2021-01-13
79 reads
2021-01-13
79 reads
Steve has a thought on the best way to protect sensitive data.
2021-01-07
136 reads
2020-12-14
132 reads
A recent issue with malware and SQL Servers has Steve wondering if you would detect a new, and unapproved, login added to an instance.
2020-10-05
216 reads
Learn about how ownership chaining allows you to limit permissions on specific database objects yet give users access through other objects such as views and stored procedures.
2020-10-01
A colleague left the company, a couple of days after SQL Server processes start failing...what do you do?
2020-09-29
6,311 reads
2020-09-10
107 reads
2020-09-10
608 reads
Today Steve talks about limiting security issues for administrators.
2020-09-08
183 reads
Steve found an attack against Google's SQL database that their SREs detected.
2020-09-03
207 reads
By Chris Yates
For decades, enterprises have approached data management with the same mindset as someone stuffing...
Truncate Table Pitfalls Truncating a table can be gloriously fast—and spectacularly dangerous when used carelessly....
You can find all the session materials for the presentation “Indexing for Dummies” that...
Comments posted to this topic are about the item Technological Dinosaurs or Social Dinosaurs?
Comments posted to this topic are about the item DBCC CHECKIDENT
Comments posted to this topic are about the item Distributed Availability Group Health: T-SQL...
What is returned as a result set when I run this command without a new seed value?
See possible answers