Solved

Deleted DBF files

Posted on 2004-08-31
3
223 Views
Last Modified: 2013-12-04
Today our software Dr. Dispatch came to a hault when I found my DBF and DBT and MDX files were deleted and our backup didnt pick them up and I talked to my softwares technical support and they are going to try and rebuild the files around and old DBF file we had saved but I need to figure out how these files got deleted how can I do so?
0
Comment
Question by:rsmithgs
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 7

Expert Comment

by:msice
ID: 11947227
You could setup auditing on the folders where the db files reside to findout who deletes them in the future, but if it was not on before you wont be able to see how, who or what deleted them. See second half of this artical: http://www.microsoft.com/technet/prodtechnol/windows2000serv/deploy/confeat/13w2kadc.mspx  under "Auditing System Resources"
0
 

Author Comment

by:rsmithgs
ID: 11956970
Also I was wondering we are running a SATA Raid 5 whats the best way to go looking for the deleted files?
0
 
LVL 7

Accepted Solution

by:
msice earned 500 total points
ID: 11957582
I use this http://www.binarybiz.com/vlab/ you can install it for free and it will let you see what it can recover. Then you can pay and it will recover it for you. I have used it many times and I have never found a file it cant recover - you will be amazed at how much it sees.
0

Featured Post

Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
This is my first video review of Microsoft Bookings, I will be doing a part two with a bit more information, but wanted to get this out to you folks.
Suggested Courses

627 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question