Your Field Guide To Designing Security Into Networking Protocols
We'll go over some examples of attacks against protocols and rules following, which will help you when designing and implementing protocols of your own.
2006-12-19
1,808 reads
We'll go over some examples of attacks against protocols and rules following, which will help you when designing and implementing protocols of your own.
2006-12-19
1,808 reads
2006-12-18
1,665 reads
This article is meant to explore these architectural issues from the bottom up, and aims to guide you through this new world. In the long run, new programming models are likely to appear that will abstract away a lot of the challenges you will encounter.
2006-12-15
2,929 reads
In this article I will discuss some new ideas that can result in either modifying SQL statements or injecting SQL code even if the code has escaped the delimiting characters. I will start with some best practices for constructing delimited identifiers and SQL literals, and then I'll show you new ways attackers can inject SQL code in order to help you protect your applications.
2006-12-14
4,373 reads
Check out SSIS, the SQL Server 2005 replacement for the older Data Transformation Services. You might find SSIS to be a great solution for automating SQL Server.
2006-12-13
2,992 reads
With Windows 2003 now clustered, you're ready to begin to clustering SQL Server 2005. In this presentation, you'll see how to cluster SQL Server 2005 and some best practices in how to configure the SQL Server cluster after the fact.
2006-12-12
3,765 reads
The suggested method illustrates a way how such tampering by an authorized user can be detected. While this method doesn't provide tamper-prevention measures, but as there is no such thing as ultimate security, detection of such tampers will help maintaining the integrity of information in a great way
2006-12-12
2,407 reads
The benefits of SQL Server 2005's new snapshot isolation feature are well known, but SQL Server developers also need to understand the downstream ramifications of snapshot isolation.
2006-12-11
2,303 reads
This document describes the problem and the workaround in SQL Server 2000, and the solution and recommendation in SQL Server 2005.
2006-12-08
2,616 reads
Binary objects like Word documents, MP3 files, or any other non-data file can be challenging to load into SQL Server. In this presentation, Brian shows you how to use SQL Server Integration Services (SSIS) to load BLOB resume files into SQL Server by using the Import Column transform.
2006-12-08
1,755 reads
2025 exposed a growing gap between AI ambition and operational reality. As budgets tightened...
By Brian Kelley
There's a great article from MIT Technology Review about resetting on the hype of...
By Steve Jones
etherness – n. the wistful feeling of looking around a gathering of loved ones,...
Comments posted to this topic are about the item The Max PK Length
Comments posted to this topic are about the item My experience using the GitHub...
Comments posted to this topic are about the item The Microsoft SQL Year in...
If I create a multiple column Primary Key constraint, what is the most number of bytes I can include in the constraint?
See possible answers