473,396 Members | 1,767 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

Corrupt Encrypted Back-end. Any suggestions?

Well, after reading and hunting all over the web, including here, I
still haven't been successful in my attempts to resolve my situation.
So, I thought maybe I'd just ask. Here's the situation:

I have an Access 2000 database (~15 users), split into a front- and
back-end. Each user has a local copy of a workgroup file and the data
file is out on a server.

The problem started when the IS department upgraded the server at
night, touching every file in the process. One of my users decided not
to log out at night and left an open connection to the data file. Thus,
I come in the next day to find everyone getting error messages (can't
connect, not a valid mdb, etc.) and those that can get in are
experiencing a weird error: one of the forms is displaying records for
the wrong patients.

The form affected (which probably isn't the only one but it is easily
noticable) pops up listing records linked to the customer. It's a
progress notes form with timestamped entries. Now wrong customers'
notes are showing up, getting criss-crossed.

I booted everyone off, made a copy of the data file to explore, and
found that when I searched for some of the sub-table's records they
were being displayed with one foreign key but when I filtered on it, it
displayed that record plus a bunch of records with a different foreign
key. The database seems to store the correct key with the record but
when you look at it in the table it shows a different key.

So here's what I did. I created a new database from scratch, using my
administrative account in our security file, imported the tables from
the copy of the corrupt data file, re-linked a copy of my front-end to
the new data file and built a new mde. When I went to test it, things
were working again. But I come in the next day and everyone starts
getting the same errors. The one catch is that a single user logged in
to the new data file with the old mde before I got a chance to upgrade
hers. Now, I'll try all of this again to see if that old mde hitting
the data file is what corrupted things all over again but I am begging
for additional suggestions.

Can I create a blank database with the standard workgroup file and
import the tables from the encrypted one? Can I export the encrypted
tables to text files or spreadsheets so I can import them into a
non-encrypted data file and scrap encryption? I plan on trying to
migrate the backend to Oracle soon, using Access only as a front-end
with ADO. But I need to get things limping along until then.

Ideas?

Mar 9 '06 #1
4 2378
Br
ne****@vmmc.org wrote:
Well, after reading and hunting all over the web, including here, I
still haven't been successful in my attempts to resolve my situation.
So, I thought maybe I'd just ask. Here's the situation:

I have an Access 2000 database (~15 users), split into a front- and
back-end. Each user has a local copy of a workgroup file and the data
file is out on a server.
Why has each user has a local copy of the workgroup file? Makes it harder
to administer users. Any reason for not also sharing it on the server?
The problem started when the IS department upgraded the server at
night, touching every file in the process. One of my users decided not
to log out at night and left an open connection to the data file.
Thus, I come in the next day to find everyone getting error messages
(can't connect, not a valid mdb, etc.) and those that can get in are
experiencing a weird error: one of the forms is displaying records for
the wrong patients.

The form affected (which probably isn't the only one but it is easily
noticable) pops up listing records linked to the customer. It's a
progress notes form with timestamped entries. Now wrong customers'
notes are showing up, getting criss-crossed.

I booted everyone off, made a copy of the data file to explore, and
found that when I searched for some of the sub-table's records they
were being displayed with one foreign key but when I filtered on it,
it displayed that record plus a bunch of records with a different
foreign key. The database seems to store the correct key with the
record but when you look at it in the table it shows a different key.

So here's what I did. I created a new database from scratch, using my
administrative account in our security file, imported the tables from
the copy of the corrupt data file, re-linked a copy of my front-end to
the new data file and built a new mde.
Did you try a repair/compact first?
When I went to test it, things
were working again. But I come in the next day and everyone starts
getting the same errors. The one catch is that a single user logged in
to the new data file with the old mde before I got a chance to upgrade
hers. Now, I'll try all of this again to see if that old mde hitting
the data file is what corrupted things all over again but I am begging
for additional suggestions.
Maybe force users to shut down the database? (eg. if no activity for 10min
close all forms bound to data, or if time between 6pm and 6am close?).
Can I create a blank database with the standard workgroup file and
import the tables from the encrypted one?
When did encryption come into this?

You can import as long as you have permissions.
Can I export the encrypted
tables to text files or spreadsheets so I can import them into a
non-encrypted data file and scrap encryption?
What do you mean "scrap encryption"? Can't you just turn encyption off?
I plan on trying to
migrate the backend to Oracle soon, using Access only as a front-end
with ADO. But I need to get things limping along until then.

Ideas?

