(Hardik Shah) A technique often employed by malicious users for gaining illegal access to remote machines, through the web applications’ vulnerability, is SQL injection. The basic idea behind this technique is to run the SQL query, something not intended by the programmer. SQL injection relies heavi
Author: SSWUG Research
ASP.NET tutorial: binding a datareader to a datalist using SQL server and C#
The first step in binding a datareader to a datalist is to import the System.Data.SqlClient namespace and have ASP.NET connect to SQL Server. This gives you access to the classes necessary to retrieve data from a SQL Server database. More on .net datareader performance in this asp.net tutorial
Nullifying foreign key statements when loading a test dev MySQL database
(Mike Hillyer) Is there a way to write a SQL statement that will override (set to null) all foreign keys? I want to use this when loading a test development MySQL database. (R)
Oracle 10g Warehousing, VLDB & Analytical Features
(Garry Robinson) A change in the default behaviour of the skip_unusable_indexes parameter. The new default is TRUE which means Oracle will not error, but instead just write a warning to the alert log when it comes across an unusable index that it has skipped. If an index is used to enforce a UNIQUE
Why should I create an index?
(Conor) There are many cases where the database administrator does not control the queries being submitted of the system. As a result, the physical database design is often not tuned as well as it could be. In a number of actual customer cases where we investigated performance issues with them, we
XML and Web services: SOAP
(William Brogden) Early experiments with XML-based messaging using XML-RPC encouraged the development of an extension called SOAP. In the initial submission to the W3C, SOAP was said to stand for Simple Object Access Protocol. Many people have pointed out that SOAP is not particularly simple and doe
High Availability Disaster Recovery Demystified in IBM DB2 8.2
(Anil Mahadev) HADR stands for High Availability Disaster Recovery, a new technique introduced in IBM DB2 8.2.
Data Modeling, RDF, and OWL
(David C. Hays) Everyone knows that we are drowning in information, both from the databases in our companies as well as from the world-wide web, the media, and life in general. The information technology industry has been wrestling with this problem for years, and one is entitled to wonder if thing
More on when to rebind in Version 8
(Willie Favero) Today’s post is inspired by Rick’s comment to my Saturday, April 1st entry that discussed “One more reason to bind after migrating to DB2 V8”. Rick asked what other optimizer enhancements would be available in new function mode (NFM) if a plan or package was already bound while in co
SQL Server 2005’s EXECUTE AS statement
(Muthusamy Anantha Kumar) In SQL Server 2005, you can explicitly or implicitly define the execution context. As we all know, a session starts when a user logs on to SQLServer or a connection to SQLserver is made. All operations in that session use the logon credentials used for connecting to SQL Ser
