Search Results

Search found 24588 results on 984 pages for 'source hiding'.

Page 355/984 | < Previous Page | 351 352 353 354 355 356 357 358 359 360 361 362  | Next Page >

  • Capture a Query Executed By An Application Or User Against a SQL Server Database in Less Than a Minute

    - by Compudicted
    At times a Database Administrator, or even a developer is required to wear a spy’s hat. This necessity oftentimes is dictated by a need to take a glimpse into a black-box application for reasons varying from a performance issue to an unauthorized access to data or resources, or as in my most recent case, a closed source custom application that was abandoned by a deserted contractor without source code. It may not be news or unknown to most IT people that SQL Server has always provided means of back-door access to everything connecting to its database. This indispensible tool is SQL Server Profiler. This “gem” is always quietly sitting in the Start – Programs – SQL Server <product version> – Performance Tools folder (yes, it is for performance analysis mostly, but not limited to) ready to help you! So, to the action, let’s start it up. Once ready click on the File – New Trace button, or using Ctrl-N with your keyboard. The standard connection dialog you have seen in SSMS comes up where you connect the standard way: One side note here, you will be able to connect only if your account belongs to the sysadmin or alter trace fixed server role. Upon a successful connection you must be able to see this initial dialog: At this stage I will give a hint: you will have a wide variety of predefined templates: But to shorten your time to results you would need to opt for using the TSQL_Grouped template. Now you need to set it up. In some cases, you will know the principal’s login name (account) that needs to be monitored in advance, and in some (like in mine), you will not. But it is VERY helpful to monitor just a particular account to minimize the amount of results returned. So if you know it you can already go to the Event Section tab, then click the Column Filters button which would bring a dialog below where you key in the account being monitored without any mask (or whildcard):  If you do not know the principal name then you will need to poke around and look around for things like a config file where (typically!) the connection string is fully exposed. That was the case in my situation, an application had an app.config (XML) file with the connection string in it not encrypted: This made my endeavor very easy. So after I entered the account to monitor I clicked on Run button and also started my black-box application. Voilà, in a under a minute of time I had the SQL statement captured:

    Read the article

  • Stairway to T-SQL DML Level 10: Changing Data with the UPDATE Statement

    Unless you are working on a reporting-only application you will probably need to update tables in your SQL Server database. To update rows in a table you use the UPDATE statement. In this level we will be discussing how to find and update records in your database, and discuss the pitfalls you might run into when using the UPDATE statement. Is your SQL Database under Version Control?SSMS plug-in SQL Source Control connects SVN, TFS, Git, Hg and all others to SQL Server. Learn more.

    Read the article

  • SQL in the City - Boston 2012

    A free day of training in Boston on Oct 8, 2012. Come join Grant Fritchey, Steve Jones and more to talk about SQL Server and how you can work more efficiently. Keep your database and application development in syncSQL Connect is a Visual Studio add-in that brings your databases into your solution. It then makes it easy to keep your database in sync, and commit to your existing source control system. Find out more.

    Read the article

  • YouTube: Realtime Graph Sharing on the NetBeans Platform

    - by Geertjan
    Yet another really cool movie by the Maltego team in South Africa, this time showing Visual Library widgets in their NetBeans Platform application shared in realtime between different users of the Maltego open source intelligence gathering and analytics software: What you see above is Maltego CaseFile. Below you find out more about it in the latest blog entry on the Maltego site: http://maltego.blogspot.be/2013/11/maltego-casefile-v2-released.html

    Read the article

  • what is the exact frontier of Extreme Programming

    - by joker13
    I'm doing some study on Extreme Programming and from what is anticipated many people have published their personal reflection of what XP is and eventually prescribe some practices. But I'm a little vague on what exactly XP refers to?! I've seen Kent Beck's book Titled "Extreme Programming Explained". is that the single source I can rely on I can take other books too? please explain and provide some references to your answers

    Read the article

  • What can I do with urllib?

