SQL Server Security Part 3
In the final article in the series, Chris Kempster covers some of the more advanced methods to securing your SQL Server.
2002-02-18
9,874 reads
In the final article in the series, Chris Kempster covers some of the more advanced methods to securing your SQL Server.
2002-02-18
9,874 reads
One of our readers needed some help with altering a table with DMO, so Andy has a code sample and some comments in general about how to add objects using DMO. It's good code and a very quick introduction to how objects work. Worth reading!
2002-02-14
4,759 reads
In this article by Neil Weicher, he talks about encryption of data and files for SQL Server.
2002-01-30
6,879 reads
One of the biggest performance gains built into SQL Server is the stored procedure. In this article by Brian Kelley, he shows you how to fully utilize, debug and monitor the caching of such objects.
2004-11-19 (first published: 2002-01-28)
50,498 reads
This white paper outlines the following:
-The steps to configure Log Shipping between two or more servers that are running SQL Server 2000 Enterprise Edition.
-The steps to configure Log Shipping between Microsoft SQL Server 7.0 Service Pack 2 (SP2), or later, and Microsoft SQL Server 2000 Enterprise Edition.
-A brief comparison between Log Shipping and the other high availability-solutions that SQL Server provides.
2002-01-25
1,822 reads
This week Andy takes a look at a new product from Red-Gate that gives you even more options than you get with their SQL Compare and SQL Data Compare tools - now you can build your own. Add the features you always wanted. Build automated processes instead of using the GUI. It's an interesting product - read the review and then maybe even enter the contest to win a free copy.
2002-01-16
5,422 reads
In this series of articles, Chris Kempster will discuss some of the finer aspects of SQL Server security and also touch on OS, physical and application security to open up this science for general discussion.
2007-10-02 (first published: 2002-01-14)
50,629 reads
This white paper is a joint effort by Microsoft and Dell to demonstrate the scalability of SQL Server 2000 and Dell hardware.
2002-01-10
1,274 reads
SQL Server DBAs are often curious about the inner-workings of SQL Server. Indeed, it can save your job during disasters to know what's going on inside SQL Server. This article shows you how to use some of the SQL Server internal views to view some meta data about your servers.
2002-01-09
17,577 reads
If you use identity values, chances are that at some point you will need to find more information about the next value or reset the seed. This article looks at how you can accomplish this.
2001-12-31
7,151 reads
By John
Today is Christmas and while I do not expect anybody to actual be reading...
By Bert Wagner
Until recently, my family's 90,000+ photos have been hidden away in the depths of...
By Kamil
Managing Microsoft Fabric at scale quickly becomes painful if you rely only on the...
Comments posted to this topic are about the item UNISTR Escape
Comments posted to this topic are about the item Celebrating Tomorrow
Comments posted to this topic are about the item SQL Art: I Made a...
In SQL Server 2025, I run this command:
SELECT UNISTR('*3041*308A*304C\3068 and good night', '*') as "A Classic";
What is returned? (assume the database has an appropriate collation)
A:
B:
C:
See possible answers