Cookie Consent by Free Privacy Policy Generator ๐Ÿ“Œ The most widely used database in the world

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š The most widely used database in the world


๐Ÿ’ก Newskategorie: Programmierung
๐Ÿ”— Quelle: dev.to

The most widely used database in the world

Photo by [Jan Antonin Kolar](https://unsplash.com/@jankolar?utm_source=medium&utm_medium=referral) on [Unsplash](https://unsplash.com?utm_source=medium&utm_medium=referral)
Photo by Jan Antonin Kolar on Unsplash

A piece of trivia

It would be an excellent question for a trivia show for programmers (by the way, I would definitely watch that!):

What is the worldโ€™s most widely used database?

  1. MySQL

  2. Oracle

  3. MongoDB

  4. Microsoft Access

  5. Something else

The answer is, of course, โ€œsomething elseโ€, namely SQLite. According to their homepage, there are over 1 trillion (1e12) SQLite databases in active use!

What is SQLite?

SQLite is a self-contained, serverless, zero-configuration, transactional SQL database engine. Letโ€™s go over these characteristics one by one.

SQLite is stand-alone or self-contained in the sense that it has very few dependencies. It runs on any operating system and the entire SQLite library is encapsulated in a single source code file that requires no special facilities or tools to build. Similarly, a complete SQLite database is nothing more than a single file.

SQLite is serverless, because unlike most SQL database engines it is not implemented as a client-server process. With SQLite, the process that wants to access the database reads and writes directly from the database files on disk. There is no intermediary server process.

This also explains why SQLite is a zero-configuration database. It does not need to be installed before it is used, there is no setup, no need for an administrator to create a new database instance or assign access permissions to users. โ€œSQLite just worksโ€, as the homepage puts it.

Finally, it is a transactional database in which all operations appear to be atomic, consistent, isolated, and durable (ACID) โ€” which are the most vital quality standards for databases. SQLite explicitly guarantees that changes within a single transaction either occur completely or not at all, even if the act of writing the change out to the disk is interrupted by a program crash, OS crash or even a power failure!

To boot, SQLite is public domain, small (about 600 KB), fast (SQLite can be faster than your filesystem), reliable, cross-platform, and offers a full-fledged flavour of the SQL languageโ€ฆ No wonder it is indeed the most widely deployed database in the world, with famous users like Adobe, Dropbox, Facebook or Google, who use it for the Android OS and Chrome.

However, despite of all the positive aspects of SQLite there are also some disadvantages. Without doubt, the most important one is that SQLite does not allow concurrent writing processes (reading is no problem). If concurrent writing is what you need, you can take a look at PostgreSQL, which is also open-source. Also, SQLite databases has limited data types (e.g. missing a type for dates or times) and its SQL dialect has some limitations compared to standard SQL.

What is SQLite used for?

SQLite database files are a recommended storage format by the US Library of Congress and a popular and excellent choice as an Application File Format. For instance, letโ€™s say you are writing a Contacts app for smartphones. Besides a pretty user interface you will need a reliable, fast, lightweight database to store your contactsโ€™ data. Et voilร , enter SQLiteโ€ฆ And this is precisely what happens. Smartphones, gadgets, desktop applications โ€” there are literally tens of billions of SQLite database files in use daily. To cite only one more example, SQLite is also the default database engine for apps made with Django, a popular Python web framework.

How to use SQLite

For the next section, I will use a basic database to demonstrate how to interact with SQLite databases. Hereโ€™s what it looks like in CSV format (the first row contains the column headers):

identifier,product,colour
1,apples,red
2,bananas,yellow
3,grapes,purple

GUI

First of all, we should point out that SQLite can also easily be manipulated by non-technical users. There are several, excellent open-source SQLite โ€œbrowsersโ€ or โ€œeditorsโ€ available that allow for a graphical user interface to manipulate SQLite databases. Two notable examples are, DB Browser and Sqlite Viewer.

DB Browser

CLI

The SQLite project provides a simple command-line program called **sqlite3 **that allows the user to manually enter and execute SQL statements against an SQLite database. You can use this program in two ways.

First, you can use it in โ€œdirectโ€ mode, i.e. you can use the binary sqlite3 in your terminal environment or in shell scripts. This also implies that you can execute SQLite operations from any other programming language, as long as your language of choice is able to spawn a shell process.

Creating the schema for the above database, for instance, looks like this:

tdeneire@XPS-13-9370:~/tmp$ sqlite3 mydb.sqlite 'CREATE TABLE fruit (identifier integer, product text, colour text)'

Alternatively, SQLite also offers an โ€œinteractiveโ€ command-line shell, which I personally do not use frequently, unless for didactic purposes and occasionally for debugging.

Inserting our database values, for instance, looks like this:

tdeneire@XPS-13-9370:~/tmp$ sqlite3 mydb.sqlite
SQLite version 3.31.1 2020-01-27 19:55:54
Enter ".help" for usage hints.
sqlite> INSERT INTO fruit VALUES(1,'apples','red');
sqlite> INSERT INTO fruit VALUES(2,'bananas','yellow');
sqlite> INSERT INTO fruit VALUES(3,'grapes','purple');
sqlite> .quit

APIs

There are SQLite APIs for many programming languages, including C/C++, C#, Go, Java, Perl, PHP, Python, โ€ฆ Letโ€™s have a look at the Python module first, which is part of the standard library:


The output of this program is [(2,'bananas')] .

