Solved

Override Windows file lock

Posted on 2013-10-30
5
481 Views
Last Modified: 2013-11-13
Occasionally I get the following error: The process cannot access the file because it is being used by another process.

Is there any way to override this error?  Sometimes I get this error even though I am sure no process has a lock on my file or directory.  In such cases, it would be nice to reset the file lock and get on with life.
0
Comment
Question by:CFS_developer
  • 2
  • 2
5 Comments
 
LVL 74

Accepted Solution

by:
käµfm³d   👽 earned 500 total points
Comment Utility
You can try Unlocker. I had great results with it on XP. The last time I tried it on Windows 7, it didn't seem to work as intended, but perhaps there's been an update since then.
0
 
LVL 15

Expert Comment

by:Skyler Kincaid
Comment Utility
Unlocker does work well. What kind of file is it? Is it a Word file or another Office file?

Sometimes the error is caused when you highlight the file and the preview is displayed on the right hand side of Windows Explorer.

Just an idea, let us know!
0
 

Author Comment

by:CFS_developer
Comment Utility
I got this problem when redirecting program output:
perlProgram.pl > log

And then I called the perl program via a Sql Server job, and then I cancelled the job.  

Somehow that sequence leaves the log file locked.  

If it hurts don't do it is one obvious approach, but it would be nice to find a way to fix this situation when it comes up.  I'll try UnLocker and see what it does.
0
 
LVL 15

Expert Comment

by:Skyler Kincaid
Comment Utility
Oh okay that situation makes more sense now.

Unlocker should be able to do what you need it to do. It has unlock and delete options.

I never like leaving Unlocker installed on a server if that is what you are using because it seems very Malwareish when you are installing it and downloading but I have never seen any  issues caused by it.
0
 

Author Closing Comment

by:CFS_developer
Comment Utility
It's nice to solve problems.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

INTRODUCTION The purpose of this document is to demonstrate the Installation and configuration of the Data Protection Manager product. Note that this demonstration was prepared on the basis of Windows OS is 2008 R2 and DPM 2010. DATA PROTECTI…
Citrix XenApp, Internet Explorer 11 set to Enterprise Mode and using central hosted sites.xml file.
Windows 8 came with a dramatically different user interface known as Metro. Notably missing from that interface was a Start button and Start Menu. Microsoft responded to negative user feedback of the Metro interface, bringing back the Start button a…
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now