Dbeaver logoHow to Use DBeaver CE with Git

In spite of some limitations in DBeaver Community Edition (CE) to work with Git, it is not an obstacle in making smooth integration of DBeaver with Git. The issue is DBeaver perspective which does not allow completely viewing of the current status of a project and project files under Git …

more ...

Dbeaver logoInstall DBeaver CE Git Extension

Git version control can be used in DBeaver Community Edition (CE). As DBeaver is Eclipse based Integrated Development Environment (IDE), Eclipse extensions are installed on it. Eclipse Marketplace is a repository of different kinds of extensions. Installation of Git extension follows the same rules as in Eclipse IDE. DBeaver CE …

more ...

Dbeaver logoAdd GitHub Repository to DBeaver CE Secured with SSH Protocol

GitHub is a good addition to DBeaver Community Edition (CE). It allows to store scripts and other files in source control. Even with some limitations in DBeaver CE, GitHub full functionality can be utilized. There are varieties of ways connecting GitHub to DBeaver CE. SSH protocol provides with enhanced security …

more ...

Dbeaver logoCreate SSH Key in DBeaver CE

SSH keys are widely used to secure access to sensitive information. They provide both relatively easy implementation and better security than passwords. Generating of SSH keys can be done with different tools. In some cases, the process is complicated and requests manual interaction. DBeaver Community Edition (CE) utilizes SSH keys …

more ...





Python logoObtain Identity Value for SQL Server Insert in Python

Extracting of an identity value when data inserted into a SQL Server table in Python is done in the same way as in Microsoft Transact-SQL. The difference is that SQL Server statements are wrapped up in Python commands. pypyodbc is a good candidate to communicate with SQL Server in Python …

more ...

Security logoExport TLS/SSL Server Certificate from Internet Browser

DateModifiedViewsCategory

To securely browse the Web, HTTPS protocol is established. The secure protocol requests public certificate which is freely transmitted from a Web site to a client. The public certificate can be exported from Internet browser in Privacy-Enhanced Mail (PEM) format. If a certificate is exported from PKCS #12 or other …

more ...