No mean to hijack the thread, but by watching your query, I have to warn you to be more careful and try to handle possible sql injections.
In the query you post, if you place, for example:
username text: ' or not('1'<>'1
password text: ') or '1'='1
, your query will then be:
select * from adminclient where username='' or not('1'<>'1' and password='') or '1'='1'
This will always return the complete list of users, thus getting someone to login without knowing any user name or password.
B4A has the query2 method, which is more safe.