Solved

copy access file still locked

Posted on 2013-05-16
3
462 Views
Last Modified: 2013-05-16
hey guys, i'm putting an access file on a network where it will be accessed by many people at the same time. i've used a force shutdown mechanism BUT in the event that something screws up and the network access file always has an .ldb file, are there any problems if i just copy the mdb file to my desktop, delete both the .mdb and .ldb file from the network and then just compact and repair the mdb file on my desktop before putting it on the network?

what i think is that i'll lose some data on the ldb file but it's ok in this case that i lose that data. i'm just trying to find a way to reset the database should it become corrupted.
0
Comment
Question by:developingprogrammer
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 57

Accepted Solution

by:
Jim Dettman (Microsoft MVP/ EE MVE) earned 500 total points
ID: 39170994
<<are there any problems if i just copy the mdb file to my desktop, delete both the .mdb and .ldb file from the network and then just compact and repair the mdb file on my desktop before putting it on the network? >>

 There's no need to copy the MDB file to a local drive, but it may be faster.   And while those are the basic steps, you many find that your unable to delete the LDB file.
 
 The answer to that is a reboot.  If you can't reboot, then the file handle needs to be closed manually.  You can look at this old thread:

http://www.experts-exchange.com/Microsoft/Development/MS_Access/Q_22423758.html

 To see how to do that.  There are a few ultities out there that do the same thing.

  The .LDB by the way contains no other data then a list of the station names and users that are currently connected or were connected and left the DB corrupt.  With all users out, you can delete it at any time without loosing anything.

 Last comment on "force shutdown", hopefully that's built into the app and your allowing the clients to exit gracefully.  If your forcing them out by severing their connections, you don't really want to do that.

Jim.
0
 

Author Comment

by:developingprogrammer
ID: 39171971
Hi Jim, thanks so much for your help and for directing me to the other resource too.

I don't have access to the server computer and have never used windows server before so I'm completely clueless about any server things. I'm just a very beginner programmer and a user of a network folder as it turns out haha. So from my point of view, how do I delete a corrupt database along with its ldb file so I can re upload the working database?this deleting the ldb file is something I'm always very scared of haha
0
 

Author Comment

by:developingprogrammer
ID: 39172031
Oops Jim, I think this question has been answered like a few hundred times on experts exchange already and it's just sheer silliness and laziness that I didn't check before that. Those are two qualities a developer must never have so I am closing this thread and getting off my arse = ) but thanks for your help Jim!! Much appreciated!!!!
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your contacts.How it Works The attack works by targeti…
As tax season makes its return, so does the increase in cyber crime and tax refund phishing that comes with it
Using Microsoft Access, learn some simple rules for how to construct tables in a relational database. Split up all multi-value fields into single values: Split up fields that belong to other things into separate tables: Make sure that all record…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question