Join us on May 2nd, as we discuss preparing for DDoS attacks, building resiliency, overcoming obstacles and key preparations to make now before ransomware attacks.
Editor's Note: SQL Server Magazine welcomes feedback about the magazine. Send your comments to [email protected]. Please include your full name, email address, and daytime phone number with your letter. We edit all letters and replies for style...
I have a copy of Microsoft SQL Server Desktop Engine (MSDE) installed on a Windows 2000 Professional PC. By default, MSDE is configured to use Windows authentication. The database developer didn't provide an MSDE management utility to let us...
As a regular part of T-SQL Tutor, you'll find a commented script file to test the syntax in the article. The script for this article is NTableJoinsExamples.sql. In addition, each article includes a small amount of "homework" to help you to ...
I still haven't mailed my family's Christmas letter, so I don't see any reason why I can't write my annual "let's start thinking about the new year" commentary 3 weeks late! These "in with the new, out with the old" items might pique your interest...
A few weeks ago, I complained about how Microsoft doesn't make content from its technical shows readily available. I still believe that Microsoft should publish—for free—all the content from its major shows. However, several readers pointed out...
Multiple vulnerabilities exist in Microsoft SQL Server 2000 and 7.0. The first vulnerability is a result of several functions that let the SQL database generate text messages. By not adequately verifying that the text fits into the allocated...