A backup & disaster recovery plan is a blend of protecting both data & hardware. Data & hardware protection falls into three basic categories: fault tolerance, mirroring or duplication and archived backups.Fault toleranceThough Fault tolerance is not a part of backup but it is very much like having a quick-fix or spare parts available at all times, and is often coupled with mirroring or duplication, as well. The goal of fault tolerance is either...more
Transaction log files is the disaster recovery method used by Exchange Server to bring its databases to a consistent state post crash. The current transaction log data for a database is stored in E##.log file, which is further renamed to E#######.log when reaches to 5MB in size. The '##' is basically the storage group identifier. Thus, for first storage group, the file is E00.log. The file may go missing or get corrupt It generally occurs...more
Circular logging is a Exchange Server feature that implements recycling of logs. Microsoft Exchange Server writes the data to be committed to the database in transaction logs before actually writing it. If circular logging is enabled and four logs have been filled, it assumes that the first log as committed and thus, recycles the logs in order to save disk space. But it comes with a major flaw that prevents disaster recovery. If the database is corrupted while the feature is enabled, Exchange can only restore as far as the last backup is available. In case a suitable backup is unavailable, you are suggested to opt for Exchange Repair solutions that are powerful and safe too at repairing a corrupted Exchange database.For example, you observe an unexpected shutdown with an Exchange database. After this, when you try to start it, an 'JET_errFileNotFound' error is displayed with a numerical value, such as 4294965485, -1811 or 0xfffff8ed. When you view the application event log, it shows events 1120 and 5000.Cause Events 1120 and 5000 generally show database inconsistency that prevent the database to start. You should see their description for the exact reason. One probable cause...more
Outlook 2002 and prior versions limit the PST file size to 2 GB. The file, which goes beyond this limit gains fair chances of being corrupted. But Outlook 2002 includes a new feature, due to which the .pst file stops accepting email messages, much before the file could reach to 2 GB. This feature limits the .pst file size to be lesser than 2 GB in...more
Whether you have these individual or company files that must be kept private, protecting it the best way you can is very essential. These vital data should have the privacy that it needs. Some of these private details include company projects, banks account details, and even personal information as well. Unfortunately, no matter how...more
Microsoft Windows operating system contains a number of files, which work as the components of operating system. These files are specifically designed to perform a particular operation. Like NTLDR is responsible for loading the NT operating system. In case any of these files get damage or deleted due to any reason, operating system can not load and you can not get access of your hard drive partitions. This behavior cause serious partition loss situations in Windows and require Windows Partition Recovery to sort out the issue. When a critical operating system file gets deleted or damaged due to virus infection, improper system shutdown, accidental deletion or the file system corruption, you can restore the files from Microsoft Windows installation CD. You need to search for filename, replacing last character with the underscore. For instance, Notepad.ex_.If you find the file, open command prompt window and enter command EXPAND, then enter the full path of the file and path of desired destination. For example:EXPAND D:SETUPNOTEPAD.EX_ C:WindowsNOTEPAD.EXE If the path name of file contains any space, surround it with the double quotes. If the above process does not find the file,...more
Beijing Morning News November 3, according to foreign media report today, the Internet statistics agency released data from Net Applications shows, Windows 7, after the release of its market share has risen nearly 40%. Data show that, Windows...more
Obtaining access to a locked Windows account can often be a difficult task. However, there are certain ways to recover and replace passwords. This program works for all versions of Windows, unlike many similar solutions which only work for the...more
A table error while accessing a table in SQL Server 2000 database can occur due to various reasons like corruption in page header, incorrect alignment of system table, invalid page type, index_page page has an index zero, incorrect header...more
For integrity and safety of your data on external/removable hard drive, you should remove the hard drive properly. If you do hot detach of a removable hard drive from MS Windows Vista computer, the drive may not work properly next time when you try...more
In Linux operating system, file system stores all of the critical information about files located on the hard drive. Without file system, operating system can not locate files stored on hard drive and thus they can not be accessed. This is the top...more
One of the most common factors for Microsoft Access database corruption is damage in your computer system. The damage can occur due to numerous logical and physical factors, resulting into inaccessibility of records stored in your database. For...more