    - by Aerovistae
    I grasp that it can fetch internet resources, but I'm not really fully appreciating what that means. I was doing the challenges at pythonchallenge.com, and I got past the one that requires urllib to fetch the page and read the source, but I don't see how this is useful quite yet. And examples are kind of lacking in diversity. What else can it do, or how can I use this to my advantage? (Besides building a web browser...)

    Read the article

  • Déploiement d'une instance GNU/Linux Debian 7 sous CloudStack, premier tutoriel d'une série sur Cloudstack

    Bonjour, Citation: CloudStack est un logiciel de cloud computing open source pour la création, la gestion et le déploiement de services de cloud d'infrastructure. Il utilise des hyperviseurs existants tels que KVM, vSphere, XenServer et / XCP pour la virtualisation. En plus de sa propre API, CloudStack prend également en charge les Amazon Web Services. Voici une série de tests effectués par Ikoula sur ce logiciel. Je vous présente ce tutoriel sur Cloudstack:Déploiement d'une instance...

    Read the article

  • SQL Server Unit Testing with tSQLt

    When one considers the amount of time and effort that Unit Testing consumes for the Database Developer, is surprising how few good SQL Server Test frameworks are around. tSQLt , which is open source and free to use, is one of the frameworks that provide a simple way to populate a table with test data as part of the unit test, and check the results with what should be expected. Sebastian and Dennis, who created tSQLt, explain.

    Read the article

  • Gracefully Handling Deadlocks

    - by Derek Dieter
    In some situations, deadlocks may need to be dealt with not by changing the source of the deadlock, but by changing handling the deadlock gracefully. An example of this may be an external subscription that runs on a schedule deadlocking with another process. If the subscription deadlocks then it would be ok to [...]

    Read the article

  • SSIS Basics: Using the Merge Join Transformation

    SSIS is able to take sorted data from more than one OLE DB data source and merge them into one table which can then be sent to an OLE DB destination. This 'Merge Join' transformation works in a similar way to a SQL join by specifying a 'join key' relationship. this transformation can save a great deal of processing on the destination. Annette Allen, as usual, gives clear guidance on how to do it.

    Read the article

  • Why DbContext object shouldn't be referred in Service Layer?

    - by nazmoonnoor
    I've been looking for some implementations of Service Layer and Controller interaction in blogs and in some open source projects. All of them seem to refer DbContext object in repository classes but avoided to use in service classes. Service classes essentially using a IQueryable<T> references of DbSet<T>. I want to know why this practice is good and why DbContext shouldn't have a reference in Service Layer.

    Read the article

  • non-volatile virtual memory for C++ containers

    - by arieberman
    Is there a virtual memory management process that would allow a program to use the standard container structures and classes, but retain these structures and their data when the program is not running (or being used), for use by the program at a later time? This should be possible, but can it be done without changing the source code and its (container) declarations? Is there a standard way of doing this?

    Read the article

  • libgtk2.0-common fails to build with Gdk-2.0.gir error, Type reference 'GdkPixbuf' not found

    - by Stefano Palazzo
    I'm trying to build gtk, but it fails. Here's what I'm doing: sudo apt-get build-dep libgtk2.0-common sudo apt-get source libgtk2.0-common cd gtk+2.0-2.22.0/ sudo gedit gtk/gtktreeview.c & #...editing a few files (or not, it's the same error) sudo ./configure --prefix=/usr sudo make The compilation runs for a while and then quits: Gdk-2.0.gir: error: Type reference 'GdkPixbuf' not found ... make: *** [all] Error 2 What am I doing wrong?

    Read the article

  • System 76 Lemur Review

    <b>Jonobacon@home:</b> "Recently I got one of these new System 76 ultra-thin laptops, the Lemur: System76 are well known in the Open Source community for shipping Ubuntu on their machines, being active community members and for helping LoCo teams with machines too."

    Read the article

  • Archiving SQL Server Data Using Partitioning

    Many companies now have a requirement to keep data for long periods of time. While this data does have to be available if requested, it usually does not need to be accessible by the application for any current transactions. Data that falls into this category are a good candidate for archival. Is your SQL Database under Version Control?SSMS plug-in SQL Source Control connects SVN, TFS, Git, Hg and all others to SQL Server. Learn more.

