Under this kind of mechanism, the databases refuse all
the Web connections, except the local ones, that is, the
operation from the access. The databases is clearly to the
users and cut off the operation directly from the Web
databases. Even though the hackers get the account code
they can’t invade the databases by using the Web.