--
regards,

Br@dley
Mar 9 '06 #2
>Did you try a repair/compact first?

Yeah, the problem is that everything seemingly works (manually
verifying newly added data integrity) until the next day when users
start logging back in. Then things fall apart again. No out of the
ordinary user actions are taking place. They do exactly what I do when
I test things.

Maybe force users to shut down the database? (eg. if no activity for 10min
close all forms bound to data, or if time between 6pm and 6am close?).
We have established new protocols for database use (too little, too
late) but it's not that they are continuously re-creating the original
scenario. That server upgrade only tainted the data file once. All
users are logged off at the end of the day and the data file isn't
being touched by outside processes.
Can I create a blank database with the standard workgroup file and
import the tables from the encrypted one?

When did encryption come into this?
The data file was encrypted from day one. During my research, I came
across posts indicating that encrypted data files are more prone to
corruption. I'm just grasping at straws right now. If that is the case,
I would happily trade that for stability until we migrate to Oracle
whereby security and data integrity will be much more stringently
enforced.
You can import as long as you have permissions.


Well, the thing is that I have imported the whole data file tableset
into a clean mdb while using the secured mdw and logged in as my
adminstrative account. But that imported copy still exhibits the same
problems after a day. I guess I'm just trying to figure out what action
being taken is the cause for re-corruption. Like I said, there was that
one user who tried to access a new, imported and supposedly stable data
file with an mde still linked to the corrupted data file. The new data
file was identically named and put in place of the old, corrupt one but
I thought maybe not using an mde specifically linked to the clean copy
and re-compiled might have tripped things up. Does that sound
plausible? If not, I don't know what else to look at.

- Dae

Mar 9 '06 #3
ne****@vmmc.org wrote in
news:11**********************@p10g2000cwp.googlegr oups.com:
Well, the thing is that I have imported the whole data file
tableset into a clean mdb while using the secured mdw and logged
in as my adminstrative account. But that imported copy still
exhibits the same problems after a day. I guess I'm just trying to
figure out what action being taken is the cause for re-corruption.
Like I said, there was that one user who tried to access a new,
imported and supposedly stable data file with an mde still linked
to the corrupted data file. The new data file was identically
named and put in place of the old, corrupt one but I thought maybe
not using an mde specifically linked to the clean copy and
re-compiled might have tripped things up. Does that sound
plausible? If not, I don't know what else to look at.


The errors you're encountering sound like a corrupted index. I would
suggest importing the empty table structures, rather than structure
plus data, and then appending the records to it. This will then mean
that any corruption you have will be in the records and not in the
table structures themselves.

As far as I know, there is no evidence that encrypted databases
(which any MDB secured by Jet user-level security should be, or it's
not really secure, since anyone could browse the data by loading it
into any editor directly) are more prone to corruption.

I don't know what the issue of using an MDE has to do with it. Only
the front end should be an MDE, as there is no effect on a data-only
MDB when converted to an MDE (since there are no
forms/reports/modules in it).

You should also check that everyone has patched versions of Access
and Jet. I've seen machines reverted to older unpatched versions
that caused all sorts of havoc.

If you find that everything is OK in that regard, and you're still
experiencing the corruption, I'd suggest that you send the file to
Peter Miller of PKSolutions (PKSolutions.com). He'll not charge you
for analyzing the file, only if he's able to recover it, and he's
very cheap (in addition to being very reliable).

--
David W. Fenton http://www.dfenton.com/
usenet at dfenton dot com http://www.dfenton.com/DFA/
Mar 9 '06 #4
I think you might have confused Encryption with WorkGroup
Security.

Encryption you can turn on or off by opening the database
and going to Tools, Security, Encrypt/Decrypt.

This is independent of and not related to WorkGroup
Security.

After compacting and repairing a database, you should
relink and compact each of the databases that connect
to it. Database design changes are not integrated
into the database design until you compact the database.
When you compact a database and integrate any recent
database design changes, you invalidate linked tables
which have stored the old database schema. This can
certainly cause errors and confusion, and might reasonably
be supposed to cause corruption. Repairing a damaged
database might reasonably be supposed to cause design
changes: Repair will normally drop damaged indexes.

After repairing a corrupt database, it is good practice
to import all of the objects into a new database, and to
check that none of the indexes have been dropped. It is
better practice to import all of the structures, and then
append all of the data. It is even better practice to
create all of the structures from scratch, then append
the data. In 2003, XML may be one way to do this. The
last step is pretty extreme, and rarely justified.

