Firebird 2 QuickStart................................................................................... 17 Windows Control Panel applets .................................................................................. filesystem-level access rights to the database for this to work. On Linux, all local connections are made via the network layer, using localhost (often implicitly). Only the server process needs access rights to architectures now support safe and reliable local connec- tions, with only the server process requiring access rights to the database file. Multiprocessor SMP (symmetrical multi-processor) sup- port. Better0 码力 | 40 页 | 218.42 KB | 1 年前3
firebird 40 language reference. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 552 12. Transaction Control. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . data storage structures, referential integrity mechanisms, to data manipulation capabilities and access privileges. Firebird also implements a robust procedural language — procedural SQL (PSQL) — for deci-milliseconds precision. Deci-milliseconds precision is rare and is not supported by all drivers and access components. The best assumption to make from all this is that, although Firebird stores TIME and0 码力 | 778 页 | 3.43 MB | 1 年前3
Firebird File and Metadata Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 4.1.1. Needs of the Access Layer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 4.2.3. Removing SYSDBA access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . firebirdsql.org This article discusses the security of Firebird database files and in particular access to the metadata stored in those files. It has been written in response to frequent questions on0 码力 | 19 页 | 115.27 KB | 1 年前3
Firebird 2.5 Language Reference. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383 10. Transaction Control. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . data storage structures, referential integrity mechanisms, to data manipulation capabilities and access privileges. Firebird also implements a robust procedural language — procedural SQL (PSQL) there as the argument for Restrict. If the file does not exist yet, Firebird will create it on first access. The ability to use external files for a table depends on the value set for the ExternalFileAccess0 码力 | 521 页 | 2.30 MB | 1 年前3
Firebird 2.1.5 Installation................................................................................... 27 Database Access ................................................................................................ ordinary users to make con- nection settings that could lead to database corruptions or give them access to SYSDBA-only operations. This loophole has been closed, a change that could affect several existing login is not supplied. • Embedded access without login/password works fine. On Windows, authentication is bypassed. On POSIX, the Unix user name is used to validate access to database files. The security0 码力 | 46 页 | 217.89 KB | 1 年前3
Firebird 1.0 QuickStartIf you install Firebird 1.03 or higher under Windows 95/98/ME, uncheck the option to install the Control Panel applet. It doesn't work on these platforms. We'll give you a link to a usable applet later service on Windows NT, 2000 or XP or on Linux. Windows NT4, 2000 and XP Open Control Panel -> Services (NT) or Control Panel -> Administrative Tools -> Services (2000, XP). Firebird 1.0 Quick Start Windows 9x or ME machine. Alternatively, you can use a Control Panel applet to control the starting and stopping of the Firebird server. Windows Control Panel applets Pre-1.0 distributions of Firebird for0 码力 | 26 页 | 179.05 KB | 1 年前3
firebird isqlbin directory of the Firebird installation. It provides a command line interface for interactive access to a Firebird database. It accepts DSQL statements along with a group of SET and SHOW commands to options and without starting an interactive session. Commands execute, and upon completion, return control automatically to the operating system. • In a non-interactive session, the user employs a shell users to store records of commands to a script file. The TMP setting on a client can be used to control where these script files will be stored, if an absolute file path is not specified. Chapter 4.0 码力 | 76 页 | 369.92 KB | 1 年前3
firebird 5 quickstartguideperform a local (embedded or XNET) backup of the security database; embedded mode requires filesystem access rights to the database file; XNET (Windows only) requires username and password. 2. (only after databases) Install Firebird 5 (see later sections) 3. Note down the permissions, ownership and filesystem access rights of security5.fdb 4. Rename the existing security5.fdb for safekeeping 5. Restore the backup would require the security database to exist, and it would lock the file). 6. Change filesystem access rights/permissions to match the original security5.fdb For a Firebird 4 security database, it is0 码力 | 49 页 | 396.21 KB | 1 年前3
Firebird Generator Guide: A guide on how and when to use generators in Firebird. . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 5.4. Generators to monitor and/or control long-running Stored Procedures . . . . . . . . . . . . . . . . . . . 16 Appendix A: Document history certain value and then obtain that same value — it’s inside the database, but outside of transaction control. 2.2. What is a sequence? “Sequence” is the official SQL term for what Firebird calls a generator a sequence. They are just two words for the same database object. You can create a generator and access it using the sequence syntax, and vice versa. This is the preferred syntax for creating a generator/sequence0 码力 | 20 页 | 169.00 KB | 1 年前3
Firebird Internals: Inside a Firebird Databaserepeating characters is reduced to a control byte that determines the repeat count followed by the actual byte to be repeated. Where data cannot be compressed, the control byte indicates that "the next 'n' 'n' characters are to be output unchanged". The usage of a control byte is as follows: Positive n the next 'n' bytes are stored 'verbatim'. Negative n the next byte is repeated 'n' times, but stored decompression code needs to be able to know which bytes in the data are control bytes. This is done by making the first byte a control byte. Knowing this, the decompression code is easily able to convert0 码力 | 63 页 | 261.00 KB | 1 年前3
共 27 条
- 1
- 2
- 3













