Ransomware is a particularly nasty type of malware that is being deployed with increased frequency over the past several months. In a ransomware...
database-tools
Identifying PowerShell Host and Path
Here is a quick one-liner that identifies the full path to your current PowerShell host: PS> (Get-Process -Id $pid).Path C:\Program...
Why DBAs Need to Look for Trouble
In some professions, individuals are expected to wait patiently until called upon to perform their functions. There are no opportunities for people...
The Best Way to Use Your Monitoring Software
Many businesses rely on extensive and complex computing environments to run daily operations, service customers, and store valuable data resources....
Using Online Help (Part 2)
In the previous tip we mentioned that many PowerShell users prefer the online help over locally downloaded help. To use the online help documents by...
Making Time Using Temporal Data
SQL is the first programming language with temporal data types. The SQL-92 standard added temporal data to the language, acknowledging most of what...
How to Secure Your SQL Servers from Internal Threats
The tremendous value of enterprise data resources makes them an inviting target for malicious actors. Losing sensitive financial or personal data...
Using Online Help (Part 1)
PowerShell supports both local help files and online resources. Take a look at the differences: # outputs help in same console window # level of...
Oracle 19.7 on Linux and Oracle 19.8 on Solaris is supported in Precise 10.2
Precise 10.2 now supports the latest Oracle 19C patches for Linux and Solaris. Linux Oracle 19.7 on Linux is now supported in Precise 10.2See the...
Tips on How to Become a SQL Server Database Administrator
The increased focus that organizations are placing on their data resources has put a premium on their use of database technology. Making productive...
Updating Help without Admin Privileges
In Windows PowerShell, updating help used to require Administrator privileges due to a design flaw: help had to be stored in the location where the...
Checking Profile Scripts (Part 2)
In the previous script we came up with a one-liner that checks which profile scripts actually exist. This solution works per host only, though,...
Oracle 19.7 on Linux and Oracle 19.8 on Solaris is supported in Precise 10.2
Precise now supports the latest Oracle 19.7 patch on Linux and the Oracle 19.8 patch on Solaris. The latest patch from Oracle for Oracle 19C on...
Normalization Heuristics
Heuristics and normalization are the goals of all databases. Heuristics refers to a trial-and-error method of problem-solving used when an...
Who Do You Trust with Your SQL Servers?
Protecting enterprise data resources has never been more important. The large quantities of data that many organizations store present an inviting...
Checking Profile Scripts (Part 1)
PowerShell uses up to four profile scripts. When they exist, PowerShell silently executes any content when it launches. It’s important to know...
Why is MySQL So Popular for Website Development?
Most websites that provide any degree of usefulness or functionality make use of one or several databases. Whether the site is designed to simply...
Boost Productivity with an IDE for Your Database Team
Infographics provide a method of conveying a lot of information in a condensed and visual form. They are a widely-used way of capturing an...
Using Profile Scripts
Profile scripts work like autostart scripts in PowerShell. They do not need to exist, but if they do, PowerShell executes its content silently...
How to Monitor and Streamline SQL Server Jobs
One of the appeals of using SQL Server as a database platform is the functionality and productivity that can be enjoyed through the use of the SQL...
Identifying User Profile
Be careful when using $env:userprofile or $home to create paths to user files. When a Windows box is set up for OneDrive, the documents folder may...
Get Rid of Get-EventLog
The Get-EventLog cmdlet provides easy access to event log entries in the primary Windows event logs, however it neither can access the many...
Why You Need to Defragment Your SQL Server Indexes
In the quest for optimal database performance, DBAs need to leave no stone unturned. After keeping the data resources in their systems secure, there...
Setting and Clearing Trusted Hosts
PowerShell remoting maintains a list of trusted IP addresses and/or machine names on the client side (the machine that issues the command and...