Reorganize permissions in SQL Server 2005 step by step
Learn how to reorganize permissions in SQL Server 2005 in a multiple database environment.
2007-11-29
3,160 reads
Learn how to reorganize permissions in SQL Server 2005 in a multiple database environment.
2007-11-29
3,160 reads
This script will produce the server login/role and db user/role in all databases in the server.It is best advised that you first delete/recreate orphaned users for best results
2008-01-25 (first published: 2007-11-27)
3,781 reads
2007-11-13
2,563 reads
2008-01-04 (first published: 2007-10-27)
909 reads
The Advanced Encryption Standard (AES) is a National Institute of Standards and Technology specification for the encryption of electronic data. It is expected to become the accepted means of encrypting digital information, including financial, telecommunications, and government data. This article presents an overview of AES and explains the algorithms it uses. Included is a complete C# implementation and examples of encrypting .NET data. After reading this article you will be able to encrypt data using AES, test AES-based software, and use AES encryption in your systems.
2007-10-19
2,427 reads
The Sarbanes-Oxley act has changed many IT jobs, usually requiring more work and documentation. Johan Bijnens brings us a list of some things his team has had to do to comply with SOX regulations.
2007-10-02
5,725 reads
This article discusses: How SQL injection attacks work, Testing for vulnerabilities, Validating user input, Using .NET features to prevent attacks, and Importance of handling exceptions
2007-09-19
4,869 reads
A patch to your SQL Server system can cause problems, but an unpatched SQL Server is unprotected. Learn the pros and cons of SQL Server patches.
2007-09-04
3,000 reads
Auditing is something that almost every DBA needs to tackle at some point in his or her career. David McKinney brings a new twist on the solution by using XML and XSL to help implement auditing in your SQL Server application.
2007-08-20
5,155 reads
This article discusses: How SQL injection attacks work, Testing for vulnerabilities, Validating user input, Using .NET features to prevent attacks, Importance of handling exceptions
2007-08-09
2,954 reads
pg_cron is a simple cron-based job scheduler for PostgreSQL that runs inside the database...
By Steve Jones
I heard someone say recently that you can’t change a primary key value in...
By Kevin3NF
Indexes 101: What, Why, and When? “What Is an Index?” I get this question...
Wondering how others keep track of the purpose for SQL Logins? I'm not talking...
Upgrading an instance of SQL Server 2019 to SQL Server 2022 - I am...
SQL Server SSRS 2022. Running into ' SSL Provider, error: 0 - The target...
How can I check what value I used for TEXTSIZE? I ran this code:
SET TEXTSIZE 8096But then deleted the code and couldn't remember. Is there a way to check this? See possible answers