Viewing 15 posts - 3,286 through 3,300 (of 6,105 total)
Yes, you can develop a row-level security solution through the use of a view. Vyas Kondreddi has a good explanation about how to go about this:
December 30, 2004 at 11:14 am
Yes, SQL Server, especially 2000, does try to parameterize ad hoc queries and store the execution plan. If there is enough memory, then the execution plans will stick around for...
December 30, 2004 at 11:10 am
Agreed, go with a UDF or do the encrypt/decrypt at the application level. There is no built-in capability within SQL Server 2000 without resorting to custom code or a 3rd...
December 30, 2004 at 11:05 am
Windows EFS is the only fully Microsoft supported solution that I am aware of. Basically, recovery is the same as with any deployed EFS solution. You won't find anything specific...
December 22, 2004 at 8:30 am
In order to get this information, your going to have to put a script together because there aren't any already provided system stored procedures.
Sysusers in each database ties to syslogins...
December 22, 2004 at 8:26 am
SQLPing2 from Chip Andrews. It is the first tool listed on the following page:
December 22, 2004 at 8:17 am
Jumping on the bandwagon here... Ethereal is far and away the best free one out there that I've seen. The latest version may be in beta, but Ethereal has been...
December 22, 2004 at 8:14 am
Nice article and another way to handle cluster operations. I can see advantages to putting together a custom interface for an operations staff rather than having them rely on command...
December 7, 2004 at 2:44 pm
I would agree, Frank, but I had nothing to do with it, honest!!! Every so often they re-schedule some of the older articles and I guess it was my time....
November 19, 2004 at 11:22 pm
And you can connect to the SQL Server on other computers without a problem? Can you connect to other SQL Servers from your computer?
November 15, 2004 at 1:29 pm
The use of ; is prevalent in several database platforms to separate what we call batches in SQL Server lingo. It's a problem child because if I can insert a...
October 29, 2004 at 3:27 pm
You are correct that if you granted SELECT you don't need cross-database ownership chaining. Understandably, you don't want to grant the SELECT.
Keep in mind an ownership chain only forms when...
October 29, 2004 at 2:25 pm
There are quite a few tools out there, like ApexSQL Edit which has source control features built-in, similar to Visual Studio. Of course, there are some simpler (cheap solutions). Steve...
October 28, 2004 at 7:43 pm
Yes, it can work, but the guest user must be enabled in the second database.
When you use application roles, you lose all previous server login and database user information....
October 28, 2004 at 7:35 pm
Hide server moves the default instance from tcp/1433 to tcp/2433, a different port. It does also prevent it from being seen whenever someone tries to look at what servers are...
October 27, 2004 at 7:12 am
Viewing 15 posts - 3,286 through 3,300 (of 6,105 total)