2007-03-13
1,480 reads
2007-03-13
1,480 reads
2007-03-06
1,018 reads
2007-02-28
1,066 reads
In this presentation at the Jacksonville SQL Server Users Group, Bayer White playS the part of a developer protecting his application and Brian Knight attempts to hack his application using SQL Injection and cross-site scripting. Then, Bayer will show you how to protect yourself from the hacker and then Brian tries again. Back and forth the chess match goes until someone wins!
2007-02-12
5,265 reads
How many DBAs need a solution to track those changes made for multiple systems? Auditing is becoming more and more prevalent in all systems and having a good solution can really make your DBA job interesting. New author Keren Ramot brings us his technique that works indepedent of the database structure.
2007-12-26 (first published: 2007-02-12)
19,610 reads
2007-01-31
1,019 reads
2007-01-23
1,154 reads
2007-01-11
1,154 reads
2007-01-10
1,165 reads
Pop provides a cunning, trigger-based technique for auditing the activity on SQL Server tables
2007-01-09
2,668 reads
By Brian Kelley
If you are considering any of the ISACA AI certs like the Advanced Artificial...
By ChrisJenkins
Are you currently using Microsoft Fabric or considering migrating to it? If so, there...
By SQLPals
Track SQL Server Configuration Changes Using the Error Log If you...
Comments posted to this topic are about the item We Are Eating Our Own...
Artificial intelligence tools are quickly becoming part of daily business operations, from document analysis...
Comments posted to this topic are about the item Designing SQL Server ETL Pipelines...
In the Database Engine, when a deadlock is detected, what does the detection interval shrink to (in time)?
See possible answers