firebird 5 quickstartguidethe backup scenario, using XNET is not an option to restore the security database (as this would require the security database to exist, and it would lock the file). 6. Change filesystem access rights/permissions offer an option to enable legacy authentication. You will need to configure this manually if you require it. If security is a concern (as it should be), you should not use the Legacy_Auth authentication (on Windows) and XNET connections to databases on the local machine. All these connection types require full authentication and have the server process, not the user process, open the database file.0 码力 | 49 页 | 396.21 KB | 1 年前3
firebird gbakshown above by the echo command. This method does not attempt to backup any databases and does not require a username and password to be defined or supplied. Chapter 2. Command-line Options 4 If you wish command lines have been replaced by {…}. When executing these commands, any remote gbak commands will require to have them specified unless the firebird user on the remote database(s) has ISC_USER and ISC_PASSWORD /opt/firebird/aliases.conf # --------------------------------------------------------- # WARNING: Backup Standards require that: # The database name starts in column 1. # There is a single space before0 码力 | 34 页 | 191.73 KB | 1 年前3
firebird 40 language referenceor above. That changes the type but not the value. • Hex numbers between 8000 0000 .. FFFF FFFF require some attention: ◦ When written with eight hex digits, as in 0x9E44F9A8, a value is interpreted as specification for primary database file server_spec Remote server specification. Some protocols require specifying a hostname. Optionally includes a port number or service name. Required if the database of course, have that constraint. The foreign key columns in the referencing table itself do not require a NOT NULL constraint. A single-column Foreign Key can be defined in the column declaration, using0 码力 | 778 页 | 3.43 MB | 1 年前3
Firebird 2.1.5 InstallationStudy the notes about firebird.conf to work out what can be copied directly and what parameters require new syntax. If this document is not in the documentation directory after installation, you can read Visual Studio 2005. Because all the Firebird binaries are built to use dynamic linking, they all require run-time libraries. To avoid the dll-hell issue Microsoft introduced new rules for the distribution the compile-time libraries that were used. A typical installation of Firebird Embedded would thus require three complete copies of the MSVC8 run-time assembly: one in the application folder and one each0 码力 | 46 页 | 217.89 KB | 1 年前3
firebird gsplitwith the Windows version of Firebird 1.5, it is not supplied with the Linux version. Linux doesn’t require a separate utility as it can split files using the split command as well as using gbak. In testing Command line Options 3 Chapter 3. Gsplit Command Parameters Both main gsplit command line options require parameters. When splitting a backup, the parameters are: -S[PLIT_BK_FILE]{k|m|g} 0 码力 | 10 页 | 103.73 KB | 1 年前3
Firebird File and Metadata Securityaccess control to objects in that database. At no time does the user connecting to the database require direct access to the database file itself. All access goes through the server process, which accesses control the server you cannot prevent the user from installing a version of the server that does not require the authentication. 4.2.3. Removing SYSDBA access At various times people have suggested that removing0 码力 | 19 页 | 115.27 KB | 1 年前3
Firebird 2.5 Language Referenceor above. That changes the type but not the value. • Hex numbers between 8000 0000 .. FFFF FFFF require some attention: ◦ When written with eight hex digits, as in 0x9E44F9A8, a value is interpreted as of course, have that constraint. The foreign key columns in the referencing table itself do not require a NOT NULL constraint. A single-column Foreign Key can be defined in the column declaration, using UNION ALL operators. The unions between non-recursive members may be of any type. Recursive CTEs require the RECURSIVE keyword to be present right after WITH. Each recursive union member may reference0 码力 | 521 页 | 2.30 MB | 1 年前3
Firebird Internals: Inside a Firebird Databaseonly. 0x08 Blob Page. Blobs have their own storage within the database. Very large blobs will require a sequence of pages and the type 8 page holds blob data. 0x09 Generator Page. Holds an array of additional bits will be added in groups of 32 at a time. A record with 33 columns, therefore, will require 64 bits in the array, although 31 of these will be unused. As this example table has a single field0 码力 | 63 页 | 261.00 KB | 1 年前3
firebird wire protocola different operation. Versions 11 and higher of the wire protocol explicitly support (or even require) deferring of operations, including deferring the read of the response. Chapter 1. Introduction0 码力 | 40 页 | 213.15 KB | 1 年前3
firebird gfixFirebird is still running. The major cause of garbage build-up is long-running transactions that require Firebird to keep old versions of records that are frequently updated. Another source of garbage0 码力 | 44 页 | 247.13 KB | 1 年前3
共 11 条
- 1
- 2













