2002-04-01
782 reads
2002-04-01
782 reads
This script would help find primary key, foriegn key, unique constraints, check constraints on a table. With slight modification you can use it to find various information about a table.
2002-04-01
599 reads
2002-04-01
691 reads
This script would help you find users, their logins, roles etc in a database.
2002-04-01
347 reads
Under special circumstances, it could happen that database contains "orphan" records. Data in dependant table exists without it's "parent" record in a master table. It could be caused by a bulk insert operation without CHECK_CONSTRAINTS option, or by disabling foreign key for a while or adding a foreign key to a table that already contains […]
2002-03-27
221 reads
This Stored Procedure creates the script of all existing triggersOptionally it creates the script to drop the triggers too.Triggers may belong to different owners. This procedure takes care of it.In SQLServer Enterprise Manager there is a facility to generate scripts forTables, Views, Stored Procedures etc.But it won't generate script for triggers unless we include the […]
2002-03-27
2,718 reads
This script is actually part of an article written about performing a simple password audit on SQL Server logins when you start to administor a new SQL Environment. The script will scan the sysxlogins table located in the master database for SQL Server logins with no passwords, passwords that are the same as the login […]
2002-03-27
1,559 reads
2002-03-27
2,867 reads
We often make changes in the test databases. But failure in making even the smallest change in the production database may lead to unwanted situations.This utility compares 2 databases.Parameters to be passed @DB1 Database 1 (SysName) @DB2 Databse 2 (SysName) @ShowDifferentOnly see later (Bit) Parameters 1, 2 may include server name as well. […]
2002-03-22
519 reads
When deleting data from many tables, foreign key constraints can force you to specifically order your DELETE commands. This can take tons of time, especially if you have many tables. Here's a technique I use to delete data in the correct order during the restaging of test databases.It makes use of the system stored procedure […]
2002-03-22
1,623 reads
By Vinay Thakur
Following up on my Part 1 baseline, the journey from 2017 onward changed how...
By Brian Kelley
In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography...
By Steve Jones
In today’s world, this might mean something different, but in 2010, we had this...
Comments posted to this topic are about the item Dancing Robot Goes Rogue
Hi , i installed winscp on my pc, added it to GAC thru vs...
Comments posted to this topic are about the item Identities and Sequences II
In thinking about the differences between the identity property and a sequence object, which of these two guarantees that there are consecutive numbers (according to the increment) inserted in a single table?
See possible answers