Solved

Corrupt replica problem

Posted on 2001-08-24
8
367 Views
Last Modified: 2008-02-07

I have a Access97 database that is a designmaster that only I have access to and the users works with a set of replicas. It works well almost all time.
But sometimes there occour some replication errors between those replicas and its only
2 tables that are involved. If it's syncronization error there's no problem to solve it but when it's a data error in a memo field the only way to solve it is to delete all records in the design master and copy all records to it(except for the corrupt ones) and then manually recreate the corrupt record. After that I create a new set of replicas.

Here's my last problem:
When I tried to do it yesterday everything looked right until I tried to open the 'recreated' replica. Access crashed immideately when I tried to open the database.
The error was this:

"Microsoft Access - Application error"
"The instruction at '0x651a3460' referenced memory at '0x00000072'. The memory could not be 'read'".

It doesn't matter if I use a computer with NT4 or W2k.
I temporary solved the problem by copy my design master to the users.

Can someone give me a clue what might have happend?

/Brel
0
Comment
Question by:brel
  • 5
  • 3
8 Comments
 
LVL 6

Expert Comment

by:devtha
ID: 6422727
send me the copy devthaa@yahoo.com
0
 

Author Comment

by:brel
ID: 6431401
To devtha,
Can't do that. Database size is about 40MB
0
 
LVL 6

Expert Comment

by:devtha
ID: 6431971
OK try these steps

Start - Run
msaccess /decompile
select your database in question
this will decompile it. Open a mod and do a compile and save all from DEBUG menu
Then do a compact from Tools- DBUTIL

0
Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

 

Author Comment

by:brel
ID: 6432209
The database can only be opend with a special dedicated workgroupfile. Do you think it will work if I change to that one with workgroupadministrator before I run Start/Run .... and will I be able to provide the application with a valid username/password(Admin has no rights at all)?
0
 

Author Comment

by:brel
ID: 6432231
The database can only be opend with a special dedicated workgroupfile. Do you think it will work if I change to that one with workgroupadministrator before I run Start/Run .... and will I be able to provide the application with a valid username/password(Admin has no rights at all)?
0
 
LVL 6

Accepted Solution

by:
devtha earned 200 total points
ID: 6432249
OK then you need a special shortcut.
Can you put the shortcut that you use with the workgroup file in it or you have joined to the MDW using WGAdmin.?
Most of the times you need not join you can specify the workgroup on the shortcut.

as follows...
"C:\Program Files\Microsoft Office\Office\MSACCESS.EXE" D:\MY_Files\TT01.mdb /Wrkgrp "D:\MY_Files\TTsys.MDW" /User

Now for you to decompile you database it would be as follows and then just carry on the steps from the previous post.
"C:\Program Files\Microsoft Office\Office\MSACCESS.EXE" D:\MY_Files\TT01.mdb /Wrkgrp "D:\MY_Files\TTsys.MDW" /excl decompile /User

let me know how you make out with this.
0
 

Author Comment

by:brel
ID: 6799450
I finally found a good replica that I could make a designmaster of. Thanks for your suggestions.
0
 

Author Comment

by:brel
ID: 6799486
I finally found a good replica that I could make a designmaster of. Thanks for your suggestions.
0

Featured Post

Live: Real-Time Solutions, Start Here

Receive instant 1:1 support from technology experts, using our real-time conversation and whiteboard interface. Your first 5 minutes are always free.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Phishing attempts can come in all forms, shapes and sizes. No matter how familiar you think you are with them, always remember to take extra precaution when opening an email with attachments or links.
It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your contacts.How it Works The attack works by targeti…
Show developers how to use a criteria form to limit the data that appears on an Access report. It is a common requirement that users can specify the criteria for a report at runtime. The easiest way to accomplish this is using a criteria form that a…
Basics of query design. Shows you how to construct a simple query by adding tables, perform joins, defining output columns, perform sorting, and apply criteria.

785 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question