By Brian McWilliams – Officials at the SANS Institute, a computer security education and analysis organization, also reported today that they have received “exploit code” that indicates the increase in port 1433 scans may be due to a self-propagating worm rather than to manual probes by would-be att
Author: SSWUG Research
How to modify the snapshot structure without dropping the table
By riadh amari – This script modifies the structure of a snapshot for Oracle replication without dropping and recreating the snapshot. (It’s very useful but you have to be careful–it should be done by a DBA only.)
Date-Time Presentation
The technique makes a presentable conversion of the result from substraction between dates. For example, suppose we are looking for how many days, hours, minutes, etc. we spend between two dates, say at the beginning and ending the job/project/compaign. Oracle returns the result in days (such as 2.2
Revisiting SGML on the web
Four years after the publication of XML 1.0 as a W3C Recommendation, Edd Dumbill opens the XML Europe 2002 conference by questioning whether XML has become the "SGML on the Web" which it was meant to be.
XML for Data: XSL style sheets — push or pull?
Columnist Kevin Williams examines the two most common authoring styles used to create XSL style sheets: push and pull. He takes a look at some simple XML and XSL examples and discusses the benefits and drawbacks of each approach.
Use XSLT in .NET
by Dan Wahlin – In a previous article I discussed some of the different roles that XSLT could play in the .NET platform. One of the roles discussed in that article focused on using XSLT for content management or applications that present varying amounts of data to end users. In this article, I'l
Spida spreads venom on MS SQL servers
By Robert Lemos – The new arch-enemy of Microsoft SQL Server has slammed many networks with bogus data–causing traffic to a server port to jump by a factor of 40 in some reported cases.
Staying Ahead in the Security Game
By Brian Moran – Find out about the latest SQL Server security patch, which you can download from Microsoft’s Web site, and learn how to sign up for Microsoft’s security bulletin service.
Some Useful Undocumented SQL Server 2000 Trace Flags
by Alexander Chigrik – You can never know too much about SQL Server trace flags. In this article, find out about those that are undocumented in SQL Server 2000.
Oracle contract raises issues of security, privacy
By Robert Salladay – The furious political debate over California’s botched contract with Oracle Corp. has overlooked a critical question: Why let one company’s software dominate the state’s vast information databank?
