Viewing 15 posts - 1,411 through 1,425 (of 6,105 total)
Do you have access to the struct definition itself? If so, this can probably be scripted out.
November 16, 2007 at 7:57 pm
aureolin (11/16/2007)
I respectfully disagree. (et. al.)
Y'all are certainly welcome to. And, as long as you're working in a nice, sterile environment, you'll have a lot of success. But, let's take...
November 16, 2007 at 5:58 pm
You might private mail Jeremy. He has the charts and performance stats to back up what he is saying.
November 16, 2007 at 4:05 pm
I respectfully disagree. Properly designed, constraints do not impact usability. In the case of dirty data, if the data is ambiguous, how do you establish relationships based on it? The...
November 16, 2007 at 1:24 pm
A friend of mine, Jeremy Brown on here, ran into this in production a few months back. Here's what they did to fix the issue:
- Configure the SQL Server service...
November 16, 2007 at 12:45 pm
A trigger fires on a SQL operation. Therefore, a trigger could be handling multiple rows, not just one. So you must take that into account.
When a trigger fires, two special...
November 16, 2007 at 12:28 pm
The DMV sys.server_principals contains basic information on all logins. That should give you the information you need from a SQL Server perspective with respect to domain accounts. If you need...
November 16, 2007 at 12:16 pm
jon pill (11/16/2007)
I dont chart in excel i chart in a charting package built for realtime data from the stockmartet, excel is just a medium for referencing data
And most financial...
November 16, 2007 at 12:14 pm
Use a proxy account with only the rights necessary to complete the job. The schema doesn't really help you in this context.
November 16, 2007 at 11:18 am
Peter Schott (11/16/2007)
Steve Jones - Editor (11/16/2007) People don't respect security when it's a pain and it gets in their way. They don't see the risk of something happening as...
November 16, 2007 at 11:17 am
Bob Hoffman (11/16/2007)
Simple technology solution:Use only NT Terminal Server as your network OS with users getting only thin clients.
Can you say privilege escalation attack? And once I escalate to admin,...
November 16, 2007 at 11:12 am
Stephanie J Brown (11/16/2007)
November 16, 2007 at 9:12 am
Sir Slicendice (11/16/2007)
November 16, 2007 at 8:39 am
The database master key and all certificates, symmetric, and asymmetric keys do travel with the backup. However, usually you have to know the password to decrypt the database master key....
November 16, 2007 at 8:23 am
rudy komacsar (11/16/2007)
Locks only keep honest people out.
No, they keep out the curious and in the case of an attacker who is looking for easy prey, they keep those guys...
November 16, 2007 at 8:20 am
Viewing 15 posts - 1,411 through 1,425 (of 6,105 total)