You can easily determine your CD key for your SQL Server software by just typing a few lines into the query window. To do this:
You can get the file location, size, maxsize, growth and usage attributes of a database without leaving your Enterprise Manager or Management Studio. To do this:
If you need to attach a database that has no log file (.LDF), or have deleted the log file because it was too big and need to reattach the database, SQL Server 2005 does allow you to do this. You can attach the database by following this Tech-Recipe:
It is sometimes necessary to modify the number of characters displayed in a query result set, especially when you are dealing with results containing a large number of columns. To configure the maximum number of characters displayed, do the following…
One almost always runs into a situation that requires a comma delimited result set from a query so that the data can be utilized by other software. Luckily, this is a native feature in the Query Editor.
Previous versions of SQL Server have featured the ability to create grid result sets from queries so that one can easily copy and paste the data into another application. Unfortunately, the column headers were not copied, so you then would have to go into the application and add the header by hand. SQL Server 2005 provides a new option that will allow you to copy the column headers with the data. Here is how to activate this handy option…
As a security safeguard, Microsoft has turned off the use of xp_cmdshell by default in the latest version of SQL Server. This built-in extended stored procedure can come in quite handy as it gives you the ability to run any command line process from a stored procedure or job. To enable xp_cmdshell, do the following…
SQL Server used to rely on SQL Mail to for email capabilities. This was a pain as it required you to install a MAPI mail client onto your server. SQL Server 2005 has done away with this and now uses Database mail which relies on using your SMTP server instead of a mail client to send out email. You can set up Database Mail by following these instructions…
The CONCAT function in MySQL allows SELECT statements to act like printf commands by mingling text and query results together.
Utilizing password policy and expiration can better secure your server and better protect the valuable data in your database. To enforce password policy and expiration for a login, follow these steps…
A full backup includes database files and locations as well as parts of the transaction log. A full backup is necessary, regardless of the backup strategy that is implemented, because all other backup types (differential and transaction log) depend on the having a full backup. To perform a full backup of your database, follow these steps:
Your database is down, your users are in a panic, what do you do?. If you have been performing routine backups of your database, you can restore it to the point of the most recent backup. To restore your database, follow these steps:
1...343344345...502Page 344 of 502 error: Content is protected !!