Data Worms
Worms have been around a long time in computer systems. However changes in the global policies of governments and the possible retaliation for cyber warfare should have DBAs concerned.
2012-09-20
147 reads
Worms have been around a long time in computer systems. However changes in the global policies of governments and the possible retaliation for cyber warfare should have DBAs concerned.
2012-09-20
147 reads
More stuff you may find interesting.
Prepare for your first security breach. Sobering. As data professionals we’re going to get pulled...
2012-09-20 (first published: 2012-09-18)
2,129 reads
2012-09-11
2 reads
One of the security recommendation inside SQL Server Security Best Practice white paper for guest user is that, to disable...
2012-08-31 (first published: 2012-08-28)
5,267 reads
The hack on a Gizmodo writer using Amazon and Apple customer service security holes was shocking. Steve Jones notes that while security is important, backups are even more important.
2012-08-22
162 reads
It's been a while since I was in the day-to-day business of security patches. However, I still keep up with...
2012-08-24 (first published: 2012-08-21)
2,569 reads
Security is a complex process, one that is becoming more and more important to DBAs all the time. This week Steve Jones wants to know how security is handled for your service accounts.
2016-08-29 (first published: 2012-08-10)
258 reads
I've been charged with coming up with a quick solution to audit login changes on my SQL Servers. However, there's no budget so I'm going to have to come up with basic scripts and the like to do the work. Is this tip we cover a solution for you to audit login changes.
2012-08-06
2,872 reads
2012-08-02
4 reads
Recently I was supporting a third party application. It queries to determine what tables it has permissions to before it proceeds with the rest of its functionality. We had implemented permissions based on the best practice of creating roles, assigning the permissions to the roles, and then making the users members of the roles. The application was querying INFORMATION_SCHEMA.TABLE_PRIVILEGES and of course didn't find any permissions directly against the user in question. We ended up granting explicit permissions to the user so the application would work, but I'm more interested in the general case. How can I determine permissions for an individual user?
2012-08-02
3,152 reads
By Steve Jones
The season 1, seventh episode of Simple Talks is out. Check it out, with...
By Steve Jones
the McFly Effect – n. the phenomenon of observing your parents interact with people...
At a recent conference I was asked how I executed code during my presentation....
Comments posted to this topic are about the item 7 sept, scheduled book
Comments posted to this topic are about the item 7 sept, schedlued article
Comments posted to this topic are about the item 6 sept, published book
Azure Data Lake Storage Gen 2 is built on ...?
See possible answers