Wednesday, January 25 2006

Installing Tornado on other database servers

Follow these instructions to install Tornado on other database systems such as mySQL, PostgreSQL, DB2, Oracle, SQLServer etc

Tornado server uses ansi-92 standard SQL calls so should work fine with most ansi-92 standard databases.

Set up the database server

Follow the database manufacturers instructions to set up the server. Be sure to carefully note any usernames and passwords, along with any special setup if you need to access the server on a different host to where Tornado is running.

Install Tornado Server

Run the installer and install Tornado. This is usually done by double clicking the installer jar file, or typing 'java -jar TornadoServerInstall.jar' at the command prompt. Start Tornado server to ensure it works OK after the install. Note: this will be working with the internal hsqldb database.

JDBC

Get a copy of the JDBC driver software from the databse manufacturer and copy the jar file to the [tornado_install]/jdbc directory. Note some databases (eg DB2) may require some binary software installed on the host where Tornado will be running as well as the jar file.

Create the system database

Using the query tool that came with your database software (eg psql for postgres or msql for mysql) create a database called 'puakma' and tables as per the table definition. Table definition files are found in the config directory and are named datadef.xxsqlxx. There may not be the exact file for your platform there, so make changes as appropriate to get it working on your platform.

puakma.config

Next edit the [tornado_install]/config/puakma.config file and add the correct database settings, for example:
SystemDBURL=jdbc:mysql://localhost:3306/
SystemDriverClass=com.mysql.jdbc.Driver
SystemUser=dbuser
SystemPW=dbpassword

Locate the AddIns= line and remove 'puakma.addin.db.HSQLDB' from the list of addins to load at server startup. This will stop hsqldb internal database loading at server startup.

Populate the system database

Start a command prompt and change to the [tornado_install]/bin directory. Edit setupdb.bat with your jdbc driver settings, save and exit, then execute the batch file from the command prompt. This should populate the system tables from the .pmx files in the [tornado_install]/temp directory. At the same time it will create a SysAdmin user and password.

Start Tornado

Start Tornado Server in the usual way using [tornado_install]/bin/pmastart or from a menu shortcut. Start your web browser and go to http://yourserver/system/admin.pma. This should display a login screen where you can enter SysAdmin and the password to log in.

If you forgot the password, start the database query tool and clear the password from the SysAdmin user. "UPDATE PERSON SET Password='' WHERE Alias='SysAdmin'". Try to log in again using SysAdmin with no password. You can then set a new password in the /system/admin.pma by clicking on the "People" tab and editing the SysAdmin user.

Recent Comments

oQa0oa grsvitdyhhym, [url=http://jsahddjqsiae.com/]jsahddjqsiae[/url], [link=http://fnwneiudvoqn.com/]fnwneiudvoqn[/link], http://eissaajguwvz.com/
Posted by zezraj at heuobg.com   on   02.Oct.08 03:26
The term �virus� is often loosely used in reference to any type of malicious program, or it is used to describe any negative event that a malicious program causes to a host system. In the simplest terms, a virus is defined as program code that replicates from one host file to another. This simple definition leaves room for further sub-division, which has become necessary due to the evolution of malicious code over the last two decades. Computer Viruses can be further classified by the types of objects they infect, the method used to select a potential host, and infection technique., All-about-20-september-2008-www-diabetes-association-asian-org, 24537, Latest-news-30-june-2008-www-kooty-kinz-com, >:PPP, Latest-news-05-august-2008-links-to-www-freesex-com, qpgud, Go-to-03-august-2008-www-bolly-serch-com, 8[[, Latest-news-16-july-2008-www-mo-info-de-dienstleistungen-news, dxeg, --09-august-2008-www-rfc-editor-org, 297, --03-july-2008-www-myspace-com-gage-real, 452719, --05-october-2008-www-forgiveness-student-loan-program-org, xbygl, Go-to-08-june-2008-www-avery-com, 245, Latest-news-30-june-2008-www-bbc-co-uk-news, %-), --09-september-2008-www-manulife-com, 0978, Go-to-www-missingmoney-com, 8[[, All-about-03-june-2008-http-www-net, qqk,
Posted by jakie at gmail.com   on   17.Oct.08 03:09
Infection by type: Boot sector and multipartite viruses infect boot sectors and key operating system startup files (primarily COMMAND.COM). File viruses infect application .COM and .EXE files. Word Macro and Excel Macro viruses infect Microsoft Word .DOC and .XLS files, respectively. Classified by the method they use to select their host: �Indirect action file viruses� load into memory and hook into the system interrupt table(s) so they can infect as files are accessed. Conversely, �direct action file viruses� do not become a memory resident, they simply infect a file (or files) when an infected program is run., All-about-15-may-2008-www-myspace-com-goodturn, 8OO, Latest-news-www-freddy-vs-jason-com, qpc, Latest-news-11-october-2008-name-www-zufolo-org, 378272, Latest-news-03-april-2008-http-www-bigcharts-com, %DD, --01-august-2008-www-dallas-morning-news-com, 728, Go-to-02-june-2008-www-mercedes-benz, gvbllr, Go-to-www-freedomrocks-com-commandcenter, qmnylq, All-about-www-sos-state-ga-us-com, 8-OOO, All-about-www-income-tax-refunds, yschex, --www-royal-olympic-cruises-com, :PPP, All-about-29-may-2008-www-free-games-com, :-)),
Posted by handyman at gmail.com   on   17.Oct.08 09:00
The term �virus� is often loosely used in reference to any type of malicious program, or it is used to describe any negative event that a malicious program causes to a host system. In the simplest terms, a virus is defined as program code that replicates from one host file to another. This simple definition leaves room for further sub-division, which has become necessary due to the evolution of malicious code over the last two decades. Computer Viruses can be further classified by the types of objects they infect, the method used to select a potential host, and infection technique., HoBot.com Favorite Links, 101, Lucos.com Links, cafmw, Hotbot Links, kaa, Live.com links, kamo, Webcrawler.com Favorite Links, ghx, Info.com Favorite Links, evbn, Altavista.com Favorite Links, 8678, Dogpile.com News Links, 081, Click4choice.com Links, bgiy, viewzi.com linksnd fifty years ago. He knuckled it away. He stood there for a moment, staring at her as if he had never www|, 375831,
Posted by ann at gmail.com   on   26.Oct.08 03:35
Show all comments
Got something to say? Add comment