search
HomeDatabaseMysql Tutorial64位win7下安装oracle的一些问题

64位win7下安装oracle的一些问题

Jun 07, 2016 pm 03:21 PM
64 bitoraclewwin7Installnotebookquestion

笔记本是WIN7 64位的,装ORCAL 遇到了几个问题,相信装过的人都知道,不过还是记下来,备以后查阅。 问题一: 装完 Oracle 10g,然后,进行em后,界面出来了,但报了一个错: java.lang.Exception: Exception in sending Request :: null 很多功能不能用,提

 

             笔记本是WIN7 64位的,装ORCAL 遇到了几个问题,相信装过的人都知道,不过还是记下来,备以后查阅。

 

问题一: 装完 Oracle 10g,然后,进行em后,界面出来了,但报了一个错:

java.lang.Exception: Exception in sending Request :: null

很多功能不能用,提示重新登录


解决方案:找到下面的文件

$ORACLE_HOME\db_1\$HOSTNAME\sysman\config\emd.properties

$ORACLE_HOME\db_1\sysman\config\emd.properties

注意:这两个路径是不同的,从上面的路径中才能找到agentTZRegion字段。

比如我的计算机是:c:\oracle\product\10.2.0\db_1\zy_oracl\sysman\config

其中的agentTZRegion缺省是GMT,改为你所在的时区即可,例如:

agentTZRegion=Asia/Shanghai

关于时区的列表参考:10.2.0\db_1\sysman\admin\supportedtzs.lst

 

修改文件时,要先停了下面的服务,把文件复制出来,改好了,再覆盖回去。

关于服务

然后先停止 dbconsole 使时区设置生效并重启OracleDBConsole:

 

顺序如下:

stop dbconsole

emctl resetTZ agent

emctl config agent getTZ

start dbconsole

 

 

问题二:

    PLSQL安装问题

   64位win7下安装oracle报“ORA-12154: TNS: 无法解析指定的连接标识符”

以下是一位网友的描述:

在64位win7下安装oracle 10g,经测试一切正常。但是在装完PL/SQL Developer 8后,输入正缺的用户名和密码后,却报出“ORA-12154:

TNS: 无法解析指定的连接标识符”。经查看tnsnames.ora和listener.ora两个配置文件均无问题。在从网上查查原因,有说“是由于环境变

量导致PL/SQL找不到配置文件”,于是又配置了环境变量,但还是报错。其余就是说配置文件的问题了,我开始误入歧途,将配置文件进行

各种修改,但还是不行。怎么就这么奇怪呢?应该说是没有问题了啊~我又安装了一个绿色低版本的PL/SQL,连接成功。奇怪了~以前装也没

发现这问题啊!再上网继续查,在“chewinggum的专栏”发现了一篇具有相同问题文章,我仔细看了一下他的解决方法,按照其操作。将

PL/SQL安装文件卸载,重新安装,并将安装位置不选择默认的“Program Files (x86)”而安装在自己指定的目录下,安装成功后进行连接,

OK,搞定了~非常无奈!原来64位win7会把32位应用程序默认的安装到Program Files (x86)目录下,而这两个括号可能会引起冲突,唉,这

真是害死人啊~以后再安装需要连接oracle的软件,一定不能一直点下一步了。    问题总算是解决了,感谢chewinggum、虎哥、小陈儿。  

 我还得将CR卸了,再重新装一遍,一定注意选择一个舒服的位置给它休息,要不它还得跟我闹。

 

我把上面的办法都试过了,后来使用了重装,更改文件名解决了问题。

 

PS: 之前一直是想学OrCL的,这次项目中遇到了,索性装了,,搭建一个真实的环境,BLESS!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
What Are the Limitations of Using Views in MySQL?What Are the Limitations of Using Views in MySQL?May 14, 2025 am 12:10 AM

