Viewing 15 posts - 1,381 through 1,395 (of 6,105 total)
Actually, that may not be the case. Some of the tools, can be run even without a full client installation, if they are copied over or accessed from a network...
November 23, 2007 at 9:12 am
In Books Online there is the CREATE TRIGGER topic. You'll be wanting the AFTER triggers (which fire after the query operation and do not interrupt it, unless you rollback everything...
November 23, 2007 at 9:04 am
Malcolm Daughtree (11/21/2007)
November 22, 2007 at 8:45 pm
Danny Springer (11/22/2007)
What is wrong with sp_change_users_login?
Nothing at all. However, if you can script out the logins and recreate them with identical SIDs, that saves you a tremendous amount of...
November 22, 2007 at 8:39 pm
noeld (11/20/2007)
Definitely was not expecting this much feed back. Apparenly Steve has a nack for "debates".Good one Steve!
Yup. Steve dumped some high-quality chum into the shark tank today. But...
November 20, 2007 at 8:07 pm
Yes, via a trigger. However, the trigger is considered part of that transaction so if the trigger fails and is rolled back, so is the original query.
November 20, 2007 at 6:07 pm
If the permissions are assigned to an app role, that app role must be activated via sp_setapprole. However, doing so causes the user's security context to become the app role...
November 20, 2007 at 6:05 pm
Have you built in any objects, such as stored procedures in the master database? If not, and all you have to move is the users, there are ways to do...
November 20, 2007 at 5:58 pm
The Permissions topic lists all the potential permissions in a useful chart. It includes permissions like ALTER TRACE (object: server, as previously mentioned) which you won't find in the Permissions...
November 20, 2007 at 5:49 pm
Unfortunately, no. When you go the linked server route because you've got to cross servers, you're going to have to use the four part naming convention.
EDIT: Actually, create a database...
November 20, 2007 at 5:33 pm
1) Does the SQL Server service account match the SQL Server Agent service account?
2) If so, have you followed the steps in Books Online under the section, "Configuring Mail...
November 20, 2007 at 5:29 pm
In the security arena we have a concept called Defense in Depth. It's a rather simple idea: have several layers of protection against a potential compromise.
For instance, having the...
November 20, 2007 at 5:19 pm
aureolin (11/19/2007)
And one place it can be helpful is if you have a system where you enter in an address. The system auto looks up using Full Text or some...
November 19, 2007 at 6:39 pm
Take a look at the EncryptByPassPhrase and DecryptByPassPhrase functions. The Books Online links (which have examples):
November 19, 2007 at 6:19 am
Make sure whoever you want to be the owner of the database doesn't already exist as a user of the database. If so, you'll have to delete the user mapping....
November 19, 2007 at 6:14 am
Viewing 15 posts - 1,381 through 1,395 (of 6,105 total)