Forum Replies Created

Viewing 15 posts - 466 through 480 (of 6,034 total)

  • Reply To: Timing is Everything

    Most phishing scams are automated and impersonal, while other scams hit closer to home. For example, last year my grandmother got a call from a guy pretending to be me....

  • Reply To: Timing is Everything

    Sadly, there are some crooks directing folks to fake Equifax settlement websites.

    https://www.consumer.ftc.gov/blog/2019/07/equifax-data-breach-beware-fake-settlement-websites

     

     

  • Reply To: better DB Design tools?

    I'm guessing you're talking about a database modeling or entity relationship diagram (ERD) tool. I don't know of an extension for SSMS or Visual Studio, but there is a tool...

  • Reply To: Attacks Using Attacks

    When it comes to hacks against corporate or government targets, it is entirely plausible that in many cases the public disclosure itself is of more importance to the hacker than...

  • Reply To: The Aware DBA

    Steve Jones - SSC Editor wrote:

    .. The downside of chaining to slack and then Pagerduty is that is Slack is down, what happens? It's not often Slack goes down, but with my prior luck,...

  • Reply To: SSISDB is in recovery

    I believe you have two issues:

    (1) Your SSIS package(s) are probaly logging a tremendous amount of event detail.

    (2) The above has caused your SSISDB database to swell and then the...

  • Reply To: Are Synonyms Useful?

    Synonyms can be useful for whomever created them, but confusing for others who stumble across them by accident. It depends on the purpose, but I prefer views instead.

  • Reply To: The Aware DBA

    Yes, setting up an event monitoring solution is phase 1. The next phase is setting a solution for alerting, collaboration, triage, and incident workflow. Historically, we had error and threshold...

  • Reply To: Deny Permissions to Schema Owner (assign read only) and deny to Linked Servers

    If this user is to have only reader access going forward, then I would suggest changing the owner of the schema to someone else, like DBO.

    ALTER AUTHORIZATION ON SCHEMA::schema_name TO...

  • Reply To: The Problem with Users

    I guess the problem with users as it relates to security and deployments would be that: if a process is not simple, then they won't follow it. So the solution...

  • Reply To: More MVPs Than Awards

    Just out of curiosity, how does Microsoft inform someone they have been awarded MVP status?

  • Reply To: An Age of AI?

    Back in the 1950s, it was predicted that mass produced frozen TV dinners would enable most Americans to purchase homes without kitchens and restaurants would be obsolete. While technically possible,...

  • Reply To: The Changing Nature of Data

    One design pattern is to separate the PII database from the operational database using a service oriented architecture and that PII database could even be hosted by a 3rd party...

  • Reply To: The Changing Nature of Data

    For a highly selective and sensitive database, something  like AIDS patients or voter records, address should be protected. Not only can it be used in conjunction with other public databases...

  • Reply To: Ransomware and DevOps

    So, how is it possible that an employee (even an IT administrator) clicking on an executable attachment can somehow wipe out the bulk of the organization's databases, network file shares,...

Viewing 15 posts - 466 through 480 (of 6,034 total)