Forum Replies Created

Viewing 15 posts - 1,411 through 1,425 (of 6,105 total)

  • RE: Complex Data Structs stored as image files

    Do you have access to the struct definition itself? If so, this can probably be scripted out.

  • RE: Foreign keys good or bad practice?

    aureolin (11/16/2007)


    I respectfully disagree. (et. al.)

    Y'all are certainly welcome to. And, as long as you're working in a nice, sterile environment, you'll have a lot of success. But, let's take...

  • RE: 2005 Standard (x64) memory problems

    You might private mail Jeremy. He has the charts and performance stats to back up what he is saying.

  • RE: Foreign keys good or bad practice?

    I respectfully disagree. Properly designed, constraints do not impact usability. In the case of dirty data, if the data is ambiguous, how do you establish relationships based on it? The...

  • RE: 2005 Standard (x64) memory problems

    A friend of mine, Jeremy Brown on here, ran into this in production a few months back. Here's what they did to fix the issue:

    - Configure the SQL Server service...

  • RE: Triggers with Cycle IF

    A trigger fires on a SQL operation. Therefore, a trigger could be handling multiple rows, not just one. So you must take that into account.

    When a trigger fires, two special...

  • RE: SQL Server 2005 Logins

    The DMV sys.server_principals contains basic information on all logins. That should give you the information you need from a SQL Server perspective with respect to domain accounts. If you need...

  • RE: a timed query

    jon pill (11/16/2007)


    I dont chart in excel i chart in a charting package built for realtime data from the stockmartet, excel is just a medium for referencing data

    And most financial...

  • RE: Schema's

    Use a proxy account with only the rights necessary to complete the job. The schema doesn't really help you in this context.

  • RE: Finding a Balance

    Peter Schott (11/16/2007)


    Steve Jones - Editor (11/16/2007) People don't respect security when it's a pain and it gets in their way. They don't see the risk of something happening as...

  • RE: Finding a Balance

    Bob Hoffman (11/16/2007)


    Simple technology solution:

    Use only NT Terminal Server as your network OS with users getting only thin clients.

    Can you say privilege escalation attack? And once I escalate to admin,...

  • RE: Finding a Balance

    Stephanie J Brown (11/16/2007)


    As a for instance, the military bans camera phones on base, but at my company there is not a real need to do so (note, someone could...

  • RE: Finding a Balance

    Sir Slicendice (11/16/2007)


    I'm sure that if worked at it I could have built a small bit of code to generate a gif with a set of high-density bar codes, which...

  • RE: Data encryption using Certificates and Backups

    The database master key and all certificates, symmetric, and asymmetric keys do travel with the backup. However, usually you have to know the password to decrypt the database master key....

  • RE: Finding a Balance

    rudy komacsar (11/16/2007)


    Locks only keep honest people out.

    No, they keep out the curious and in the case of an attacker who is looking for easy prey, they keep those guys...

Viewing 15 posts - 1,411 through 1,425 (of 6,105 total)