Viewing 15 posts - 271 through 285 (of 814 total)
sbamaty (3/11/2013)
I don't think any file transfer utility/software automatically encrypts the file during file transfer process. Vendor/provider needs to encrypt it.
SFTP does that (see MIT licensed PuTTy's PSFTP client)...
March 11, 2013 at 12:25 pm
Thank you for the article!
In addition to the howto article, I would recommend making sure everyone is fully aware that nothing in FTP is encrypted - the data transferred is...
March 11, 2013 at 9:18 am
Revenant (3/4/2013)
Gary Varga (3/4/2013)
. . . As a community we want better products and know that our collective opinions and knowledge count.
Microsoft has people who "own this line of communication."...
March 6, 2013 at 8:51 am
paul.knibbs (3/6/2013)
SQLCharger (3/6/2013)
Guys,Would this also work with Windows hashes as well?
That would be even more scary (if someone manages to get your Windows hash from a server). :unsure:
There's no reason...
March 6, 2013 at 8:06 am
As a note for the mildly more advanced, in general, it's best to run the very quick checks first to remove those, and the large checks later.
For the even more...
March 5, 2013 at 4:32 pm
Larger files should be sent electronically by (S)FTP(S), or if you must, put on a web site.
Alternately, burn them to a CD, DVD, BD, or write to an external hard...
March 4, 2013 at 10:31 am
I agree that Connect has at most one use: For those Connect items where someone from Microsoft has said "No, we're not fixing it", you can see that you're hosed...
March 4, 2013 at 10:28 am
Excellent post on brute forcing using oclhashcat-lite - everyone, please be aware that dictionary and rules-based dictionary attacks are also available in GPU-powered form with these excellent tools.
For everyone worried...
March 4, 2013 at 10:10 am
Jeff Moden (2/25/2013)
Who's got a CLR arbitrary precision library for SQL Server?
BWAAAA-HAAAA!!! SQL Server is a very small park for these types of things. That brings me back...
February 26, 2013 at 8:42 am
Jeff Moden (2/16/2013)
If we're going to do this, let's knock the problem right out of the park.
...
We also come to the understanding that we can't directly calculate more than the...
February 25, 2013 at 2:35 pm
Yes, SSD's (and SSD's in RAID configurations) are indeed still faster for sequential access than they are for random access (significantly, in the case of writes, slightly in the case...
February 25, 2013 at 2:23 pm
Very interesting.
Did you install that on a corporate-specific OS instance/deployment? If so, and if you have an MSDN license, you could try to create a development machine/VM with absolutely...
February 25, 2013 at 2:07 pm
Note that if you move the hashed_passwords over, you're using the old SQL 2005 (0x0100) type password hashes SHA1(Binary(UCS2(Password+Salt))), not the newer, very slightly better SQL 2012 (0x0200) type password...
February 25, 2013 at 1:59 pm
Gail beat me to the "change to Full recovery model and do Log backups instead" option.
As far as your proposed "full after each snapshot" option, you can try looking at...
February 21, 2013 at 10:16 am
The above poster is correct; here's something with that same data plus a bit more.
Note there are two columns (qs.query_hash and qs.query_plan_hash) useful only on 2008+ in the GROUP BY...
February 19, 2013 at 9:52 am
Viewing 15 posts - 271 through 285 (of 814 total)