server

Want to know server? we have a huge selection of server information on alibabacloud.com

Third SQL Server security principals and securable objects

This article is the third of the SQL Server Security series, please refer to the original text for more information. In general, you implement the security of users and objects on SQL Server by assigning the principal permissions to objects.

SQL Server 2012 Authentication (authentication) _mssql

In keeping your servers and data secure from the current complex attacks, SQL Server has everything you need. But before you can effectively use these security features, you need to understand the threats you face and some basic security concepts.

SQL Server 2000 Log Shipping Features-description

Server Role changes, role swaps, and monitoring server location When an online database is shut down (either planned maintenance or unplanned), you might be more comfortable if the database on the standby server is available for access. A

How to start and stop a MySQL Server

1. Run the MySQL server as a non-privileged user Before discussing how to start the MySQL server, let's take a look at the user identity to run the MySQL server. The server can be started manually or automatically. If you manually start it, the

Apache Server Configuration Full Introduction _ Server

A profile controls all aspects of the server, so the three files need to be set up to run the server properly. In addition to these three settings files, Apache uses the Mime.types file to identify different files The corresponding MIME type, the

When SQL Server 2000 is installed, the installation program fails to configure the server. For more information, see Server Error Log and c: \ winnt \ sqlstp. log.

InstallProgramAn error occurred while configuring the server. For more information, see Server Error Log and c: \ winnt \ sqlstp. log. View the log file. The following problems are found: Driver = {SQL Server}; server = zhl; uid = sa; Pwd =;

Use Win2003 to set up mail server graphics and text detailed _ server other

We can actually set up a small mail server to meet our needs through the POP3 service and SMTP service provided by Windows Server 2003.   First, install POP3 and SMTP service components Windows Server 2003 does not have the POP3 and SMTP service

Linux server cluster system

Linux server cluster system-Linux Enterprise Application-Linux server application information. The following is a detailed description. This article mainly introduces the architecture of the LVS cluster. Firstly, the general architecture of the LVS

Linux Server cluster System (i)

Add by Zhj: Although it was a 2002 article, it was a lot of money to read. In Zhangwensong: About LVs and Ali Open source behind the wonderful story of LVs initiator and main contributors talk about the development process of LVS and Ali Open source

[SQL Server] database migration between SQL server computers

Note: Data can be migrated from SQL Server 2000 to Microsoft SQL Server 2000 (64-bit ). You can attach a 32-bit database to a 64-bit database by using the sp_attach_db system stored procedure or sp_attach_single_file_db system stored procedure, you

Web server and Application server

Web servers (Web server)In layman's words, the basic function of Web server is to provide Web information browsing service. It only supports HTTP protocols, HTML document formats, and URLs. Mates with the client's Web browser. Because the Web server

SQL Server 2000 Log shipping Function-settings

Server SQL Server 2000 Log shipping Function-settings (1) The log shipping feature automatically copies the transaction log file for the database and is saved to another database in the standby server (standby server). Therefore, the availability

Linux server cluster system

LVS cluster architecture This article mainly introduces the architecture of the LVS cluster. Firstly, the general architecture of the LVS cluster is given, and the design principles and corresponding features are discussed. Finally, the LVS cluster

MSSQL Server Database Backup Restore method

Tutorial on MSSQL Server database backup Restore method Full backup: Backs up all selected folders and does not rely on the archive properties of files to determine which files to back up. (During the backup process, any existing tags are cleared,

IIS Various authentication detailed test 1th/2 page _win server

I. Authentication overview for IIS .... 3 1, Anonymous access ... 3 2. Integrated Windows authentication ... 3 2.1. NTLM authentication ... 3 2.2. Kerberos Authentication ... 3 3. Basic Authentication ... 4 Second, anonymous access .... 4 Third,

Reverse Proxy Server (forwarding)

Reverse proxy and nginx Example 1 concept of reverse proxy The reverse proxy method is to use a proxy server to accept connection requests from the Internet, and then forward the requests to the server on the internal network, return the result

Enable awe memory for SQL Server.

Today, I suddenly want to take a closer look at awe, so I checked it on Microsoft's website and put it here by the way.Address Window Extensions (AWE) Allow 32-bit operating systems to access a large amount of memory. Awe is provided by the

Nginx Server Load balancer configuration instance details, nginx Server Load balancer instance

Nginx Server Load balancer configuration instance details, nginx Server Load balancer instance First, let's take a brief look at what Server Load balancer is. Simply understanding what it means literally can explain that N servers are equally loaded,

Enable AWE memory for SQL Server

This function will be deleted in the next version of Microsoft SQL Server. Do not use this function in new development work, and modify the application that is currently using this function as soon as possible. Address Window Extensions (AWE) Allow 3

Enterprise experience sharing with VMware vsphere for server virtualization

Enterprise experience sharing with VMware vsphere for server virtualizationFor many small and midsize enterprises, virtualization has become an important means of saving IT spending, following the company's VMware Virtualization Product deployment

Total Pages: 15 1 .... 3 4 5 6 7 .... 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.