In This Section:
Setting Environment Variables
Checking for Database Corruption
Fixing Database Corruption
Replacing Database Files with Backups
Checking the User Limit Profile
Setting NETDELAY and NETRETRYCOUNT
Ending the Server Task
Unlocking Objects
Determining Operating System Privileges