Viewing 15 posts - 1,621 through 1,635 (of 6,105 total)
I've been trying to find a case where the nt_username and loginame are both populated and different... and I haven't seen anything consistent. One thing to check is if they...
October 8, 2007 at 9:48 pm
One way in should be the SQL Server service account itself. If you have a local or domain account, you can login as it and that should give you sysadmin...
October 8, 2007 at 9:46 pm
DDL triggers can flag on schema changes. While there is an event for changing the membership of a role, this isn't something accessible via DDL triggers. However, you can create...
October 8, 2007 at 9:42 pm
One advantage mirroring has over clustering is it does not require a 3rd party solution to do a geographically dispersed high availability solution (having the data in more than one...
October 8, 2007 at 2:03 pm
Well, to be honest, it does sound like you do need some consulting on high-availability (is that why the consultants were in house?), if you don't already the expertise in...
October 8, 2007 at 12:59 pm
JuanBob (10/8/2007)
Thanks for the feedback, Brian. So, summing up your ultimate advice in this situation, would be to not use rowlock?!
It always depends. However, in general SQL Server can...
October 8, 2007 at 12:14 pm
The big question is how available does your SQL Server need to be? How much down time is acceptable? These questions go beyond database mirroring. Standard Edition with a witness...
October 8, 2007 at 12:10 pm
Keep in mind that for the pubs database, the guest user is enabled and has SELECT, INSERT, UPDATE, DELETE, and REFERENCES rights on all the tables. It also has the...
October 8, 2007 at 11:43 am
I agree with Steve here that a well-designed server trace is the way to go. C2 compliance mode is basically a server trace with almost everything toggled. My experience matches...
October 8, 2007 at 11:31 am
(nolock) allows for dirty reads... other users being able to see data before the transaction is completed. In general you don't want this (unless you know your app is transaction...
October 8, 2007 at 11:25 am
binu.ma (10/6/2007)
Can u help me how to do this in SQL 2000
As Noel pointed out, the article gives the registry keys for SQL Server 2000. As far as helping you,...
October 8, 2007 at 11:16 am
I wrote an article that covers how to use the back door:
SQL Server Security: Security Admins[/url]
There are new registry locations in SQL Server 2005, but if you take a look...
October 5, 2007 at 6:48 pm
One case you will need it is if all other members of the sysadmin fixed server role have been removed. In this situation, only the sa account is left available....
October 5, 2007 at 2:51 pm
kestack makes a good point. Your management now has a repudiation issue since folks have sysadmin access (and are knowingly abusing that access) because you can't prove "who did it."...
October 5, 2007 at 8:26 am
What network library are those connections being made with?
October 5, 2007 at 8:23 am
Viewing 15 posts - 1,621 through 1,635 (of 6,105 total)