Question : I am designing a multi-environment Windows-based software product that will extensively employ Windows services running as LocalService to […]
Category: Security
Use of log_bin_trust_function_creators in MySQL
Question : What is the use of log_bin_trust_function_creators? Also, Is the value of the parameter dynamic? Will it change if […]
Security Compliance Dashboard
Question : We have internal audit team, which works with E&Y and SOX on Monthly, Quarterly and Yearly basis. They […]
Check if a SQL Login exists without SA
Question : How can I check if a SQL Login exists for an arbitrary domain user if the account I’m […]
SQL Server: how to avoid sysadmin rights but give adequate rights
Question : I have a collegue who want to get an access to one SQL Server 2008 instance. I’ll have […]
SSMS connections not using KERBEROS over VPN – why?
Question : I have a very simple setup. SQL Server X (2012) and SQL Server Y (2016). X has a […]
SQL Cross Database Views Security
Question : Cross Database Views: Hi, We have two databases Database A: Contains dbo.Customerid table, Database B: Contains dbo.Customerdescription table, […]
Can I grant privileges to a role without specifying an object?
Question : I am trying to create a role to simplify granting a set of privileges that I often give […]
Create Linked Server using Active Directory account
Question : I was able to grant access in MSSQL to an Active Directory group and add a service account […]
What’s an example of an exploitation of the security from enabling Ole Automation Procedures Server Configuration option?
Question : I have a need to enable to the Ole Automation Procedures Server Configuration Option on my SQL Server, […]