Just Say No to Social Engineering Memes
These memes, from a security and privacy perspective, are nothing but trouble. Here’s an example I just saw a friend...
2017-08-11
1,421 reads
These memes, from a security and privacy perspective, are nothing but trouble. Here’s an example I just saw a friend...
2017-08-11
1,421 reads
This T-SQL Tuesday is hosted by Kendra Little.
I’ve been told interviewing is an art. Perhaps it is. I view it...
2017-08-08
319 reads
This Wednesday, July 26th, at 12 PM EDT, I’ll be giving a presentation through Idera’s Geek Sync series. You will...
2017-07-24
290 reads
File this under “soft skills.” Let me start with a recent experience.
Last week I was leading a team of youth...
2017-08-08 (first published: 2017-07-20)
1,693 reads
Whenever I’m asked about creating a security model for an application or database, I tell folks to follow the Principle...
2017-07-17 (first published: 2017-06-30)
2,942 reads
If you were unable to attend this month’s PASS Security Virtual Chapter webinar, The Dirty Business of Auditing, it has...
2017-06-29
559 reads
Authentication and Authorization, the first two of the three A’s of security, control who gets access to what. However, at...
2017-07-13 (first published: 2017-06-28)
1,621 reads
Having covered authentication yesterday, let’s move on the second A, authorization. Authentication was about proving identity. Now that we know...
2017-07-10 (first published: 2017-06-27)
1,661 reads
When I start talking with folks about security, one of the areas of confusion I often find has to do...
2017-07-05 (first published: 2017-06-26)
1,825 reads
Twitter can often be a great source of information for the SQL Community, especially with the #SQLHelp hashtag. Another resource...
2017-06-23
371 reads
By HeyMo0sh
One of the biggest challenges I’ve faced in cloud operations is maintaining clear visibility...
By Steve Jones
I come to Heathrow often. Today is likely somewhere close to 60 trips to...
By Brian Kelley
If your organization is spending money, then meaningful results are a must. Pen testing...
Comments posted to this topic are about the item Restoring On Top II
Comments posted to this topic are about the item SQL Art 2: St Patrick’s...
Comments posted to this topic are about the item Breaking Down Your Work
I have a database, DNRTest, that has a number of tables and other objects in it. The other day, I was trying to mock up a test and ran this code on the same server:
-- run yesterday CREATE DATABASE DNRTest2 GO USE DNRTest2 GO CREATE TABLE NewTable (id INT) GOToday, I realize that I need a copy of DNRTest for another mockup, and I run this:
-- run today USE Master BACKUP DATABASE DNRTest TO DISK = 'dnrtest.bak' GO RESTORE DATABASE DNRTest2 FROM DISK = 'dnrtest.bak' WITH REPLACEWhat happens? See possible answers