Viewing 15 posts - 46 through 60 (of 6,102 total)
Since you don't know what all was done, consider this server compromised (permanently). That means the OS and means the attacker could potentially come back in. Therefore, if possible, build...
April 2, 2014 at 1:41 pm
I don't think you're going to find a function with just distance. Maybe with a point. The reason I say this is in 2D space there would be two lines...
March 19, 2014 at 1:20 pm
Is there a reason to do this in SQL Server? Typically this sort of operation is best done in the application. For instance:
http://stackoverflow.com/questions/4763611/replace-multiple-words-in-string
March 19, 2014 at 1:09 pm
That's one of the reasons I like Tom LaRock's book and recommended it. Usually folks transition into a DBA position in an existing company or after a body of work...
March 19, 2014 at 6:36 am
Start with this book:
http://www.amazon.com/DBA-Survivor-Become-Rock-Star/dp/1430227877
It has good, practical advice on how to break into a DBA role and what you need to know once you get in one.
Also, it's SQL...
March 18, 2014 at 12:37 pm
It is possible to give you permission to create an object without giving you permission to touch the object. The most simplest way this can occur is by making you...
March 18, 2014 at 12:02 pm
GreenSQL is in the space for this. It sits between the app server and the database server. However, no solution is perfect.
Some IDS/IPS can help as well. But they'll...
March 18, 2014 at 11:55 am
If it's SQL Server 2008 or higher, use the Instance Name for the port. A Domain Admin will need to use setspn to put in the SPN:
March 18, 2014 at 11:51 am
patboner (12/18/2013)
We have quite a few Service accounts and...
December 18, 2013 at 8:32 am
Slevin (12/18/2013)
rstone (12/17/2013)
December 18, 2013 at 8:28 am
Slevin (12/17/2013)
EdgeOfKnowWare (12/17/2013)
SPNs (Server Principal Names) need to be generated for all servers involved. This can be automatic by giving the AD account that is used as the service...
December 17, 2013 at 11:48 am
rstone (12/17/2013)
We have a vendor that claimed they...
December 17, 2013 at 11:47 am
Slevin (12/17/2013)
K. Brian Kelley (12/17/2013)
December 17, 2013 at 8:17 am
Please use constrained delegation (selecting the 3rd option) if configuring Kerberos delegation. It's considered a significant security risk to use unconstrained delegation (where any server can be delegated).
December 17, 2013 at 6:45 am
It's interesting that you mentioned security because in order to use openrowset you're using a configured SQL Server that is likely less secure than it ought to be. Ad hoc...
December 16, 2013 at 9:00 am
Viewing 15 posts - 46 through 60 (of 6,102 total)