Join us on May 2nd, as we discuss preparing for DDoS attacks, building resiliency, overcoming obstacles and key preparations to make now before ransomware attacks.
Microsoft recently released the Microsoft SQL Server 2000 Resource Kit. Like the other Microsoft resource kits, this one includes a book as well as a set of samples and utilities. The resource kit is available separately or as a part of TechNet...
Parent-child dimensions can lead to different types of analysis questions. In this column's file-analysis problem, one of the questions I wanted to answer was, Which first-level directories consume the most disk space? A first-level directory is a...
Editor's Note: Send your SQL Server questions to Richard Waymire, Microsoft's group program manager for SQL Server management tools, at [email protected]...
Related Reading
ARTICLES
RAIN FOREST PUPPY
"NT Web Technology Vulnerabilities"
Phrack Magazine, December 25, 1998, Vol. 8, Issue 54BOOKS
MICHAEL HOWARD, MARC LEVY, AND RICHARD WAYMIREDesigning Secure Web-Based Applications for Microsoft Win...
Component security has a couple terms you need to understand. Windows authentication refers to the authentication services that Windows 2000 performs for you. For instance, if user Ken logs in to a Web application with Basic or Integrated security...