2025-07-18
5,554 reads
2025-07-18
5,554 reads
2025-04-07
1,676 reads
Explore key strategies for securing SQL databases in this comprehensive guide. Learn about robust authentication, data encryption, SQL injection prevention, and more, with practical code examples. Enhance your database's security and performance by following tips from this article.
2024-03-01
5,650 reads
2024-02-05
395 reads
2024-02-02
373 reads
2024-01-22
324 reads
2024-01-15
606 reads
2024-01-08
464 reads
2023-12-08
456 reads
On social media, I asked folks, “Why haven’t you disabled the SA account in your SQL Servers? Wrong answers only.” The results were pretty funny:
2023-12-01
By Steve Jones
Don’t reserve your kindest praise for a person until their eulogy. Tell them while...
I wanted to try out the new JSON index which is for the moment...
By Brian Kelley
I thought it would be good to put my thoughts down on how to...
Comments posted to this topic are about the item Learning a New Language
Hi, we have a few people who like to experiment on our prod sql...
Comments posted to this topic are about the item Guidelines and Requirements
If I use DBCC CLONEDATABASE, can I remove some of the information from the copy?
See possible answers