Firebird 2.1.5 Installation
........................................................................ 30 Supporting legacy applications and drivers ............................................................................ 30 Special SYSDBA-only operations. This loophole has been closed, a change that could affect several existing applications, database tools and connectivity layers (drivers, components). Details are in Chapter 3 of the Platforms) Be aware of the following changes that introduce incompatibilities with how your existing applications interface with Firebird's security: Direct connections to the security database are no longer0 码力 | 46 页 | 217.89 KB | 1 年前3Firebird 2.5 Language Reference
manual to cover all aspects of the query language used by developers to communicate, through their applications, with the Firebird relational database management system. It has a long history. 1.1. Subject 2 (SQL/Foundation) part of the SQL specification. DSQL represents statements passed by client applications through the public Firebird API and processed by the database engine. Procedural SQL augments 64-bit integers. Use of Dialect 3 is strongly recommended for newly developed databases and applications. Both database and connection dialects should match, except under migration conditions with Dialect0 码力 | 521 页 | 2.30 MB | 1 年前3firebird 40 language reference
manual to cover all aspects of the query language used by developers to communicate, through their applications, with the Firebird relational database management system. 1.1. Subject The subject of this 2 (SQL/Foundation) part of the SQL specification. DSQL represents statements passed by client applications through the public Firebird API and processed by the database engine. Procedural SQL augments 64-bit integers. Use of Dialect 3 is strongly recommended for newly developed databases and applications. Both database and connection dialects should match, except under migration conditions with Dialect0 码力 | 778 页 | 3.43 MB | 1 年前3Firebird 1.5 QuickStart French
toujours basculer d'une architecture à l'autre plus tard; vos applications et vos bases fonctionneront toujours (sauf si vos applications font appels à certaines fonctionnalités des Services Manager encore ...) Client Firebird fbclient.dll (avec en option gds32. dll, pour utiliser les an- ciennes applications)\bin (avec en option une copie dans Windows System – voir la note en bas de ta- sont configurées par défaut sur l'ancien modèle, « non sécurisé » afin de ne pas empécher des applications existantes de fonc- tionner, mais vous pouvez significativement améliorer la sécurité de votre 0 码力 | 29 页 | 192.46 KB | 1 年前3firebird isql
the user employs a shell script or batch file to perform database functions. Because other applications in the Linux environment, for example, MySQL, also use isql as a utility name, you are advised Variables An environment variable is a named object that contains information used by one or more applications. They are global to their specific operating systems. The Firebird server recognises and uses are designed to give SYSDBA access to the database from the commandline utilities and client applications to anyone who has access to a host machine. When running commandline utilities like isql0 码力 | 76 页 | 369.92 KB | 1 年前3firebird gfix
physical server crashed, then these remnants may still exist, even in later versions of Firebird. • Applications, described above, which delete database records, but then, subsequently, never revisit those backup by gbak tool. Gbak reads every table sequentially and thus visits every row in every table. Applications which also visit every row in one or more tables, will also cause the garbage in those tables built into the disk hardware) to buffer writes to the hardware. This improves the performance of applications that are write intensive but means that the user is never certain when their data has actually0 码力 | 44 页 | 247.13 KB | 1 年前3Firebird File and Metadata Security
primary key, domain and similar structural information, in order to make development of client applications easier. Consequently, you may discover that you cannot prevent users from accessing metadata library. 4.1.2. “Leaking” by Inference and Deduction There is also the issue that most client applications inherently “leak” structural information about the database with which they interact. It is very features of embedded are useful for developers wanting to create easy to distribute single-user applications that do not need security. From that brief description it appears that having an embedded server0 码力 | 19 页 | 115.27 KB | 1 年前3Firebird 2 QuickStart
performance difference. Note that you can always switch to the other architecture later; your applications and databases will keep func- tioning like before. For Linux, Superserver download packages start /usr/lib/libfbclient.so ...replacing 2.m.n with your version number, e.g. 2.0.0 or 2.1.0 If you're running applications that expect the legacy libraries to be present, also create the following sym- links: ln -s “insecure” behaviour inherited from InterBase and Firebird 1.0, in order not to break existing applications. It pays to familiarise yourself with Firebird's security-related configuration parameters. You0 码力 | 40 页 | 218.42 KB | 1 年前3Coexistence Firebird InterBase
services themselves, though! Firebird-InterBase Coexistence 4 5. If you are using IBX in your applications, and you have different versions of the application(s) in different directories, then copy the you will be obliged to specify the computer name whenever you connect to IB databases via IBX applications. As far as other database access components are concerned, we're not sure if there are any issues0 码力 | 8 页 | 48.66 KB | 1 年前3Firebird Null Guide: NULL behaviour and pitfalls in Firebird SQL
'IB_UDF_ltrim' module_name 'ib_udf'; This requirement ensures that existing databases and their applications can continue to function like before. Leave out the NULL keyword and the function will behave — unless the client flips back the flag before entering the data retrieval stage. Most client applications don’t do this. After all, if the server assures you that a column can’t contain NULLs, why would0 码力 | 69 页 | 479.63 KB | 1 年前3
共 14 条
- 1
- 2