How to Convert FileTime to DateTime
One of my customers recently wanted to rename each of the SQL audit files will the datetime stamp of when it was created. I explained to them the filename...
2025-01-15 (first published: 2024-11-05)
598 reads
One of my customers recently wanted to rename each of the SQL audit files will the datetime stamp of when it was created. I explained to them the filename...
2025-01-15 (first published: 2024-11-05)
598 reads
Several months ago, I discussed my customer’s intention to enable trace flag 3625. Since that time, we have observed an intriguing phenomenon when encountering a login failure. To demonstrate...
2024-12-13 (first published: 2024-12-10)
492 reads
SQL Server Audit is an efficient way to track and log events that occur within the database engine. For on-premises or IaaS environments, those audits can only be stored...
2024-10-30 (first published: 2024-10-15)
395 reads
Recently, one of my customers considered enabling Trace Flag 3625 on one of their SQL Servers, but they wanted a way to quickly test its functionality beforehand. For those...
2023-12-22 (first published: 2023-12-12)
520 reads
In a previous blog post, I showed you how to use PowerShell to retrieve the details of the certificate being used for encryption-in-transit, aka TLS encryption. I have received...
2023-11-22 (first published: 2023-11-14)
1,272 reads
In a few previous articles, I have talked a lot about Managed Service Accounts (MSA) and Service Principal Names (SPN) and given examples of managing the separately. As a...
2022-11-11 (first published: 2022-11-01)
327 reads
Managed Service Accounts (MSA) are intended to run as a service and not to be used by an end user to logon interactively; however, there are some cases where...
2022-03-15
145 reads
In my previous post, I discussed how to setup Kerberos constrained delegation and a limitation of using that method. This post will discuss how we can used resource-based Kerberos...
2022-03-01
244 reads
For those of you that need to setup Kerberos constrained delegation for Group Managed Service Accounts, you will likely get more familiar with msDS-AllowedToDelegateTo. This attribute stores a list...
2022-02-15
284 reads
Kerberos delegation is not a new concept in Active Directory; however, setting it up for Group Managed Service Accounts (gMSA) can be a bit confusing. Unlike normal domain accounts,...
2022-02-01
750 reads
By Steve Jones
With the AI push being everywhere, Redgate is no exception. We’ve been getting requests,...
By Steve Jones
fawtle – n. a weird little flaw built into your partner that somehow only...
AWS recently added support for Post-Quantum Key Exchange for TLS in Application Load Balancer...
Comments posted to this topic are about the item Semantic Search in SQL Server...
Comments posted to this topic are about the item Encoding URLs
Comments posted to this topic are about the item An SSIS Upgrade
I have this data in a table:
CREATE TABLE Response ( ResponseID INT NOT NULL CONSTRAINT ResponsePK PRIMARY KEY , ResponseVal VARBINARY(5000) ) GOIf I want to get a value from this table that I can add to a URL in a browser, which of these code items produces a result I can use? See possible answers