Data Recovery possibility on SQL databases

SQL-Query

There can be a possibility that when you connect to an SQL Server Instance you will find the database being marked as SUSPECT. During such scenarios, you will not be able to connect to the database. In this article we will go through the Data Recovery possibility on SQL databases.

When an incident occurs, it is important to take all precautions in order to protect the data and to increase chances of successful recovery. It is highly recommended to perform following steps immediately after an incident occurs:

  1. Take database offline – detach it from SQL server
  2. Create copies of the MDF and LDF files
  3. Reattach MDF and LDF files copied to SQL server
  4. Use appropriate recovery options

Recovery interval is the top time period for rolling back a recovery action executed by SQL Server. If the recovery action is not completed on time then, the transaction will roll forward. The status of Recovery Interval gets settled to 0 when it is automatically running. Steps for the recovery interval creation:

  • Within SQL Server, open Object Explorer
  • Make a right click on Server option
  • Make selection for Properties tab
  • Go with Database Setting tab
  • Find Recovery tab such as   http://www.datanalyzers.com/houston-data-recovery/
  • Go with Recovery Interval box
  • Settle the value for database recovery within the range 0-32767 minutes
  • Recovery interval 0 shows that SQL Server 2008 R2 settled with automatic SQL recovery

Opt Recovery Model for SQL Database Recovery

After applying recovery interval properly, it is required to opt or use a database recovery model. There are different database recovery models for SQL Server 2008 R2.

Simple Recovery Model: This database recovery model is settled to remove database inaccessibility issues from development databases.

When Simple Database Recovery Applicable?

Above listed all points should be true for applying simple recovery:

 

  • You are not able to get update between the time intervals from last back to database failure.
  • Expecting the data loss risk from log files
  • Backing up database for restoration is not your preference
  • Relying on differential or full backup

SQL-Properties

Full Recovery Model: Database those are running in production phases should recover under this database recovery model.

When Full Database Recovery Applicable?

Above listed all points should be true for applying full recovery:

  • Ability to repair all data from damaged database
  • Should able to repair database failure point
  • Should able to repair database failure point
  • Possibility to recovery all damaged pages from databases
  • The cost for backups of transaction log is exceeding beyond expectations

 

In addition, there are several data recovery software applications to assist with the recovery of corrupted SQL MDF and LDF database files. Stellar, Systools and Kernel are some of the more commonly available and commercial SQL data recovery software applications which might be worth looking into if the above processes are not functioning or providing limited results.

 

For more details about SQL Server and recover-ability visit the http://sqlmag.com

 

The Most Dangerous Computer Viruses

The Most Dangerous Computer Viruses

Computer viruses are often a nightmare that may cause extensive damage to your precious machine. A virus may significantly interrupt the performance of your system. Furthermore, it has the potential of wiping out everything on your hard drive. Computer viruses are deadly in a similar way that pneumonia, cancer and other deadly disease are to people. They are designed to replicate themselves and corrupt your system making it ineffective and helpless. If you have had a virus attack, then you will know why it is important to know the most dangerous computer viruses in the market. Having information on a number of them can be quit helpful in case they affect your computer.

 

Nimda

The first time Nimda went viral was in 2001. The interesting fact is that the name of the virus is derived from the word ‘Admin’ spelt backwards. It took a minimum of 22 minutes for Nimda to propagate through four different ways – file transfer, shared folders, server vulnerabilities and e-mail.

 

The virus was believed to be a Cyber Terror attack since it was realised about a week after the 9/11 attacks. This forced many people to believe it being a terror attack because of the fact that it captured almost each source that a virus can use to effectively infect most computers. However

computer-virus-windows

, the main purpose of the virus was to cause a significant decrease in internet traffic to the point that it effected a denial – in – service attack. Since then, there have been many replications of the virus such that Nimda has become the source of creation of viruses that are similar in its replication and infection.

 

Conficker

A computer worm, known as Conficker and other names such as Kido, Domnadup, Downup, made its way into as many as 15 million Windows operating systems internationally in 2009. It made its way without being created as it was a patched Windows flaw. It can be described as a very hard to detected virus because it can only be effectively detected by running an upgraded version of original malware scanner and anti-virus.

 

It has the ability to spread using removable drives such as thumb drives, smart phones and hard disks. Conficker adds a corrupt file to any of these devices such that when it is added to another computer, there is an additional option on the AutoPlay dialog box. Conficker has managed to assemble a number of zombies which have the potential of stealing important information from your computer such as your financial data. It is present in this list because it is still considered to be among the most dangerous computer viruses.

ordinateur portable virus

Storm Worm

This is a virus that got its name because it cane embedded in an email that stated ‘230 dead as storm batters Europe’. It was (and still is to a point) one of the greatest and most sophisticated cyber fraud networks to be constructed. It could turn any Windows computer into a botnet the moment the user was tricked into clicking a fake link in a virus infected e-mail. By 2007, it was estimated that at least 10 million computers infected worldwide were the work of the virus. It is still working in the present day, and there are other upcoming viruses that use the same modus operandi. The only way to avoid getting attacked by such viruses is using one of the leading anti-viruses in the world today.

