Providing information is the most fundamental purpose of a database. This is accomplished through queries that are submitted by the database’s...
database-tools
Categories
- Free tools
- SQL Admin Toolset
- SQL Compliance Manager
- SQL Defrag Manager
- SQL Diagnostic Manager for MySQL
- SQL Diagnostic Manager for SQL Server
- SQL Diagnostic Manager Pro
- SQL Doctor
- SQL Enterprise Job Manager
- SQL Inventory Manager
- SQL Query Tuner for SQL Server
- SQL Safe Backup
- SQL Secure
- SQL Workload Analysis for SQL Server
- Uptime Infrastructure Monitor Formerly Uptime
Adding PowerShell commands for Azure
To manage and automate your assets in the Azure cloud, you can easily install a free PowerShell module which comes with a wealth of new PowerShell...
How can you prevent SQL Server intrusions?
Understanding how SQL Server can be infiltrated is the key to understanding how to prevent intrusions. The consequences for inadequate permissions...
Finding the Best Way to Present Your Data
Modern organizations use their data resources for many essential activities. The information contained in enterprise databases is used to drive...
Showing Wi-Fi SSIDs
In the previous tip we illustrated how you can dump all Wi-Fi profile names using netsh.exe. Typically, profile names and SSIDs are identical....
The Value of an IT Capacity Planning Strategy
Planning to ensure that requirements are met is a practice that is performed in many different situations. The need to accurately plan manifests...
How should you handle the complexities of regulatory compliance?
The reliance on digitally stored information continues to grow and now dominates society in the 21st Century. The use of the Internet for business...
Dumping Wi-Fi Passwords
In the previous tip we used netsh.exe to dump Wi-Fi profiles. Let’s take it a step further and expose the cached passwords: # get cleartext...
Which items do you need to audit in SQL Server?
SQL Server provides robust capabilities to monitor itself, and it can be easy to be overwhelmed with the choices presented through catalog or...
It is Never a Bad Time to Revisit User Permissions
A database needs users to provide any value to an organization. While it might be instructive from an academic point of view to simply collect large...
How can you balance database security and database performance?
The security of any database can be improved. However, that likely degrades the performance of the database. The cost increases to improve database...
Showing Wi-Fi Profiles
PowerShell is not limited to cmdlets and can run executables. For example, there is no built-in cmdlet to list the existing Wi-Fi profiles, but...
Addressing Out of Control SQL Server Sprawl Effectively
Data is the driving force in business these days. Organizations rely on their information resources to make informed decisions regarding all aspects...
The Benefits of Using a Unified Interface
Individuals in many different fields of endeavor make use of tools or processes that exhibit a certain degree of consistency. Finding something that...
Redirecting Streams
PowerShell writes output information to six different streams, and only the output stream is assigned to variables: function Invoke-Test {...
Are you aware of these database risks?
Databases are vitally important to modern businesses across all market sectors. They are the repository of an organization’s information...
Why are health checks for SQL Server life savers?
SQL Server health checks have garnered a great deal of notoriety over the last five years. What was originally a niche offering more than ten years...
Silencing Write-Host Statements
Write-Host is an extremely useful cmdlet to output information to a user because this output cannot be discarded: function Invoke-Test {...
How can you protect personally identifiable information (PII) in databases?
The data resources of an organization are one of its most valuable assets. Except for its people, the information contained in enterprise databases...
Uptime Infrastructure Monitor 7.8.6 General Availability
We are pleased to announce the general availability of Uptime Infrastructure Monitor 7.8.6. Existing users may upgrade to this version through the...
Backups Are Important Because Hackers Never Rest
It’s an aspect of human nature that people tend to ignore repeated warnings that do not manifest themselves into real problems. Letting their...
Discarding Streams
PowerShell outputs information via different streams. Warnings are written to a different stream than output, and errors again go to a different...
A Tool for Creating More Efficient SQL Code Quickly
Information technology has become one of the most important manifestations of society’s technological advancements. IT systems are widely used...
What do you need to know about compliance audits?
Compliance audits are an inescapable part of the information technology world we live in. A compliance audit is a detailed review that is conducted...
Discarding (Any) Output
There are (a few) commands in PowerShell that output information to the console no matter what you do. Neither redirection of streams nor assigning...
Help – I’ve inherited yet another database!
In the previous tip we introduced the PowerShell “SmbShare” module which comes with Windows and enables you to manage file shares. We looked at the...
SQL Diagnostic Manager 10.6 General Availability
We are pleased to announce the general availability of SQL Diagnostic Manager 10.6. Existing users may upgrade to this version through the Idera...
The Important Role of Compliance Reporting
The way organizations handle sensitive and personal information regarding their customers and employees has radically changed in the last twenty...
Announcing the General Availability of SQL Secure 3.3.2
We are pleased to announce the general availability of SQL Secure 3.3.2. Customers can access the new version via the IDERA Customer Portal. New...
Identifying Operating System Details
WMI returns a cryptic number when you ask for operating system details: PS> Get-CimInstance -ClassName Win32_OperatingSystem | Select-Object...