`
dogasshole
  • 浏览: 845163 次
文章分类
社区版块
存档分类
最新评论

the security settings could not be applied to the database (error 1045 MySQL)

 
阅读更多

在装mysql时,总是到最后启动的时候出错,出错内容如下:

就是最后的Apply security setting过不去

提示:

The security settings could not be applied to the database because the connection has failed with the following error.

Error Nr. 1045

Access denied for user 'root'@'localhost' (using password: YES)

If a personal firewall is running on your machine, please make sure you have opened the TCP port 3306 for connections. Otherwise no client application can connect to the server. After you have opened the port please press [Retry] to apply the security settings.

If you are re-installing after you just uninstalled the MySQL server please note that the data directory was not removed automatically. Therefore the old password from your last installation is still needed to connect to the server. In this case please select skip now and re-run the Configuration Wizard from the start menu.

解决方法:

1, 卸载MySQL

2, 删除目录 C:/Documents and Settings/All Users/Application Data/MySQL

3, 重新安装MySQL 就好了

如何你C:/Documents and Settings/All Users下没有Application Data文件夹,选择:工具——文件夹选项——查看——选择显示所有文件和文件夹

mysql 数据库卸载不完全,配置出错解决办法

The security settings could not be applied to the database because the connection has failed with the following error.

Error Nr. 2003
Can't connect to MySQL server on 'localhost' (10061)

If a personal firewall is running on your machine, please make sure you have opened the TCP port 3306 for connections. Otherwise no client application can connect to the server. After you have opened the port please press [Retry] to apply the security settings.

If you are re-installing after you just uninstalled the MySQL server please note that the data directory was not removed automatically. Therefore the old password from your last installation is still needed to connect to the server. In this case please select skip now and re-run the Configuration Wizard from the start menu.
*****************************************************************************************
The security settings could not be applied to the database because the connection has failed with the following error.

Error Nr. 1045
Access denied for user 'root'@'localhost' (using password: YES)

If a personal firewall is running on your machine, please make sure you have opened the TCP port 3306 for connections. Otherwise no client application can connect to the server. After you have opened the port please press [Retry] to apply the security settings.

If you are re-installing after you just uninstalled the MySQL server please note that the data directory was not removed automatically. Therefore the old password from your last installation is still needed to connect to the server. In this case please select skip now and re-run the Configuration Wizard from the start menu.

MySQL 5.1 安装过程中报apply security setting错误的解决办法
1, 卸载MySQL
2, 删除目录 C:/Documents and Settings/All Users/Application Data/MySQL
3, 重新安装MySQL 就 OK 啦
------------------------------------------
[MySQL] Could not start the service MySQL 解决方法

安装mysql 5.1.33,在运行Server Instance Configuration wizard时的Execute configurattion步骤中的第三项Start Service进出错,错误提示为Could not start the service MySQL (出现这种情况一般是因为装过mysql,卸载不干净造成的。卸载后重启后再重装。注意看下服务,如果未能卸载,可以用mysqld-nt -remove卸载)。

具体方法如下:
查看服务中有没有mysql,如果有将该服务停掉;
在控制面板中运行添加删除程序,将mysql卸载;
卸载后打开注册表,查看HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Services 下的键值,如果有相关mysql键值(mysql、mysqladmin)则删掉,即可;
重启,将mysql的安装残余目录删掉 (查看服务,此时服务中已没有mysql);
重新安装mysql.安装后先不要运行Server Instance Configuration wizard,重启后在开始菜单中运行该向导,即可。

PS:一种值得参考的方法
---------------------------------------------
msyql安装到最后一步start service错误解决方法

1,到控制面板里面先把mysql删除.

2.到c盘C:/Program Files目录下把mysql目录删除.

3.如果在其他盘还有设置目录也要删除.空目录也要删除

4.到regedit把注册表

HKEY_LOCAL_MACHINE/SYSTEM/ControlSet001/Services/Eventlog/Applications/MySQL

HKEY_LOCAL_MACHINE/SYSTEM/ControlSet002/Services/Eventlog/Applications/MySQL

HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Services/Eventlog/Applications/MySQL

有的话,全部删除!

