Join us on May 2nd, as we discuss preparing for DDoS attacks, building resiliency, overcoming obstacles and key preparations to make now before ransomware attacks.
I'm trying to make my SQL Server installation as secure as possible. Some of my users need access to Enterprise Manager, but I don't want them to view Data Transformation Services (DTS) packages on the server. Enterprise Manager lets me restrict...
I regularly get an annoying error message from Enterprise Manager when I try to view database information through the Task Pad view. Figure 1 shows the dialog box that displays the error message. When I click Yes or No, Enterprise Manager...
Recovering quickly from isolated corruption is an admirable goal and an impressive achievement. If you carefully develop plans for dealing effectively with data loss and damage, you will undoubtedly reduce the toll that corruption takes on your...
The connection string is essential for connecting your ADO database applications to SQL Server. (See also, "Mastering ADO" and "Using a .UDL File from ADO").
These connection-string examples illustrate the seven most common connection scenarios...
Microsoft recently announced a cumulative patch that addresses three new security vulnerabilities in SQL Server: named pipe hijacking, named pipe Denial of Service (DoS), and a new SQL Server buffer-overrun problem. These security holes can lead...
Microsoft has released four Analysis Services-related hotfixes. The supported fixes are intended to correct only the problems described in the following articles. Microsoft recommends applying the fixes only to systems that are experiencing these...