2005-10-24
1,201 reads
2005-10-24
1,201 reads
2005-10-21
1,320 reads
2005-10-18
990 reads
If a hacker sets sights on your SQL Server, there are four primary methods he can use to take control and carry out unauthorized, malicious activity. I will look at each of these: Password compromise, Account compromise, SQL injection, Buffer overflows
2005-10-07
4,718 reads
SQL injection has been a hot topic the last couple years and there are some great articles at SQLServerCentral.com on this topic. Michael Coles brings us an updated look at this SQL Server security issue with some new examples you might not have previously thought.
2008-03-21 (first published: 2005-09-21)
85,100 reads
2005-07-27
1,249 reads
Free SQL Server 2000 Encryption for your data!!! Author Michael Coles has put together a tolljit and some XPs that you can use to encrypt your data with the Blowfish algorithm. It is hard to write good applications that encrpyt data and manage the keys and security. This will give you a great headstart on protecting your data.
2018-10-10 (first published: 2005-07-21)
78,916 reads
Despite the major advances made with Profiler in SQL Server 2005, auditing changes isn't one of the strengths of the product. New author Sergey Pustovit brings us his technique that allows auditing of actions using shared accounts from an application. A few minor code changes, but overall this is a very interesting idea.
2005-07-20
7,519 reads
2005-06-08
1,065 reads
2005-05-27
1,027 reads
By John
One of the more frustrating aspects about creating an Azure virtual machine is that...
By Steve Jones
Redgate Monitor has been able to monitor replication for a long term, but it...
By Steve Jones
Superheroes and saints never make art. Only imperfect beings can make art because art...
Comments posted to this topic are about the item Think LSNs Are Unique? Think...
Comments posted to this topic are about the item The AI Bubble and the...
In SQL Server 2025, how many columns can be included in a Primary Key constraint?
See possible answers