SQL Injection isn't special code. It consists of regular, valid T-SQL that is unexpected by the application. Steve Jones notes that using the principle of least privilege can help to limit the damage from SQL Injection if the application fails to properly check input.
2015-12-28 (first published: 2011-04-12)
598 reads
This Friday Steve Jones has a poll about which SQL Servers might impress you. Is there a company or installation that you think would really showcase the power and scalability of SQL Server?
2015-12-25 (first published: 2011-05-06)
491 reads
A new series of attacks were proven recently using music files to attach embedded systems in cars. Could this be another attack vector that we need to worry about?
2015-12-22 (first published: 2011-03-23)
575 reads
Today we have a guest editorial from Andy Warren. We still have many applications runnning under sysadmin accounts, often "sa". Why do people do this? Andy has a few thoughts on the subject.
2015-12-21 (first published: 2011-05-04)
525 reads