Viewing 15 posts - 16 through 30 (of 42 total)
.. much like gTalk's "Off the record"
my coworkers have posited that it means "revoke my access to" and that status makes it generally more interesting for NSA, or google's AI,...
February 24, 2010 at 8:36 am
Why wasn't this failure mode disclosed? It seems obvious to me that properly designed software could have allowed retrieval without allowing storage after the license expiration. It is...
January 20, 2010 at 5:25 am
I think the value of random move is for illustrative purposes.
I think the value of "wall at center" also illustrates a full permutation test. That we can observe the...
January 15, 2010 at 9:46 am
Consider what the data ON the server is worth. Desktop hardware is so cheap its marginal cost is almost irrelevant compared to the software licenses for the OS, MS...
January 15, 2010 at 7:25 am
"awesome" - you did an excellent job of making genetic algorithms approachable
I would like to implement this kind of problem solver to our real world situation. What I...
January 14, 2010 at 12:04 pm
skjoldtc (1/13/2010)
Thanks for the question. I wonder why anyone would think that errors could be corrected by a user? 😉
Yeah, we all know errors are generated by users
Lest anyone think...
January 13, 2010 at 10:46 am
Are OLAP cubes considered database? Is OODBMS a database? I think we can protect our concept of RDBMS using exact terminology for exact meaning. Let's accept that...
December 18, 2009 at 8:47 am
also a typical response to this question is "don't ask the DB to format strings"
... meaning the consumer of this content should be responsible for display/output.
I'm not sure there is...
October 14, 2009 at 7:43 am
This still feels to me like it's violating a basic principle of normalization by creating a dependency of multiple (possibly unrelated) points of data on a single field. It's...
May 21, 2009 at 7:58 am
If participation is important at work, then it should be at least as important in school. I'm back to school with 20 year olds who seem to think education...
November 4, 2008 at 7:23 am
We went with the premise that people would rather find what they're looking for than be prompted with spelling corrections, so we wrote the search feature to join the product...
July 21, 2008 at 7:04 am
GSquared (6/9/2008)
Mike, I would actually classify what you're describing as a form of active auditing. You created a log other than the SQL server transaction log.
yeah... I didn't want...
June 9, 2008 at 10:20 am
We recently dealt with this exploit.
One very useful tip that I did not find anywhere else: Revoke access to the meta-data tables this attack uses to find every character...
June 9, 2008 at 8:30 am
We implemented a passive log while trying to audit SQL injection attempts from our website. We couldn't even begin to consider server-based solutions because the command batch itself was...
June 9, 2008 at 8:08 am
If we're looking for obscure/inefficient ways to produce the requested output:
select *
from stud_mast o
where
(select month( dob ) from stud_mast i where i.pk = o.pk) != 1
and
...
April 17, 2008 at 7:59 am
Viewing 15 posts - 16 through 30 (of 42 total)