Security Update for SQL Server SP2
Microsoft has release a cumulative security update for SQL Server with SP2. Read , download and update your SQL Server!
2002-07-25
3,912 reads
Microsoft has release a cumulative security update for SQL Server with SP2. Read , download and update your SQL Server!
2002-07-25
3,912 reads
SQLServerCentral.com launched its first online free software, which can evaluate your SQL Server remotely and look for SQL Server security vulnerabilities. This free service looks for weak or no passwords and does a basic penetration test online.
2002-06-13
55 reads
In this article by Randy Dyess he shares with you the script on how he audits his environment and outputs reports of the permissions that users have.
2002-05-30
9,908 reads
If you haven't changed the SA password on your SQL Server, you may be soon paying the price. Beginning last week, an old worm has come back in full force, infecting about 100 SQL Servers an hour. Reports of heavy port 1433 scanning began in early may but by the 22nd, the virus really began to take its hold on systems with no SA password.
2002-05-28
4,812 reads
SQLServerCentral.com is proud to launch it's first Resource Center for security. It's a one-stop shop for anything related to SQL Server security. All content is user-contributed and contains links to content throughout the web.
2002-05-20
76 reads
As I work with a particular topic or problem, I often research on the Internet different opinions, white papers, etc. Here is a list of resources that are located both on SQLServerCentral.com and other sites that I have found useful.
2002-04-08
5,536 reads
Ever been placed into a new environment and couldn't
find an ounce of documentation? This article is the first in a series that will help you make an audit of your new environment
and determine if any SQL Server login does not have a password, has a password the same as the login name or a password that is only one character long.
2002-04-02
10,441 reads
Sooner or later everyone who works with SQL Server hears that it is better to avoid dynamic SQL at all cost. Dynamic SQL will force you to give out more permissions than static SQL. This article by Robert Marda shows you some of the security issues with dynamic SQL.
2002-02-27
12,958 reads
Continuing with the Worst Practices Series: Steve Jones examines why encryption in the database is a bad idea.
2002-01-08
8,433 reads
The major part of the article, however, is dedicated to a topic that often confuses people and leads to some of the strongest disagreements among IT professionals and developers: the benefits and drawbacks of enforcing security in the middle (or business) tier versus the data tier.
2001-12-25
1,855 reads
By Steve Jones
Superheroes and saints never make art. Only imperfect beings can make art because art...
One feature that I have been waiting for years! The new announcement around optimize...
Following on from my last post about Getting Started With KubeVirt & SQL Server,...
Comments posted to this topic are about the item The AI Bubble and the...
Hi, in a simple oledb source->derived column->oledb destination data flow, 2 of my...
hi, i noticed the sqlhealth extended event is on by default , and it...
I am currently working with Sql Server 2022 and AdventureWorks database. First of all, let's set the "Read Committed Snapshot" to ON:
use master; go alter database AdventureWorks set read_committed_snapshot on with no_wait; goThen, from Session 1, I execute the following code:
--Session 1 use AdventureWorks; go create table ##t1 (id int, f1 varchar(10)); go insert into ##t1 values (1, 'A');From another session, called Session 2, I open a transaction and execute the following update:
--Session 2 use AdventureWorks; go begin tran; update ##t1 set f1 = 'B' where id = 1;Now, going back to Session 1, what happens if I execute this statement?
--Session 1 select f1 from ##t1 where id = 1;See possible answers