2015-08-06 (first published: 2010-11-02)
19,862 reads
2015-08-06 (first published: 2010-11-02)
19,862 reads
Self-marketing is not my strong suit. I don't feel very comfortable doing it, but Andy Warren (twitter | blog) suggests that we...
2010-11-01
2,380 reads
As more and more people look to work away from inside traditional networks, security becomes an issue. As a data professional, Steve Jones reminds you to be sure that your data is protected.
2010-10-25
101 reads
Did malware cause a plane crash? Not likely, but Steve Jones warns us it could and we need to be very security conscious when we have computers linked together in transportation systems.
2010-10-13
115 reads
2010-09-29 (first published: 2010-09-28)
1,612 reads
Social engineering is one of the most effective ways to hack information out of a company. Steve Jones looks at this technique and a recent contest at DefCon that featured social engineering.
2010-09-15
157 reads
We use Internet Protocol Security (IPSec) within the trusted domains, but use the Negotiate Security Support Provider for our web applications. What other security methods can we employ with SQL Server?
2010-09-07
2,304 reads
Members of the securityadmin role can escalate to sysadmin rights. Here's how to restrict them back to 2000 levels.
2010-09-02
6,087 reads
2010-08-26
4 reads
A script to reveal which logins have access to your sql server via windows groups.
2010-12-09 (first published: 2010-08-26)
2,240 reads
By Rob Sewell
The Social Web Foundation is aiming to grow the fediverse and make the social...
By Steve Jones
A customer recently wanted to know if any of their instances were too old...
A reader of one of my previous posts pointed out that the legend order...
Comments posted to this topic are about the item 7 sept, scheduled book
Comments posted to this topic are about the item 7 sept, schedlued article
Comments posted to this topic are about the item 6 sept, published book
Azure Data Lake Storage Gen 2 is built on ...?
See possible answers