Join us on May 2nd, as we discuss preparing for DDoS attacks, building resiliency, overcoming obstacles and key preparations to make now before ransomware attacks.
I'm trying to create stored procedures for performing a log shipping role change. The same logins from the primary server are already on the secondary server. Can I just use the role-change stored procedures without having to create a Data...
I need to migrate my SQL Server 2000 database for use on a SQL Server 7.0 database. I haven't used any SQL Server 2000-specific features. What's the best way to move this database back to SQL Server 7.0...
In making your security decisions, you might wonder whether to use IPSec or Kerberos for authentication and encryption. The main difference between them is that IPSec authenticates computer-to-computer communications and Kerberos authenticates...
I'm having trouble getting my SQL Server client tools to connect to a default instance of SQL Server 2000 through a dynamically determined TCP/IP port. The SQL Server has the TCP/IP Net-Library enabled. I installed SQL Server 2000 using the...
One of my SQL Server users periodically stops and starts the SQL Server Agent service. The user isn't a member of the sysadmin role and isn't a member of any other SQL Server role, but the user can still stop the service. I've denied public access...
Benchmarks are serious business in the database industry. World-record benchmark scores mean publicity and product recognition. That's why Microsoft, IBM, and Oracle spend hundreds of thousands of dollars putting together Transaction Processing...