#1
  1. No Profile Picture
    Registered User
    Devshed Newbie (0 - 499 posts)

    Join Date
    Jul 2013
    Posts
    4
    Rep Power
    0

    Pbcat* tables in MySQL


    Hi everybody.

    I have these tables in database for one of my softwares. I believe the software hasn't made them:

    pbcatedt , pbcatvld, pbcatfmt, pbcatcol, pbcattbl

    I wonder if MySQL makes them for its own operation. Can you tell me about this? I am trying to reverse engineer this and I am really not good about how mysql behaves... I'd appreciate any help, or if you can send me a link or documentation about this,

    Thanks.
  2. #2
  3. No Profile Picture
    Contributing User
    Devshed Frequenter (2500 - 2999 posts)

    Join Date
    Dec 2004
    Posts
    2,990
    Rep Power
    375
    no all mysql tables from version 5+ are stored in a separate database called information or system or something

    search the net for pbcat because that seems to be the common starting letter in those tables to see which software does that
  4. #3
  5. No Profile Picture
    Registered User
    Devshed Newbie (0 - 499 posts)

    Join Date
    Jul 2013
    Posts
    4
    Rep Power
    0
    Thanks. I did search the net, but I really don't find anything... I am still looking, will let you know and if anybody has any other information, put here.

    Originally Posted by paulh1983
    no all mysql tables from version 5+ are stored in a separate database called information or system or something

    search the net for pbcat because that seems to be the common starting letter in those tables to see which software does that
  6. #4
  7. --
    Devshed Expert (3500 - 3999 posts)

    Join Date
    Jul 2012
    Posts
    3,959
    Rep Power
    1014
    Originally Posted by samanka80
    Thanks. I did search the net, but I really don't find anything...
    What?

    That was 5 seconds on google.com.
    The 6 worst sins of security ē How to (properly) access a MySQL database with PHP

    Why canít I use certain words like "drop" as part of my Security Question answers?
    There are certain words used by hackers to try to gain access to systems and manipulate data; therefore, the following words are restricted: "select," "delete," "update," "insert," "drop" and "null".

IMN logo majestic logo threadwatch logo seochat tools logo