2017-04-25
234 reads
2017-04-25
234 reads
It does not limit the number of connections. It limits the number of connections by ONE user. Does someone know if a typical Denial of Service attack uses a security context of one or many users? Why do I think it depends on how the hackers code it?MaxActiveReqForOneUser - Specifies the maximum number of simultaneous […]
2005-01-18
Hopefully, this will clear it up because it is confusing me. I ran DBCC Shrinkfile and it would return that it could not find the log file. So I ran the 'select name from sysfiles' command and it returned the file names for the live database and not the test database which I was working […]
2005-01-17
This month’s T-SQL Tuesday is hosted by a dear friend, long time SQL Server...
By Steve Jones
I almost missed this month, so this is also a good #SQLNewBlogger post. I...
By Steve Jones
I had a lot of local branches for a repo (actually a few repos)....
Comments posted to this topic are about the item 7 sept, scheduled book
Comments posted to this topic are about the item 7 sept, schedlued article
Comments posted to this topic are about the item 6 sept, published book
Azure Data Lake Storage Gen 2 is built on ...?
See possible answers