 

To read more about computer Viruses please visit the following resources:

Microsoft explains computer Viruses

The Computer Virus Catalog

 

 

Best SEO techniques for 2014

A Hot topic for any website owner is that of SEO which is all about the ability of a site to rank highly for particular search terms in search engine results. If you don’t rank well in search, you may well be limiting your traffic considerably. Many efforts are made therefore to improve sites traffic by improving search visibility. In the earlier period we tried many Off-page SEO techniques like link submission, article submission, citation submission, press release etc. But in the year 2014 lots of things have been changed.

 

Google has drastically changed its search algorithm based on the various version updates of its algorithms that are released periodically like Hummingbird, Panda, Penguin and EMD etc. So we need to keep updated with new SEO techniques. We are here with some new SEO techniques that can help you to boost your traffic and to get good ranking for your websites. Go through the techniques listed below and complete them, keeping in mind that your objective is to build an online presence so that search engine spiders will recommend you confidently.

 

  • Social Bookmarking

Let’s start first to find out what you mean by social bookmarking. In simple words suppose if we find something interesting on internet like website, picture or fact then we save its URL link in our computer for future use, but suppose if we want to share this link to our family and friends then instead of saving this link to our computer you can save it to the web. Now since your bookmarks are online, you can easily share them with your friends. In other words, a social bookmark contains a link to a web page that people want to share or remember.

 

  • PDF File Submissions

You can create a search engine optimized PDF file for your business website and submit it to PDF submission websites to get better traffic for your website. Search engine give same importance to PDF files as it gives to html files. Getting a backlink here will get your keywords optimized and bring more traffic. PDF file submission sites such as slideshare, issuu, yudu etc. are frequently updated and hence search engines crawls these sites more often.

 

  • Infographic

There is a “three second rule” the techies talk about according to this rule, a regular user of the internet just take three seconds to decide whether to stay on the page or move on. So our information should be so clear and visual so that a user doesn’t take more than 3 seconds to understand the information. So Infographic is a new SEO technique that is a visual representation of information.

 

  • RSS FEEDS

RSS, also commonly known as Really Simple Syndication, is a feed format used to publish frequently updated content from sources such as blog entries, news headlines, and other standardized formats. An RSS feed is important for your site because you can allow your readers to subscribe to your content. In turn, they can share these feeds on social networks. The sharing process continues and your site can get more exposure.

What SEO is all about?

SEO, or search engine optimization, is a subset of the umbrella term “search engine marketing” (SEM). Properly applied, search engine optimization allows your site to not only be seen by the search engines but, when a search term (either keywords or phrases) is entered, offers the ability to rank very high in the search engine results pages. The results pages are typically a combination of natural (sometimes called organic) results, paid inclusions (directories) and pay-per-click (PPC) ads.

In the world of SEO, they often say “content is king”. That means if you want people to find your website on Google, you need to have lots of words on your website, and those words should be the “keywords” you think people would be looking for on Google.

Search engine optimization (SEO) is the process of affecting the visibility of a website or a web page in a search engine’s “natural” or un-paid (“organic”) search results. In general, the earlier (or higher ranked on the search results page), and more frequently a site appears in the search results list, the more visitors it will receive from the search engine’s users. SEO may target different kinds of search, including image search, local search, video search, academic search, news search and industry-specific vertical search engines.

A critical first step for an effective SEO plan is to perform heavy competitive analysis. In fact, if you search in Google for a key term or phrase related to your field and website, you should look at the first three to five websites that come up on the first page of your Google search results.

As an Internet marketing strategy, SEO considers how search engines work, what people search for, the actual search terms or keywords typed into search engines and which search engines are preferred by their targeted audience. Optimizing a website may involve editing its content, HTML and associated coding to both increase its relevance to specific keywords and to remove barriers to the indexing activities of search engines. Promoting a site to increase the number of backlinks, or inbound links, is another SEO tactic.

The plural of the abbreviation SEO can also refer to “search engine optimizers”, those who provide SEO services. Many people hire professional consultants to perform SEO, while others attempt to do it themselves, which you certainly can-it’s not brain surgery. SEO can (and should) be a full-time engagement. The scope of work depends on your site and your niche. This doesn’t necessarily mean you’ll need to spend 40 hours a week on it–you certainly couldn’t afford to put that much effort into it–but you need to put a solid content and link-building strategy in place for the long term.

© 2014 Ranklogix SEO

Theme by Anders NorenUp ↑