Viewing 15 posts - 1,156 through 1,170 (of 6,105 total)
The approach is commonly referred to as "row-level security" when dealing with SQL Server and unfortunately, unlike Oracle, it requires a home grown solution.
The standard way is to create a...
May 28, 2008 at 10:37 am
The way this can be done is to use something called cross-database ownership chaining. It's a security "feature" which is turned off by default because of the risk if one...
May 28, 2008 at 10:33 am
As previously mentioned, you can't block Windows based logins from inside SQL Server. SQL Server-based logins can be blocked, but not Windows-basde ones.
The rule in SQL Server is if security...
May 28, 2008 at 10:26 am
Lynn,
which version is installed on the respective servers? McAfee, Symantec, Trend Micro, other?
May 28, 2008 at 10:20 am
Unless you are crossing domains when crossing servers, Windows SIDs should map just fine, provided the logins were created previously on the new servers. A good thing to do is...
May 28, 2008 at 10:16 am
And if it's a domain account, you'll need to use a tool like Active Directory Domain Users and Computers (usually abbreviated ADUC).
May 24, 2008 at 9:14 am
I'm not aware of any product out there that scans BLOBs. You can force most virus scanners to scan a particular file, however, so if you can have it written...
May 23, 2008 at 9:35 pm
Full Disclosure: I am a "Friend of Red Gate" and I've been a VIP for ApexSQL, meaning I've gotten the versions I have for free.
I use both Red Gate...
May 23, 2008 at 8:41 pm
You need to be connected via the DAC. As to the exact means, I'd suggest you Google for it. No offense, but that's not something I'd post in a forum....
May 23, 2008 at 8:38 pm
Another reason to be cautious with triggers is that any errors or rollbacks that occur in a trigger affect the entire transaction. Therefore, if your trigger is poorly written and...
May 23, 2008 at 8:35 pm
Yes, you can restore master and get it back without restoring the other databases. The catch is what else changed since that backup?
Another option would be to try and...
May 23, 2008 at 8:30 pm
The group ensures that any member of that group can connect to the server. Typically groups will then be used to grant access into the database. However, it doesn't have...
May 23, 2008 at 8:25 pm
Agreed. When I was writing all the time on security, my later articles started including a section called references. My point for including those links was to give folks more...
May 23, 2008 at 8:16 pm
Are there any interesting events in either the SQL Server error log or the system's application event log?
May 21, 2008 at 7:52 am
Viewing 15 posts - 1,156 through 1,170 (of 6,105 total)