• Implementing row level security in SQL 2000

    Is there a way to implement row level security in SQL Server 2000?

    SQL Server Ask the Experts2,585 pointsBadges:
  • Looking for best way to have SQL Server data security, replication as well as security maintenance

    I joined a production environment recently, and I’m the key person here. We have 2 servers: one production server and a replication server. Data from the application goes to the production server every second and that is replicated to the replication server. We fetch the data from replication...

    SQL Server Ask the Experts2,585 pointsBadges:
  • Read Only access to a SQL Database? Best way?

    We're trying to prevent hacks on our site. We've been down several times and the idea came up that we could prevent the SQL Injections by making an account for just the public-facing side of the site that has Read Only set for it. This is a Microsoft SQL 2000 server BTW. Our hosting company...

    Kwoodall10 pointsBadges:
  • Suspect DB

    Hi, I am using sql server 2000 and recently found 2 of the DBs are marked as Suspect and I don't have access to them any more.Would you please help me with this? Thanks, Ellie

    Ellie145 pointsBadges:
  • disk activity is running at 100%

    24 hrs ago disk i/o and activity shot up to 100* with quues grwoing. our average i/o queue is normally around zero with disk activity at <15% we have had this before - lasts a couple of days and then stops. we have never found out why? can anyone help?

    Salmonthefish5 pointsBadges:
  • Potential over & under security issues with SQLNative Client ?

    Hello, I've been unable to find any reports of these two problem when using the SQL Native Client driver (9.00.3042.00), so I'm hoping else has seen these. Firstly check constraint definitions accessed by the following TSQL only returns data with the SQL Server driver, ie nothing with SQL Native...

    WarwickW5 pointsBadges:
  • Best 3rd party monitoring software for sql

    Best 3rd party monitoring software for sql

    Fran5 pointsBadges:
  • Is firewall preventing SQL Server from showing up in the EM?

    I have a corporate Dell Image laptop running SQL server 2000. Enterprise manager (EM) shows up without my registered SQL server (local or remote). When I try to re-register I see the other registered servers, however, they are grayed out. When I use the MMC Snap-In from computer management, I can...

    SQL Server Ask the Experts2,585 pointsBadges:
  • How can I set the database password by the SQL Server Enterprise Manager?

    How can I set the database password by the SQL Server Enterprise Manager?

    SQL Server Ask the Experts2,585 pointsBadges:
  • How to transfer encrypted data between SQL Server 2005 and SQL Server 2000

    We are a retail/web/phone order store. We process credit cards for all three stores at our retail location. We have our web data stored offsite on the web server, using SQL Server 2005. We have our retail/phone order data stored onsite in SQL Server 2000. I'd like to add a function to our MS Access...

    SQL Server Ask the Experts2,585 pointsBadges:
  • sql 2005 db security for public

    I have databases that were converted (by restore) from sql 2000 to sql 2005. I found a script to move the logins (all using nt/sql auth) to the 2005 box. All the users on the sql 2000 box belonged to public on the old box. If i loook at the users inside the db's on the 2005 box (no public) they are...

    tcstl95 pointsBadges:
  • Securing dynamic file uploads to a SQL 2005 Server database

    I need to determine what is the best (practices) method for scanning of files/documents (.DOC, .XLS, .JPG, .TIF, .PDF) before they are dynamically uploaded into an SQL 2005 db as BLOBs..Thanks

    RJpoorvin0 pointsBadges:
  • SQL Server Command String

    What is the max length of the Command String that can be submitted to SQL Server?

    Hank103925 pointsBadges:
  • Create credential

    I need to create a credential,and a proxy for my Jr. dba to support and troubleshoot production SSIS and SQL jobs. I want to create a credential/proxy that follows best practice and can be implemented as a standard across environments. Can you give me an example of a credential that has sufficient...

    Maura d'ae0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following