Records Marked as Deleted” in MS Access Database

0

Written on 06.05 by girl oh tech

The records saved in the MS Access database form core component of Access database files (.mdb and .accdb). You can save your records in various MS Access database components like tables, forms, views, reports etc. Various factors responsible for the damage of records can be concurrent modification by two or more users on the same record, software bugs, network hardware failure and more. In such situations, you need to recover the damaged records by using latest data backup. However, if you have not maintained any backup, you need to recover and restore the lost data by using Access Recovery tools.

Consider a scenario when you attempt to access the records saved in the Marketing” table, you find that some of the records have been marked as #Deleted.” This indicates that the Access database has been corrupted. Few main reasons for the Access database corruption are discussed as follows:

• Two users in multi-user environment were attempting to modify the records of the same table.
• Improper shutdown of the Microsoft Jet connection due to power outage.
• ActiveX Data Objects (ADO) and Data Access Objects (DAO)
• Faulty Network Hardware
• Malicious software like virus
• Large number of open and close operations in a sequence.

Resolution:

To resolve the above issue and access the database records in Marketing” table, you need to use an inbuilt repair utility known as Compact and Repair. To use the utility, you need to follow these steps:

1. Go to the Tools menu, select Database Utilities and then click Compact and Repair Database.
2. Locate and then click the database in the �~Database to Compact From’ dialog box, and then click Compact.
3. Select an appropriate folder location for the new file in the �~Compact Database Into’ dialog box, type a unique name for the file and then click on Save.

However, the above inbuilt utility can not be used to repair the database greater than
2 GB in size. In such circumstances, you need to repair and restore the Access database components by using advanced and effective Access Repair tool. Such access database repair utilities employ influential scanning methods to provide absolute and systematic database repair of all Access database components. With interactive and user-friendly interface, these utilities can be easily used to repair and restore corrupted Access databases without prior technical knowledge.

Stellar Phoenix Access Recovery is the most reliable Access Database Repair utility that offers comprehensive repair and restoration in all software related data loss scenarios. It is compatible with Microsoft Access 2007, 2003, XP (2002) and 2000. This access repair utility supports Windows Vista, XP, 2003, 2000 and NT.

Mobile Porting and its Importance in Application Development

0

Written on 06.04 by girl oh tech

Today more and more people in the world are going mobile. With changing lifestyles and easy availability of mobile phone aided with good connectivity, mobile is no more a luxury, it's a necessity. With this change of attitude, people have now realized that mobile is not just a means to talk to each other, it's also a great companion. It serves as your personal assistant, your gaming console, your camera, your mobile office, and a lot more. For business professionals it offers great deal of productivity and usability, for basic users it offers games, fun applications and more such engaging activities. It's all been possible due to numerous applications available today.
Mobile software development companies today are making amazing applications which help you a lot. Many of them started making applications straight away for mobiles, whereas some brought their web versions to mobile, so that their users are never away from them even when they are not at their PCs or laptops. It changed the way people looked at mobiles. Mobile applications are now so essential for some, that it's hard for them to imagine life without it. But with so many available mobile phones, and network carriers, mobile application developers faced a challenge. How could they make an application which could be used on every possible device? Nokia, the market leader today, has a very wide range of mobile phones. Each has various features differences, operating systems, memory capabilities, screen sizes and more such technical jargon. So how can a mobile application be made compatible to run on all these phones with varying capabilities without any issues, and not just Nokia, there are many other manufactures, like Samsung, Sony Ericsson, Motorola, iPhone, Blackberry and lot more.
Mobile applications are therefore needed to be ported to various platforms and devices. This really takes a great deal of effort and its time consuming. For a developer it's a task which takes them away from enhancing or developing new applications. We at Rapidsoft Technologies have been helping mobile application developers to port their applications to various platforms and make sure they can reach the maximum number of users, irrespective of their mobile devices. Rapidsoft is among the leading outsourcing companies in India for mobile porting. We have been porting mobile applications since years now, and have developed a sound infrastructure and understand of the whole process of mobile application porting. No matter what type of application do you use, we can port your application to the intended platform in a customized solution suited to your requirements. Backed by expert professionals and technical capabilities we can handle it very efficiently and cost effectively. We have already ported a number of mobile applications successfully to all popular mobile platforms like Symbian, BREW, iPhone, Blackberry, Windows Mobile, J2ME. We can port in whatever way it suits your requirements, it be handset specific or operator specific. Our porting process follows strict internal standards set by us, and are thoroughly tested, so that no application goes without proper testing.

Computer Virus, Anti Virus, and Virus Removal

0

Written on 06.03 by girl oh tech

Due to many requests I will discuss virus removal. This is of great importance these days as newer and nastier viruses are being released all the time. The best offense is a good defense so it is imperative to have
anti virus protection. If it is too late to protect and you already have a virus read on.

As I said, the best offense is a good defense. Of all the software you buy the one you should not skimp on is an anti virus program. I have heard several stories recently of people paying $350.00 to have a virus removed and the operating system reinstalled. This really doesn’t make any sense because installing an operating system requires formatting, (erasing), the hard drive which would eliminate any viruses contained on it anyway. Protect yourself first and avoid being put in that position.

Once you are infected you must act quickly. Delay will just allow it to change more of your system settings. If the virus gets into the root of your system it can be very difficult to remove. This is called a root kit virus and they attach themselves to necessary system files. With that being said I suggest that you proceed with caution because deleting the wrong files can cause great damage to your system, sometimes so bad you are unable to boot up at all. Here are links to two free root kit anti virus programs. The first is from Sophos. I haven’t used it yet myself but they do have good reviews. . .

http://www.sophos.com/products/free-tools/sophos-anti-rootkit.html

The second is from AVG and I have used this one. It is fast, thorough, and free. Here is the link to this program. . . .

http://www.softpedia.com/get/Antivirus/AVG-Anti-Rootkit.shtml

Before you use a root kit anti virus it is imperative that you disable ALL real time scanners from your anti virus, spyware, and adware removers as well as your firewall. Use extreme caution when you choose to delete anything a root kit anti virus finds. If you are unsure about what to do go to this link and look up what the program has found to verify if it is a virus or not….

http://www.f-secure.com/en_EMEA/security/security-lab/latest-threats/virus-descriptions/

Before you begin scanning for spyware follow this tip. Use a cleaning program to clear out junk files and temp files first. It will cut down on the scan time for your anti virus. Don’t forget to purge your temporary internet files and cookies too. You also need to make sure your programs have the latest updates.

Here is what I do when I am presented with an infected computer. I will run two anti virus programs, one at a time. I will scan two or three times with one until it doesn’t detect anything anymore, then I will uninstall it including the virus vault. Then I install a different anti virus and run it several times, the choice of programs is up to you. Here are two other options for you. Get Microsofts free malicious software removal tool from this link.

http://www.microsoft.com/security/malwareremove/default.mspx

I also run Spybot and Adaware afterwards just to make sure I got everything. Spybot is for spyware but it definitely will find a virus too.
Once you think you have found everything I suggest making sure. There are a few sites that offer online scans. The only one I have used before is Kaspersky and it is free and thorough. You just go to the site and let it scan. At the end you will get a report that shows any malware left on your system. Here is the link..

http://www.kaspersky.com/virusscanner

After removing any viruses from your computer it is always a good idea to clean it up. Use your cleaning utility to clean the system and registry. After that run your defragmenting program. You should now be at a nice clean system state. This is the perfect time to set a restore point and use your backup program to create a new backup. You do have a backup program don’t you?