Thursday 30 May 2013

An AHK script to select particular tables for reverse engineering in PowerDesigner

The following script helps to select tables (optionally any objects) in the 'Database Reverse Engineering' window of PowerDesigner 15.3 that are stored in txt file.
First one should unmark all objects in the list view, then run the script, hit F5, and after the selection process ends (that can be noticed by stopped blinking of the 'Database Reverse Engineering' window) hit SPACE to mark only selected objects.
Here's the resulting list:

Script uses Acc Library to get the names of items in the ListView and to select them. It should be run under one of the latest releases of AutoHotkey_L.
In my particular case file containing list of objects is called 'tables_to_reverse.txt' (see the script).

Wednesday 29 May 2013

Reverse engineering Oracle 11gR2 scheme with Sybase PowerDesigner 12.5 on Windows 7 x64

The following setup was made to perform reverse engineering of Oracle 11gR2 scheme into physical diagram using Sybase PowerDesigner 12.5 on Windows 7 x64.
ConnectionType: JDBC
DBMS type: Oracle
User name: <your scheme name>
Password: <your password>
JDBC driver class: oracle.jdbc.driver.OracleDriver
JDBC connection URL: jdbc:oracle:thin:@//<your host>:<your port>/<your service name>
JDBC driver jar files: c:\Oracle\product\11.2.0\client_1\jdbc\lib\ojdbc6.jar
Plus had to install 32-bit Java and add edit path variable in batch file to make PowerDesigner use appropriate VM:
set path=C:\Program Files (x86)\Java\jre7\bin\client\;%path%
cd "c:\Program Files (x86)\Sybase\PowerDesigner 12\"
pdshell12.exe
Many thanks to Devtype blog and Jan Bartos' answer on google groups.

Tuesday 28 May 2013

Two window browser setup to bypass corporate firewall using iOS hotspot

I've just changed a department and was surprised by more strict corporate rules applied to my windows account.
More blogs and sites became totally unreachable because of the corporate firewall.
So to continue productive work I rolled out the following setup:
1. Second LAN connection through iPhone 3gs' wired hotspot established.
2. Second palemoon (a firefox fork) profile created (named backdoor).
3. Second palemoon profile was assigned a different theme (and a different icon by AutoHotkey script that will be covered in the following posts).
4. A shortcut was made that binds second palemoon instance (with 'backdoor' profile) to specific LAN interface using a ForceBindIP utility:
C:\Windows\SysWOW64\ForceBindIP.exe 127.0.0.1 "C:\Program Files (x86)\Pale Moon\palemoon.exe" dummy -p backdoor -no-remote
The dummy argument is used because of the feature of the ForceBind utitlity: it does not pass the first given parameter to the program specified.
Given IP should be replaced with actual ip-address of the second LAN interface.
Now I can surf through unblocked sites through a corporate LAN and access restricted ones through an iPhone hotspot.