Potential Security Exploit Using CONTROL SERVER Permissions in SQL Server
In this tip we cover what CONTROL SERVER is, how to detect its use and a possible way to exploit this permission.
2012-03-01
2,469 reads
In this tip we cover what CONTROL SERVER is, how to detect its use and a possible way to exploit this permission.
2012-03-01
2,469 reads
By Brian Kelley
There's a great article from MIT Technology Review about resetting on the hype of...
By Steve Jones
etherness – n. the wistful feeling of looking around a gathering of loved ones,...
By Steve Jones
A customer was asking about tracking logins and logouts in Redgate Monitor. We don’t...
Comments posted to this topic are about the item The Max PK Length
Comments posted to this topic are about the item My experience using the GitHub...
Comments posted to this topic are about the item The Microsoft SQL Year in...
If I create a multiple column Primary Key constraint, what is the most number of bytes I can include in the constraint?
See possible answers