server| Server | Solution for remote Connection SQL Server 2000 Server
A look at ping server IP can ping through.
This actually looks at whether the physical connection to the remote SQL Server 2000 Server exists. If not, check the network to see
The server transaction log (Transaction logs) is a very important but often overlooked part of the database structure. Because it is not as active as the schema in the database, few people are concerned about the transaction log.
The transaction log
The T-SQL programming language of SQL Server is powerful in data storage and recovery, but is less functional in terms of interaction with systems outside of the SQL Server database. However, we can overcome this limitation with SQL Server's
Data | statement
Master SQL four most basic data manipulation statements: insert,select,update and delete.Mastering SQL is a valuable asset for database users. In this article, we will guide you through the core functions of the four most basic data
Server| Solution | Problems often see people ask, MSSQL occupies too much memory, but also constantly grow, or has set up the use of memory, but it does not use so much, this is how the matter?
First, let's look at how the MSSQL uses memory.
server| Data | database | Statement SQL SERVER Database Management Common SQL and T-SQL statements
1. View the version of the database
SELECT @ @version
2. View the machine operating system parameters of the databaseEXEC master.. xp_msver
3.
server| Problem | performance
1. To optimize the query, you should try to avoid full table scan, first consider the where and the order by the columns involved in the establishment of the index.
2. The null value of the field in the WHERE clause
Domestic Internet connection speed is not satisfactory is the fact that many netizens and carrot and stick, in order to maximize the speed of the Internet. A time fast cat plus whip, netants and other network Tools software by netizens. However,
DNS software is the target of hackers ' passion for attack, and it can bring security problems. Here are some of the most effective ways to protect your DNS servers.
1. Using DNS ForwardersA DNS forwarder is a DNS server that completes DNS queries
3.3.2. Algorithm
The algorithm used by the name server is related to the local operating system and the data structure, and the following algorithm assumes that the RR is organized in several tree structures, one is the area, and one tree is used
2.6. Resource records
The domain name marks the node, each node has the resource information set, some sets can be empty. The resource information set is associated with the special name of the detached resource set (RR). There is no relationship
1. Introduce
This article mainly introduces the domain name (DNS) Some of the mechanisms and implementation methods, the following we have a specific look at its situation.
1.1. History of domain names
The fundamental motivation for creating a
Windows2000 as a brand new operating system, its biggest feature is the introduction of Active Directory, and the Active Directory is one of the biggest feature of the DNS and Active Directory tightly together. So how do they work together and what
DNS is a hierarchical decentralized name correspondence system a bit like a computer directory tree structure at the top is a "root" Then it is divided into several basic category names such as comorgedu, and then the following is the organization
The named query uses the UDP protocol and port 53. Responses are returned through UDP unless they are greater than 512K, which uses TCP. TCP is used for "zone transfer" between servers.
Delegate: All name servers know the root server. and root
The concept and mechanism of domain name
1. Introduce
This article mainly introduces the domain name (DNS) Some of the mechanisms and implementation methods, the following we have a specific look at its situation.
1.1. History of domain names
The
DNS (domain Name System) is a long history method for assigning a domain name to a computer with an IP address so that the computer has a character name. If the IP address is 207.46.193.254 computer that is Microsoft server www.microsoft.com. DNS is
There are two mail servers 192.168.1.1 (under Windows host name b.test.cn) and 192.168.1.3 (Linux under host name is a.test.com).
Configure the DNS server under Linux, and here are some of the files that were set during the configuration
The service provided by the DNS server is the task of converting the host name and domain name to an IP address. Why do I need to convert the hostname and domain name to an IP address? This is because when a client on a network accesses a resource
Download |iis| Log Analysis
IIS Log Analysis tool
You can consider using open source Awstats to analyzeThe following is my installation notes, I hope you can have a referenceAwstats's installation notes under IIS6.0What is
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service