SQL Server 2005 - Hacking password Encryption
Part 2 of this article discusses how to hack/de-cipher the data that has been encrypted by passphrase.
2008-01-10
4,751 reads
Part 2 of this article discusses how to hack/de-cipher the data that has been encrypted by passphrase.
2008-01-10
4,751 reads
Learn how using basic SQL Server security practices of least privilege, delegated administration and separation of duties will protect SQL Server databases.
2008-01-09
3,806 reads
The Visual Studio 2005 Team Edition for Database Professionals (a.k.a Data Dude) was released somewhere around December 2006 helping many Database Administrators and Database Developers. The release was huge for us, because it addresses many issues faced by us.
2008-01-09
3,641 reads
Every extra byte of space you waste in your database causes a performance hit to your application. This article looks at disk space usage and how it affects performance.
2008-01-08
7,011 reads
Every developer needs to ensure that each TSQL statement is optimized. This article will give you a few different ideas on how to identify slow running queries and provide you with some tips on monitor your query performance while you make iterative changes to each query to try and improve performance.
2008-01-08
4,445 reads
Learn how to use an Analysis Services cube as a data source by using parameterized MDX queries, as well as how to localize label strings in a report, in SQL Server 2005.
2008-01-07
2,399 reads
SQL Server 2005 provides four methods of encryption. Part one of this article covers encryption and decryption by passphrase.
2008-01-07
3,647 reads
The I/O system is important to the performance of SQL Server. When configuring a new server for SQL Server or when adding or modifying the disk configuration of an existing system, it is good practice to determine the capacity of the I/O subsystem prior to deploying SQL Server. This white paper discusses validating and determining the capacity of an I/O subsystem. A number of tools are available for performing this type of testing. This white paper focuses on the SQLIO.exe tool, but also compares all available tools. It also covers basic I/O configuration best practices for SQL Server 2005.
2008-01-04
3,111 reads
Business Intelligence Architect Bill Pearson introduces the useful .AllMembers function, reinforcing the basic concepts, as always, with hands-on practice examples.
2008-01-04
2,173 reads
Locking is a major part of every RDBMS and is important to know about. It is a database functionality which without a multi-user environment could not work. The main problem of locking is that in an essence it's a logical and not physical problem. This means that no amount of hardware will help you in the end. Yes you might cut execution times but this is only a virtual fix.
2008-01-03
4,767 reads
By Brian Kelley
My most recent bout with imposter syndrome was with ISACA’s Digital Trust Ecosystem Framework...
By Steve Jones
“On the way to a grand goal, celebrate the smallest victories as if each...
Materialized lake views (MLVs) in Microsoft Fabric are an effective way to implement medallion...
Graha Elok Mas, Jl. Panjang No.79 EF, RT.6/RW.1, Kedoya Sel., Kec. Kb. Jeruk, Kota...
Jl. Daan Mogot No.48 A, Jelambar, Kec. Grogol petamburan, Kota Jakarta Barat, Daerah Khusus...
Ruko Ngaliyan Square, Jl. Prof. Dr. Hamka No.17 No. 3A, Purwoyoso, Kec. Ngaliyan, Kota...
In honor of May the fourth and Star Wars (may the force be with you), finish this quote:
"Do, or do not. ..."See possible answers