Viewing 15 posts - 3,001 through 3,015 (of 6,105 total)
DBD :: ODBC (spaces are in place because it triggers a smiley) comes to mind, but you'll need an ODBC Driver Manager. Example here:
http://www.easysoft.com/products/9999/documentation/perl_tutorials/dbd_odbc_tutorial1.html
Another option would...
July 5, 2005 at 2:31 pm
How are they connecting (Enterprise Manager, app)? Are you sure they are providingt he correct connection information whether it be the dialog box or a connection string?
July 5, 2005 at 2:24 pm
Do this instead.
Create an IPSEC policy to block udp/1434 both inbound and outbound. If you do that, unless someone is doing a port scan on your SQL Server, they won't...
July 5, 2005 at 2:23 pm
From the information in the error log, no. You can run a trace (profiler or by using the stored procedures) and determine what the client is passing as a hostname....
July 5, 2005 at 2:19 pm
Are you running SQL Server 7.0 (prior to SP3)? If so, take a look at:
FIX: DBCC ShrinkDatabase or ShrinkFile Commands May Cause Errors 5042 and 3140...
July 5, 2005 at 2:17 pm
I've been bitten by the same problem and my behavior matches yours... I'll copy and paste to a side window for about a week after getting burned, but after that...
July 5, 2005 at 2:15 pm
Chris' suggestion to remove BUILTIN\Administrators will keep their Windows logins from getting through on the server itself and it's probably the best you can do. It also fits the 80/20...
July 1, 2005 at 7:21 am
That's why there is movement towards biometrics and one time pads like the secure tokens from RSA Security. There isn't a password to remember, per se, although there is usually...
June 24, 2005 at 10:24 am
As Rudy as pointed out, there is no capability for this. In SQL Server 2000 if I hold CREATE PROCEDURE rights, I can use the code originally developed by ShoeBoy...
June 24, 2005 at 10:19 am
Serveral security experts have theorized that at some point "the walls will come down." What I mean by that is traditional concepts of perimeter security will finally be laid to...
June 17, 2005 at 1:31 pm
Not disagreeing with you about sa. My original post indicated DBAs, per se, may be okay (although a virus attacking using Windows auth if the Windows account has sa privs...
April 25, 2005 at 11:29 am
There is a difference, though, when talking about the Windows world. For instance, the HTML-based email I receive in Outlook. Because of the fact that Microsoft uses the Internet Explorer...
April 25, 2005 at 10:25 am
Maybe for a DBA it's unnecessary, for someone holding domain admin privs, that's a different story entirely. Case in point: nimda.
If I'm running as a normal user account, think about...
April 25, 2005 at 9:15 am
If you have a sysadmin membered account, you can use NGSSquirrel or NGSSQLCrack from NGS Software (both commercial). Due to a weakness in the way they hash and store the...
April 18, 2005 at 8:49 am
Viewing 15 posts - 3,001 through 3,015 (of 6,105 total)