Wednesday, September 25, 2013

SQL SERVER – FIX : Error : 3702 Cannot drop database because it is currently in use.

Hi This post describes how to delete a user-defined database in SQL Server Management Studio in SQL Server  by using SQL Server Management Studio or Transact-SQL.

Using SQL Server Management Studio

To delete a database

  1. In Object Explorer, connect to an instance of the SQL Server Database Engine, and then expand that instance.
  2. Expand Databases, right-click the database to delete, and then click Delete.
  3. Confirm the correct database is selected, and then click OK.

Using Transact-SQL 

To delete a database

  1. Connect to the Database Engine.
  2. From the Standard bar, click New Query.
  3. Copy and paste the following example into the query window and click Execute. The example removes the Sales and NewSales databases.

    USE master ;
    GO
    DROP DATABASE Sales, NewSales ;
    GO
If you are Receive Below Error Message   
Msg 3702, Level 16, State 3, Line 2
Cannot drop database “DataBaseName” because it is currently in use. 

Fix/Workaround/Solution:
Close SQL Server Management Studio completely. Open it again and connect as normal. Now you will be able to drop the database with
 
Conclusion
If you want to drop the database use master database first and then drop the database.

Thanks
R.karthikeyan

Tuesday, September 24, 2013

Get a second shot at your Microsoft Certification for free




Thinking about starting or upgrading your Microsoft certification? Still undecided about scheduling that exam? It’s no secret that it takes time, preparation, and commitment to pass all the required exams to achieve a certification milestone, and Microsoft want to help you. That's why Microsoft so excited to bring back Second Shot!


For those who are newer to our community: the return of Second Shot is great news for MCPs (and aspiring ones) because it means being able to retake an exam for free. Just knowing there's a chance to do-over at no cost can make a big difference on exam day.

This round of Second Shot applies to individual technical (070 and 071 beta) and commercial MTA (098) exams. Here are two ways to get your Second Shot voucher:

  • Directly from us at http://aka.ms/SecondShot
  • Purchase vouchers after you complete a technical training program from a Microsoft Learning Partner or IT Academy

Both the initial exam and the retake have to be done no later than May 31, 2014, so find yourcertification path and get started soon!

Thanks
R.karthikeyan



Friday, September 13, 2013

FTP Server Interview Questions Answers in windows



How much data can be send in a Single FTP session?
The amount of data which can be send is infinite. FTP uses TCP. The TCP channel can be used until the complete data is transferred. Multiple TCP segments can be used within the same TCP channel.

How does Active FTP communication Work?
When a FTP client initiates a connection with FTP server in Active FTP mode, initially the FTP client initiates tcp 3 way handshake with the FTP server. This is initiated to port 21 on the server and is referred to as the control connection. Once the control connection is successful, the client responds with the port command to the server, which contains the port number to which the server needs to initiate the second TCP connection. The server initiates the connection ( 2ND tcp 3 way handshake) from port 20 on it to the port number provided by the client. This is known as data connection. Once the data connection is successful, the data transmission can commence.

How many TCP connections are used by Active and Passive FTP Respectively?
Both Active and Passive FTP uses two TCP connections

Why does Active FTP not work when a firewall is involved between the client and the server?
In Active FTP, once the FTP client establishes the connectivity with the server, the server initiates the data connection to the client. This is a TCP connection which is initiated from a system (FTP Server) which resides outside the network. All traffic initiated from outside is considered as untrusted, and the firewall would drop it by default.

How does Passive FTP resolve the issue with firewalls?
In Passive FTP, the FTP client initiates the connection with the server and not the FTP server with the client. Since the client is residing within the network, the connection is considered as trusted by the firewall.

In Active FTP, which TCP port is used for initiating the control channel?
Port 21

If you want to know about FTP  like how it's working? or different connection mode you can refer my previous post  

Difference between Active and Passive Connection Mode in FTP

Conclusion About FTP -


FTP uses one connection for commands and the other for sending and receiving data.  FTP has a standard port number on which the FTP server "listens" for connections.  A port is a "logical connection point" for communicating using the Internet Protocol (IP).  The standard port number used by FTP servers is 21 and is used only for sending commands.  Since port 21 is used exclusively for sending commands, this port is referred to as a command port. For example, to get a list of folders and files present on the FTP server, the FTP Client issues a "LIST" command.  The FTP server then sends a list of all folders and files back to the FTP Client.  So what about the internet connection used to send and receive data?  The port that is used for transferring data is referred to as a data port. The number of the data port will vary depending on the "mode" of the connection.  (See below for Active and Passive modes.)