(技巧:用F3循环查找“mysql”)

5.如果任务管理器里有关mysql内容也删除

6,把防火墙关了

7,重新装mysql(这里我没有重启计算机)

重装时候有必要的话,重启计算机,停用IIS,和删除temp里的临时文件.

实在不行的话,配置mysql时候,把mysql服务换个服务名.
******************************************************************************************

---------------------------
删除项时出错。
---------------------------
无法删除 LEGACY_MYSQL51: 删除项时出错。
---------------------------
确定
---------------------------
解决办法:注册表项里右键增加administrators所有权限

分享到:
评论

相关推荐

    mysql安装失败

    The security settings could not be applied to the database because the connection has failed with the following error. Error Nr. 1045 Access denied for user 'root'@'localhost' (using password: YES) ...

    my sql 安装报错

    the security settings could not be applied to the database (error 1045 MySQL)

    安装MySql时apply security settings报错解决方法

    解决apply security settings报错

    NIST SP800-43.pdf

    The NISTWin2kProGoldPlus.inf security template contains all of the settings of the NISTWin2kProGold.inf security template, plus added restrictions on command line executables that could be used by ...

    mysql密码丢失&&mysql apply security settings错误.pdf

    mysql密码丢失&&mysql apply security settings错误.pdf

    Securing RFID systems conforming to EPC Class 1 Generation 2 standard

    RFID, capable of remote automatic identification, is taking the place of barcodes to become electronic tags 18 ... The improved protocol could thus be applied in high security demanding environments.

    MySQL 8 Cookbook epub 格式

    With quick solutions to common and not-so-common problems you might encounter while working with MySQL 8, the book contains practical tips and tricks to give you the edge over others in designing, ...

    The.Security.Consultants.Handbook.

    The Security Consultant's Handbook aims to be a practical and enabling guide for security officers and contractors. Its purpose is to plug information gaps or provoke new ideas, and provide a real-...

    Oracle Database Listener Security Guide

    The default installation of the Oracle Database prior to Oracle 10g, allows any client to remotely administer a Listener using the "lsnrctl" program or by issuing commands directly to the Listener....

    security the internet of things

    CHAPTER 2 Security Architecture in the Internet of Things CHAPTER 3 Security and Vulnerability in the Internet of Things CHAPTER 4 IoT Node Authentication CHAPTER 5 Security Requirements in IoT ...

    An In-Depth Analysis of the Security of the Connected Repair Shop

    we conclude that the TVRA method was not easy to follow, but still useful in this analysis. Finally, we suggest that repair shop security should mainly be addressed at the link layer. Such an approach...

    mysql8学习手册

    With quick solutions to common and not-so-common problems you might encounter while working with MySQL 8, the book contains practical tips and tricks to give you the edge over others in designing, ...

    Migrating to MariaDB: Toward an Open Source Database Solution

    You’ll learn to do your own risk assessment, to identify database and application code that may need to be modified or re-implemented, and to identify MariaDB features to provide the security and ...

    Hands-On Database An IntroductIon to Database design and development 2nd

    narrative Now that she has the scope of the database, Sharon begins to gather information about the data the database will need to capture and process. First, she looks at the spiral notebooks that ...

    MySQL 8 Administrator’s Guide

    This handbook will be your companion to understand the newly introduced features in MySQL and how you can leverage them to design a high-performance MySQL solution for your organization. This book ...

    MySQL Administrator's Bible

    Welcome to the MySQL Administrator’s Bible. Like all books in the Bible series, you can expect to find both hands-on tutorials and real-world practical application information, as well as reference ...

    The InfoSec Handbook An Introduction to Information Security

    This book explains information security concepts in lay ...time, we also describe some of the concepts in detail in order for the content to be of interest to people in the information security field.

    PHP.and.MySQL.Web.Development.5th.Edition

    The definitive guide to building ...The authors cover important aspects of security and authentication as they relate to building a real-world website and show you how to implement these aspects in ...

    Core Software Security: Security at the Source

    Mapping the Security Development Lifecycle to the Software Development Lifecycle Software Development Methodologies Waterfall Development Agile Development Chapter Summary References Security ...

Global site tag (gtag.js) - Google Analytics