Additional Articles


SQLServerCentral Article

Freeware : DDL Source Safe Archive Utility

If your shop is even close to the typical Micosoft SQL Server environment there are several people that can (and do!) make changes to the production environment, a change management system is in place, that change management system uses Source Safe to store database scripts, and what's in Source Safe does not match what's on the SQL Server. This utility by Bill Wunder will archive your SQL scripts and DDL into Source Safe easily and efficiently. All for the price of $0 (yes, free!).

You rated this post out of 5. Change rating

2003-02-26

285 reads

SQLServerCentral Article

Freeware: Terminator Opens Gigabyte Files Easily

Ever tried to open 1 Gig ASCII file with Notepad? WordPad? Do you remember ASCII codes of Tab and Carriage Return? Enter Terminator; huge ASCII file viewer and BCP helper. Terminator reads top 10 (and more if asked) records of ASCII file of any size. It detects record terminators and calculates current cursor position (field offset) and length of selected area (field length). Best of all, it's free!

You rated this post out of 5. Change rating

2003-01-29

116 reads

Technical Article

How to move SQL Server from one computer to another?

Moving SQL Server from one computer to another is not a very difficult thing to do, but it often stumps newbie DBAs. Of course, it needs careful planning to ensure that the SQL Server is moved completely and properly to the new machine, and with a minimal downtime and no data loss. This article introduces you to a couple of methods you can employ to move/migrate SQL Server from one computer to another.

2003-01-24

107 reads

Technical Article

Auditing Your SQL Server Environment Part I

This article is the first of a series that I plan on writing and placing on my website to help other DBAs in auditing a new SQL Server environment. This article deals with determing which SQL Server logins have weak passwords, with the definition of weak being, no password, password the same as the login name or having a password of only one character.The stored procedure used for this article is embedded in the article and it has been submitted as a independent script named spAuditPasswords.

2003-01-21

66 reads

Blogs

Vibe Coding a Login Tracking System

By

A customer was asking about tracking logins and logouts in Redgate Monitor. We don’t...

4 CPE Opportunity (Virtual) for Charity

By

Every year, the South Carolina State Internal Auditors Association and the South Carolina Midlands...

Data Céilí 2026 Call for Speakers!

By

Data Céilí 2026 Call for Speakers is now live! Data Céilí (pronounced kay-lee), is...

Read the latest Blogs

Forums

Deadlock graph anomaly

By Databae

I've come across what appears to be a strange deadlock anomaly. As seen in...

Stairway to Azure SQL Hyperscale Level 6: Backup and Restore Internals

By Chandan Shukla

Comments posted to this topic are about the item Stairway to Azure SQL Hyperscale...

The Challenge of AI

By Steve Jones - SSC Editor

Comments posted to this topic are about the item The Challenge of AI, which...

Visit the forum

Question of the Day

Deprecated Feature Tracking

From T-SQL, without requiring an XEvent session, can I tell which deprecated features are being used on my instance?

See possible answers