How to avoid unauthorized changes in the queries’ and tables’ designs of Access 2007 or 2003 databases?