Forum Replies Created

Viewing 3 posts - 1 through 3 (of 3 total)

  • RE: The Auditor Attack Vector

    I would say that the Auditors need their data-security policy auditing, but auditing only proves you followed your procedures, not that the procedures were sensible.

  • RE: The Auditor Attack Vector

    1. Find out who this employee is who picked up a thumb drive and fire them. It's a known ploy used by hackers to gain access to your network for...

  • RE: SQL Server Memory Management Explained

    I believe there's an error in the article, circa 4,700,000 K is not 4.7MB, it's 4.7GB.

    "The Available counter will show how many KB are available to the host;400 MB is...

Viewing 3 posts - 1 through 3 (of 3 total)