2007-03-06
1,018 reads
2007-03-06
1,018 reads
2007-02-28
1,064 reads
In this presentation at the Jacksonville SQL Server Users Group, Bayer White playS the part of a developer protecting his application and Brian Knight attempts to hack his application using SQL Injection and cross-site scripting. Then, Bayer will show you how to protect yourself from the hacker and then Brian tries again. Back and forth the chess match goes until someone wins!
2007-02-12
5,265 reads
How many DBAs need a solution to track those changes made for multiple systems? Auditing is becoming more and more prevalent in all systems and having a good solution can really make your DBA job interesting. New author Keren Ramot brings us his technique that works indepedent of the database structure.
2007-12-26 (first published: 2007-02-12)
19,606 reads
2007-01-31
1,019 reads
2007-01-23
1,153 reads
2007-01-11
1,154 reads
2007-01-10
1,165 reads
Pop provides a cunning, trigger-based technique for auditing the activity on SQL Server tables
2007-01-09
2,668 reads
Security has become more and more important in today's business environment. From the database point of view, DBAs and system administrators need an improved security model. SQL Server 2005 provides an improved security feature. It is claimed that SQL Server 2005 is secure by default. In SQL Server 2005, the security model is divided into three areas namely authentication, authorization, and encryption.
2006-12-29
2,741 reads
By DataOnWheels
The T-SQL Tuesday topic this month comes James Serra. What career risks have you...
This T-SQL Tuesday is hosted by the one and only James Serra – literally...
By Steve Jones
This month we have a new host, James Serra. I’ve been trying to find...
We have two "identical" instances of an ASP.NET web service (or so I have...
Comments posted to this topic are about the item OPENQUERY Flexibility
Comments posted to this topic are about the item A Full Shutdown
Which of these are valid OPENQUERY() uses?
See possible answers