Viewing 15 posts - 1,141 through 1,155 (of 6,105 total)
What is typically frowned upon are ad hoc distributed queries.
Ad Hoc Distributed Query Option
The reason this type of access is typically bad is it could potentially allow a user to...
May 31, 2008 at 2:55 pm
SQL Server only supports what the Windows operating system supports (and this only started in SQL Server 2005). Neither the operating system nor SQL Server supports increased delays in logging...
May 31, 2008 at 2:44 pm
Are they coming in with accounts that are in some way members of the sysadmin fixed server role? Either directly, or through a group, this is possible. For instance, BUILTIN\administrators...
May 31, 2008 at 2:39 pm
This is one of the reasons that we typically ensure the accounts that manage security and the like have master set as the default database. I've faced this same problem...
May 31, 2008 at 2:36 pm
On SQL Server 2005 SP2 you can track login activity (when they connect) using Login triggers. Otherwise, your only option is, as previous stated, using SQL Server Profiler or a...
May 31, 2008 at 2:35 pm
If you log in with a different account you see the rest of the databases, etc.? Hrm, I've not seen that one before. What happens if you open up a...
May 29, 2008 at 8:37 am
It sounds like he granted EXECUTE rights against the dbo schema. If so, you'll need to check the permissions on the schema itself. If you are using SQL Server Management...
May 29, 2008 at 8:34 am
NGS has SQuirreL for SQL Server which will do password recovery on SQL Server 2000. It uses the algorithm they developed and put into NGSSQLCrack, which is a separate product....
May 28, 2008 at 8:49 pm
In general, SQL Server runs as a Windows service. It stops the same as any other controllable service, such as IIS Admin, WWW Publishing Service, etc. As to what else...
May 28, 2008 at 8:39 pm
John Ranger (5/28/2008)
May 28, 2008 at 8:36 pm
Is the BUILTIN\Administrators group still a member of the sysadmin fixed server role?
May 28, 2008 at 8:30 pm
How is the user coming into the database? Through an application? Using a service account?
May 28, 2008 at 8:26 pm
I like Matt's solution a lot because it ensures you don't have multiple instances of the AV engine running to do scans. Of course, I've never been a big fan...
May 28, 2008 at 8:24 pm
If you're talking about for customers who have servers which you have no control over, you can't. That's the bottom line. As you indicated, even if you use encryption, they...
May 28, 2008 at 10:48 am
Piggy-backing on what's already been said here:
Introduce your users to The Principle of Least Privilege. It's a security principle that says you give the users the rights they need and...
May 28, 2008 at 10:44 am
Viewing 15 posts - 1,141 through 1,155 (of 6,105 total)