Additional Articles


Technical Article

Manipulating Microsoft SQL Server Using SQL Injection

Focuses on advanced techniques that can be used in an attack on an application utilizing Microsoft SQL Server as a backend. These techniques demonstrate how an attacker could use a SQL Injection vulnerability to retrieve the database content from behind a firewall and penetrate the internal network. Also provided are recommendations on how to prevent such attacks.

2005-01-05

2,626 reads

Technical Article

Get the Value of a BitMask

This function will take a 64 bitmask string and return the value of bitmask. If you need 128, 256, etc simply change the length of the parameter, being careful to remember you may need to change the return type of int to BigInt if you get too long.

You rated this post out of 5. Change rating

2005-01-04 (first published: )

241 reads

Blogs

Resetting on the AI hype train

By

There's a great article from MIT Technology Review about resetting on the hype of...

A New Word: Etherness

By

etherness – n. the wistful feeling of looking around a gathering of loved ones,...

Vibe Coding a Login Tracking System

By

A customer was asking about tracking logins and logouts in Redgate Monitor. We don’t...

Read the latest Blogs

Forums

T-SQL in SQL Server 2025: The || Operator

By Steve Jones - SSC Editor

Comments posted to this topic are about the item T-SQL in SQL Server 2025:...

Your Value from a Conference

By Steve Jones - SSC Editor

Comments posted to this topic are about the item Your Value from a Conference

UNISTR Basics

By Steve Jones - SSC Editor

Comments posted to this topic are about the item UNISTR Basics

Visit the forum

Question of the Day

UNISTR Basics

What does this code return in SQL Server 2025+? (assume the database has an appropriate collation)

SELECT UNISTR('Hello 4E16754C') AS 'A Classic';
A:   B:  

See possible answers