Solved

OS corrupted?

Posted on 2002-04-24
7
255 Views
Last Modified: 2010-04-13
Although not my posting, my problem pretty much resembles the problem described in the following link.  

http://groups.google.com/groups?th=509f2e8bafad30e8

However, I can add what I think is a very correlative fact:  my problem only started occurring after the server logged a "Drive C: nearing capacity" event.  This is because I allowed a performance monitor log to grow unchecked.  I cleaned up disk space at that time and stopped performance monitors, but the server has been experiencing between one and six of these access violations every day since then.  

In an effort to resolve it, I upgraded the windows scripting engine from 5.1 to 5.6, but the problem has been relentless.  

The server was running faultlessly for over a year before the the disk full event.  I'm beginning to think that some Windows OS files are corrupted and that we will need to wipe the server clean and reinstall everything. I am looking for the best advice (hopefully with references) which would help me avoid this, or which would convince me that I am dong the right thing.

-- Windows 2000 w/ SP2 and critical updates
-- Dell 4400, dual CPU, 1GB memory
-- Used for web serving (IIS, ASP)
-- no recovery disk available (shame on me!)
0
Comment
Question by:xinger
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 2
7 Comments
 
LVL 63

Accepted Solution

by:
SysExpert earned 200 total points
ID: 6967038
Weird.

Have you run Defrag and Chkdsk at all ?

It could be  a  problem with fragmentation.

I hope this helps !
0
 
LVL 2

Author Comment

by:xinger
ID: 6967113
Chkdsk came out perfectly clean.  We'll do defrag tonight.
0
 
LVL 2

Author Comment

by:xinger
ID: 6967157
Chkdsk came out perfectly clean.  We'll do defrag tonight.
0
Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

 
LVL 16

Expert Comment

by:GUEEN
ID: 6967236
Check out the ASP FAQ at the bottom of this link:
http://www.eventid.net/display.asp?eventid=5&source=active+server+pages
0
 
LVL 16

Expert Comment

by:GUEEN
ID: 6967239
DL the February 5, 2002 pdf:
http://www.aspfaq.com/downloads.asp
0
 
LVL 2

Author Comment

by:xinger
ID: 6968187
shekerra:  specifically which MSKB Q# or ASPFAQ did you think addresses my issues?  I looked through the .pdf and did not recognize anything familiar.  And I thoroughly searched MSDN and MS Support and Google sites before posting this question.
0
 
LVL 2

Author Comment

by:xinger
ID: 6971829
Thanks for giving me something else to try.  Unfortunately, it did not make any difference.  I'm closing this question because we decided to format the drives and reinstall Windows 2000.  
0

Featured Post

Get 15 Days FREE Full-Featured Trial

Benefit from a mission critical IT monitoring with Monitis Premium or get it FREE for your entry level monitoring needs.
-Over 200,000 users
-More than 300,000 websites monitored
-Used in 197 countries
-Recommended by 98% of users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Today’s effective marketing is about coming down to the customers’ level and engaging in a whole new way. A text message is one of the most effective and influential ways that you can engage your customers. Here are eight ways that you can utilize t…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…

695 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question