2006-04-14
1,096 reads
2006-04-14
1,096 reads
SQL Server 2005 builds some great encryption tools into the product, but what if you are stuck with SQL Server 2000? SQL Server expert Michael Coles brings us the first part of a series along with a free toolkit to manage encryption and keys.
2013-04-18 (first published: 2006-04-13)
31,433 reads
Learn about SQL Server security techniques including the principle of least privilege, controlling metadata visibility, separation of users and schemas, and more.
2006-04-12
2,475 reads
2006-04-04
1,206 reads
2006-03-29
1,345 reads
2006-03-28
1,566 reads
2006-03-27
1,269 reads
2006-03-24
1,193 reads
2006-03-20
1,219 reads
A defense-in-depth strategy, with overlapping layers of security, is the best way to counter these threats, and the least-privileged user account (LUA) approach is an important part of that defensive strategy. The LUA approach ensures that users follow the principle of least privilege and always log on with limited user accounts. This strategy also aims to limit the use of administrative credentials to administrators, and then only for administrative tasks.
2006-02-24
2,597 reads
By DataOnWheels
Ramblings of a retired data architect Let me start by saying that I have...
By Steve Jones
A customer was testing Redgate Data Modeler and complained that it auto-generated PK names....
By Steve Jones
With the AI push being everywhere, Redgate is no exception. We’ve been getting requests,...
Hi everyone, Below is a consolidated summary of what we validated Architecture & data...
Hi all, I recently moved to a new employer who have their HA setup...
Comments posted to this topic are about the item Semantic Search in SQL Server...
I have this data in a SQL Server 2025 table:
CREATE TABLE Response ( ResponseID INT NOT NULL CONSTRAINT ResponsePK PRIMARY KEY , ResponseVal VARBINARY(5000) ) GOIf I want to get a value from this table that I can add to a URL in a browser, which of these code items produces a result I can use? See possible answers