In keeping with its mantra of simplifying IT, the firm offers up new storage and server virtualization products with rapid deployment and provisioning at the heart of their design.
Occasionally, when you install identical databases on two different SQL Server instances, they will behave in surprisingly different ways. Why? Most likely, it is down to different configuration settings. There are around seventy of these settings and the DBA needs to be aware of the effect that many of them have. Brad McGehee explains them all in enough detail to help with most common configuration problems, and suggests some best practices.
i have a windows 2003 domain where i have strange problem.
One of our file shares is on a 2003r2 domain controller, xp clients trying to
copy files on the share are always getting the error
error copying file or folder
filename could not be copied. path too long
while windows 7 clients work fine.
Nothing unusal is found in the eventlog on both the server and the client.
It doesn't matter if i access the share by fqdn or ip, the path is including filename
shorter than 20 characters i.e. \path\share\file.txt
Copying files to other servers is fine. Reading from the shares is ok too.
Happened from one day to the other, one windows update that was installed this day (kb2736233) was removed but nothing changed.
thanks for any tips
I have a very similar case as this user: Access denied on some files on Win2008R2 DC share
This is on a windows 2008 R2. The user has Win7 pro.
The user has their own home folder on the server. Every file, except one, the user can read/write/modify at their own will. No problems - except this one file. She gets "access denied" I can open it (as domain admin). Another user can open it (because she's in the domain admin group).
I did run the AccessEnum tool and the read/write permissions are all identical for all files. So, I can't explain why the user can't open this one single file. Out of all her files in sub-folders and such. No problems. This one file is causing a headache.
What do you think could be wrong here?
Our CruiseControl.NET service on Win2003 Server (VMWare Virtual) was recently changed from a service account to a user account to allow for a new part of our build process to work.
The new user has "Log on as a service" rights, verified by checking Local Security Settings - Local Policies - User Rights Assignment, and the user password is set to never expire.
The problem I'm facing is every time the service is restarted, I get the 1069 error as described in this questions subject. I have to go into the properties of the service (log on tab) and re-enter the password, even though it hasn't changed, and the user already has the appropriate rights.
Once I enter the password apply the changes, a prompt appears telling me that the user has been granted log on as a service rights. The service will then start will no problems.
Not a show stopper, but a pain none-the-less. Why isn't the password persisting with the service?
<b>Linux.com:</b> "...there are a number of ways you can go in order to get that mail server up and running. Over the years I have found Postfix to be one of the easiest to set up and most reliable to deploy in most organizations."
I'm adding a new 64-bit server to our domain. Everything seems fine except when accessing the machine using remote desktop, after a few seconds the connection is lost. The error message is "This computer can't connect to the remote computer." "Try connecting again. If the problem continues, contact the owner of the remote computer or your network administrator."
A similar result with Telnet on port 3389. I am able to connect but if I hit a key the connection to host lost.
The event log shows the successful login. No errors.
Any ideas?
Hi Everyone,
I am trying to implement encryption in sql server 2005 through Certificate and Symmetric Key
and i came to know that the application user should have the following access in order to Encrypt and Decrypt Data
1) CONTROL permission on Certificate and
2) REFERENCES on the Symmetric Key
(Let me know if i am wrong)
Now my concern is what does CONTROL mean in the context of Certificate?
If my User1 has Control permission on my certificate Cert1
What all can he do, Is there a way to restrict him further, but user1 still be able to Encrypt\Decrypt the data
I could not find any good practice doc for certificate and key management so can some one advice the good practice for this
Thanks,
Ram
XML is, it seems, everywhere. SQL Server has ever-improving functionality that helps us peek into, shred, store, manipulate and otherwise utilize XML. This article covers XML variables, XML columns, typed vs. untyped XML, and the xml data type methods.
We have a small training network with server 2003, and XP clients and users in a AD domain. A printer is connected to a client with USB. We are trying to share the printer to all the users but it's not working. We come so far as the users can see the printer when they search for it. But when they try to add it, there appears a pop up window for user name and password. No matter what user name we try it doesn't work. We have checked the shared printer's security settings and they are all in order. Everyone has printer rights. But even with full rights it doesn't work. The only ones it works for are Domain Admins.
Anyone have any ideas?
I have Windows Server 2008 Enterprise. I need to copy files from network folder, I connected as a Z: drive. I need to schedule the copy. In scheduler I run it every 5 minutes.
robocopy.exe Z:\ C:\destination /E
I've tried to put it to .bat file, tried to write in scheduler, it doesn't help.
I've set run with highest privilegies...
Task Scheduler successfully completed task "\RoboCopy" , instance "{dd2d2d1c-4ef1-4e30-b226-4a77aa52dab9}" , action "C:\Windows\SYSTEM32\cmd.exe" with return code 16.
I'd like to configure an SMTP MTA to accept all mail addressed to any domain and deliver it to my local user account.
