2012-08-01 (first published: 2008-02-15)
3,207 reads
2012-08-01 (first published: 2008-02-15)
3,207 reads
2008-03-19 (first published: 2008-01-24)
3,568 reads
Longtime SQL Server guru David Poole brings us a look at one of the thorny problems a DBA faces: tracking down illicit users.
2008-01-15
7,895 reads
Learn how using basic SQL Server security practices of least privilege, delegated administration and separation of duties will protect SQL Server databases.
2008-01-09
3,806 reads
SQL Server 2005 provides four methods of encryption. Part one of this article covers encryption and decryption by passphrase.
2008-01-07
3,647 reads
Study encryption and hashing algorithm options for data security in SQL Server 2005 and use symmetric/asymmetric keys to encrypt and decrypt SQL Server data.
2007-12-25
3,463 reads
2007-11-29
2,691 reads
Learn how to reorganize permissions in SQL Server 2005 in a multiple database environment.
2007-11-29
3,160 reads
This script will produce the server login/role and db user/role in all databases in the server.It is best advised that you first delete/recreate orphaned users for best results
2008-01-25 (first published: 2007-11-27)
3,791 reads
2007-11-13
2,566 reads
By Steve Jones
A customer was asking about tracking logins and logouts in Redgate Monitor. We don’t...
By Brian Kelley
Every year, the South Carolina State Internal Auditors Association and the South Carolina Midlands...
Data Céilí 2026 Call for Speakers is now live! Data Céilí (pronounced kay-lee), is...
Comments posted to this topic are about the item T-SQL in SQL Server 2025:...
Comments posted to this topic are about the item Your Value from a Conference
Comments posted to this topic are about the item UNISTR Basics
What does this code return in SQL Server 2025+? (assume the database has an appropriate collation)
SELECT UNISTR('Hello 4E16754C') AS 'A Classic';
A:
B:
See possible answers