Difference between Active and Passive Connection Mode

The FTP server may support Active or Passive connections, or both.  In an Active FTP connection, the client opens a port and listens and the server actively connects to it.  In a Passive FTP connection, the server opens a port and listens (passively) and the client connects to it.  You must grant Auto FTP Manager access to the Internet and to choose the right type of FTP Connection Mode.

Most FTP client programs select passive connection mode by default because server administrators prefer it as a safety measure.  Firewalls generally block connections that are "initiated" from the outside.  Using passive mode, the FTP client (like Auto FTP Manager) is "reaching out" to the server to make the connection.  The firewall will allow these outgoing connections, meaning that no special adjustments to firewall settings are required.

If you are connecting to the FTP server using Active mode of connection you must set your firewall to accept connections to the port that your FTP client will open.  However, many Internet service providers block incoming connections to all ports above 1024.  Active FTP servers generally use port 20 as their data port.




 It's a good idea to use Passive mode to connect to an FTP server.  Most FTP servers support the Passive mode.  For Passive FTP connection to succeed, the FTP server administrator must set his / her firewall to accept all connections to any ports that the FTP server may open.  However, this is the server administrator's problem (and standard practice for servers).  You can go ahead, make and use FTP connections.

                      

Once the FTP Client manages to open the internet connections, one for command and one for data, it starts communicating with the FTP server.  You are now ready to transfer your files and folders between the two connected computers with Auto FTP Manager.

Below image is Example  of both Active and passive connection mode how it is works.
                                  




                                   


Thanks
R.karthikeyan

Tuesday, August 27, 2013

SQL Server Startup Parameters


Hi, Every now and then we all have to reread something we may already know because frankly if you are like me, you can’t keep everything in your head. I tend to go back over tips and tricks and even database concepts when I have time so I will maybe remember enough about it so when a problem arises I at least know where to go look and find the answer. It is with, that I want to write about my latest re-education attempt.

I am working with a SQL Server database and something went wrong. Yea I know how weird nothing ever goes wrong with SQL Server or any other product out there. While this particular article is not about rebuilding or restoring a master database, it is about something that a lot of DBAs overlook startup parameters. 

SQL Server allows you to control a few of its configurable options during startup with the use of startup parameters. These parameters are usually useful for troubleshooting purposes – usually in case of extreme emergencies, but they can also be useful for some long-term configuration changes as well. Before we go any further, I want to add a little warning here – do not learn about startup parameters on any SQL Server installation that you are not willing to completely rebuild. It is possible to set a parameter and cause serious problems that may affect your installation, like setting the location of the master database to a false one.
You have two easy ways to set the startup parameters in a SQL Server installation. The first is from the command line by using the sqlservr.exe parameter command. This way is useful for those emergencies in which you have to start SQL Server in single user mode or with minimal configurations. The second method is by using Enterprise Manager and the startup parameters dialog box. This method is great for long-term parameter requirements like the locations of the master database data and log files and the location of the error logs. 

To change a parameter through the Enterprise Manager:
  • Open Enterprise Manager and right click on a registered installation.
  • Click Properties.
  • Click the Startup Parameters button.
  • Add your new parameters or remove an existing one. Be careful not to remove the default parameters that give the locations of the master database, the master database log, and the error logs unless you provide an alternate location.
If you take a look at the startup parameters dialog box, will see there are a few default parameters that are part of every SQL Server installation:
 -d master_data_file_path,
 -l master_log_file_path, and
 -e error_log_path.

You can use these default parameters to change the locations of the master database file, the master database log file, or SQL Server error logs. I would not do this unless you have a problem with the default location’s drive or if the master database or error logs outgrow their current directories and you need to move them to another drive. If you are simply moving the master database data file or log file to another location, then you can change the parameter from Enterprise Manger before you stop the instance. If you are moving the file because of a problem, stop the instance and use the sqlservr.exe command to restart the instance pointing to the new data file or log file location.

SQL Server does have a few optional startup parameters that you can set to help troubleshoot your installation or make some minor performance optimizations. 

-c  Shortens SQL Server’s startup time by starting the instance independent of the Service Control Manager. Starting SQL Server independent of the Service Control Manager will keep if from running as a Windows service. I have not had the need to use this parameter so I can only guess that it could be useful for troubleshooting startup issues.

