473,385 Members | 2,162 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,385 software developers and data experts.

Corrupt LACCDB File?

124 100+
A split network Access 2010 database always shows users as being in the database front end in the lock file, even when no one is in it. I am unable to make any design changes or compact and repair the database as a result, despite having no one in the database, because of the misinformation from the lock file.

Is the best method for dealing with this to delete the lock file and have Access create a new one? So far I have been unable to delete the lock file because it always says there are users in it. Thanks for any advice.
Oct 7 '15 #1
1 3623
jforbes
1,107 Expert 1GB
As long as you are sure there is no one currently using the database, you can delete the Access lock file.

I haven't used Access as a Backend for quite sometime, so I'm relying on my fuzzy memory. There are times when a system/windows filelock gets orphaned and maybe this is what you are running into. When this happens, Windows thinks the file is in use, but it isn't. Whoever was using the file somehow didn't let Windows know it was done or Windows ignored them. This can happen to pretty much any file that is opened for edit; a datafile. So in my fuzzy experience it happened with Access from time to time, both the lock file and the database. This wasn't a surprise since it would coincide with the Access lock file getting out of sync which will happen pretty much regardless of the precautions short of moving to SQL Sever.

So when a file gets an orphaned file lock on it, the easiest and surest way to unlock it is to reboot. Isn't that the answer for everything? If it's on a FileServer/FileShare you may not want to reboot as that can be disruptive, so something you can try is to rename the Access Lock file. Every once in a while this will work. The Windows file lock might be dropped or it may stay with the renamed file which you can delete on the next reboot. Either way you can get back to work on the Backend Database. If the Rename trick doesn't work, you might try the techniques here: http://www.howtogeek.com/128680/how-...es-in-windows/ I've never tried it, so if you do, let us know how it goes.
Oct 8 '15 #2

Sign in to post your reply or Sign up for a free account.

Similar topics

5
by: Vinay | last post by:
Hi I have a corrupt word file. I am able to open it with the code given below tr Dim pInfo As System.Diagnostics.ProcessStartInfo = New System.Diagnostics.ProcessStartInfo( pInfo.UseShellExecute...
0
by: Ken Ekberg | last post by:
Hello everyone, I am moving an ATL project from VC6 to VS .NET 2003. It builds fine in VC6, but I am having problems with ADO on VS 2003. It appears that if I use the msado15.idl included with...
4
by: nepdae | last post by:
Well, after reading and hunting all over the web, including here, I still haven't been successful in my attempts to resolve my situation. So, I thought maybe I'd just ask. Here's the situation: ...
1
by: vinodyadav1976 | last post by:
Hi, I have one cpp file when i was working due to power failuire file get correpted now all source code is looking in binary form. How to recove code from this birary form. any can help me.
2
by: tubby | last post by:
Does a py script written to open and read binary files on Windows affect files on a Linux or Mac machine in a negative way? My concern is portability and safety. I want scripts written within...
4
by: GS | last post by:
How do I fix this corrupt resource file header problem? Corrupt .resources file. Got an unexpected EndOfStreamException while trying to read the ResourceReader header. When I open up properties,...
2
by: pullover | last post by:
hello, i'm from paris and i study graphic design.i'm not familiar with jpeg compression, decoding... i had few searchs on google though. i would like to learn how to manipulate the binary code of...
0
by: xXPureXx | last post by:
The error code is as follows: "An error occurred creating the form. See Exception.InnerException for details. The error is: Corrupt .resources file. Got an unexpected EndOfStreamException while...
4
by: PeterRee | last post by:
I have a user who was working on an Excel 2007 file from a thumbdrive.. all of a suddem the file will not open and generates the following error: "Excel cannot open the file 'filename.xlsx'...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.