 firebird gfixswitch displays the command line options and switches. It replaces the old method in which you had to supply an invalid switch (such as -help) in order to see the list of valid ones.  Firebird 2.5 onwards If you have not defined the above environment variables, some commands will not work unless you supply -u[ser] and -pa[ssword] on the command line. For example: linux> gfix -validate my_employee linux> create a new shadow file in the event of a current shadow being activated. This allows a continuous supply of shadow files and prevents the database ever running without one. 4.2. Killing Shadows The command0 码力 | 44 页 | 247.13 KB | 1 年前3 firebird gfixswitch displays the command line options and switches. It replaces the old method in which you had to supply an invalid switch (such as -help) in order to see the list of valid ones.  Firebird 2.5 onwards If you have not defined the above environment variables, some commands will not work unless you supply -u[ser] and -pa[ssword] on the command line. For example: linux> gfix -validate my_employee linux> create a new shadow file in the event of a current shadow being activated. This allows a continuous supply of shadow files and prevents the database ever running without one. 4.2. Killing Shadows The command0 码力 | 44 页 | 247.13 KB | 1 年前3
 Firebird 2.5 Language Referencestring. However, if you want to coerce it to anything other than OCTETS, it is your responsibility to supply the bytes in a sequence that is valid for the target character set. Introducer Syntax for String that role can be granted to or revoked from one or many users. A user that is granted a role must supply that role in his login credentials in order to exercise the associated privileges. Any other privileges be prepared first. Once a parameterized query has been prepared, the user (or calling code) can supply values for the parameters and have it executed many times, entering new values before every call0 码力 | 521 页 | 2.30 MB | 1 年前3 Firebird 2.5 Language Referencestring. However, if you want to coerce it to anything other than OCTETS, it is your responsibility to supply the bytes in a sequence that is valid for the target character set. Introducer Syntax for String that role can be granted to or revoked from one or many users. A user that is granted a role must supply that role in his login credentials in order to exercise the associated privileges. Any other privileges be prepared first. Once a parameterized query has been prepared, the user (or calling code) can supply values for the parameters and have it executed many times, entering new values before every call0 码力 | 521 页 | 2.30 MB | 1 年前3
 firebird 40 language referencestring. However, if you want to coerce it to anything other than OCTETS, it is your responsibility to supply the bytes in a sequence that is valid for the target character set. Alternative String Literals be prepared first. Once a parameterized query has been prepared, the user (or calling code) can supply values for the parameters and have it executed many times, entering new values before every call not provide more advanced multi-branch jumps, such as CASE or SWITCH. However, it is possible to chain IF … THEN … ELSE statements, see the example section below. Alternatively, the CASE statement from0 码力 | 778 页 | 3.43 MB | 1 年前3 firebird 40 language referencestring. However, if you want to coerce it to anything other than OCTETS, it is your responsibility to supply the bytes in a sequence that is valid for the target character set. Alternative String Literals be prepared first. Once a parameterized query has been prepared, the user (or calling code) can supply values for the parameters and have it executed many times, entering new values before every call not provide more advanced multi-branch jumps, such as CASE or SWITCH. However, it is possible to chain IF … THEN … ELSE statements, see the example section below. Alternatively, the CASE statement from0 码力 | 778 页 | 3.43 MB | 1 年前3
 firebird gbakswitch displays the command line options and switches. It replaces the old method in which you had to supply an invalid switch (see -help below) in order to see the list of valid ones.  Firebird 2.5 onwards you wish to display the version number of the gbak utility and also details of database, you must supply a valid database name and backup filename, as follows: tux> gbak -z employee employee.fbk -user what follows as you wish. For example, to use the -b[ackup_database] switch the minimum you must supply on the command line is -b but anything between -b and -backup_database will be accepted. Using0 码力 | 34 页 | 191.73 KB | 1 年前3 firebird gbakswitch displays the command line options and switches. It replaces the old method in which you had to supply an invalid switch (see -help below) in order to see the list of valid ones.  Firebird 2.5 onwards you wish to display the version number of the gbak utility and also details of database, you must supply a valid database name and backup filename, as follows: tux> gbak -z employee employee.fbk -user what follows as you wish. For example, to use the -b[ackup_database] switch the minimum you must supply on the command line is -b but anything between -b and -backup_database will be accepted. Using0 码力 | 34 页 | 191.73 KB | 1 年前3
