Forum Replies Created

Viewing 15 posts - 5,221 through 5,235 (of 6,022 total)

  • RE: Data Gravity

    Most companies won't bother trying to avoid laws like this right now, but at some point in the future, the cost of moving an application to another country might be...

  • RE: Three Attack Vectors in SQL Server 2005

    SSIS connections should be using Windows authentication and use the encrypted option. However, you can at least try locating any .dtsConfig and .dtsx files and looking for properties called "ConnectionString".

  • RE: Best approach to let users create and manage their own tables and data

    Lynn Pettis (3/6/2012)


    agustingarzon (2/29/2012)


    ...

    This would be fool proof, and monitored by DBAs for performance problems, but this is just a small project.

    ...

    I find this part the toughest. There really...

  • RE: Best approach to let users create and manage their own tables and data

    Eugene Elutin (3/6/2012)


    I would go with Eric M Russell's suggestion:

    Kill the project!

    Give your users MS Access if they want to abe able to create tables themselves.

    Unless we're talking about...

  • RE: Zettabyte

    It's expected that this year the amount of data stored and replicated will get to 255EB,

    Yeah, but what percentage of that data consists of porn, spam, and fragmented indexes?

  • RE: SELECT to transform a csv of INT into VARCHAR

    Henk Schreij (3/5/2012)


    What I learned from this discussion is: there is no easy 'set based' solution to the problem of unwrapping a csv with sql.

    (a solution, like the other...

  • RE: Code Scanning

    Steve Jones - SSC Editor (3/5/2012)


    Eric M Russell (3/5/2012)


    So you're saying that the project requirements should include a document or Excel sheet that explicitly list what accounts / roles should...

  • RE: When to use Transparent Data Encryption (TDE)?

    kilkenny (3/5/2012)


    I think you nailed it on the head. And in that case, the only protection is in the collaboration processes and making sure that people are handling data...

  • RE: When to use Transparent Data Encryption (TDE)?

    kilkenny (3/5/2012)


    Thanks everyone for the great insight. It seems in our situation that TDE is the best solution, aside from the performance hit to the server. The reason being...

  • RE: Code Scanning

    Steve Jones - SSC Editor (3/5/2012)


    @eric, not knocking your process in terms of what it does. I'm more concerned with the issue of actually understanding what permissions are granted and...

  • RE: Code Scanning

    Steve Jones - SSC Editor (3/5/2012)


    Eric M Russell (3/5/2012)


    Databases have a much smaller surface area for security breaches than do Web applications. For a database, you're basically concerned with how...

  • RE: DBCC Transaction Logs - How to read/interpret

    GilaMonster (3/5/2012)


    Eric M Russell (3/5/2012)


    If you're thinking about implementing some solution that involves auditing events, then consider extended events.

    Though since this is the SQL 2000 forum, it needs mentioning that...

  • RE: DBCC Transaction Logs - How to read/interpret

    Klarence A. (3/1/2012)


    Hi Guys,

    How to read/interpret the transaction logs displayed by DBCC command? can I convert the records into human readable format? If so, how?

    Thanks in advance!

    If you're in some...

  • RE: Need an alternative way for using parameters in views

    mikemartineac (3/4/2012)


    Hello,

    In a stored procedure, I have a view as my data source. Unfortunately, views restrict the use of parameters. In my case, I need to get a value into...

  • RE: When to use Transparent Data Encryption (TDE)?

    Perry Whittle (3/4/2012)


    kilkenny (2/27/2012)


    My company has been getting a lot of requests from our clients to put into place more stringent security practices. I just received the word from...

Viewing 15 posts - 5,221 through 5,235 (of 6,022 total)