MS15-058: Vulnerabilities in SQL Server could allow remote code execution
A vulnerability has been released that can affect SQL Server 2008, 208 R2, 2012, and 2014.
2015-07-15
5,654 reads
A vulnerability has been released that can affect SQL Server 2008, 208 R2, 2012, and 2014.
2015-07-15
5,654 reads
Consider a situation when you have a large number of databases on your SQL Server, and you are requested to grant user access to all SQL Server databases. How can you grant access to a user for all databases on a SQL Server instance?
2015-06-30
5,795 reads
2015-05-29
1,370 reads
A challenge from United intrigues Steve Jones. How many other companies would make a challenge like this?
2015-05-26
182 reads
2015-05-21
1,247 reads
Tibor Nagy has put together some best practices to help SQL Server DBAs navigate the many different requirements around PCI compliance.
2015-05-21
6,930 reads
It is no good doing some or most of the aspects of SQL Server security right. You have to get them all right, because any effective penetration of your security is likely to spell disaster. If you fail in any of the ways that Robert Sheldon lists and describes, then you can't assume that your data is secure, and things are likely to go horribly wrong.
2015-05-13
9,527 reads
2018-06-26 (first published: 2015-04-14)
258 reads
Sometimes you need to reach outside a database and access data and objects from multiple databases, which raises some security issues and increases the complexity of data access. In this stairway level, you’ll learn about cross-database ownership chaining so that you can reach across database boundaries securely.
2021-04-28 (first published: 2015-04-08)
8,049 reads
The code you use may contain security information. Be extra careful in this case, especially when you use encryption.
2015-03-31
120 reads
By Steve Jones
The season 1, seventh episode of Simple Talks is out. Check it out, with...
By Steve Jones
the McFly Effect – n. the phenomenon of observing your parents interact with people...
At a recent conference I was asked how I executed code during my presentation....
Comments posted to this topic are about the item 7 sept, scheduled book
Comments posted to this topic are about the item 7 sept, schedlued article
Comments posted to this topic are about the item 6 sept, published book
Azure Data Lake Storage Gen 2 is built on ...?
See possible answers