A Security Control Inconsistently Applied Is Not a Control
Some things and readings today reminded me of this: a security control inconsistently applied is not a control. The whole...
2009-02-27
2,819 reads
Some things and readings today reminded me of this: a security control inconsistently applied is not a control. The whole...
2009-02-27
2,819 reads
As I blogged about previously, I had decided to go ahead and pre-order the Kindle 2. It was slated for...
2009-02-27
1,542 reads
After some recent talks with security folks and auditors, one of the things I have had a hard time getting across is that you must trust those folks responsible for account and server management when it comes to securing your data. Yes, you can put in...
2009-02-26
2,549 reads
This question comes up a lot in the forums: "How do I know if the login owns any objects?" Usually...
2009-02-24
7,420 reads
Today, Microsoft release a security advisory about a new vulnerability in Microsoft Excel. This one affects both PCs and Macs....
2009-02-24
1,808 reads
Yesterday I blogged about how to figure out what database principals corresponded to what server principals. The key is to...
2009-02-23
1,874 reads
All of the videos I've done are up under my profile. However, the video for The difference between GRANT, DENY...
2009-02-23
1,498 reads
A question on the forum asked how to find all the database mappings for a particular login. If you're on SQL...
2009-02-22
9,817 reads
When the Kindle 2 was first announced, I debated about whether or not to get it. Then I realized I...
2009-02-21
1,369 reads
There is an active attack in the wild for the newly announced Adobe Acrobat and Adobe Reader vulnerability. While the...
2009-02-20
2,065 reads
By Brian Kelley
I am guilty as charged. The quote was in reference to how people argue...
By Steve Jones
Learn how to tie a bowline knot. Practice in the dark. With one hand....
By HeyMo0sh
As a DevOps practitioner, I’ve always focused on performance, scalability, and automation. But as...
Hi everyone I asked this earlier but the desired outcome is a bit different...
Hi, I have a SQL Server instance where users connect to via Windows Authentication,...
Comments posted to this topic are about the item Multiple Deployment Processes
I have a query from a former DBA that we run on SQL Server 2025 to check on database metadata. This query references sys.sysaltfiles. I want to refactor this code to be more modern. Which DMV should I reference instead?
See possible answers