-f  This parameter starts an instance of SQL Server with the minimal configurations and enables the sp_configure allow updates option. This parameter is very useful if a configuration option is set that disables SQL Server. You can use this parameter to start SQL Server and change the inappropriate configuration setting back to the original.

-g  This parameter will specify the amount of virtual address space that SQL Server will leave available for memory allocations within the SQL Server process, but outside the SQL Server memory pool. What does that mean? This memory allocation outside of the SQL Server memory pool is used for loading times such as extended stored procedures, dll files, OLE DB providers referenced by queries, and automation objects reference in Transact-SQL statements. The default size of this memory is 128 MB, which is usually fine for most SQL Server installations. Keep in mind that SQL Server installations under 2 GB (SQL Server 2000 Standard Edition) or 3 GB (Enterprise Edition) will only use 128 MB no matter what size you set with the -g parameter. You can however, use this parameter to optimize the memory on installations above the 2 GB and 3 GB cutoffs. Microsoft recommends that you do not use this parameter unless you see the following error in your error log.
WARNING: Clearing procedure cache to free contiguous memory
However, I have used this and seen others use this parameter for errors such as:
OLE DB provider ‘SQLOLEDB’ reported an error. The provider ran out of memory.

-m  This parameter may be one of the most used, especially if you are studying for the SQL Server tests. The 
-m  parameter will start SQL Server in the single user mode and enable the sp_configure allow updates configuration option. Starting SQL Server in the single user mode does not issue a CHECKPOINT command. This parameter allows you work on your system databases if you encounter a problem with one of them. If you ever have to rebuild your master database you will be familiar with this parameter.

-n  This parameter turns off SQL Server logging its errors to the Windows application log. It is recommended that if you use this parameter you should also use the -e startup parameter, which you should be doing anyway. This is another parameter that I have not used and personally, I would not recommend turning off the Windows application logging.

-s  This parameter is used to start a named instance of SQL Server. Without the use of this parameter, SQL Server will try to start the default instance, which may or may not be present or the one you want to start.
/Ttrace# Used to start a Trace Flag when you start SQL Server. This parameter is useful for general troubleshooting purposes.

-x  This parameter will disable the keeping of the CPU time and CACHE-HIT ratio statistics. While this parameter allows maximum performance, I do not use it as the benefits of the CACHE-HIT ratio outweigh the small performance gain this parameter buys you. 

A quick guide to the startup parameters found in SQL Server that you could use for those extreme emergencies. Most of the time, you will not have to use these parameters but they are nice to know for that rare instance that you have system database problems or when you need to start a Trace Flag.

Note:- Hi readers, If you found this post is useful / save your precious time kindly give your feed back in comment box.

Thanks
R.karthikeyan
   (RKB)

How to unprotect Excel Sheet with Macro

 The AllInternalPasswords Macro
This macro, for which the true origin is lost in antiquity, will unlock all the internal passwords in your workbook. It will report which password strings worked (so that if you have other workbooks by the same author, you can try it on them), but it will NOT report the original password (it can't - it's never stored - only the hash is saved in the file). I first saw it in a post by Bob McCormick. Norman Harker did an outstanding job in modifying it for workbook as well as worksheet protection. we mostly cleaned it up and made it a bit more efficient.
It shouldn't take more than a few seconds (certainly less than a minute) to find each password if you have a relatively up to date computer.
Working passwords will be returned in the form
    AAABABBABABX
where the first 11 characters will be As or Bs and the X represents a character from ASCII 32 (" " or space) to ASCII 126 ("~", or tilde). While the sheet or workbook will automatically be unprotected, the macro suggests you write this code down, not only for future use, but, people being creatures of habit, it may work on another sheet/workbook by the same author. Again, since it's not returning the original password, it's unlikely to be useful in breaking file or VBA project passwords.

DISCLAIMER: Please note that breaking password protection MAY violate laws or regulations in your jurisdiction. In the United States (currently) it is certainly OK to break password protection on sheets that you developed for your personal use, or for which you have permission from the author or owner. It's probably OK if you own the workbook, even if it was written by someone else. But neither Norman nor I are intellectual property lawyers in ANY jurisdiction, so, if in doubt, ask the original author, and if you can't ask - don't use it!

