PostgreSQL 13 安装包
2021-12-09 16:02:46 13.94MB postgresql
1
PostgreSQL64位数据库安装包,下载运行即可安装,直接下一步就可以,pgadmin客户端安装时选择好像会出问题,建议不勾选,后期自己下载也可
2021-12-09 09:45:03 67.42MB PostgreSQL 64位安装包
1
C#连接PostgreSql需要的Npgsql.dll和Mono.Security.dll各版本支持文件
2021-12-08 15:03:44 2.37MB C# postgreSql
1
postgresql 9.2 linux 64位版本数据库安装包。
2021-12-08 11:39:20 37.69MB postgresql 9.2 linux
1
中文手册介绍了如何使用pgAdmin维护PostgreSQL数据库。 pgAdmin支持数据库服务器7.3及以上版本。 对于低于7.3版本的请使用pgAdmin II。
2021-12-07 22:33:23 893KB PGAdmin PostgreSQ
1
This release contains a variety of fixes from 14.0. For information about new features in major release 14, see Section E.2. A dump/restore is not required for those running 14.X. However, note that installations using physical replication should update standby servers before the primary server, as explained in the third changelog entry below. Also, several bugs have been found that may have resulted in corrupted indexes, as explained in the next several changelog entries. If any of those cases apply to you, it's recommended to reindex possibly-affected indexes after updating. Make the server reject extraneous data after an SSL or GSS encryption handshake (Tom Lane) A man-in-the-middle with the ability to inject data into the TCP connection could stuff some cleartext data into the start of a supposedly encryption-protected database session. This could be abused to send faked SQL commands to the server, although that would only work if the server did not demand any authentication data. (However, a server relying on SSL certificate authentication might well not do so.) The PostgreSQL Project thanks Jacob Champion for reporting this problem. (CVE-2021-23214) Make libpq reject extraneous data after an SSL or GSS encryption handshake (Tom Lane) A man-in-the-middle with the ability to inject data into the TCP connection could stuff some cleartext data into the start of a supposedly encryption-protected database session. This could probably be abused to inject faked responses to the client's first few queries, although other details of libpq's behavior make that harder than it sounds. A different line of attack is to exfiltrate the client's password, or other sensitive data that might be sent early in the session. That has been shown to be possible with a server vulnerable to CVE-2021-23214. The PostgreSQL Project thanks Jacob Champion for reporting this problem. (CVE-2021-23222) Fix physical replication for cases where the primary crashes after shipping a WAL se
2021-12-07 13:06:56 270.97MB postgresql 开源数据库
1
postgreSQL数据库用pgRouting求两点间最短路径,详细描述操作步骤,直接复制可用
2021-12-06 10:53:04 27KB 两点最短路径 pgRouting postgreSQL
1
离线安装包,亲测可用
2021-12-05 16:00:35 626KB rpm
ansible一键部署postgresql主从,实现主从同步,数据备份的功能。
2021-12-04 13:01:29 30.25MB postgresql
1
离线安装包,亲测可用
2021-12-02 10:01:40 6.87MB rpm