Balancing Priorities
This one isn't a technical post, but it's entirely appropriate to those of us in the IT field. Today was a...
2009-06-02
768 reads
This one isn't a technical post, but it's entirely appropriate to those of us in the IT field. Today was a...
2009-06-02
768 reads
When it comes to securing a system, it's important to understand how it might be attacked. That's what surface area...
2009-06-01
1,319 reads
Whenever I do a security presentation, I make sure to cover the Principle of Least Privilege. And when I do...
2009-05-29
3,151 reads
On a couple of recent webcasts, I pointed out the folks were running with the local Administrator account. To start...
2009-05-28
2,150 reads
I was playing around with the endpoint catalog views this afternoon just looking at ways to do poor man's configuration...
2009-05-27
2,816 reads
Tomorrow night, May 28th, I'll be speaking the Augusta Developer's Guild. This is a make-up from earlier in the year...
2009-05-27
1,378 reads
Yesterday I did something I wouldn't have thought of doing a year ago: I stayed home. When I woke up,...
2009-05-19
843 reads
Note:Since there have been several comments on this, I'm using parameterization at the application layer in the security sense of...
2009-05-15
2,703 reads
This is spurred on by a comment a pen tester made. He was referring to a particular technology and said...
2009-05-05
1,246 reads
Shortly after the Zune debuted, I purchased one. And I've been happy with it. It's done everything I expected out...
2009-05-04
851 reads
By Steve Jones
It’s that time of the month, and I’m late. My apologies. I had a...
By Chris Yates
For decades, enterprises have approached data management with the same mindset as someone stuffing...
Truncate Table Pitfalls Truncating a table can be gloriously fast—and spectacularly dangerous when used carelessly....
Comments posted to this topic are about the item The Improvement Limit
Comments posted to this topic are about the item Migrate SSRS Reports to a...