Randomness in Security Configuration
We were deploying a new web service. Because of the nature of the service, we wanted it to listen on...
2017-08-24 (first published: 2017-08-14)
1,412 reads
We were deploying a new web service. Because of the nature of the service, we wanted it to listen on...
2017-08-24 (first published: 2017-08-14)
1,412 reads
These memes, from a security and privacy perspective, are nothing but trouble. Here’s an example I just saw a friend...
2017-08-11
1,421 reads
This T-SQL Tuesday is hosted by Kendra Little.
I’ve been told interviewing is an art. Perhaps it is. I view it...
2017-08-08
319 reads
File this under “soft skills.” Let me start with a recent experience.
Last week I was leading a team of youth...
2017-08-08 (first published: 2017-07-20)
1,692 reads
This Wednesday, July 26th, at 12 PM EDT, I’ll be giving a presentation through Idera’s Geek Sync series. You will...
2017-07-24
290 reads
Whenever I’m asked about creating a security model for an application or database, I tell folks to follow the Principle...
2017-07-17 (first published: 2017-06-30)
2,942 reads
Authentication and Authorization, the first two of the three A’s of security, control who gets access to what. However, at...
2017-07-13 (first published: 2017-06-28)
1,621 reads
Having covered authentication yesterday, let’s move on the second A, authorization. Authentication was about proving identity. Now that we know...
2017-07-10 (first published: 2017-06-27)
1,661 reads
When I start talking with folks about security, one of the areas of confusion I often find has to do...
2017-07-05 (first published: 2017-06-26)
1,825 reads
If you were unable to attend this month’s PASS Security Virtual Chapter webinar, The Dirty Business of Auditing, it has...
2017-06-29
559 reads
By Brian Kelley
I am guilty as charged. The quote was in reference to how people argue...
By Steve Jones
Learn how to tie a bowline knot. Practice in the dark. With one hand....
By HeyMo0sh
As a DevOps practitioner, I’ve always focused on performance, scalability, and automation. But as...
Hi, I have a SQL Server instance where users connect to via Windows Authentication,...
Comments posted to this topic are about the item Multiple Deployment Processes
Comments posted to this topic are about the item How to Use sqlpackage to...
I have a query from a former DBA that we run on SQL Server 2025 to check on database metadata. This query references sys.sysaltfiles. I want to refactor this code to be more modern. Which DMV should I reference instead?
See possible answers