It would be very useful for debugging mail sent in some code I'm working on. I'll be running the server locally - no outside world interaction required.
To be clear:
[email protected] - delivered to - cam8001@localhost
[email protected] - delivered to - cam8001@localhost
[email protected] - delivered to - cam8001@localhost
I need some help understanding firewalls.
I played around with Amazon EC2 and it seems to provide a firewall out-of-the-box. When I say firewall, to me that means the ability to block ports from being accessed from the outside world, or to only specific security groups.
I'm looking at a dedicated server hosting provider and they provide a hardware firewall for $50/month and it is limited to 10mbps. Can someone explain to me what kind of traffic this correlates to? Are these usually limited to the number of simultaneous connections also?
This writing is like an encyclopedia for the SQL statements and stored procedures used to enumerate, attach, and detach databases on a SQL Server instance.
Hello, I'm running a Small Business Server 2008 with Windows Sharepoint Services 3.0 (WSS 3.0). I thought WSS was supposed to hide menu items for which the current logged in user don't have access? Apparently, all users can see all links, regardless of whether they have access.
This applies to both links to newly created sub-sites as well as document libraries/lists.
Is this expected behaviour, or is there a misconfiguration somewhere that causes the links to stay visible even for users without access?
Thanks!
If we give the anti-virus a URL it should be able to scan it and give us a report, Else, it should be able to scan the folder that we put all the links into... i.e. if we download the entire content of the webpage from the 10 Child links... and 1 parent webpage... and put them into a folder, the anti-virus solution should be able to scan all the 10 CHild and 1 Parent data.. and give us a report, Else, the anti-virus solution should be able to scan any incoming virus in any file or entity that is coming into our server and generate the report for that file, Please help me thanks in advance...
I had a server in a hosting company and I took it home.
I need to connect him to a local network (not wifi) and access to the server from another computer in the network via browser, like I did it when it was in the hosting company.
I don't have any knowledge in linux, I just know how to type in the command line :)
I thinks all the IP configuration of the server is one big mess, because it passed from more then one hosting company to another...
I tried a lot of tutorials that I found in the web, but nothing works - mainly because I don't know how to check if I did something wrong.
I just need to know how to connect to local network ( D-Link router)
and then access the server from another computer browser.
thanks
update:
the server os is: CentOS release 4.8 (Final)
I have an extremely large database and most of the space is the index size. I moved several indexes to a different file group (just to experiment) but no matter what I do I cannot reduce the size of the MDF.
I tried shrink database, shrink files, rebuilding clustered index. What can I do to reclaim that space in the MDF? I've moved 15GB worth of indexes to a different file group. Is it even possible to reduce my mdf by that same 15gb (or close to it)?
SQL Server 2008 Enterprise
I've got an old windows 2000 box in a remote location with a T1 connection and a vpn to my location. I normally use smb mounts to transfer files but now it's time to decommission the server and copy it's backups to my location. I have about 40 gigabytes (compressed) to copy. I'm prepared for it to take a long time, but I have a few caveats.
I need to limit the bandwidth so terminal service connections to the site are not affected
I want to be able to resume a partial transfer
There are a few small files and several large files (10-20 gigabytes). I'm familiar with rsync on *nix platforms but have had bad luck with windows and I don't know that it will really keep partially transfered files. What do you use?
All the users connected to the SQL Server instance have access to a global resource called tempdb system database. This database holds temporary user objects, internal database objects, and row versi... [Author: Mark Willium - Computers and Internet - May 13, 2010]
The company started out with a server virtualization aggregation tool that makes many boxes look like one. Now, it's enhancing its formula and splitting that image into a second virtual machine.
syslogd during install give following error from the server? How to diagnose this problem
debconf: falling back to frontend: Readline
Selecting previously deselected package sysklogd.
(Reading database ... 32541 files and directories currently installed.)
Unpacking sysklogd (from .../sysklogd_1.5-5ubuntu4_amd64.deb) ...
Selecting previously deselected package klogd.
Unpacking klogd (from .../klogd_1.5-5ubuntu4_amd64.deb) ...
Setting up sysklogd (1.5-5ubuntu4) ...
* Starting system log daemon... [ OK ]
Setting up klogd (1.5-5ubuntu4) ...
* Starting kernel log daemon... [fail]
As a database developer or DBA there is not a lot you can do about a legitimate user sharing confidential data. However, you can minimize the risks of someone breaking into our database and browsing around to find confidential information. This article explores how you can use SQL Server features to encrypt your confidential data.
Hi,
I have a database in SQL Server 2005 whose transaction log becomes full. It is using snapshot replication. I noticed the transaction log is not freeing up space. So I created an additional transaction log. Three days has passed and this first transaction log is still full. I performed a full database backup and transaction backup. Then I tried to shrink the transaction log but the shrink failed.
Can anyone advise why shrinking transaction log is failing? ANy other recommendation on how to resolve the problem?