MS15-058: Vulnerabilities in SQL Server could allow remote code execution
A vulnerability has been released that can affect SQL Server 2008, 208 R2, 2012, and 2014.
2015-07-15
5,806 reads
A vulnerability has been released that can affect SQL Server 2008, 208 R2, 2012, and 2014.
2015-07-15
5,806 reads
Consider a situation when you have a large number of databases on your SQL Server, and you are requested to grant user access to all SQL Server databases. How can you grant access to a user for all databases on a SQL Server instance?
2015-06-30
5,795 reads
2015-05-29
1,371 reads
2015-05-21
1,249 reads
It is no good doing some or most of the aspects of SQL Server security right. You have to get them all right, because any effective penetration of your security is likely to spell disaster. If you fail in any of the ways that Robert Sheldon lists and describes, then you can't assume that your data is secure, and things are likely to go horribly wrong.
2015-05-13
9,527 reads
Sometimes you need to reach outside a database and access data and objects from multiple databases, which raises some security issues and increases the complexity of data access. In this stairway level, you’ll learn about cross-database ownership chaining so that you can reach across database boundaries securely.
2024-05-08 (first published: 2015-04-08)
11,069 reads
2015-03-25
1,766 reads
2015-03-19
1,977 reads
2015-02-10
1,638 reads
2015-02-09
1,614 reads
By Brian Kelley
I picked up Never Split the Difference: Negotiating As If Your Life Depended On...
With the PBIR format of Power BI reports, it’s much easier to make report...
By Steve Jones
As we close out the year, I decided to drop this post here and...
Comments posted to this topic are about the item The Oldest Article
Comments posted to this topic are about the item Happy New Year 2025
How does this capture multiple values from a cursor, and put them into an...
What's the oldest article on SQL Server Central (take a guess)?
See possible answers