Viewing 15 posts - 121 through 135 (of 813 total)
Knut Boehnert (2/7/2014)
"How would you fill a coffee cup in T-SQL?"
Well, I'd probably start off development by using xp_cmdshell to interface with the driver for the stepper motor or...
February 7, 2014 at 11:03 am
select serverproperty('servername'), @@servername
Sometimes the two are different, BTW.
February 6, 2014 at 2:49 pm
I simply execute
REPLACE(@text,"the cloud","timeshared mainframes")
when I hear people talking about the benefits of timeshared mainframes.
Quite seriously, does anyone still know of any really good references from the 60's and 70's...
February 6, 2014 at 10:42 am
First, give the front end a combo box dropdown, or a search, or some way to pick the right existing record.
On the SQL side, you've got a classic case of...
February 3, 2014 at 8:17 am
L' Eomot Inversé (2/1/2014)
Nadrek (1/30/2014)
February 3, 2014 at 8:07 am
Adam Bean (1/30/2014)
January 31, 2014 at 9:17 am
Cadavre (1/30/2014)
To be honest here guys, I don't think there's a whole lot more I can do.
Then write it up and send it out to your manager and the corporate...
January 30, 2014 at 1:47 pm
Yes; for both the extraction script and examples of using HASHBYTES to construct the password hash (i.e. the algorithm SQL Server uses) see the end of http://www.sqlservercentral.com/Forums/Topic1530283-3411-1.aspx. Note that...
January 30, 2014 at 1:23 pm
Create a two column WeakPasswords table; one with the weak password, the other with a comment on the source (or a reference to a lookup table, if you want to...
January 30, 2014 at 12:14 pm
Classic second order SQL injection.
Anonymous post on security.stackexchange.com?
May I recommend a CHECK constraint on the column(s) that prevent any data except letters and maybe spaces, perhaps numbers if you have...
January 30, 2014 at 12:01 pm
GilaMonster (1/30/2014)
January 30, 2014 at 10:57 am
Adam Bean (1/30/2014)
I was hoping to just find compilations of all known/bad passwords out there and continue to build out this table.
The most current such list I'm aware of has...
January 30, 2014 at 10:50 am
Very interesting.
Essentially, you need a robust, verifiable network copy, then.
I'd suggest taking a hash of the actual backup file before the first copy, and then checking it after each copy...
January 30, 2014 at 10:41 am
DominantDBA (1/29/2014)
Scenario:
A backup is taken and is 50gb uncompressed and is copied from one domain(A) into Domain(B). It is restored and all is well. The same backup file is...
January 30, 2014 at 10:13 am
GilaMonster (1/29/2014)
What I would suggest - don't nest transactions and do all your transaction handling at one level
+1 - there are no nested transactions, despite what it looks like. ...
January 30, 2014 at 10:00 am
Viewing 15 posts - 121 through 135 (of 813 total)