Viewing 15 posts - 436 through 450 (of 6,105 total)
Melton (10/2/2009)
Now this timestamp does not mean that SQL Server was the last thing they...
October 2, 2009 at 5:41 pm
SQL Serer does not keep track of when a login last connected. You'd have to come up with a different way to track that (logon trigger, trace, etc.). As far...
October 2, 2009 at 2:46 pm
SequelDBA (10/1/2009)
October 2, 2009 at 2:12 pm
pclemares (7/3/2009)
I have a Sql 2000 and I'd like to migrate to sql 2005. The problem I have it's that on the Sql 2000 I have the password of SA...
October 2, 2009 at 2:11 pm
If you have the option, pull the web server off the wire and begin a proper forensics investigation ASAP. If it's coming from a web server using a known login...
September 28, 2009 at 8:31 pm
You can add Application Name and Hostname to the columns you're reporting on. Unless those have been hacked (and they can be), that should tell where, what app, and the...
September 28, 2009 at 6:18 pm
Elliott W (9/28/2009)
September 28, 2009 at 6:15 pm
You might be able to tell if the information is still in the default trace. If you've got SSMS and you've got it patched to at least SP2 (where Reports...
September 28, 2009 at 9:07 am
Hanging the SQL Server in the DMZ brings up other issues, like how to get backup files off, how to patch, etc. so I'd stick with the SQL Server on...
September 25, 2009 at 5:11 pm
Your risk team is approaching such access incorrectly based on a full understanding of Windows authentication and Active Directory. Here's the best way to approach it:
- All access within SQL...
September 23, 2009 at 8:13 am
Elliott W (9/22/2009)
September 22, 2009 at 3:51 pm
John,
get Kevvie Fowler's book. It will tell you everything you need to know and he handles chain of custody, etc., in his treatment of what to do.
September 22, 2009 at 11:17 am
Because you're consuming memory and resources intended for the SQL Server process, 1, and 2, it means your SQL Server service account doesn't have to have special privileges within the...
September 22, 2009 at 11:13 am
Use scripts or custom applications to do this, don't originate it from SQL Server (speaking as both a SQL Server DBA and a former directory services administrator). If you're using...
September 22, 2009 at 8:33 am
tafountain (9/21/2009)
Thanks for the response. I actually have a couple of scenarios to address:
- company employees using company owned laptops that connect via a normal VPN
- offshore development teams...
September 22, 2009 at 8:26 am
Viewing 15 posts - 436 through 450 (of 6,105 total)