Wrapping Up
Congratulations! You've now seen how Log Explorer solves many of the common
database management problems you face regularly, as well as a few problems we
hope you don't often see - but need to fix quickly if you do!
Of course, this short guided tour can only begin to introduce you to all of
Log Explorer's capabilities. Here are some key features we did not explore in
detail:
- Log Explorer can now display NT user name and application for all database
transactions
- Log Explorer has extensive and powerful filter capabilities for finding
and operating on transactions
- transactions can be selected with filters and a script can be created to
re-apply them [Redo User Transactions]
- similarly, a set of transactions can be selected and a script can be
created to undo their effect [Undo User Transactions]
- on-line and/or backup logs can be combined to view as a single virtual log
for performing any of Log Explorer's functions
- selective recovery of individual tables can be performed from backup files
- system table transactions are also accessible from Log Explorer, providing
further information about database modifications
The next few pages provide answers to common questions, direct you to clean up the database files you created, and offer pointers for more information.
Click 'Next' to continue.