Community Circle
Search this blog
Steve’s tweets
- Daily Coping 20 Jan 2021 voiceofthedba.com/2021/01/20/dai… 1 hour ago
- @stridergdm I agree. Any setup ought to require a default to be changed. 21 hours ago
- @stridergdm That "install SQL Server without a password" was one of the worst. Now I tend to see default passwords… twitter.com/i/web/status/1… 21 hours ago
The Current Book
MVP Award
Tags
- administration
- AI
- auditing
- Azure
- backup
- Backup/Recovery
- blogging
- business
- career
- career
- cell phone
- Cloud Computing
- containers
- continuous delivery
- continuous integration
- coping
- data
- data analysis
- database design
- databases
- Database Weekly
- data privacy
- dbatools
- DevOps
- disaster recovery
- DLM
- encryption
- Friday Poll
- GDPR
- Git
- goals
- hardware
- high availability
- Humor
- life
- Linux
- mcm
- Microsoft
- misc
- monitoring
- networking
- NoSQL
- PASS
- patching
- Performance
- powershell
- presentations
- Redgate
- republish
- sabbatical
- security
- software development
- software development
- speaking
- SQL Change Automation
- SQL Clone
- SQL Connections
- SQL in the City
- SQLNewBlogger
- SQL Prompt
- SQL Saturday
- sql server
- SQLServerCentral
- SSMS
- syndicated
- T-SQL
- T-SQL Tuesday
- testing
- travel
- tsqlt
- vacation
- version control
- webinar
- windows
- work
Daily Archives: June 24, 2013
More Data Security Issues
Insiders and human frailty are still a big problem in data security, according to a new study from Symmatec. Along with system issues these account for two thirds of data breaches. I suspect system issues means misconfiguration and poorly written code … Continue reading
When Is Work, Work?
This editorial was originally published on Sept 11, 2008. It is being re-run as Steve is out of the office. More and more people carry Blackberry phones for work, getting push email and a constant connection to the office, it … Continue reading
Don’t Use MD5
“The hashing alone being MD5 tells me that they really don’t care about their passwords too much, so it’s probably some pre-generated site.” That was from this article on an Anatomy of a Hack. It’s an interesting quote, and it … Continue reading