A few reflections on security by a weary application developer
Data security? No worries! Tell me how much you are willing to pay.
2014-09-03
139 reads
Data security? No worries! Tell me how much you are willing to pay.
2014-09-03
139 reads
Last week one of my team members was supposed to create a SQL Authenticated ID on a SQL Server 2005 instance. This was as per the request of the Application team who would be using it for an Application.
2014-08-20 (first published: 2014-08-13)
1,901 reads
Set a security standard across environments that developers can see and run, but not change.
2014-07-30
3,855 reads
CONNECT ANY DATABASE is one of three new permissions in SQL Server 2014 that can be granted to server logins. What is this new permission good for and why would we ever want this?
2014-07-29
14,905 reads
2014-07-02
2,111 reads
2014-06-19
1,581 reads
If the level cloud storage encryption are so high, then why is the cloud security industry experiencing such distrust?
2014-06-18
87 reads
2014-06-16
1,905 reads
2014-06-03
1,968 reads
The script give you the list of all users and their respective Server roles
2014-04-02 (first published: 2014-03-11)
1,558 reads
By Chris Yates
For decades, enterprises have approached data management with the same mindset as someone stuffing...
Truncate Table Pitfalls Truncating a table can be gloriously fast—and spectacularly dangerous when used carelessly....
You can find all the session materials for the presentation “Indexing for Dummies” that...
Comments posted to this topic are about the item Technological Dinosaurs or Social Dinosaurs?
Comments posted to this topic are about the item DBCC CHECKIDENT
Comments posted to this topic are about the item Distributed Availability Group Health: T-SQL...
What is returned as a result set when I run this command without a new seed value?
See possible answers