files report in use, or access is denied, but they are not in use.

Posted on 2006-05-26
Last Modified: 2010-04-13
Thank you experts,
I have a windows 2000 machine in a small (3 node) peer to peer as a server, it is the forth machine (no work is done on the machine, I know that it is not a sever in the true sence of the word.)  I have had one on the machines on the network get a blue screen.  Since that time I can not access some of the files on the "server".  I tried to copy off the files, but i receive an error that the file may be in use.  If I try to click on an Exe then I get access to specific device, path, or file is denied.  I am logging in as Administrator and have all rights, I have checked the open files folder, no files show open. The event log: Security log is empty, application log reports no yellow or red flags for today, the system log shows a few yellow flags all the same : the redirector failed to determine the connection type.  I have done multipile shutdowns.  I can not see anythin that would "lock" these files. Other data is fine on the system, just selected files.  This network is "down" as the selected files are needed to for a application.

Thank you in advance for any help
Question by:mdlp
    LVL 32

    Accepted Solution

    Just to be sure, use Filemon from:

    to see if anything has those files open.

    Another possibility is that the directory entries for those files/folders are corrupted.
    LVL 32

    Expert Comment

    LVL 52

    Assisted Solution

    A program to show you if they are in use is "isusedby" by mst software. Maybe a checkdisk on the "server" would help.
    chkdsk c: /r
    or d: or...

    Author Comment

    I do not know what happened, I did accept both questions and split the points, 300 to r-k and 200 to Mcknife.  I did not respond as quick as I should have, as I got put on another project.  I am sorry for any inconvience that I have caused to the experts and to you the follow up staff!

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    IT, Stop Being Called Into Every Meeting

    Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

    NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
    This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
    In this sixth video of the Xpdf series, we discuss and demonstrate the PDFtoPNG utility, which converts a multi-page PDF file to separate color, grayscale, or monochrome PNG files, creating one PNG file for each page in the PDF. It does this via a c…
    Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    15 Experts available now in Live!

    Get 1:1 Help Now