Join us on May 2nd, as we discuss preparing for DDoS attacks, building resiliency, overcoming obstacles and key preparations to make now before ransomware attacks.
Cesar Cerrudo discovered three new vulnerabilities in Microsoft SQL Server 2000 and Microsoft SQL Server Desktop Engine (MSDE) 2000. The vulnerabilities are buffer overruns with a potential for Denial of Service (DoS) attacks. Microsoft has...
EDITOR'S NOTE: Share your T-SQL tips and tricks with other T-SQL Solutions readers. Email your ideas (400 words or fewer) to [email protected]. If we print your submission, you'll get $50.
I recently had to write interface code in wh...
At first glance, the way SQL Server defines the days of the week can be confusing. The definition is a mix of two values—the DATEFIRST value and the DATEPART value—the second of which relies on the first for its meaning...
"Extreme performance" is a term that a colleague and I coined 2 years ago to define the SQL Server performance-tuning approach that we take with our consulting customers. I'd like to explain the essence of our philosophy, which might help you...
As the main article mentions, having a login name for SQL Server only lets you in the system's front door. To access a database, you need a username in that database, and to access objects in the database, your username must have appropriate...
One of my database tables contains information about companies. All the table's companies have a name, but only companies listed on the stock market have a code. I created a unique index on the company-name field and would also like to creat...