Dbeaver logoInstall DBeaver CE Git Extension

Git version control can be used in DBeaver Community Edition (CE). As DBeaver is Eclipse based Integrated Development Environment (IDE), Eclipse extensions are installed on it. Eclipse Marketplace is a repository of different kinds of extensions. Installation of Git extension follows the same rules as in Eclipse IDE. DBeaver CE …

more ...

Dbeaver logoAdd GitHub Repository to DBeaver CE Secured with SSH Protocol

GitHub is a good addition to DBeaver Community Edition (CE). It allows to store scripts and other files in source control. Even with some limitations in DBeaver CE, GitHub full functionality can be utilized. There are varieties of ways connecting GitHub to DBeaver CE. SSH protocol provides with enhanced security …

more ...

Dbeaver logoCreate SSH Key in DBeaver CE

SSH keys are widely used to secure access to sensitive information. They provide both relatively easy implementation and better security than passwords. Generating of SSH keys can be done with different tools. In some cases, the process is complicated and requests manual interaction. DBeaver Community Edition (CE) utilizes SSH keys …

more ...




Prestodb logoBuilt-in System Access Control to Catalogs in Presto

Presto secures access to catalogs with built-in system. This article is not aimed to replace the Presto documentation which provides high level of overview with following details on the implementation of build-in system access control. As any documentation, it does not cover all topics and there are some missing pieces …

more ...


Python logoObtain Identity Value for SQL Server Insert in Python

Extracting of an identity value when data inserted into a SQL Server table in Python is done in the same way as in Microsoft Transact-SQL. The difference is that SQL Server statements are wrapped up in Python commands. pypyodbc is a good candidate to communicate with SQL Server in Python …

more ...

Security logoExport TLS/SSL Server Certificate from Internet Browser

DateModifiedViewsCategory

To securely browse the Web, HTTPS protocol is established. The secure protocol requests public certificate which is freely transmitted from a Web site to a client. The public certificate can be exported from Internet browser in Privacy-Enhanced Mail (PEM) format. If a certificate is exported from PKCS #12 or other …

more ...