SQL Server Security: Login Weaknesses
Brian writes regularly for us on sql security issues, this week he discusses the pros and cons of various authentication methods.
2003-08-14
18,159 reads
Brian writes regularly for us on sql security issues, this week he discusses the pros and cons of various authentication methods.
2003-08-14
18,159 reads
Regular columnist Brian Kelley reviews the real world impact that inadequate security can have by reviewing some recent incidents in the sql/security world. Very much worth reading, especially if you have credit card data.
2003-07-31
7,537 reads
2003-07-23
2,777 reads
2003-07-18
2,627 reads
So how many servers do you have in your environment? In this review of AppDetective by Brian Knight, he shows you how AppDetective helped him find SQL Servers he didn't even know about in his environment.
2003-07-11
4,726 reads
2003-07-04
2,347 reads
2003-07-02
2,526 reads
2003-06-30
3,391 reads
As we mentioned before, Brian will be writing a column covering all facets of security. Turns out that there is so much to cover, he has agreed to write two columns per month! This article talks about the principle least privilege, why it doesn't always work, and some good info about removing the Builtin\Admin account.
2003-06-27
21,139 reads
2003-06-13
5,953 reads
By Chris Yates
For decades, enterprises have approached data management with the same mindset as someone stuffing...
Truncate Table Pitfalls Truncating a table can be gloriously fast—and spectacularly dangerous when used carelessly....
You can find all the session materials for the presentation “Indexing for Dummies” that...
Comments posted to this topic are about the item DBCC CHECKIDENT
Comments posted to this topic are about the item Distributed Availability Group Health: T-SQL...
Hi, our peer who owns a remote mysql server from which we extract warehouse...
What is returned as a result set when I run this command without a new seed value?
See possible answers