SQL Server Security Part 3
In the final article in the series, Chris Kempster covers some of the more advanced methods to securing your SQL Server.
2002-02-18
9,875 reads
In the final article in the series, Chris Kempster covers some of the more advanced methods to securing your SQL Server.
2002-02-18
9,875 reads
One of our readers needed some help with altering a table with DMO, so Andy has a code sample and some comments in general about how to add objects using DMO. It's good code and a very quick introduction to how objects work. Worth reading!
2002-02-14
4,759 reads
In this article by Neil Weicher, he talks about encryption of data and files for SQL Server.
2002-01-30
6,879 reads
One of the biggest performance gains built into SQL Server is the stored procedure. In this article by Brian Kelley, he shows you how to fully utilize, debug and monitor the caching of such objects.
2004-11-19 (first published: 2002-01-28)
50,506 reads
This white paper outlines the following:
-The steps to configure Log Shipping between two or more servers that are running SQL Server 2000 Enterprise Edition.
-The steps to configure Log Shipping between Microsoft SQL Server 7.0 Service Pack 2 (SP2), or later, and Microsoft SQL Server 2000 Enterprise Edition.
-A brief comparison between Log Shipping and the other high availability-solutions that SQL Server provides.
2002-01-25
1,822 reads
This week Andy takes a look at a new product from Red-Gate that gives you even more options than you get with their SQL Compare and SQL Data Compare tools - now you can build your own. Add the features you always wanted. Build automated processes instead of using the GUI. It's an interesting product - read the review and then maybe even enter the contest to win a free copy.
2002-01-16
5,423 reads
In this series of articles, Chris Kempster will discuss some of the finer aspects of SQL Server security and also touch on OS, physical and application security to open up this science for general discussion.
2007-10-02 (first published: 2002-01-14)
50,629 reads
This white paper is a joint effort by Microsoft and Dell to demonstrate the scalability of SQL Server 2000 and Dell hardware.
2002-01-10
1,274 reads
SQL Server DBAs are often curious about the inner-workings of SQL Server. Indeed, it can save your job during disasters to know what's going on inside SQL Server. This article shows you how to use some of the SQL Server internal views to view some meta data about your servers.
2002-01-09
17,578 reads
If you use identity values, chances are that at some point you will need to find more information about the next value or reset the seed. This article looks at how you can accomplish this.
2001-12-31
7,151 reads
By Steve Jones
With the AI push being everywhere, Redgate is no exception. We’ve been getting requests,...
By Steve Jones
fawtle – n. a weird little flaw built into your partner that somehow only...
AWS recently added support for Post-Quantum Key Exchange for TLS in Application Load Balancer...
Comments posted to this topic are about the item Semantic Search in SQL Server...
Comments posted to this topic are about the item Encoding URLs
Comments posted to this topic are about the item An SSIS Upgrade
I have this data in a table:
CREATE TABLE Response ( ResponseID INT NOT NULL CONSTRAINT ResponsePK PRIMARY KEY , ResponseVal VARBINARY(5000) ) GOIf I want to get a value from this table that I can add to a URL in a browser, which of these code items produces a result I can use? See possible answers