Viewing 15 posts - 256 through 270 (of 814 total)
The best syntax for multiple files is to zip them first, and then gpg the zipped single file :).
Note that if you're dealing with U.S. government standards, DSA/ElGamal keys are...
April 9, 2013 at 8:36 am
First, Evernote's customer service response was indeed excellent! Not only owning up to the breach, but also forcing a password reset is good. Forcing a password reset with...
March 26, 2013 at 10:50 am
To capture activity that happened yesterday, today, please look up DBCC TIMEWARP. Be certain to study the clarification on the 13th parameter:
http://www.sqlservercentral.com/Forums/FindPost866665.aspx
Alternately, generate a trace to capture only what...
March 21, 2013 at 2:06 pm
I usually have to use:
setspn -A MSSQLSvc/Servername.Domain.TopLevelInternalDomain:PortUsually1433 Domain\ADServiceAccount
March 21, 2013 at 8:43 am
I also had to think about DML vs. DDL, because TRUNCATE is more or less equivalent to:
DELETE FROM + Reset Identity
and
DROP TABLE(etc.) + CREATE TABLE(etc.)
For me, the clincher was the...
March 21, 2013 at 8:40 am
Point of order: in 1983, 30 years ago, we were using 1.2MB 5.25" DS floppies, and 720KB 3.5" DS floppies.
1.44MB floppies didn't show up until 1986, so they're only 27...
March 21, 2013 at 8:33 am
Martin Stephenson (3/18/2013)
I will however need to re think the whole approach as for...
March 20, 2013 at 4:00 pm
Make sure you get your physical hardware folks to check out the storage. A RAID controller cache battery going bad can cause the RAID card to disable its [write]...
March 20, 2013 at 3:55 pm
pehlebhiayatha (3/19/2013)
Currently we don’t have multiple devices or any third party tools to backup the large databases. I read in article if we strip the backup files to multiple .bak...
March 20, 2013 at 3:46 pm
Have you checked the physical layer - are they all actually getting gigabit data transfer rates (try a Windows Explorer file copy) if you're restoring over the network.
Check the actual...
March 20, 2013 at 3:35 pm
umailedit (3/19/2013)
Not so many with SHA-1 or one of the SHA-2 family with 100 rounds, either. You're not arguing for encryption vs. hashing, you're arguing for enough rounds to take...
March 19, 2013 at 8:17 am
Antares686 (3/18/2013)
March 18, 2013 at 9:27 am
umailedit (3/18/2013)
Not sure I agree. Plenty of people recommend using one-way hashes for passwords: http://stackoverflow.com/questions/2549988/whats-the-recommended-hashing-algorithm-to-use-for-stored-passwords
One way hashing can be done using encryption algorithms instead of hashing algorithms. You...
March 18, 2013 at 9:24 am
On a separate note, there is a significant desire amount the non-security development community to either write their own algorithm, or to "tweak" an existing algorithm. Both of these...
March 17, 2013 at 7:52 pm
umailedit (3/16/2013)
You should never use hashing algorithms to store password. ...
March 17, 2013 at 6:53 pm
Viewing 15 posts - 256 through 270 (of 814 total)