Examine the similarities and differences between Windows security and SQL Server security and you'll find that most of the concepts you already know from managing a network will map quite nicely into ...
SQL Server 2005 introduced a means to enforce password and lockout policies for SQL Server login accounts when using SQL Server Authentication. SQL Server 2008 continues to do so. The SQL Server ...
MS SQL Server is by far the most common DBMS that attackers target, probably due to its tight integration with Windows. Brute-force credential guessing attacks against database servers are ramping up ...
In the past, the question of how to perform auditing under SQL Server has had a simple answer: Do it yourself. But now, SQL Server 2000 has eased the burden of auditing by introducing an extensive and ...
SQL Server Management Studio or SSMS allows you to connect to the SQL server and execute queries. In this tutorial, we will see how you can install and configure SQL Server Management Studio in ...
The transaction log file contains the SQL Server transactions of the database. It basically records the database transactions and the changes made by the transactions to the database. The logs are ...