5 Simple Tips to Prevent MS Access Database Corruption

It's important to understand that any time an Access client disconnects unexpectedly, it may set a "corruption flag" in the .mdb file indicating that the database is in a corrupt state (regardless of whether any data has actually been corrupted or not). Any user who attempts to open the database while this flag is set will receive a message, and the database will have to be repaired before it can be used. If the users don't have permission to perform the repair, or don't know how to perform the repair, there may be significant downtime before the database is available again. This can result in a loss of productivity as well as extreme frustration for the users. Following the 5 tips below will minimize your odds of data loss from corruption in your Access databases.

1) Split your database.

The single most important thing you can do to prevent corruption in MS Access databases is to split the database into a "front-end" and a "back-end". The front-end contains all of the forms, queries, and reports, while the back-end contains only the data tables. A copy of the front-end is placed on each user's computer, and the back-end with the table data is stored in a shared folder on the network. How does this prevent corruption? Well, consider the amount of information that must make it across your network to your computer each time you open a form or report. If one bit of that information doesn't make it intact, you risk corrupting your database. Alternatively, if the forms, queries and reports are all stored on your local computer, then the only bit of information that needs to traverse the network is the actual table data. By reducing the amount of data you need to move back and forth across the network, you significantly reduce the chances of corrupting your database. If you're having corruption problems with an Access database on a network drive, splitting the database is the single most important thing you can do to stop it.

2) Don't hold connections open.

This one applies to both programmers and users. If you're a programmer, make sure you close your connections as soon as possible after using them. Leaving the connections open will allow more opportunities for an "unexpected" dropped connection. The only time you may want to leave a connection open longer than required would when it's used inside a loop. For such a case, open the connection at the beginning of the loop, and then close it after the loop is completed. Just make sure it gets closed for all cases (including exceptions).

If you're using a Microsoft Access database or application, be sure to close it when you're finished. Again, leaving the application open provides the opportunity for corruption if a network connection is lost. Remind users to always close the application before going home, as nightly backup jobs may fail or cause corruption in the shared file if there are open connections.

3) Exit the database correctly.

Always close the database or application correctly. Ctrl-Alt-Delete/End Task can wreak havoc on Access databases. Whenever possible, complete your tasks, then close the application using the File - Exit menu option or alternative Exit option provided by the application.

4) Don't skimp on hardware.

Remember that the corruption flag can be set from the slightest packet loss between your computer and the database file. MS Access has sometimes been called "the canary in the coal mine". It has gained this reputation from being the first application to "die" when there's the slightest hint of trouble on your network. Just like the slightest presence of gas caused the canary to die, the slightest presence of network problems and packet loss can kill your Access applications. Make sure you're not using the cheap built-in NICs that come with some PCs. Instead, use brand name network cards. The same goes for cheap hubs. Whenever possible, match good brands of equipment throughout your network.

5) Compact and repair regularly.

Performing the built-in compact and repair function regularly is recommended to prevent corruption and improve performance. Consider automating this function with a utility to compact and repair all of your databases nightly or during the weekend.

Error messages to look out for - the following error messages may signal database corruption:

"The database 'databasename.mdb' needs to be repaired or isn't a Microsoft Access database file."

"Record(s) can't be read, no read permissions on 'databasename.mdb'"

"Unexpected Error 35012"

"Unrecognized database format 'databasename.mdb'."

"'databasename.mdb' isn't an index in this table. Look in the Indexes collection of the TableDef object to determine the valid index names."

"The Microsoft Jet database engine could not find the object 'databases'. Make sure the object exists and that you spell its name and path name correctly."

"The database has been placed in a state by user '' on machine '' that prevents it from being opened or locked"

"Disk Error -- Reserved error (-1601)"

"The database has been placed in an unexpected state."

"Record(s) cannot be read; no read permission on 'MSysObjects'"

"Record(s) cannot be read; no read permission on 'MSysACEs'."

"The Microsoft Jet database engine cannot find the input table or query 'MSysAccessObjects'. Make sure it exists and that its name is spelled correctly."

Conclusion:

While you may never be able to prevent all Microsoft Access database corruption, you should be able to stop 98% of the problems before they occur by following these 5 simple tips. Follow these tips and implement a prudent automated backup schedule to minimize your odds of significant data loss.

