How to Secure a Database?
In this blog, we will walk you through a couple of necessary steps to secure a database, no matter what kind of RDBMS you might be running.
The database performance category is the place to dive into the depths of weird and interesting database behavior.
In this blog, we will walk you through a couple of necessary steps to secure a database, no matter what kind of RDBMS you might be running.
In this blog, we tell you it all about composite indexes – what they are, how they work, and when should they be used.
In this blog post, we tell you how does MyISAM compare with InnoDB.
In this blog, we will look a little closer into the character sets available in MySQL – we will tell you what they are, and how best to work with them.
In this blog, we discuss the ins and outs of the MySQL daemon and tell you how best to improve MySQL performance & security.
MySQL Security Best Practices: A Checklist In an ever-changing technology landscape, it is critical for companies and individuals to know a list of best practices that they can use on whatever technology that supports their database. As you already know, the majority of the world’s websites are built on MySQL or their flavors – Percona Server or MariaDB. MySQL Security – the Basics If you’ve been running MySQL behind your web infrastructure for a while, you already know some of…
If you have ever dived deeper into physics and quantum mechanics in particular, you have probably heard of this weird phenomena called the Schrödinger’s cat. In a nutshell, a Schrödinger’s cat is a thought experiment performed by an Austrian-Irish physicist Erwin Schrödinger in 1935 in a discussion with Albert Einstein: the experiment illustrates a hypothetical cat that may simultaneously be considered both alive and dead as a result of being linked to a random subatomic event that may or may…
As we all know, data breaches occur all too often. After a data breach occurs, we are used to seeing security experts, company associates and other people advising us to change our passwords and safeguard our data by securing our infrastructure. This is what the majority of developers do – we secure our infrastructure, maybe hire some information security consultants for advice on how to prevent data breaches in the future and forget about the data breach as time passes….
The ibdata1 file is arguably the most important file in the entire InnoDB infrastructure. Without the file InnoDB simply could not function – we will explore why in this post. What is ibdata1 and Why Is It So Important? The ibdata1 file is the system tablespace for the InnoDB infrastructure – the file contains vital information for the InnoDB storage engine. Here’s how the infrastructure of InnoDB looks like (note the ibdata1‘s place on the right): The ibdata1 contains several…
DESCRIBE and EXPLAIN statements are two of the most common statements that concerns MySQL performance issues. When you ask people how to optimize a query, the DESCRIBE and EXPLAIN statements are one of the first ones that get mentioned. We will explore them in this article. Understanding DESCRIBE The DESCRIBE statement is primarily used when the need to find out information about each of table’s columns arises. This is how the output of a DESCRIBE statement looks like: Here’s what…