2007-06-12
1,281 reads
2007-06-12
1,281 reads
2007-06-11
1,419 reads
2007-06-07
1,309 reads
One of the more interesting new features with SQL Server 2005 is the native encryption built into the product. Expert SQL crpytographer, Michael Coles, brings us a look at the symmetric keys in SQL Server 2005 and how they can be used to encrypt data and be secured by a certificate.
2007-08-24 (first published: 2007-05-11)
54,574 reads
2007-04-17
1,137 reads
2007-04-12
1,357 reads
2007-04-06
1,276 reads
2007-03-29
1,060 reads
SQL Server 2005 has greatly changed the security paradigm for SQL Server DBAs. The sa account still exists, but for many tasks
you can now avoid using it. New author Ken Johnson brings us some ides for properly securing this highly privileged account.
2008-02-20 (first published: 2007-03-14)
16,605 reads
2007-03-13
1,479 reads
By James Serra
I’m honored to be hosting T-SQL Tuesday — edition #192. For those who may...
By Vinay Thakur
Continuing from Day 2 , we learned introduction on Generative AI and Agentic AI,...
Quite the title, so let me set the stage first. You have an Azure...
Comments posted to this topic are about the item A Quick Restore
Comments posted to this topic are about the item Guarding Against SQL Injection at...
I have a quick question on Ola Hallengren Index Optimize Maintenance . Do we...
While doing some testing of an application, I wanted to reset my environment after doing some testing with this code:
USE DNRTest BACKUP DATABASE DNRTest TO DISK = 'dnrtest.bak' GO /* Bunch of stuff tested here */RESTORE DATABASE DNRTest FROM DISK = 'dnrtest.bak' WITH REPLACEWhat happens if this runs, assuming the "bunch of stuff" isn't anything affecting the instance. See possible answers