Kevin Sparks is a technical writer for Kaizen Software Solutions, the producer of Digital DBA, an automated MS Access monitoring, backup, and compact/repair utility. For more information, visit their website at http://www.kzsoftware.com/products/digitaldba

In The News:


pen paper and inkwell


cat break through


Data Recovery The Easy Way

If you aren't prepared in advance, you will most likely... Read More

Business Continuity and Disaster Recovery - Risk Analysis and Control

In the risk evaluation phase, there are a number of... Read More

Data Recovery: Beginners Tips

Right now you probably in a lot of mental pain,... Read More

Business Continuity and Disaster Recovery - Reducing Your Risk Profile

Like all plans, there is an ultimate goal to achieve.... Read More

Its All In The Planning - Surviving Disaster

ITS ALL IN THE PLANNING - PREPARING FOR THE UNTHINKABLE*... Read More

How Secure Are Online Data Backups?

Processing DATA is what all businesses do. Protecting data is... Read More

Business Continuity and Disaster Recovery - The Business Continuity and Disaster Recovery Plan

Essentially, the plan addresses the who, what, where, why and... Read More

How to Survive an Operating System Crash

"We apologize for the inconvenience, but Windows could not be... Read More

3 Ways Computers Can Hurt Your Ministry - Part 1 - Ineffective Data Backups

Our computers have become almost indispensable ministry tools. What would... Read More

Data Backups ? One Key to Business Survival

Your customer data is a precious resource that can literally... Read More

Do You Have The One Key Ingredient Necessary For Disaster Recovery?

It is not rocket science, we all know that we... Read More

Business Continuity and Disaster Recovery - Business Impact Analysis

Business impact analysis is a critical part of the business... Read More

Are The Words Business Continuity and Disaster Recovery Planning Rolling Off Your Lips?

It might be more fun to talk about those free... Read More

Hard Drive Crash? The Essential Data Recovery Report

Your worst nightmare just became a horrifying reality. You keep... Read More

The Best Data Recovery Choice For You

The best defense against a loss of data is a... Read More

Disaster Recovery- Managing the Risk

Helping your business survive in the event of an unforeseen... Read More

Data Recovery - You Can Get It Back!

Data recovery is a process whereby you can save data... Read More

Business Continuity and Disaster Recovery - Selecting A Business Continuity Strategy

The risk analysis and business impact analysis have identified risks... Read More

5 Simple Tips to Prevent MS Access Database Corruption

It's important to understand that any time an Access client... Read More

Read This Now: Its Not If You Will Lose Your Data, Its When Will You Lose Your Data

With Adware, SpyWare, E-Mail Viruses, Java Script Viruses and Hardware... Read More

How To Limit Hard Drive Data Recovery Costs

With the value on information rising day by day, one... Read More

Computer Data Recovery Options

Losing files on your computer can be a frightening experience... Read More

Backup -- But Where To?

We all know we have to backup regularly, but those... Read More

Offsite Data Backup Not Just for Fortune 500 Companies Anymore

In today's high paced digital world there is a very... Read More

The Seven Golden Rules Of Data Backups

Backups of company data are carried out for two main... Read More

Do I Really Need To Backup?

Okay, computers a machine, right? Okay, maybe not yours. You... Read More

When Disaster Strikes: How Long Would Your Business Survive if Files On Your Computer Disappeared?

A Tornado? In Birmingham? In The United Kingdom? Unthinkable!Yes, in... Read More

Bill Gates Made Data Recovery Easy

Bill gates provided a ready made option in Microsoft windows,... Read More

Want To Beat The Odds? Disaster Recovery Planning is Essential

Statistics show two out of five businesses go out of... Read More

Data Recovery

Every person who uses a personal computer will eventually face... Read More

HasYour Computer Hard Drive Ever Crashed? Are You Challenged by Backups?

The following scenario's have probably been repeated thousands of times,... Read More

Backup 101 - How To Pick The Right Backup Software

Vision Backup 10 Enterprise is an advanced and easy-to-use backup... Read More

Did You Loose Your Windows XP Password? What Should You Have Done Before it Happened?

There is a common problem that happens with lot of... Read More