Data Recovery Information


5 Simple Tips to Prevent MS Access Database Corruption


It's important to understand that any time an Access client disconnects unexpectedly, it may set a "corruption flag" in the .mdb file indicating that the database is in a corrupt state (regardless of whether any data has actually been corrupted or not). Any user who attempts to open the database while this flag is set will receive a message, and the database will have to be repaired before it can be used. If the users don't have permission to perform the repair, or don't know how to perform the repair, there may be significant downtime before the database is available again. This can result in a loss of productivity as well as extreme frustration for the users. Following the 5 tips below will minimize your odds of data loss from corruption in your Access databases.

1) Split your database.

The single most important thing you can do to prevent corruption in MS Access databases is to split the database into a "front-end" and a "back-end". The front-end contains all of the forms, queries, and reports, while the back-end contains only the data tables. A copy of the front-end is placed on each user's computer, and the back-end with the table data is stored in a shared folder on the network. How does this prevent corruption? Well, consider the amount of information that must make it across your network to your computer each time you open a form or report. If one bit of that information doesn't make it intact, you risk corrupting your database. Alternatively, if the forms, queries and reports are all stored on your local computer, then the only bit of information that needs to traverse the network is the actual table data. By reducing the amount of data you need to move back and forth across the network, you significantly reduce the chances of corrupting your database. If you're having corruption problems with an Access database on a network drive, splitting the database is the single most important thing you can do to stop it.

2) Don't hold connections open.

This one applies to both programmers and users. If you're a programmer, make sure you close your connections as soon as possible after using them. Leaving the connections open will allow more opportunities for an "unexpected" dropped connection. The only time you may want to leave a connection open longer than required would when it's used inside a loop. For such a case, open the connection at the beginning of the loop, and then close it after the loop is completed. Just make sure it gets closed for all cases (including exceptions).

If you're using a Microsoft Access database or application, be sure to close it when you're finished. Again, leaving the application open provides the opportunity for corruption if a network connection is lost. Remind users to always close the application before going home, as nightly backup jobs may fail or cause corruption in the shared file if there are open connections.

3) Exit the database correctly.

Always close the database or application correctly. Ctrl-Alt-Delete/End Task can wreak havoc on Access databases. Whenever possible, complete your tasks, then close the application using the File - Exit menu option or alternative Exit option provided by the application.

4) Don't skimp on hardware.

Remember that the corruption flag can be set from the slightest packet loss between your computer and the database file. MS Access has sometimes been called "the canary in the coal mine". It has gained this reputation from being the first application to "die" when there's the slightest hint of trouble on your network. Just like the slightest presence of gas caused the canary to die, the slightest presence of network problems and packet loss can kill your Access applications. Make sure you're not using the cheap built-in NICs that come with some PCs. Instead, use brand name network cards. The same goes for cheap hubs. Whenever possible, match good brands of equipment throughout your network.

5) Compact and repair regularly.

Performing the built-in compact and repair function regularly is recommended to prevent corruption and improve performance. Consider automating this function with a utility to compact and repair all of your databases nightly or during the weekend.

Error messages to look out for - the following error messages may signal database corruption:

"The database 'databasename.mdb' needs to be repaired or isn't a Microsoft Access database file."

"Record(s) can't be read, no read permissions on 'databasename.mdb'"

"Unexpected Error 35012"

"Unrecognized database format 'databasename.mdb'."

"'databasename.mdb' isn't an index in this table. Look in the Indexes collection of the TableDef object to determine the valid index names."

"The Microsoft Jet database engine could not find the object 'databases'. Make sure the object exists and that you spell its name and path name correctly."

"The database has been placed in a state by user '' on machine '' that prevents it from being opened or locked"

"Disk Error -- Reserved error (-1601)"

"The database has been placed in an unexpected state."

"Record(s) cannot be read; no read permission on 'MSysObjects'"

"Record(s) cannot be read; no read permission on 'MSysACEs'."

