When working in a very large SQL Server environment, it is very common that no one in the organization knows who uses a particular database. This scenario is very common if there are multiple legacy systems. Follow this article to identify how...
Read more »
In this article we look at the vulnerabilities associated with enabling SQL Mail and look at ways to work around such security issues
For SQL users, enabling an email database for replying to database queries is possible, since queries are...
Read more »
In this article we look at key security vulnerabilities that one can possibly be exposed to while working with SQL Server Express edition.
All editions of SQL Server although come with a lot of security features, the user might still have to face...
Read more »