MySQLviewshavelimitations:1)Theydon'tsupportallSQLoperations,restrictingdatamanipulationthroughviewswithjoinsorsubqueries.2)Theycanimpactperformance,especiallywithcomplexqueriesorlargedatasets.3)Viewsdon'tstoredata,potentiallyleadingtooutdatedinforma

Securing Your MySQL Database: Adding Users and Granting PrivilegesSecuring Your MySQL Database: Adding Users and Granting PrivilegesMay 14, 2025 am 12:09 AM

ProperusermanagementinMySQLiscrucialforenhancingsecurityandensuringefficientdatabaseoperation.1)UseCREATEUSERtoaddusers,specifyingconnectionsourcewith@'localhost'or@'%'.2)GrantspecificprivilegeswithGRANT,usingleastprivilegeprincipletominimizerisks.3)

What Factors Influence the Number of Triggers I Can Use in MySQL?What Factors Influence the Number of Triggers I Can Use in MySQL?May 14, 2025 am 12:08 AM

MySQLdoesn'timposeahardlimitontriggers,butpracticalfactorsdeterminetheireffectiveuse:1)Serverconfigurationimpactstriggermanagement;2)Complextriggersincreasesystemload;3)Largertablesslowtriggerperformance;4)Highconcurrencycancausetriggercontention;5)M

MySQL: Is it safe to store BLOB?MySQL: Is it safe to store BLOB?May 14, 2025 am 12:07 AM

Yes,it'ssafetostoreBLOBdatainMySQL,butconsiderthesefactors:1)StorageSpace:BLOBscanconsumesignificantspace,potentiallyincreasingcostsandslowingperformance.2)Performance:LargerrowsizesduetoBLOBsmayslowdownqueries.3)BackupandRecovery:Theseprocessescanbe

MySQL: Adding a user through a PHP web interfaceMySQL: Adding a user through a PHP web interfaceMay 14, 2025 am 12:04 AM

Adding MySQL users through the PHP web interface can use MySQLi extensions. The steps are as follows: 1. Connect to the MySQL database and use the MySQLi extension. 2. Create a user, use the CREATEUSER statement, and use the PASSWORD() function to encrypt the password. 3. Prevent SQL injection and use the mysqli_real_escape_string() function to process user input. 4. Assign permissions to new users and use the GRANT statement.

MySQL: BLOB and other no-sql storage, what are the differences?MySQL: BLOB and other no-sql storage, what are the differences?May 13, 2025 am 12:14 AM

MySQL'sBLOBissuitableforstoringbinarydatawithinarelationaldatabase,whileNoSQLoptionslikeMongoDB,Redis,andCassandraofferflexible,scalablesolutionsforunstructureddata.BLOBissimplerbutcanslowdownperformancewithlargedata;NoSQLprovidesbetterscalabilityand

MySQL Add User: Syntax, Options, and Security Best PracticesMySQL Add User: Syntax, Options, and Security Best PracticesMay 13, 2025 am 12:12 AM

ToaddauserinMySQL,use:CREATEUSER'username'@'host'IDENTIFIEDBY'password';Here'showtodoitsecurely:1)Choosethehostcarefullytocontrolaccess.2)SetresourcelimitswithoptionslikeMAX_QUERIES_PER_HOUR.3)Usestrong,uniquepasswords.4)EnforceSSL/TLSconnectionswith

MySQL: How to avoid String Data Types common mistakes?MySQL: How to avoid String Data Types common mistakes?May 13, 2025 am 12:09 AM

ToavoidcommonmistakeswithstringdatatypesinMySQL,understandstringtypenuances,choosetherighttype,andmanageencodingandcollationsettingseffectively.1)UseCHARforfixed-lengthstrings,VARCHARforvariable-length,andTEXT/BLOBforlargerdata.2)Setcorrectcharacters

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

MantisBT

MantisBT

Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

EditPlus Chinese cracked version

EditPlus Chinese cracked version

Small size, syntax highlighting, does not support code prompt function

Atom editor mac version download

Atom editor mac version download

The most popular open source editor