 firebird 5 quickstartguidepassword that’s much longer than that. Notice however that if you do enter such a password, you must supply it in its full length every time you connect — it won’t work if you truncate it to the first 20 Win_Sspi”. In the latter case, the user will be authenticated with their Windows login if they fail to supply user credentials (causing the Srp256 method, which is tried first, to fail). • AuthClient defines protocol. 6.1. Connection strings If you want to connect to a database or create one you have to supply, amongst other things, a connection string to the client application (or, if you are a programmer0 码力 | 49 页 | 396.21 KB | 1 年前3 firebird 5 quickstartguidepassword that’s much longer than that. Notice however that if you do enter such a password, you must supply it in its full length every time you connect — it won’t work if you truncate it to the first 20 Win_Sspi”. In the latter case, the user will be authenticated with their Windows login if they fail to supply user credentials (causing the Srp256 method, which is tried first, to fail). • AuthClient defines protocol. 6.1. Connection strings If you want to connect to a database or create one you have to supply, amongst other things, a connection string to the client application (or, if you are a programmer0 码力 | 49 页 | 396.21 KB | 1 年前3
 firebird isqlmessage telling you that your username or password have not been defined. In this case, you need to supply the username and password, or create two environment variables as discussed below. The following Because the alias is defined on the server where the database resides, the remote client needs to supply the server name and alias (as defined on that server) in order to connect. Using the CONNECT command parameters acts as a toggle and turns autoddl off if it is currently on and vice versa. You may supply a specific parameter to make your intentions clear. The parameter must be one of on or off. The0 码力 | 76 页 | 369.92 KB | 1 年前3 firebird isqlmessage telling you that your username or password have not been defined. In this case, you need to supply the username and password, or create two environment variables as discussed below. The following Because the alias is defined on the server where the database resides, the remote client needs to supply the server name and alias (as defined on that server) in order to connect. Using the CONNECT command parameters acts as a toggle and turns autoddl off if it is currently on and vice versa. You may supply a specific parameter to make your intentions clear. The parameter must be one of on or off. The0 码力 | 76 页 | 369.92 KB | 1 年前3
 firebird gsecparameters and these are one, or more, of the following: -pw firebird gsecparameters and these are one, or more, of the following: -pw- This parameter lets you supply a new password for the user. If you omit the password, the current one will be removed and the user Remotely Gsec can be used to administer the security database on a remote server. To do this you must supply the remote security database name on the command line as shown in the following example which connects 0 码力 | 23 页 | 145.31 KB | 1 年前3
 firebird gsplitthe prompt, the second file will be named stdout and not norman_2.fbk. If, on the other hand, you supply the filename norman_2.fbk then that file will be written to. Unfortunately you cannot specify how0 码力 | 10 页 | 103.73 KB | 1 年前3 firebird gsplitthe prompt, the second file will be named stdout and not norman_2.fbk. If, on the other hand, you supply the filename norman_2.fbk then that file will be written to. Unfortunately you cannot specify how0 码力 | 10 页 | 103.73 KB | 1 年前3
 Firebird File and Metadata Securityaccessed without the key. When you start the computer you have to mount the encrypted volume and supply the secret key before the data can be accessed. This additional, and necessarily manual, step in0 码力 | 19 页 | 115.27 KB | 1 年前3 Firebird File and Metadata Securityaccessed without the key. When you start the computer you have to mount the encrypted volume and supply the secret key before the data can be accessed. This additional, and necessarily manual, step in0 码力 | 19 页 | 115.27 KB | 1 年前3
 Firebird 2 QuickStartTCP/IP protocol. Connection strings If you want to connect to a database or create one you have to supply, amongst other things, a connection string to the client application (or, if you are a programmer0 码力 | 40 页 | 218.42 KB | 1 年前3 Firebird 2 QuickStartTCP/IP protocol. Connection strings If you want to connect to a database or create one you have to supply, amongst other things, a connection string to the client application (or, if you are a programmer0 码力 | 40 页 | 218.42 KB | 1 年前3
共 16 条
- 1
- 2