"The Microsoft Jet database engine cannot find the input table or query 'MSysAccessObjects'. Make sure it exists and that its name is spelled correctly."

Conclusion:

While you may never be able to prevent all Microsoft Access database corruption, you should be able to stop 98% of the problems before they occur by following these 5 simple tips. Follow these tips and implement a prudent automated backup schedule to minimize your odds of significant data loss.

Kevin Sparks is a technical writer for Kaizen Software Solutions, the producer of Digital DBA, an automated MS Access monitoring, backup, and compact/repair utility. For more information, visit their website at http://www.kzsoftware.com/products/digitaldba


MORE RESOURCES:
This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news


9to5Mac

Apple introduces new data recovery process for Macs with T2 chip
9to5Mac
Apple has recently documented a new data recovery process internally for Macs that utilize its T2 chip introduced with the iMac Pro and the 2018 MacBook Pro. The new process for repair staff is being introduced due to the T2 chip's advanced security ...



Digital Trends

Documentation shows data recovery possible for Macs with T2 coprocessor
Digital Trends
With previous versions of Apple's MacBook lineup, the company implemented a connector on the logic board for data recovery. However, after the launch of the 2018 MacBook Pro, the connector was removed, leaving speculation that due to the T2 chip's ...



MarTech Series

Sesame Software Unveils New Features of Relational Junction Data Recovery for Salesforce on Salesforce ...
MarTech Series
Launch of Enhanced Data Recovery on the World's Leading Enterprise Apps Marketplace Enhances Complex Backup and Recovery within Salesforce. Sesame Software, a leader in data warehouse, data recovery, and data integration solutions, introduces ...



Cloudwards

How to Recover Data From a Broken Phone: Three Steps to Data Recovery
Cloudwards
We all know someone whose phone never seems to be fully functioning. A knock here, a drop there and God forbid you leave it in your pocket while performing the essential business of the day. If that happens to you, or you just want to help a friend in ...



Redfield Herald (press release) (blog)

Data Recovery Software Market Growth Factors, Applications, Regional Analysis, Key Players and Forecasts by 2023
Redfield Herald (press release) (blog)
Data Recovery Software Market report is a tremendous resource, which provides technical and financial details of the market and elaborates the Data Recovery Software Market overview. Also focuses on key players, major drivers, plans, and development ...
Data Recovery Software Market Outlook and Opportunities in Grooming Regions; Edition 2018-2025Chronicle India

all 25 news articles »


Free download data recovery software with key
Digital Journal
Use Aidfile free data recovery software version 3.674, 2GB size file free recovery. Most of the time, you just accidentally deleted some photos or office documents. The total amount of all files should not exceed 2GB. You can use the free version directly.



Data recovery for businesses: Top tools to protect your most precious asset
TechGenix (blog)
Data loss is way too common. Every organization will suffer at least a minor data loss at some point. Data loss can occur due to multiple reasons that include external, internal, as well as human errors. Unless you have a solid data recovery process ...



DoYourData Releases Data Recovery Software 6.5 to Help in Recovering More Lost Data on PC and Mac
Digital Journal
Guangdong, China -- (SBWIRE) -- 09/19/2018 -- DoYourData Software, the famous data recovery software developer, releases Do Your Data Recovery 6.5 to help both Windows users and Mac users efficiently and completely recover lost data from PC, Mac, ...

and more »


Digital Journal

Recoverit Offers the Safest and Most Reliable Partition Recovery Solution in the Industry
Digital Journal
As one of the best data recovery software, Recoverit has provided users with a lot of data recovery solution like deleted file recovery, recycle bin recovery, formatted drive recovery, external device data recovery, virus attack recovery, system crash ...

and more »


Digital Journal

TTR Data Recovery extending free data recovery to Carolina Florence victims
Digital Journal
“We are offering our industry-leading data recovery services completely FREE of charge to the direct victims of Florence in Carolina. This is our humble attempt to show solidarity in times of need and to make lives wee better for our fellow brothers ...

and more »

Google News

home | site map
© 2007