Recovering quickly from isolated corruption is an admirable goal and an impressive achievement. If you carefully develop plans for dealing effectively with data loss and damage, you will undoubtedly reduce the toll that corruption takes on your...
The connection string is essential for connecting your ADO database applications to SQL Server. (See also, "Mastering ADO" and "Using a .UDL File from ADO").
These connection-string examples illustrate the seven most common connection scenarios...
Microsoft recently announced a cumulative patch that addresses three new security vulnerabilities in SQL Server: named pipe hijacking, named pipe Denial of Service (DoS), and a new SQL Server buffer-overrun problem. These security holes can lead...
SQL Server Magazine UPDATE—brought to you by SQL Server Magazinehttp://www.sqlmag.com and SQL Server Magazine Connections...
Microsoft has released four Analysis Services-related hotfixes. The supported fixes are intended to correct only the problems described in the following articles. Microsoft recommends applying the fixes only to systems that are experiencing these...
More than a month ago, Microsoft issued a critical security update exhorting users to install a patch that fixed a security vulnerability that the company said, at the time, had yet to be exploited. Microsoft made the patch available thr...
Congratulations to Narasimhan Jayachandran, a database management consultant for HTC Global Services in Troy, Michigan, and Shannon L. Edie, senior database analyst for Kaiser Permanente Center for Health Research in Portland, Oregon. Narasimhan...
In Windows XP, the Anonymous Logon group is no longer a member of the Everyone group, which does have permissions...
SQL Server Magazine UPDATE—brought to you by SQL Server Magazine and SQL Server Magazine Connections...