Skip to content

NTSEQ:- A IT Infrastructure and Cyber Security Blogs

Memory Brokers In SQL Server

Memory Brokers:- Because memory is needed by so many components in SQL Server and to make sure each component uses

Continue reading

C++ Program to Implement Merge Sort

Program to Implement Merge Sort #include <iostream> using namespace std; void Merge(int *arr, int first, int last, int mid) {

Continue reading

Java – Program to find the number of Days between two Dates

We have dates in the program as strings. We first parse them into dates and then find the difference between

Continue reading

How to Take Backup of a Table in MySQL

In this post, I am going to show you couple of ways to take the tables backups in MySQL. Taking

Continue reading

How to Convert a String to Number in MySQL

In MySQL, the code written in earlier example for SQL Server containing CONVERT() no longer  works, instead it can be

Continue reading

How To Convert STRING To INT In SQL SERVER

If the table column is in VARCHAR and contains all numeric values, then it can be obtained as an integer

Continue reading

Find out CPU Uses By each Databases in SQL Server

Through Below Script you are able to identify the CPU utilization By per databases in your SQL Server WITH CPU_Uses_Per_Db

Continue reading

Java Program to Find Duplicate Characters in a String

This program going to find out the number of duplicate characters in the given String.  In this program we are

Continue reading

Capture TRUNCATE and DELETE events in SQL Server

I received one question on my email regarding how to capture TRUNCATE and DELETE statements being fired on a database

Continue reading

Stack Class in Java

Stack:- It is the child class of vector contains only one constructor   Stack s = new Stack(); Methods of

Continue reading

Posts pagination

«Previous Posts 1 … 11 12 13 14 15 … 34 Next Posts»
  • C Programming
  • C++
  • Cyber Security
  • Interview FAQ
  • Java
  • Linux
  • MySQL
  • Netseq.com
  • Oracle
  • PHP
  • Python
  • SQL
  • SQL Server -DBA
  • What is Cyber Kill Chain
  • Active Directory Security: Strategies to Safeguard Your Organization
  • PowerShell scripts for Active Directory (AD)
  • Top 50 Essential Active Directory PowerShell Commands and Administrative Tools
  • Critical Windows Event ID’s to SOC Team Must Monitor
WordPress Theme: Wellington by ThemeZee.