SQL2000数据库”运行在普通用户下所需的权限
SQL2000数据库是[星外虚拟主机管理平台]使用过程中必须运行的软 件,同时它和操作系统的安全有紧密的联系。因此,从安全的角度考虑,我们要 求所有用户将SQL2000数据库安装在独立的分区里面,而且,SQL2000数 据库必须运行在普通用户的状态下。所谓普通用户
“SQL2000数据库”是[星外虚拟主机管理平台]使用过程中必须运行的软
件,同时它和操作系统的安全有紧密的联系。因此,从安全的角度考虑,我们要
求所有用户将“SQL2000数据库”安装在独立的分区里面,而且,“SQL2000数
据库”必须运行在“普通用户”的状态下。所谓“普通用户”就是指没有任何权
限的用户。
为什么要将“SQL2000数据库”必须运行在“普通用户”的状态下呢?因为
如果使用了“超级管理员”或者“本地系统用户”来运行“SQL2000数据库”,
就会造成服务器被入侵。因此,为了您的服务器安全,您务必将“SQL2000数据
库”运行在“普通用户”的状态下。同时,要对硬盘的权限做好对应的权限设置
“SQL2000数据库”才能正常运行。对于硬盘的权限设置请参考如下:
--------------------------------------------------------------------------------------------------------------
(假设您的数据安装在E:\Program Files\Microsoft SQL Server\)
1. E盘的根目录(E:\)需要以下权限:
“administrators ”的全部权限
“System ”的全部权限
“SQL2000的运行用户(只应用在当前文件夹)列出文件夹/读数据”的权限
“读属性”的权限
“读扩展属性”的权限
“读取”的权限
2. 数据库的安装目录(E:\Program Files\Microsoft SQL Server\)需要以
下权限:
“administrators ”的全部权限
“System ”的全部权限
“SQL2000的运行用户 ”的全部权限
--------------------------------------------------------------------------------------------------------------
(假设您的数据备份目录安装在F:\SQLBACK)
1. F盘的根目录(F:\)需要以下权限:
“administrators ”的全部权限
“System ”的全部权限
“SQL2000的运行用户(只应用在当前文件夹)列出文件夹/读数据”的权限
“读属性”的权限
“读扩展属性”的权限
“读取”的权限
2. 数据库的安装目录(F:\SQLBACK)需要以下权限:
“administrators ”的全部权限
“System ”的全部权限
“SQL2000的运行用户 ”的全部权限
--------------------------------------------------------------------------------------------------------------
特别提醒:无论是安装在E盘还是安装在F盘根目录下的权限,都必须的按照以
上的操作来设置,否则都会导致数据库启动失败。很多用户往往是忽
视了“根目录权限”的设置,在设置完“SQL2000的运行用户”以
后,就发现再也启动不了SQL2000的数据库。如果您已经发生这种情
况,请您按照以上的说明,重新设置好“根目录的权限”,SQL2000
的数据库就可以正常启动。
补充说明:这儿说的“SQL2000的运行用户”,就是在SQL 2000企业管理器----
属性中的安全中设置的用户(默认是System用户)。如果您看过了
“星外安全包视频说明”,应该在已将“默认的System用户”改成别
的“没有任何权限”的用户,这个“没有任何权限”的用户就是这儿
说的“SQL2000的运行用户”。
SQL2005的运行用户在开始--Microsoft SQL Server 2005--配置工具
--SQL Server Configuration Manager,选QL Server 2005服务中,
选“SQL Server(MSSQLSERVER)”属性中设置本帐户。

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics











It allows users to perform more in-depth operations and customization of the system. Root permission is an administrator permission in the Android system. Obtaining root privileges usually requires a series of tedious steps, which may not be very friendly to ordinary users, however. By enabling root permissions with one click, this article will introduce a simple and effective method to help users easily obtain system permissions. Understand the importance and risks of root permissions and have greater freedom. Root permissions allow users to fully control the mobile phone system. Strengthen security controls, customize themes, and users can delete pre-installed applications. For example, accidentally deleting system files causing system crashes, excessive use of root privileges, and inadvertent installation of malware are also risky, however. Before using root privileges

Apple's latest releases of iOS18, iPadOS18 and macOS Sequoia systems have added an important feature to the Photos application, designed to help users easily recover photos and videos lost or damaged due to various reasons. The new feature introduces an album called "Recovered" in the Tools section of the Photos app that will automatically appear when a user has pictures or videos on their device that are not part of their photo library. The emergence of the "Recovered" album provides a solution for photos and videos lost due to database corruption, the camera application not saving to the photo library correctly, or a third-party application managing the photo library. Users only need a few simple steps

To handle database connection errors in PHP, you can use the following steps: Use mysqli_connect_errno() to obtain the error code. Use mysqli_connect_error() to get the error message. By capturing and logging these error messages, database connection issues can be easily identified and resolved, ensuring the smooth running of your application.

How to use MySQLi to establish a database connection in PHP: Include MySQLi extension (require_once) Create connection function (functionconnect_to_db) Call connection function ($conn=connect_to_db()) Execute query ($result=$conn->query()) Close connection ( $conn->close())

Using the database callback function in Golang can achieve: executing custom code after the specified database operation is completed. Add custom behavior through separate functions without writing additional code. Callback functions are available for insert, update, delete, and query operations. You must use the sql.Exec, sql.QueryRow, or sql.Query function to use the callback function.

JSON data can be saved into a MySQL database by using the gjson library or the json.Unmarshal function. The gjson library provides convenience methods to parse JSON fields, and the json.Unmarshal function requires a target type pointer to unmarshal JSON data. Both methods require preparing SQL statements and performing insert operations to persist the data into the database.

MySQL is an open source relational database management system. 1) Create database and tables: Use the CREATEDATABASE and CREATETABLE commands. 2) Basic operations: INSERT, UPDATE, DELETE and SELECT. 3) Advanced operations: JOIN, subquery and transaction processing. 4) Debugging skills: Check syntax, data type and permissions. 5) Optimization suggestions: Use indexes, avoid SELECT* and use transactions.

To avoid PHP database connection errors, follow best practices: check for connection errors and match variable names with credentials. Use secure storage or environment variables to avoid hardcoding credentials. Close the connection after use to prevent SQL injection and use prepared statements or bound parameters.
