Pop Rivett's SQL Server FAQ No.5: Pop on the Audit Trail
Pop provides a cunning, trigger-based technique for auditing the activity on SQL Server tables
2007-01-09
2,668 reads
Pop provides a cunning, trigger-based technique for auditing the activity on SQL Server tables
2007-01-09
2,668 reads
Security has become more and more important in today's business environment. From the database point of view, DBAs and system administrators need an improved security model. SQL Server 2005 provides an improved security feature. It is claimed that SQL Server 2005 is secure by default. In SQL Server 2005, the security model is divided into three areas namely authentication, authorization, and encryption.
2006-12-29
2,741 reads
2006-12-21
953 reads
All good detective stories have a femme fatale. In the case of corporate espionage scandals, Celia Goodson, a seasoned businesswoman and once a glossily groomed blonde, has been involved in investigating more business transgressions to hit the City in the last three decades than anyone else of her years.
2006-12-21
2,627 reads
We'll go over some examples of attacks against protocols and rules following, which will help you when designing and implementing protocols of your own.
2006-12-19
1,808 reads
2006-12-18
1,213 reads
In this article I will discuss some new ideas that can result in either modifying SQL statements or injecting SQL code even if the code has escaped the delimiting characters. I will start with some best practices for constructing delimited identifiers and SQL literals, and then I'll show you new ways attackers can inject SQL code in order to help you protect your applications.
2006-12-14
4,373 reads
The suggested method illustrates a way how such tampering by an authorized user can be detected. While this method doesn't provide tamper-prevention measures, but as there is no such thing as ultimate security, detection of such tampers will help maintaining the integrity of information in a great way
2006-12-12
2,407 reads
There are quite a few changes in SQL Server 2005 and many of those relate to security. Did you know the sa account can be disabled by default? Longtime author Raj Vasant brings a basic look at connecting and authenticating in SQL Server 2005.
2006-11-14
4,126 reads
Arthur Fuller advises DBAs to try to break their software in order to make sure their SQL Server databases can withstand potential attacks. See if your code can hold up to his suggested tests.
2006-10-12
3,499 reads
In this step-by-step tutorial, learn how to run MySQL, PostgreSQL, MongoDB, and other stateful...
By Steve Jones
The 11th episode is now live, recorded a few weeks ago at the PASS...
By Steve Jones
mornden – n. the self-container pajama universe shared by two people on a long...
Hi everyone My SSIS package does a bulk insert of csv files into a...
Dipping my toes into the waters of Azure and of course before I get...
Can you run this code in any of your SQL Server 2019 databases without error?
CREATE OR ALTER PROCEDURE [dbo].[StevesAmazingProc] AS SELECT Consumer_ID , Trend_Category , Bit_Trace FROM NewWorldDB.dbo.MarketTrend; GOSee possible answers