Cannot open Act database from remote computer

Posted on 2007-08-03
Last Modified: 2013-11-24
I am having issues with Act for Workgroups 9.0 not opening from a remote computer. If I am on the server where Act is installed the database opens fine but for some reason when I try to access it from a   remote computer via a share it does not open. It was working and for some reason it stopped.

I thought that there might be something wrong with the server that it is running on so I moved the database files to another server and I still get the same error. Here is the error message the remote computer gets when it tries to open the database:

The database "database name" could not be accessed. In order to access this database, check your network connection and verify that your database server is available. It may be necessary to disable any firewall software on your computer or server.

There is no firewall running on the server or the workstation. I have also tested accessing the share from the workstation to the server and it works fine. The user can create files and delete files without any issues.

Any help on this would be great.

Question by:thinksysinc
    LVL 30

    Accepted Solution

    LVL 7

    Expert Comment


    Most of these errors are caused by permissions or DNS issues.  Make sure the remote user has full permissions to the database share and supplemental file folder.  Also, without DNS ACT! won't be able to open the supplemental file folder.  You should be able to ping the machine name.  (C:\>ping servername).

    Try that and report back your results.


    Author Comment

    @GLComputing - That document was very helpful. My issue was with the SQL Browsing service. Thanks!

    @SStroz - Thanks for the help.

    Featured Post

    Find Ransomware Secrets With All-Source Analysis

    Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

    Join & Write a Comment

    Supply Chain Event Management Supply chain visibility is the ability of a company to track its products and business processes in supply chain towards building operational excellence. The goal of supply chain visibility is to improve and strength…
    These days socially coordinated efforts have turned into a critical requirement for enterprises.
    Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
    This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

    746 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    15 Experts available now in Live!

    Get 1:1 Help Now