How to Encrypt a password in T-SQL
A function to enctypt a string good for hiding passwords in the database comparing password is done via the PWDCOMPARE function
2002-07-18
1,104 reads
A function to enctypt a string good for hiding passwords in the database comparing password is done via the PWDCOMPARE function
2002-07-18
1,104 reads
Uses the system relatively Undocumented sp sp_MSguidtostr to do the conversion from a GUID to a string
2002-07-18
352 reads
this procedure gets a tableName,X axis column, Y axis column and a Value and draw a Pivot table from the Original Table Script also include an How to Use section
2002-07-15
1,361 reads
Microsoft says that you cannot add an ORDER BY to a view unless it comes with a TOP clause at the beginning of the query. Many people think that if that's true then you cannot "Order" the whole query but only the top few. However, this is not true because when you use TOP 100 […]
2002-07-11
247 reads
Here's how to use the derived table technique to generate an automatic script for selecting all columns in a table:
2002-07-11
517 reads
This SELECT will give you a summarized report for the options selected for ALL the databases on your SQL Server. It's compatible with versions 7 and 2000.
2002-07-11
656 reads
Here's a script that will read a text file from the Windows system into SQL Server
2002-07-11
1,124 reads
This procedure gets a tablename, column and an integer number N as parameters and finds the Nth maximum value of the column's value in a table for example : running it with 'products', 'UnitPrice' , 13 , @reswill get the 13TH largest value of unitprice from products is no such N exist an error message […]
2002-07-10
253 reads
PROCEDURE used to find the server's default collation not shown in EM in servers properties
2002-07-10
1,122 reads
This SQL Server stored procedure generates more readable output from the system sp_lock procedureinstead of getting object ids and session ids it returns the object name and user name
2002-07-10
1,047 reads
By Vinay Thakur
Following up on my Part 1 baseline, the journey from 2017 onward changed how...
By Brian Kelley
In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography...
By Steve Jones
In today’s world, this might mean something different, but in 2010, we had this...
Comments posted to this topic are about the item Dancing Robot Goes Rogue
Hi , i installed winscp on my pc, added it to GAC thru vs...
Comments posted to this topic are about the item Identities and Sequences II
In thinking about the differences between the identity property and a sequence object, which of these two guarantees that there are consecutive numbers (according to the increment) inserted in a single table?
See possible answers