Viewing 15 posts - 1 through 15 (of 82 total)
See Edd you are "reading" - cant say the same about my staff here .... this is one of those times you feel having knowledgable people isn't always enough...
February 24, 2009 at 9:08 pm
I meant to clarify - that response tells one of 2 things about the staff -
1. they aren't as well informed to know of the option of an alias...
February 24, 2009 at 5:42 pm
Good that you asked ..I almost forgot ... see we did ask the administration staff the feasibility of "calling the new machine the old name" and here's what we got...
February 24, 2009 at 5:40 pm
Yes I did .. with the same title under "SQL 2005 security" ... I did receive a very sensible explaination
February 24, 2009 at 8:07 am
Should this have been a poll? instead ....
February 24, 2009 at 7:11 am
Thanks again .. that makes perfect sense ....
P S - how "Anon" is Anon?
February 24, 2009 at 6:59 am
This makes sense - so there is a chance that the password hash could have been dependent on the machine ID or something specific to the old box that of...
February 23, 2009 at 9:21 pm
Also, wouldn't/shouldn't the password encryption routines of SQL (at least 2005+) be confidential?
February 23, 2009 at 6:04 pm
[font="Arial"]Matt,
Thanks!!! That was a very clear and comprehensive description of the idea around a password hash. Honestly, I find it a little easy to discuss SQL on external forums than...
February 23, 2009 at 5:58 pm
Matt, I was not using anything to verify of the password had a bad hash - this came from the DBA team which worked 'behind the scenes to come back...
February 23, 2009 at 3:00 pm
Thanks much .. will create a new post in the security forum and update with the items you pointed ... watch out for this soon.
February 23, 2009 at 2:08 pm
Viewing 15 posts - 1 through 15 (of 82 total)