News
To enable access to your SQL Server for those 1000 Windows users requires a single Windows login based on the Accounting group. However, say there is one Windows user called Eddie in the ...
You can supply a second parameter for the Database user name, but if you leave it, the server will default to the same name as the SQL Server login, which is usually the best way to go.
Users and developers access SQL Server for completely different reasons. So, be sure you set up access as defined by who they are and why they need access.
Despite the plentiful information in Books Online and on the official “SQL Server 2000 Security” document Microsoft offers online, setting up a truly secure SQL Server remains a difficult task. In ...
SQL Server has a long list of roles for server, database, and applications that outline things like permissions, data selection and modification, and disk management. Examine how roles play a part ...
Microsoft SQL Server 2000 allows administrators to configure database security flexibly, and supports the U.S. government certification for C2-level installations in sensitive environments.
This capability is meant to aid with auditing sensitive data. Vulnerability Assessment As the name implies, the Vulnerability Assessment feature scans Azure SQL databases for a wide variety of ...
Last week Sentrigo brought a security hole in SQL Server to my attention. The issue is simply that SQL Server stores passwords in clear text in memory, so it’s quite possible to sniff the memory ...
Microsoft is disputing the severity of a vulnerability found in its SQL Server database that security researchers say exposes administrative passwords. The vulnerability, uncovered by Sentrigo ...
The SQL Slammer worm, which exploited a known and patched hole in SQL Server 2000, crashed servers and brought networks to their knees.
Results that may be inaccessible to you are currently showing.
Hide inaccessible results