by: Florian |
last post by:
I've been stumbling over this, what I consider strange, behaviour. I
installed mySQL on a Win2k machine and tried to change the root password,
which didn't seem to work.
I changed it this way:
...
|
by: Ross Presser |
last post by:
As our customers demand that we tighten our IT security in the company,
I've been asked to prepare a report quarterly showing, for each user in
Active directory, what his effective permissions are...
|
by: vimala |
last post by:
Hi,
I have to write a setuid program which is going to check for
accesslogs based on the real user who had invoked the executable.
I need to get the real and effective user-ids of the system...
|
by: Antonios Christofides |
last post by:
Hi, I've prepared a test case about this, which I include below. I
have tables "a" and "b"; "b" has a foreign key to "a", on delete
cascade. In addition, there is a "before delete on b" trigger,...
|
by: Brendan Jurd |
last post by:
Hello all,
I have a particular application sitting on postgres that requires a
complete log of all inserts, updates and deletes, along with the
application user who made the change. There is a...
|
by: Eugeny Balakhonov |
last post by:
Hi!
How to change query priority dynamically?
I have a web site which uses PostgreSQL as a host database and a background
program which uses this database too.
|
by: akkha1234 |
last post by:
When I click on the properties of a 2005 sql server database and then
permissions.
If I select a group and then effective permission, I got an error,
saying that "cannot execute as the principal...
|
by: mahesh.kanakaraj |
last post by:
Hi All,
I have a confusion in finding the 'effective content' of a complex
type
definition in a XML Schema.
I shall give you an example situation to clearly explain my problem.
Let's have...
|
by: Peng Yu |
last post by:
Hi,
It is possible to change the length of "\t" to a number other than 8.
std::cout << "\t";
Thanks,
Peng
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
|
by: Hystou |
last post by:
Overview:
Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new...
|