Since the IS department has 'upgraded' the server, you
should immediately suspect network failures. Access is
a canary in a coal mine to network failures, and you
should start complaining now. Make sure they have applied
all service packs: ask them to monitor bad packets,
and suggest turning off opplocks while you get this
problem sorted.

(david)
<ne****@vmmc.org> wrote in message
news:11**********************@v46g2000cwv.googlegr oups.com...
Well, after reading and hunting all over the web, including here, I
still haven't been successful in my attempts to resolve my situation.
So, I thought maybe I'd just ask. Here's the situation:

I have an Access 2000 database (~15 users), split into a front- and
back-end. Each user has a local copy of a workgroup file and the data
file is out on a server.

The problem started when the IS department upgraded the server at
night, touching every file in the process. One of my users decided not
to log out at night and left an open connection to the data file. Thus,
I come in the next day to find everyone getting error messages (can't
connect, not a valid mdb, etc.) and those that can get in are
experiencing a weird error: one of the forms is displaying records for
the wrong patients.

The form affected (which probably isn't the only one but it is easily
noticable) pops up listing records linked to the customer. It's a
progress notes form with timestamped entries. Now wrong customers'
notes are showing up, getting criss-crossed.

I booted everyone off, made a copy of the data file to explore, and
found that when I searched for some of the sub-table's records they
were being displayed with one foreign key but when I filtered on it, it
displayed that record plus a bunch of records with a different foreign
key. The database seems to store the correct key with the record but
when you look at it in the table it shows a different key.

So here's what I did. I created a new database from scratch, using my
administrative account in our security file, imported the tables from
the copy of the corrupt data file, re-linked a copy of my front-end to
the new data file and built a new mde. When I went to test it, things
were working again. But I come in the next day and everyone starts
getting the same errors. The one catch is that a single user logged in
to the new data file with the old mde before I got a chance to upgrade
hers. Now, I'll try all of this again to see if that old mde hitting
the data file is what corrupted things all over again but I am begging
for additional suggestions.

Can I create a blank database with the standard workgroup file and
import the tables from the encrypted one? Can I export the encrypted
tables to text files or spreadsheets so I can import them into a
non-encrypted data file and scrap encryption? I plan on trying to
migrate the backend to Oracle soon, using Access only as a front-end
with ADO. But I need to get things limping along until then.

Ideas?

Mar 9 '06 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

8
by: Philipp Brune | last post by:
Hi all, the following problem occured to me and I hope somebody can help me : I need to implement an encrypted File download with a PHP script on the server side and a c# client application....
7
by: deko | last post by:
I need to allow users to download files from a directory that is not publicly accessible. To do this, I use a download script: header("Content-Type: application/octet-stream");...
5
by: Vinay | last post by:
Hi I have a corrupt word file. I am able to open it with the code given below tr Dim pInfo As System.Diagnostics.ProcessStartInfo = New System.Diagnostics.ProcessStartInfo( pInfo.UseShellExecute...
2
by: Leonardo D'Ippolito | last post by:
Hi! I have two .NET win apps that need to communicate on a TCP/IP network. 'App A' must ask 'app B' if it's allowed to do some task, and 'app B' must authorize or prohibit it. How can I do...
6
by: Carolyn Vo | last post by:
Hi there! I have a string that was encrypted in Java using the classes DESKeySpec, SecretKeyFactory, SecretKey, and Cipher. It looks like using the SecretKeyFactory puts a transparent layer on...
12
by: Charlie | last post by:
Hi: My host will not allow me use a trusted connection or make registry setting, so I'm stuck trying find a way to hide connection string which will be stored in web.config file. If I encrypt...
2
by: David Kyle | last post by:
Hello, I'm building a web application where I need to have some post data encrypted. An example would be something like this: <input type=hidden value='<%# GetEncriptedData() %>'> ...
4
by: Alan Samet | last post by:
Is there a way to easily and securely use the Windows Encrypted File System (EFS) with IIS and ASP.NET? Alternatively, I would prefer to find some sort of totally encrypted low-level device driver...
1
by: MimiMi | last post by:
I'm trying to decrypt a byte array in java that was encrypted in C#. I don't get any error messages, just a result that's completely not what I was hoping for. I think I am using the same type of...
2
by: MimiMi | last post by:
I'm trying to decrypt a byte array in java that was encrypted in C#. I don't get any error messages, just a result that's completely not what I was hoping for. I think I am using the same type of...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.