In the past, the question of how to perform auditing under SQL Server has had a simple answer: Do it yourself. But now, SQL Server 2000 has eased the burden of auditing by introducing an extensive and ...
Despite the plentiful information in Books Online and on the official “SQL Server 2000 Security” document Microsoft offers online, setting up a truly secure SQL Server remains a difficult task. In ...
Understand SQL Server Security SQL Server grew out of the UNIX world, and administrators maintained accounts (at that time) in a fashion similar to the "no domain" scenario in Windows. They created ...
As you will see in this chapter, companies use SQL Server for many types of applications and on most tiers now. Gone are the days when you would second guess yourself choosing to use SQL Server over a ...
Security analysts last week warned of a self-propagating worm targeting Microsoft Corp.’s SQL Server software. The worm, called SQLSnake, scans for and attacks Internet-connected SQL Server accounts ...
I'm new at this whole DBA thing, so maybe this is totally standard practice.<BR><BR>But we have a software vendor that wants remote access to our SQL server at an admin level to setup and install ...
MS SQL Server is by far the most common DBMS that attackers target, probably due to its tight integration with Windows. Brute-force credential guessing attacks against database servers are ramping up ...
When it comes to improving the performance of database systems, there are nearly as many approaches as there are DBA (database administrator) teams. That might sound acceptable at first glance. But, ...
They created accounts in SQL Server, and Windows was ignorant of these accounts. SQL Server has continued with this concept, largely for maintaining backward compatibility. In addition to what you're ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results