Stop SQL Injection Attacks Before They Stop You
This article discusses:
* How SQL injection attacks work
* Testing for vulnerabilities
* Validating user input
* Using .NET features to prevent attacks
* Importance of handling exceptions
This article discusses:
* How SQL injection attacks work
* Testing for vulnerabilities
* Validating user input
* Using .NET features to prevent attacks
* Importance of handling exceptions
One of the neatest T-SQL enhancements in SQL Server 2005 is the ROW_NUMBER() function. New author Charles Hawkins brings us an explanation of how you can use this function along with a Common Table Expression to remove duplicate data.
This whitepaper is intended to shed light on the issues affecting application performance in the wide area, and to give IT managers the knowledge required to design strategic enterprise application acceleration and deployment solutions
String manipulation is not one of the strong points of T-SQL, but there are some functions that can greatly assist you with searching and working with character values. New author Robert Davis brings us a look at PATINDEX, one of the search functions and also explains the differences between it and the often used CHARINDEX.
Should you use dynamic or static SQL in your SQL Server application? This is a hotly debated topic and Arthur Fuller brings his thoughts to this debate.
there are occasions in all of our working lives when sitting through a PowerPoint presentation is inevitable. Fortunately, there are techniques for feigning interest, many of which have developed over hundreds of years. All you need is a handful of like-minded colleagues with a sporting attitude
SQL Server 2005 brings us a number of enhancements, but the most important to T-SQL developers may be the changes to error and exception handling. The addition of the TRY CATCH structure is an important change and Raj Vasant brings us a look at this enhancement.
This paper describes how SQL Server 2005 can be used to support row- and cell-level security (RLS/CLS). The examples provided in this white paper show how RLS and CLS can be used to meet classified database security requirements.
Replication is a great tool, but it has a number of restrictions on what you can do with replicated databases. Typically you cannot easily move a replicated database, but our own Andy Warren brings us a technique that can get around this.
This article presents an excerpt from the book, Applied Microsoft Analysis Services, by Teo Lachev. Learn how to author “smart” reports using Reporting Services (SSRS), Analysis Services (SSAS), and SQL Server CLR stored procedures. Get the reports demonstrated in this article by downloading the sample code.
By Steve Jones
dolorblindness – n. the frustration that you’ll never be able to understand another person’s...
By Steve Jones
I had a customer ask about analyzing their Test Data Manager (TDM) usage to...
By Steve Jones
I had an idea for an animated view of a sales tool, and started...
Comments posted to this topic are about the item Optimism Without Illusion or Why...
Hi all, I'm trying to do classic scenario for loading multiple Excel files into...
Hi So the case statement is slowing this down - but for the life...
In SQL Server 2025, what is returned by this code:
SELECT EDIT_DISTANCE('tim', 'tom')
Assume preview features are enabled. See possible answers