Chat now with support
Chat with Support

Quest has tools and processes in place to identify, protect, detect, and remediate vulnerabilities and incidents when they occur, including external security partners. As part of our standard security operations, Quest does not use CrowdStrike in any of our operations. We are reviewing our third parties, and so far, there is minimal affect. It is Quest's policy not to provide further technical details unless they directly impact customer data.

When using a picklist to select a column it changes the alias to the schema and table name (4241261)

Return

Sign In Required

You need to be signed in and under a current maintenance contract to view premium knowledge articles.

Sign In Now



Recommended Content
Product(s):
Toad for Oracle
10.0, 9.7.2, 9.7.0, 9.6.1, 9.6.0, 9.5.0, 9.1.0, 9.0.1, 9.0.0, 8.6.1, 8.6.0.38, 8.5.3.2, 8.5.1.6, 7.5.4.17, 8.5.0.50, 7.5.3.57, 8.0.0.47, 7.6.0.1, 7.5.2.0, 7.5, 7.4.0.3, 7.4.0.1, 7.3, 7.2, 7.1, 7.0, 6.4.0.0, 6.5.0.0, 6.3.0.0
Topic(s):
Technical Solutions
Article History:
Created on: 11/26/2008
Last Update on: 5/7/2023
Search All Articles