but you are much cute but you beat me but you cant find the but you dont want to but you dream but you hand on but you have chosen but you know what but you know this thi but you lied but you need a fall g but you said but you sailed away o but you should believ but you...
Now on un-installation of product, we want to delete those (myFile) files from each user's LocalAppData directory.So the question is that, Is there any way to get LocalAppData directory path for each user so that we can make necessary action on it? Also it should work irrespective of...
One of my Application server has been restarted yesterday, we would like to know how to find the login information and the IP details of the server. Please help me how to get the information who did restarted SQL services!Thanks in advance,DBADBAAll replies (5)Monday, February 13, 2017 1...
Jeff - I'm going with Scotts recommendation which sticks with CAST and not FORMAT. That said, just out of curiosity do you know how much data/rows need to be involved for FORMAT to cause performance issues? In my case the source table is only a few hundred rows as it's like a looku...
ProgramID: File.Zip.1EXEFile: %ProgramFiles%\ZipGenius 5\zipgenius.exe -open %1 ProgramID: JustZIPit_ArchiveEXEFile: C:\Documents and Settings\Wayne\My Documents\AvatarSoft\JustZIPit\JustZIPit.exe %1 ProgramID: OpusZipEXEFile: %ProgramFiles%\GPSoftware\Directory Opus\dopusrt.exe /dde Progr...
Hock Leong Ang12 年多前in reply toNorman Wong Intellectual310points Hi Norman, I did the step 1). For step 2), my laptop just has winusb.dll and do not has driverswinusb.sys. May I know what need to be done to get this...
This article reflects on the experience of applying a person-centred approach to promote organisational change in an educational context. A detailed example is drawn from a Planning Alternative Tomorrows with Hope (PATH) process with a group of school staff. The article considers existing research ...
How to Detect SQL Injection Attacks using Extended Events and SQL Monitor Phil Factor shows how to monitor for the errors indicative of a possible SQL Injection attack on one of your SQL Server databases, using a SQL Monitor custom metric that uses diagnostic data from Extended Eve...
select t1.id from @t1 t1 inner join @t2 t2 on t2.Id = t1.Id and t2.X > 0 cross apply (select top (t2.X) 1 from sys.columns) n(n) ___ "The only true wisdom is in knowing you know nothing" "O skol'ko nam otkrytiy chudnyh prevnosit microsofta duh!"...
to express their beliefs to the creators of the Blasphemy Challenge, they didn't even know the standard arguments and just started throwing random stuff out left and right in a way that's much harder to debate intelligently. Phil Plait ofBad Astronomyhad a similar experience when debating moon...