Forum Replies Created

Viewing 15 posts - 121 through 135 (of 813 total)

  • RE: Oddball Interview Questions

    Knut Boehnert (2/7/2014)


    "How would you fill a coffee cup in T-SQL?"

    Well, I'd probably start off development by using xp_cmdshell to interface with the driver for the stepper motor or...

  • RE: How do I find out server name and instance name? Thanks

    select serverproperty('servername'), @@servername

    Sometimes the two are different, BTW.

  • RE: The Cloud

    I simply execute

    REPLACE(@text,"the cloud","timeshared mainframes")

    when I hear people talking about the benefits of timeshared mainframes.

    Quite seriously, does anyone still know of any really good references from the 60's and 70's...

  • RE: Implementation of regular expressions

    First, give the front end a combo box dropdown, or a search, or some way to pick the right existing record.

    On the SQL side, you've got a classic case of...

  • RE: Compression

    L' Eomot Inversé (2/1/2014)


    Nadrek (1/30/2014)


    The actual correct answer is D) If the schema and contents are identical in the uncompressed and compressed databases except for compression, then the compressed backup...

  • RE: Password checker automation

    Adam Bean (1/30/2014)


    That sounds pretty awesome Nadrek ... and way more effective. This SQL function is incredibly poor performing and obviously limiting. Do you have anything already built to leverage...

  • RE: Vulnerable to SQL Injection third-party API

    Cadavre (1/30/2014)


    To be honest here guys, I don't think there's a whole lot more I can do.

    Then write it up and send it out to your manager and the corporate...

  • RE: Password checker automation

    Yes; for both the extraction script and examples of using HASHBYTES to construct the password hash (i.e. the algorithm SQL Server uses) see the end of http://www.sqlservercentral.com/Forums/Topic1530283-3411-1.aspx. Note that...

  • RE: Password checker automation

    Create a two column WeakPasswords table; one with the weak password, the other with a comment on the source (or a reference to a lookup table, if you want to...

  • RE: Vulnerable to SQL Injection third-party API

    Classic second order SQL injection.

    Anonymous post on security.stackexchange.com?

    May I recommend a CHECK constraint on the column(s) that prevent any data except letters and maybe spaces, perhaps numbers if you have...

  • RE: Restore succeeded but Data is different?? What? Is this possible?

    GilaMonster (1/30/2014)


    No need, if he's now doing backups with checksum. Can just restore verifyonly and SQL will recalc the checksum and throw an error if the backup file has changed...

  • RE: Password checker automation

    Adam Bean (1/30/2014)


    I was hoping to just find compilations of all known/bad passwords out there and continue to build out this table.

    The most current such list I'm aware of has...

  • RE: Restore succeeded but Data is different?? What? Is this possible?

    Very interesting.

    Essentially, you need a robust, verifiable network copy, then.

    I'd suggest taking a hash of the actual backup file before the first copy, and then checking it after each copy...

  • RE: Restore succeeded but Data is different?? What? Is this possible?

    DominantDBA (1/29/2014)


    Hi All

    Scenario:

    A backup is taken and is 50gb uncompressed and is copied from one domain(A) into Domain(B). It is restored and all is well. The same backup file is...

  • RE: Rollback gives error

    GilaMonster (1/29/2014)


    What I would suggest - don't nest transactions and do all your transaction handling at one level

    +1 - there are no nested transactions, despite what it looks like. ...

Viewing 15 posts - 121 through 135 (of 813 total)