Solved

Corrupt File

Posted on 2004-08-13
6
205 Views
Last Modified: 2012-06-22
I have a file that is corrupt in Paradox 8.  It has 241 records in it, I looked at it in word.  When I click on the corrupt Paradox file, it opens Paradox, but none of the selections open the file.  I can put the file on a Windows XP Professional or Windows NT 4.0 server to try the recovery.

Is there anyway to fix it?  

TIA,

Jess
0
Comment
Question by:JessP
  • 4
6 Comments
 
LVL 5

Expert Comment

by:ravisimpi
Comment Utility
Try these softwares, I have never tried them.. But have a feeling that they can repair your file

http://www.pcrecovery.com/product.asp?ProductID=9

http://www.officerecovery.com/paradox/index.htm
0
 

Author Comment

by:JessP
Comment Utility
RAVI--Nice work, I will try this recovery today and get back to you.

Thanks,

Jess
0
 

Author Comment

by:JessP
Comment Utility
RAVI:

I ran the ParadoxRecovery software. It said it fixed .db files.  the file I ran it on on was a .FSL file.  I got the following Message after running the program:

"Internal shell Error.  contact the software developers.  Code=0xC00000005, Address=0x10005889"

any ideas what may be wrong or if this error message is correct?

TIA,

Jess
0
Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

 
LVL 16

Accepted Solution

by:
ahmedbahgat earned 500 total points
Comment Utility
try and import the data into access db file, possibly access will be able to read the file, if successful then yoc export it back to paradox format

cheers
0
 

Author Comment

by:JessP
Comment Utility
I have had some other problems that precluded me getting to this problem.  I hope to soon.---Jess
0
 

Author Comment

by:JessP
Comment Utility
Thank You all and Thank You ahmedbahgat.  It worked :]
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

This article summarizes using a simple matrix to map the different type of phishing attempts and its targeted victims. It also run through many scam scheme scenario with "real" phished emails. There are safeguards highlighted to stay vigilance and h…
A brand new malware strain was recently discovered by security researchers at Palo Alto Networks dubbed “AceDeceiver.” This new strain of iOS malware can successfully infect non-jailbroken devices and jailbroken devices alike.
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now