Solved

I can't delete a corrupt .pdf file in my win2k server!

Posted on 2004-10-19
4
302 Views
Last Modified: 2010-04-14
Hi all,

         I have a corrupt .pdf file sitting in my server and I can't delete, rename, move or do anything to it. When I try to delete it, it says "make sure the disk is not full or write protected or that the file is not in use." I am login as administrator, and when I right click the file choose property, there is no security tab in there. The size of the file is 0Kb.

Thanks Heaps
YOurs EC
0
Comment
Question by:ericpc
  • 3
4 Comments
 
LVL 49

Expert Comment

by:sunray_2003
Comment Utility
Hi ericpc,

have you tried to delete it in safe mode
go to task manager and see if there is no acrobat process running. if it is running ,close the application , kill the process and then check if you can remove it

SR..
0
 
LVL 49

Expert Comment

by:sunray_2003
Comment Utility
Check if this utility wud work
http://www.purgeie.com/delinv.htm

SR
0
 
LVL 49

Accepted Solution

by:
sunray_2003 earned 125 total points
Comment Utility
Check this aswell

You cannot delete a file or a folder on an NTFS file system volume
http://support.microsoft.com/?kbid=320081

http://www.theeldergeek.com/delete_undeletable_file.htm
0
 
LVL 11

Assisted Solution

by:KaliKoder
KaliKoder earned 125 total points
Comment Utility
Hello Hi ericpc,

Please try the following:

- Reboot your machine
- Log back on, goto task manager and see if acroread.exe or any such is running, if its running kill it
- Clear up your system temp directory by clicking on start -> run -> type "%systemroot%/temp" without the quotes and hit ok. Make sure its empty
- Clear up your profile temp directory by clicking on start -> run -> type "%temp%" without the quotes and make sure its empty
- Open up a command prompt and try deleting the file from there (let me know if you need to know dos commands to do that)

You said, there is no security tab, meaning File system is FAT, not NTFS, so you should have previleges to delete it.

Please let us know of your results!

Thanks and Good Luck
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
In this step by step tutorial with screenshots, we will show you HOW TO: Enable SSH Remote Access on a VMware vSphere Hypervisor 6.5 (ESXi 6.5). This is important if you need to enable SSH remote access for additional troubleshooting of the ESXi hos…
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now