Forum Replies Created

Viewing 15 posts - 1,666 through 1,680 (of 6,105 total)

  • RE: The Value of Information

    Malcolm Daughtree (10/3/2007)


    And my last comment is, that if you don't what people to use it then don't publish it on a free and open forum, someone will read it...

  • RE: SSPI error context

    There are a variety of reasons for this error. Can you explain more about your setup (workstation / SQL Server on the same domain, Kerberos configured, etc.)?

  • RE: xp_cmdshell problems

    Under what user context does the VB app run (context of the user or as a service account)? How does it connect to SQL Server (SQL Server login/Windows authentication)?

  • RE: What is the procedures on transfering Logins

    I prefer to use the technique described in this Microsoft KB article:

    How to transfer logins and passwords between instances of SQL Server[/url]

    It'll ensure your SIDs match up, meaning you won't...

  • RE: SQL 2000 DB Encryption

    Here is an idea...

    Create views of the tables which do NOT reveal the columns. Grant access to the views. Revoke access to the tables for those users. It's the quickest...

  • RE: The Value of Information

    Blog readers are a separate animal entirely. In a lot of cases I'll be reading something in my blog reader and if I find it interesting that I want to...

  • RE: create logins without being in the securityadmin role

    Strommy (10/3/2007)


    I must say I am jealous. Mr. Kelly's solution is far easier and elegant. The only down-side is having to teach Enterprise Manager addicts how to use...

  • RE: create logins without being in the securityadmin role

    Ricardo (10/2/2007)


    Or simply can a user be allowed to create logins without being a member of the securityadmin role?

    If so, how do I do?

    In SQL Server 2000, there is no...

  • RE: GRANT EXECUTE for ALL stored procedures to User/Group

    Hans Lindgren (10/1/2007)


    Has anyone used this approach for enabling a user/group to be able to execute all SPs?

    The recommendation is to do so at the schema level. The reason for...

  • RE: Sleeping process...

    One thing to remember is that with pooling in effect, if you close a connection, the operating system is going to hold it open for a length of time (the...

  • RE: setup kerberos authentication for SQL Server 2000

    I don't believe SQL Server 2000 has a way to tell this. However if your local security policy is set up right (whether configured on the server or through a...

  • RE: How to identify a failover event ...

    You know, it might. The monitoring agents do for products like HP's set. I know SQL Server has a MIB that can be imported, but it's not actually something I've...

  • RE: Data mining

    Sure. Sit down with the folks who will actually use the system. Ask them, "From here, where would you typically go next?" and build the links accordingly. Sometimes giving them...

  • RE: Named Instances Through a Firewall

    If you are specifying a default instance, than the port 1433 doesn't need to be specified. The client should try to connect to that port by default. If the port...

  • RE: Connection to database using NT authenication outside of our network

    Not exactly. IIS is designed to take credentials, such as through basic auth and validate that to a Windows user account. SQL Server is not. You see issues like this...

Viewing 15 posts - 1,666 through 1,680 (of 6,105 total)