 

 
IF You find this is post helpful/useful just leave your comments
 
 Thanks
R.karthikeyan 

Thursday, August 1, 2013

How to Restore Deleted files from Network Drive


You may have noticed that when you delete a file stored on a network location or mapped network drive that the file is permanently deleted. It does not go to the local computer's recycle bin and does not go to the server's recycle bin. I have discovered a work-around that extends recycle bin coverage to include mapped network drives. The solution is not 100% perfect, but works extremely well and does not rely on Shadow Copies or 3rd-party software.

Here's how:
1. Map a network drive to the network share you want to use. Make sure that the drive is re-connected on logon. If you don't know how to do this, search Google.
2. Browse to C:\users\<user name>.
3. Right-click on one of the folders in this location (I chose saved games) and click properties.
4. Select the Location tab.
5. Click Move, browse to to root of the drive you mapped in step 1, and click Select Folder.
6. Click Ok and click yes in the dialogue box that appears.
7. Repeat these same steps for all users on the computer.

You can now verify that the network drive is protected by the recycle bin by right-clicking on the recycle bin and clicking properties. The network drive should be listed in the Recycle Bin Locations column.

Some warnings:
1. This only protects files accessed through the mapped network drive, and not by UNC paths. So for example, if you mapped \\server\share to z:, and delete something off the z drive, it will go to the recycle bin. However, if you browse to \\server\share and delete a file, it will be deleted directly.
2. I don't know what will happen if your network drive is not available, so beware. This may not work well with laptops.
3. What ever files that were supposed to be stored in the folder you select in step 3 will now be stored on your mapped network drive by default. This can actually be quite useful.

Feel free to post you opinion about this post. 

Thanks
R.karthikeyan

Share this

Labels

WINDOWS SERVER (22) Windows (20) IIS (15) Interview questions (10) TFS (9) Troubleshooting Tips (9) Fortigate Firewall (8) SQL (8) Backup (6) Team Foundation Server (6) Webserver (6) Windows Administration Task (6) Microsoft certification (5) Virtualization (5) ADDS (4) Active Directory (4) FTP (4) PHP (4) SQL 2012 (4) SQL Server (4) server (4) DBA (3) MSSQL (3) Networking (3) Offer (3) Webhosting (3) Windows 8 (3) 74-409 (2) Agile Methodology (2) Apache (2) CLI Commands (2) DNS (2) Dedicated server (2) Difference between Active and Passive Connection Mode (2) Fortinet (2) GPO (2) IIS8 (2) IPAddress (2) IPV6 (2) MVA (2) Microsoft News (2) NAT (2) Software Development (2) TFS2013 (2) Uncategorized Post (2) XAMPP (2) firewall Administration. (2) powershell (2) .htaccess (1) ALM (1) Agile vs Scrum Difference (1) Blogging TIPS (1) CPanel (1) Command for Administrator (1) DC (1) DHCP (1) Domain joining nano server (1) Exam 74-409 (1) Excel TIps (1) File server (1) Fortigate Firewall HA (1) Fortigate Firmware Upgrade (1) Free Exam 70-740 (1) Free Voucher (1) Generation2 VM (1) Group Policy (1) HP (1) HP ILO IP CHange (1) HP OA IP Change (1) HP Proliant Servers (1) HTTP to HTTPS (1) Hyper-V (1) IAS (1) IIS Server hardening (1) ILO (1) Install dll (1) MCSA 2016 (1) Microsoft Virtual Academy (1) Microsoft file sharing Port (1) Migration (1) MySQL (1) NPS (1) Nano server (1) Network Drive (1) OA (1) Plesk Panel (1) Ports (1) Ports for windows file sharing (1) RADIUS (1) RDP (1) Remote Desktop Connection (1) SCRUM (1) SQL ErrorLog (1) SQL TEMPDB (1) Second Shot (1) Server 2012 (1) Startup Parameters (1) TEMPDB Movement (1) TIPS (1) Team Foundation Server 2013 (1) Temp profile. (1) Troubleshooting DNS (1) URL Rewriting (1) VDOM (1) VPS (1) VSS (1) Virtual Labs (1) Visual Studio (1) Visual Studio 2012 (1) Visual Studio 2013 (1) Visual source safe (1) Waterfall Model vs Agile Methodology (1) Windows 2016 (1) Windows 7 (1) Windows Server 2012 (1) Windows command line (1) XP (1) certification path (1) exam (1) free online courses (1) protocols/ports for windows file sharing on a firewall (1) sql error (1) what features has been installed in your SQL Server (1) windows 2012 (1) windows Time Service (1) work item types difference (1)

E-Books

Blogger Gadgets