Skip to main content

Sybase入门abc

  我真的真的是第一次碰这个东西。
  我学东西总是有个毛病:无论什么东西一定要试。比如学java,一定要先弄好了环境,然后写一个HelloWorld.java,编译了运行,等这个小程序打印了“HelloWorld”在屏幕上。然后,嘿嘿,我就觉得我对这个java已经有了直观的印象了,那么对于我来说,已经把java的50%学会了。
  下面就是我的Sybase的50%。
  环境是原来就有的,只是不知道Sybase数据库账号跟密码而已。
  去问偶得leader,他用了两个命令就知道了:
  su - sybase//偶们当然有root的密码了
  history |grep isql     //竟然有isql -Usa -P**** -Ssybserver
  嘿嘿,密码就知道了。
  ================
  这就是差别,偶还是太菜。
  1.登陆
  isql -Usa -Ppassword -SSYBSERVER
  账号是sa, 密码是password, 数据库实例是SYBSERVER
  2.Sybase的数据库
  每个instance都有下面的几个数据库,从建好就有了:主数据库master,模型数据库model,系统过程数据库sybsystemprocs,临时数据库tempdb。
  使用master的数据库
  1> use master
  2> go
  3.看看我是谁
  1> sp_who
  2> go
  4.关于系统过程
  所有系统过程都是以"sp_"开头,系统过程位于sybsystemprocs,所有系统过程都会报告返回状态,=0表示该过程已正常执行。
  5.一共系统里有几个db?每个占了多大地方,属于谁?
  1> sp_helpdb
  2> go
  6.查询系统设备
  1> sp_helpdevice
  2> go
  7.关于系统扩展存储过程
  所有的扩展过程都以“xp_”开头,也存在于sybsystemprocs。但是必须要先启动XP server之后才能执行这些过程
  一个有用的扩展过程“xp_cmdshell”可以在数据库中执行操作系统命令。
  8.查看有哪些sybase数据库正在运行
  用sybase用户执行showservers
  9. master数据库重要的表
  syslogins
  sysremotelogins
  sysservers
  sysprocesses
  sysconfigures
  sysmessages
  sysdatabases
  sysusages
  sysdevices
  syslocks
  syscharsets
  syslanguages
  ================

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...