In Go, you need to install the go-sqlite3 package first. After that, itโ€™s pretty straightforward to use as well:

More from the SQLite team

This seems like a good point to conclude our introduction of SQLite. However, a lot still remains to be said about this handy technology!

Moreover, the SQLite team (lead by the brilliant D. Richard Hipp) are responsible for many more interesting tools. For instance:

  • Fossil is a distributed version control system designed specifically to support SQLite development, but very usable as an alternative to git. Fossil uses SQLite as for storage.

  • SQLite Archiver is a ZIP-like archive program that uses SQLite for storage. It allows users to archive files and to include any number of database tables with data that might be relevant for the archive.

So next time when you need to store some data for an application, why not consider SQLite?

Hi! ๐Ÿ‘‹ Iโ€™m Tom. Iโ€™m a software engineer, a technical writer and IT burnout coach. If you want to get in touch, check out https://tomdeneire.github.io

...



๐Ÿ“Œ The most widely used database in the world


๐Ÿ“ˆ 45.68 Punkte

๐Ÿ“Œ 22-Year-Old Vulnerability Reported in Widely Used SQLite Database Library


๐Ÿ“ˆ 32.78 Punkte

๐Ÿ“Œ Researchers have created new artificial intelligence that could spell the end for one of the most widely used website security systems.


๐Ÿ“ˆ 32.57 Punkte

๐Ÿ“Œ Most Widely Used Plesk Extensions and Toolkits This โ€˜HoliDealsโ€™ Season (Part 2)


๐Ÿ“ˆ 32.57 Punkte

๐Ÿ“Œ Emotet Tops List of July's Most Widely Used Malware


๐Ÿ“ˆ 32.57 Punkte

๐Ÿ“Œ Museum World Hit by Cyberattack on Widely Used Software


๐Ÿ“ˆ 31.12 Punkte

๐Ÿ“Œ Medium CVE-2017-17640: Advanced world database project Advanced world database


๐Ÿ“ˆ 26.22 Punkte

๐Ÿ“Œ Widely-used patient care app found to include hidden 'backdoor' access


๐Ÿ“ˆ 25.4 Punkte

๐Ÿ“Œ Widely-used patient care app found to include hidden 'backdoor' access


๐Ÿ“ˆ 25.4 Punkte

๐Ÿ“Œ Google Finds 7 Security Flaws in Widely Used Dnsmasq Network Software


๐Ÿ“ˆ 25.4 Punkte

๐Ÿ“Œ KRACK Demo: Critical Key Reinstallation Attack Against Widely-Used WPA2 Wi-Fi Protocol


๐Ÿ“ˆ 25.4 Punkte

๐Ÿ“Œ New Mirai Okiru Botnet targets devices running widely-used ARC Processors


๐Ÿ“ˆ 25.4 Punkte

๐Ÿ“Œ Tech Firms Let Russia Probe Software Widely Used by US Government


๐Ÿ“ˆ 25.4 Punkte

๐Ÿ“Œ Why is TCPcrypt not widely used?


๐Ÿ“ˆ 25.4 Punkte

๐Ÿ“Œ New BLEEDINGBIT Vulnerabilities Affect Widely-Used Bluetooth Chips


๐Ÿ“ˆ 25.4 Punkte

๐Ÿ“Œ Widely Used Web Conference Service Zoom Patches Critical Flaw


๐Ÿ“ˆ 25.4 Punkte

๐Ÿ“Œ Game of Thrones Downloads Widely Used to Spread Malware


๐Ÿ“ˆ 25.4 Punkte

๐Ÿ“Œ Hackers Actively Exploiting Widely-Used Social Share Plugin for WordPress


๐Ÿ“ˆ 25.4 Punkte

๐Ÿ“Œ DEF CON report finds decade-old flaw in widely used ballot-counting machine


๐Ÿ“ˆ 25.4 Punkte

๐Ÿ“Œ University Researchers Discover Security Flaws In Widely Used Data Storage Devices


๐Ÿ“ˆ 25.4 Punkte

๐Ÿ“Œ Rogue Developer Infects Widely Used NodeJS Module to Steal Bitcoins


๐Ÿ“ˆ 25.4 Punkte

๐Ÿ“Œ Critical Flaws Found in Widely Used IPTV Software for Online Streaming Services


๐Ÿ“ˆ 25.4 Punkte

๐Ÿ“Œ Widely used medical infusion pump can be remotely hijacked


๐Ÿ“ˆ 25.4 Punkte

๐Ÿ“Œ Alphanumeric passwords are widely used, yet enable phishing scams


๐Ÿ“ˆ 25.4 Punkte

๐Ÿ“Œ Two Widely Used Ad Blocker Extensions for Chrome Caught in Ad Fraud Scheme


๐Ÿ“ˆ 25.4 Punkte

๐Ÿ“Œ Misleading Results From Widely-Used Machine-Learning Data Analysis Techniques


๐Ÿ“ˆ 25.4 Punkte

๐Ÿ“Œ Widely Used Kiosks Compromised by Hardcoded Credentials


๐Ÿ“ˆ 25.4 Punkte

๐Ÿ“Œ Security researchers found 21 flaws in this widely used email server, so update immediately


๐Ÿ“ˆ 25.4 Punkte

๐Ÿ“Œ Two Widely Used Ad Blocker Extensions for Chrome Caught in Ad Fraud Scheme


๐Ÿ“ˆ 25.4 Punkte











matomo