Thursday, January 07, 2010

List all Tables of Database with No of Rows - SQLSERVER

This will get all the Table Names with no of rows in it.
use YourDBName
Go
SELECT
[TableName] = so.name,
[RowCount] = MAX(si.rows)
FROM
sysobjects so,
sysindexes si
WHERE
so.xtype = 'U'
AND
si.id = OBJECT_ID(so.name)
GROUP BY
so.name
ORDER BY 2 DESC

Friday, December 11, 2009

How to recover lost files in windows 7 and Vista?

Have you ever deleted a file or folder from the desktop and emptied the recycle bin only to realize, seconds later, that you deleted the wrong one? Or have you ever edited a document, saved it, and then wanted to undo those changes?

Luckily, both Windows Vista and Windows 7 include a build-in feature called Shadow Copy that can solve this exact problem without you having to do anything. As you work with the files, Shadow Copy will automatically save incremental backups of your files in the background so if you accidentally delete or change a file, you can revert to the previous version with a simple right-click.

The Shadow Copy feature is available in all editions of Windows 7 but only in the Business and Ultimate editions of Vista. However, if your computer is running Vista Home Basic or Home Premium editions, you can still enjoy the Shadow Copy feature without upgrading your OS.

The feature may also come in handy if your document gets damaged or you want to bring back the files that were deleted by a virus.

Tuesday, November 17, 2009

Visual Studio 2005/2008 tips & tricks

Check this URL for tricks and tips by which you can enhance your productivity and efficiency

Microsoft Code Analysis Tool .NET (CAT.NET)

CAT.NET is a snap-in to the Visual Studio IDE that helps you identify security flaws within a managed code (C#, Visual Basic .NET, J#) application you are developing. It does so by scanning the binary and/or assembly of the application, and tracing the data flow among its statements, methods, and assemblies. This includes indirect data types such as property assignments and instance tainting operations. The engine works by reading the target assembly and all reference assemblies used in the application -- module-by-module -- and then analyzing all of the methods contained within each. It finally displays the issues its finds in a list that you can use to jump directly to the places in your application's source code where those issues were found. The following rules are currently support by this version of the tool. - Cross Site Scripting - SQL Injection - Process Command Injection - File Canonicalization - Exception Information - LDAP Injection - XPATH Injection - Redirection to User Controlled Site

Click here to Download