    Read the article

  • Why am I asked for default's keyring at startup?

    - by Nicoco
    I'm prompted for default's keyring at every boot since 11.10 upgrade, even though I don't see any application I have needing at startup (I have no wifi, and disabled gwibber-service) How can I know which application is requesting it ? How can I disable it ? I can't even move any window until I enter the password, and sometimes entering the password even crashes X (bug reported here : https://bugs.launchpad.net/ubuntu/+source/xserver-xorg-input-evdev/+bug/882955)

    Read the article

  • Free book from Microsoft - Building Elastic and Resilient Cloud Applications - Developer's Guide to the Enterprise Library 5.0 Integration Pack for Windows Azure

    - by TATWORTH
    At http://www.microsoft.com/en-us/download/details.aspx?id=29994, Microsoft are are offering a free book  - "Building Elastic and Resilient Cloud Applications - Developer's Guide to the Enterprise Library 5.0 Integration Pack for Windows Azure"The Microsoft Enterprise Library Integration Pack for Windows Azure is an extension to the Microsoft Enterprise Library 5.0 that can be used with Windows Azure. It includes the Autoscaling Application Block, the Transient Fault Handling Application Block, a protected configuration provider and the Blob configuration source.The book is available as PDF, mobi and epub formats.

    Read the article

  • Déploiement et configuration réseau d'une instance CloudStack, deuxième tutoriel d'une série sur Cloudstack

    Bonjour, Citation: CloudStack est un logiciel de cloud computing open source pour la création, la gestion et le déploiement de services de cloud d'infrastructure. Il utilise des hyperviseurs existants tels que KVM, vSphere, XenServer et / XCP pour la virtualisation. En plus de sa propre API, CloudStack prend également en charge les Amazon Web Services. Voici une série de tests effectués par Ikoula sur ce logiciel. Je vous présente ce deuxième tutoriel sur Cloudstack:Déploiement...

    Read the article

  • Opera 15 : le navigateur reconstruit allie simplicité, rapidité et compatibilité avec le moteur Blink, plusieurs fonctions passent à la trappe

    Opera 15 : le navigateur reconstruit à partir de zéro allie simplicité, rapidité et compatibilité avec le moteur Blink et Chromiun, plusieurs fonctions passent à la trappe Opera Software vient de lancer son nouveau navigateur entièrement reconstruit à partir de zéro, pour PC Windows et Mac.Le navigateur qui a été développé autour de trois axes majeurs : compatibilité, simplicité et rapidité, utilise comme socle Chromium (navigateur Web open source sur lequel est basé Chrome) et abandonne le moteur JavaScript maison d'Opera Carakan pour V8 de Google.

    Read the article

  • Dropbox abandonne JavaScript au profit de CoffeeScript, et vous, envisageriez-vous une telle migration ?

    Dropbox abandonne JavaScript au profit de CoffeeScript Et vous, envisageriez-vous une telle migration ? Dropbox, le service de stockage et de partage de fichiers en ligne, déclare avoir complètement abandonné JavaScript et avoir réécrit la totalité de son code source pour navigateur dans un langage relativement nouveau appelé CoffeeScript. [IMG]http://idelways.developpez.com/news/images/coffeescript.jpg[/IMG] Dans leur blog, les développeurs de Dropbox affirment que la migration vers CoffeeScript s'est faite en l'espace d'une semaine seulement. Et ce grâce à l'outil "js2coffee". I...

    Read the article

  • SEO Your Way to the Top

    An in depth survey of Chinese Internet demographics also shows that the Internet has become a vital source of information and interaction as well as a means of communication and convenience for the users. 84.3% say the Internet for them is a major information channel. 81.6% say the Internet saves them a lot of time. The value of the Internet in today's digital age is undeniable. The power of information and of convenience has turned the Internet into ally rather than a foe.

    Read the article

< Previous Page | 351 352 353 354 355 356 357 358 359 360 361 362  | Next Page >