2007-03-06
1,017 reads
2007-03-06
1,017 reads
2007-02-28
1,064 reads
In this presentation at the Jacksonville SQL Server Users Group, Bayer White playS the part of a developer protecting his application and Brian Knight attempts to hack his application using SQL Injection and cross-site scripting. Then, Bayer will show you how to protect yourself from the hacker and then Brian tries again. Back and forth the chess match goes until someone wins!
2007-02-12
5,265 reads
How many DBAs need a solution to track those changes made for multiple systems? Auditing is becoming more and more prevalent in all systems and having a good solution can really make your DBA job interesting. New author Keren Ramot brings us his technique that works indepedent of the database structure.
2007-12-26 (first published: 2007-02-12)
19,605 reads
2007-01-31
1,019 reads
2007-01-23
1,153 reads
2007-01-11
1,154 reads
2007-01-10
1,165 reads
Pop provides a cunning, trigger-based technique for auditing the activity on SQL Server tables
2007-01-09
2,668 reads
Security has become more and more important in today's business environment. From the database point of view, DBAs and system administrators need an improved security model. SQL Server 2005 provides an improved security feature. It is claimed that SQL Server 2005 is secure by default. In SQL Server 2005, the security model is divided into three areas namely authentication, authorization, and encryption.
2006-12-29
2,741 reads
By Steve Jones
I haven’t done one of these in awhile, but I saw an article recently...
In last months one of the scenarios where you can use AI has been...
Comments posted to this topic are about the item Creating JSON II
Comments posted to this topic are about the item Engineer Lessons
On SQL Server 2025, what happens when I run this code:
SELECT JSON_OBJECTAGG( N'City':N'Denver' RETURNING JSON) GOSee possible answers