2012-08-01 (first published: 2008-02-15)
3,207 reads
2012-08-01 (first published: 2008-02-15)
3,207 reads
2008-03-19 (first published: 2008-01-24)
3,568 reads
Longtime SQL Server guru David Poole brings us a look at one of the thorny problems a DBA faces: tracking down illicit users.
2008-01-15
7,895 reads
Learn how using basic SQL Server security practices of least privilege, delegated administration and separation of duties will protect SQL Server databases.
2008-01-09
3,806 reads
SQL Server 2005 provides four methods of encryption. Part one of this article covers encryption and decryption by passphrase.
2008-01-07
3,647 reads
Study encryption and hashing algorithm options for data security in SQL Server 2005 and use symmetric/asymmetric keys to encrypt and decrypt SQL Server data.
2007-12-25
3,463 reads
2007-11-29
2,691 reads
Learn how to reorganize permissions in SQL Server 2005 in a multiple database environment.
2007-11-29
3,160 reads
This script will produce the server login/role and db user/role in all databases in the server.It is best advised that you first delete/recreate orphaned users for best results
2008-01-25 (first published: 2007-11-27)
3,791 reads
2007-11-13
2,566 reads
By Steve Jones
I was looking back at my year and decided to see if SQL Prompt...
In the era of cloud-native applications, Kubernetes has become the default standard platform for...
By Steve Jones
I’ve often done some analysis of my year in different ways. Last year I...
Hi, below i show various results trying to reach our ftp site (a globalscape...
Comments posted to this topic are about the item Finding Motivation
Comments posted to this topic are about the item The Last Binary Value of...
What does this code return?
SELECT cast(0x2025 AS NVARCHAR(20))Image 1: