Dbeaver logoAdd GitHub Repository to DBeaver CE Secured with SSH Protocol

GitHub is a good addition to DBeaver Community Edition (CE). It allows to store scripts and other files in source control. Even with some limitations in DBeaver CE, GitHub full functionality can be utilized. There are varieties of ways connecting GitHub to DBeaver CE. SSH protocol provides with enhanced security …

more ...

Dbeaver logoCreate SSH Key in DBeaver CE

SSH keys are widely used to secure access to sensitive information. They provide both relatively easy implementation and better security than passwords. Generating of SSH keys can be done with different tools. In some cases, the process is complicated and requests manual interaction. DBeaver Community Edition (CE) utilizes SSH keys …

more ...




Trino logoBuilt-in System Access Control to Catalogs in Presto

Presto secures access to catalogs with built-in system. This article is not aimed to replace the Presto documentation which provides high level of overview with following details on the implementation of build-in system access control. As any documentation, it does not cover all topics and there are some missing pieces …

more ...


Python logoObtain Identity Value for SQL Server Insert in Python

Extracting of an identity value when data inserted into a SQL Server table in Python is done in the same way as in Microsoft Transact-SQL. The difference is that SQL Server statements are wrapped up in Python commands. pypyodbc is a good candidate to communicate with SQL Server in Python …

more ...

Security logoExport TLS/SSL Server Certificate from Internet Browser

DateModifiedViewsCategory

To securely browse the Web, HTTPS protocol is established. The secure protocol requests public certificate which is freely transmitted from a Web site to a client. The public certificate can be exported from Internet browser in Privacy-Enhanced Mail (PEM) format. If a certificate is exported from PKCS #12 or other …

more ...

Surveillance logoCustom Built Surveillance System

Success of a custom built surveillance system mostly depends on initial stage when you design it. A diagram of your surveillance system would be the starting point of your design. it helps outline the future functionality and performance of the system. When a list of the surveillance system components is …

more ...