Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

edb file locked while installing software

Posted on 2010-09-08
3
833 Views
Last Modified: 2013-11-14
We are installing a bespoke piece of software which seem to be sticking when attempting to install. The error is another application has exclusive access to the file "c:\windows\softwaredistribution\datastore\logs\tmp.edb

Is there a way, script etc which coulld help me get this installed.
The error relates to something having access to the edb file which appears to be stopping the instal
error.JPG
0
Comment
Question by:andrewison
  • 2
3 Comments
 
LVL 4

Accepted Solution

by:
jos_l earned 500 total points
ID: 33625425
Check out this link:

http://www.experts-exchange.com/Programming/Installation/MSI/Q_22932186.html


The mentioned solution is to check out what process is locking this EDB-file with "OpenedFilesView" ( http://www.nirsoft.net/utils/opened_files_view.html )


OpenedFilesView displays the list of all opened files on your system. For each opened file, additional information is displayed: handle value, read/write/delete access, file position, the process that opened the file, and more...
Optionally, you can also close one or more opened files, or close the process that opened these files.



HTH!
0
 

Author Comment

by:andrewison
ID: 33634293
thanks fo rthe insight, I shall look today and see if that shine a light on the situatiion
0
 

Author Closing Comment

by:andrewison
ID: 33670971
Thanks for the response, havent had time to test it but it place me on the right path to assess where the probs is.
Thanks...
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

One of the major drawbacks of deploying applications by GPO is the complete lack of any centralized reporting. After a normal deployment, there are two ways to find out if it was successful – by looking in the event log, and by looking in the log of…
Monitor input from a computer is usually nothing special.  In this instance it prevented anyone from using the computer.  This was a preconfiguration that didn't work.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
A short tutorial showing how to set up an email signature in Outlook on the Web (previously known as OWA). For free email signatures designs, visit https://www.mail-signatures.com/articles/signature-templates/?sts=6651 If you want to manage em…

792 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question