Randomness in Security Configuration
We were deploying a new web service. Because of the nature of the service, we wanted it to listen on...
2017-08-24 (first published: 2017-08-14)
1,412 reads
We were deploying a new web service. Because of the nature of the service, we wanted it to listen on...
2017-08-24 (first published: 2017-08-14)
1,412 reads
These memes, from a security and privacy perspective, are nothing but trouble. Here’s an example I just saw a friend...
2017-08-11
1,421 reads
This T-SQL Tuesday is hosted by Kendra Little.
I’ve been told interviewing is an art. Perhaps it is. I view it...
2017-08-08
319 reads
File this under “soft skills.” Let me start with a recent experience.
Last week I was leading a team of youth...
2017-08-08 (first published: 2017-07-20)
1,693 reads
This Wednesday, July 26th, at 12 PM EDT, I’ll be giving a presentation through Idera’s Geek Sync series. You will...
2017-07-24
290 reads
Whenever I’m asked about creating a security model for an application or database, I tell folks to follow the Principle...
2017-07-17 (first published: 2017-06-30)
2,942 reads
Authentication and Authorization, the first two of the three A’s of security, control who gets access to what. However, at...
2017-07-13 (first published: 2017-06-28)
1,621 reads
Having covered authentication yesterday, let’s move on the second A, authorization. Authentication was about proving identity. Now that we know...
2017-07-10 (first published: 2017-06-27)
1,661 reads
When I start talking with folks about security, one of the areas of confusion I often find has to do...
2017-07-05 (first published: 2017-06-26)
1,825 reads
If you were unable to attend this month’s PASS Security Virtual Chapter webinar, The Dirty Business of Auditing, it has...
2017-06-29
559 reads
By HeyMo0sh
As someone who works in DevOps, I’m always focused on creating systems that are...
By Brian Kelley
I am guilty as charged. The quote was in reference to how people argue...
By Steve Jones
Learn how to tie a bowline knot. Practice in the dark. With one hand....
Comments posted to this topic are about the item Restoring On Top II
Comments posted to this topic are about the item SQL Art 2: St Patrick’s...
Comments posted to this topic are about the item Breaking Down Your Work
I have a database, DNRTest, that has a number of tables and other objects in it. The other day, I was trying to mock up a test and ran this code on the same server:
-- run yesterday CREATE DATABASE DNRTest2 GO USE DNRTest2 GO CREATE TABLE NewTable (id INT) GOToday, I realize that I need a copy of DNRTest for another mockup, and I run this:
-- run today USE Master BACKUP DATABASE DNRTest TO DISK = 'dnrtest.bak' GO RESTORE DATABASE DNRTest2 FROM DISK = 'dnrtest.bak' WITH REPLACEWhat happens? See possible answers