Data Model or Data Structure for Stored Procedures in Databases

I know that Relational Algebra is the goto data model for storing information related to SQL queries.

I am however yet to find a standard data model that can encapsulate constructs of stored procedures such as cursors, loops, in/out variables, statements etc.

I might be wrong, but usually people talk about an AST, but is there something more specific? I tried looking into MySQL code to get some idea but wasn’t too successful.

Is cookie information stored on the server side?

I thought cookies are stored on client side only, as files. Then I realize if cookies are not stored on server side, how could a server match a cookie just received from a client to some session or other information created in the past?

So is it correct that cookie information is also stored on the server side?

How does a server store cookie information?

I have searched about “client side cookie” and “server side cookie” and reached several discussions including

  • https://www.quora.com/Are-cookies-client-side-or-server-side,

  • https://stackoverflow.com/questions/6922145/what-is-the-difference-between-server-side-cookie-and-client-side-cookie.

Thanks.

finding the parent index in an interval heap (stored on an array) given a child index

an interval heap is a binary tree stored on an array where the size of each node is 2.

i would like to be able to find the index of a parent and find one of the child indices given the index of a node.

an example of an interval trees indices would be:

         [0,1]      [2,3]     [4,5]  [6,7][8,9][10,11][12,13] 

or

         [1,2]      [3,4]     [5,6]  [7,8][9,10][11,12][13,14] 

How can we protect encrypted files and directories from being fingerprinted when stored on online storage services?

Assuming that online storage providers are considered untrusted, if files and directories are encrypted, how can these be protected against fingerprinting?

The files are encrypted using rclone’s implementation of Poly1305 and XSalsa20 before being backed up to the cloud provider.

According to rclone’s documentation, the available metadata is file length, file modification date and directory structure.

  • What can be identified?
  • What can be inferred?
  • What attack vectors are there against the encrypted files and directories if the online storage provider is compromised assuming the passphrase is at least 24 characters long and is a combination of alphanumeric and special characters (uppercase and lowercase) as well as salted with similar entropy?

The encrypted data is considered to be sensitive.

How can I protect those files from being fingerprinted and the contents inferred such as ownership, source and the like?

Are stored procedure query texts stored in any tables?

I don’t readily see anything in the sys schema objects, other than the DM_EXEC_SQL_TEXT function that requires a plan handle, but the procedures I’m trying to get their query texts from aren’t currently running. (Maybe there’s a way through their cached plans?…though the ones I’m looking for might not have a cached plan.)

Are the query texts of stored procedures stored anywhere that’s queryable?

I see sp_helptext might be an option: https://docs.microsoft.com/en-us/sql/relational-databases/stored-procedures/view-the-definition-of-a-stored-procedure?view=sql-server-ver15#TsqlProcedure

Can multiple castings of Glyph of Warding be stored in different objects at the same time?

Glyph of Warding looks like it is going to be a very fun and useful spell once I learn it, but in its description I don’t see any mention of whether is can be cast multiple times to store spells in multiple objects. I’m guessing there is a verdict on this, does anyone know it?

Where are fingerprints stored on an Android phone?

Many recent phones come with a fingerprint scanner. I use them rarely but I’m curious how do hardware and software protect user’s fingerprint data from being stolen.

  1. Does a fingerprint scanner come with its own storage where fingerprints are stored?

  2. How does the fingerprint scanner decide which fingerprint requests from apps are legitimate?

  3. When you factory reset a phone, do all the fingerprints get securely wiped?