2022-07-18
448 reads
2022-07-18
448 reads
2022-04-22
468 reads
While analyzing SQL Server's network protocol, I came across a weird fact: when a database client logs in using SQL Server authentication (as opposed to Windows authentication), it has to send the user's password to the server, in blatant violation of common security guidelines. At first, I couldn't believe it; SQL Server generally does an […]
2022-03-02
5,557 reads
2021-10-18
384 reads
2021-10-11
339 reads
2021-10-04
484 reads
2021-06-23
491 reads
2021-06-21
559 reads
2021-06-07
564 reads
Greg Larsen continues his series and shows how user-defined roles roles can control SQL Server security.
2021-05-24
By Steve Jones
I coach volleyball and I do a lot of stat stuff on paper. I...
By Steve Jones
dolorblindness – n. the frustration that you’ll never be able to understand another person’s...
By Steve Jones
I had a customer ask about analyzing their Test Data Manager (TDM) usage to...
Is there a good syllabus for reading these two together? (Yes, it's called the...
Comments posted to this topic are about the item GPX distance and time analysis...
Comments posted to this topic are about the item The DBA is Dead; Long...
In SQL Server 2025, if I want to remove an IP from a listener, what do I do?
See possible answers