Viewing 15 posts - 1,336 through 1,350 (of 1,492 total)
We tend to have alerts generated on failures out of the Windows Event log.
For example, Event 12288 indicates the start of one of our SSIS Packages, Event 12289 indicates...
February 26, 2009 at 7:52 am
Do you have a Reporting Services instance somewhere? That might be the easiest solution - a scheduled report.
Importing data could be done too - an Auto_Open macro comes to mind.
And...
February 24, 2009 at 7:14 am
See if this helps.
Greg E
http://windowsitpro.com/article/articleid/98671/managing-stored-credentials.html
http://netsecurity.about.com/od/quicktips/qt/iestorepassword.htm
February 24, 2009 at 6:50 am
Crazy and Evil.
Eventually you may post out of being Crazy.
That could leave you just plain evil. No wonder you scare the heck out of everyone.
Greg E
February 20, 2009 at 2:09 pm
You're welcome. Lots of good discussion from all.
Greg E
February 13, 2009 at 6:39 am
The Agent - a Domain User allows easier permissions to resources not on the server. Say you generate a report and save to a fileshare.
Browser - may want to see...
February 11, 2009 at 7:09 am
Or for a surgeon...
"I accidently removed the wrong limb, what should I do?"
I can remember having to write "No" on my left shoulder before going in for surgery on my...
February 10, 2009 at 1:49 pm
ProClarity was acquired by Microsoft about 2 years ago.
Not sure if you can even get ProClarity anymore. It is being transistioned into PerformancePoint. Here's a link to the trial, although...
February 10, 2009 at 1:35 pm
We run in mixed mode, mostly due to some legacy apps. You could probably still install / run as Network Service or Local System, even with Windows Authentication only checked....
February 9, 2009 at 2:33 pm
VEB (2/4/2009)
If a domain account is compromised, the domain is affected; if a local account is compromised, only a single machine is affected.
Keep in mind that if the same...
February 9, 2009 at 8:55 am
I setup Kerberos, so I use a Domain User account.
Part of your choice depends on if you run applications (SQL Server, Analysis Services, Reporting Services, IIS websites, etc) on...
February 9, 2009 at 8:17 am
We set up the normal exclusions - some by file extension, some by directory exclusion. And then do a full scan over the weekend maintenance window.
Seems like a common compromise.
Running...
February 9, 2009 at 7:23 am
It looks to me like someone might be trying to give you a real life example of SQL Injection.
Hopefully this machine is not internet facing and has been properly secured...
February 6, 2009 at 6:36 am
Dan English (1/26/2009)
February 5, 2009 at 10:22 am
Bruce W Cassidy (1/29/2009)
Greg Edwards (1/29/2009)
I'd say that depends on if you got the correct results.:w00t:
[font="Verdana"]Yup. I added a cross join as well. And the full outer joins...
January 29, 2009 at 7:25 pm
Viewing 15 posts - 1,336 through 1,350 (of 1,492 total)