MySQL database using a clever idea

Source: Internet
Author: User

How the MySQL database should be against the decryption master

When you connect to a MySQL server, you should usually use a password. The password is not transmitted on the connection with clear text. All other information is transmitted as text that can be read by anyone. If you're worried about this, you can use the compression protocol (MySQL3.22 and above) to make things harder. Even in order to make everything more secure, you should install SSH. With it, you can get an encrypted TCP/IP connection between a MySQL server and a MySQL client.

MySQL advanced features of the aggregate function

So far, you've only learned how to take one or more records from a table based on specific conditions. However, if you want to make statistics on the records in a table. For example, if you want to count the poll results of a poll stored in the table. Or you want to know how much time a visitor spends on your site on average. To count any type of data in a table, you need to use aggregate functions. You can count the number, average, minimum, maximum, or sum of records. When you use an aggregate function, it returns only a number that represents one of these statistical values.

How to securely configure and apply a MySQL database?

MySQL has become one of the most widely used databases in the current network, especially in Web applications, which occupy the absolute advantage of small and medium-sized applications. It all stems from its compact, safe, efficient, open licensing and multi-platform, and, more important, the perfect combination of--php with one of the three web languages.

Add 23 security doors to your MySQL

With MySQL, security issues cannot be noticed. Here are 23 things to note about MySQL hints.

MySQL Platform database backup scheme detailed description

It is important to back up your database if your database tables are missing or corrupted. If a system crash occurs, you will want to be able to recover as few data from your table as possible to the state at which the crash occurred. Sometimes it is the MySQL administrator who caused the damage. The administrator already knows that the tables have been corrupted and attempts to edit them directly using editors such as VI or Emacs, which is absolutely not a good thing for the table.

MySQL Modified password Method summary

The first thing to declare is that in most cases, MySQL needs to have root privileges in MySQL, so the general user cannot change the password unless the administrator is requested.

In MySQL modify password and access restrictions set the details

MySQL is a real multi-user, multi-threaded SQL database server. MySQL is implemented as a client/server architecture, consisting of a server daemon mysqld and many different client programs and libraries. Due to the openness and stability of its source code and the perfect combination of Wylie language and PHP, many sites use it as a back-end database, which makes it widely used. Security considerations require that each user be assigned access restrictions to different databases to meet the requirements of different users.

The use method of MySQL database under Linux operating system

First in the Open DOS window, and then into the directory Mysqlbin, and then type the command mysql-uroot-p, enter after the password prompts you, if you have just installed MySQL, superuser root is no password, so direct return can enter into MySQL.

Easy to learn how to protect important data in MySQL

In day-to-day work, protecting data from unauthorized users is a particular concern for system administrators. If you are currently using MySQL, you can use a number of convenient features to protect the system to significantly reduce the risk of confidential data access by unauthorized users.

Note : For more wonderful tutorials, please pay attention to the triple graphics tutorial channel,

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.