Brute Forcing SQL Logins and Passwords
Watch this week’s episode on YouTube.Following up on last week’s post about the different types of SQL injection, this week...
2018-11-27
1,039 reads
Watch this week’s episode on YouTube.Following up on last week’s post about the different types of SQL injection, this week...
2018-11-27
1,039 reads
Watch this week's video on YouTube
I'm not advocating that you start using SQL injection to start stealing other people's data.
However, I do think that you should familiarize...
2018-11-20
4 reads
Watch this week's video on YouTube
I'm not advocating that you start using SQL injection to start stealing other people's data.
However, I do think that you should familiarize...
2018-11-20
11 reads
This post is a response to this month’s T-SQL Tuesday #108 prompt by Malathi Mahadevan. T-SQL Tuesday is a way...
2018-11-15 (first published: 2018-11-06)
2,665 reads
What happens when you run into performance tuning expert Pinal Dave? Talk about how to troubleshoot a slow performing SQL...
2018-11-13
346 reads
Watch this week's video on YouTube
What happens when you run into performance tuning expert Pinal Dave? Talk about how to troubleshoot a slow performing SQL Server of course!
This week...
2018-11-13
5 reads
Watch this week's video on YouTube
What happens when you run into performance tuning expert Pinal Dave? Talk about how to troubleshoot a slow performing SQL Server of course!
This week...
2018-11-13
5 reads
While families and friends are scaring each other this Halloween week with stories of ghosts and ghouls, I thought it’d...
2018-11-08 (first published: 2018-10-30)
4,983 reads
This post is a response to this month's T-SQL Tuesday #108 prompt by Malathi Mahadevan. T-SQL Tuesday is a way for the SQL Server community to share ideas about...
2018-11-06
5 reads
This post is a response to this month's T-SQL Tuesday #108 prompt by Malathi Mahadevan. T-SQL Tuesday is a way for the SQL Server community to share ideas about...
2018-11-06
3 reads
If you've ever loaded a 2 GB CSV into pandas just to run a...
By James Serra
What problem is Fabric Ontology trying to solve? For years, most data conversations have...
By Steve Jones
Recently I ran across some code that used a lot of QUOTENAME() calls. A...
Comments posted to this topic are about the item Stairway to Reliable Database Deployment...
Comments posted to this topic are about the item QUOTENAME Quote Parameters
Comments posted to this topic are about the item Limit the Blast Radius
When I use QUOTENAME(), I can optionally provide the character used to surround the string in the result. Can I use any character?
See possible answers