Search this blog
2026 Redgate Summit – New York City

-

18 Year MVP Awardee

Tags
- administration
- AI
- AIExperiments
- auditing
- Azure
- Backup/Recovery
- blogging
- business
- career
- career2
- car update
- Cloud Computing
- conferences
- containers
- continuous integration
- coping
- data
- data analysis
- database design
- databases
- Database Weekly
- data privacy
- dbatools
- DevOps
- disaster recovery
- encryption
- Flyway
- Friday Poll
- FWTips
- GDPR
- Git
- goals
- hardware
- high availability
- Humor
- life
- Linux
- Microsoft
- misc
- monitoring
- networking
- PASS
- Performance
- powershell
- presentations
- Redgate
- Redgate Monitor
- republish
- sabbatical
- security
- software development
- software development
- speaking
- SQL Compare
- SQL in the City
- SQLNewBlogger
- SQL Prompt
- SQL Saturday
- sql server
- SQLServerCentral
- SSMS
- syndicated
- T-SQL
- T-SQL Tuesday
- Tesla
- testing
- tools
- travel
- tsqlt
- vacation
- version control
- webinar
- windows
- words
- work
Search this blog
Steve’s Tweets
Tweets by way0utwestOlder Posts
Meta
Tag Archives: security
SQL Server Truncate Table Permissions
I saw a note recently where someone asked what permissions were needed for a user to execute TRUNCATE TABLE. In previous versions we needed ownership of the table or DBO level permissions. I had thought this was changed in SQL … Continue reading
Bad IT People
It’s going to happen. Someone, somewhere, is going to deliberately compromise security and abuse their position as an administrator. Hopefully it doesn’t happen at your company, but the longer you are in IT, the better chance you have of being … Continue reading
Slow Fixes
Today we have an editorial reprinted from Jan 15, 2006 as Steve is on vacation. There’s an interesting piece at the Washington Post on Microsoft’s delays in releasing patches, with some analysis showing that when the flaw is disclosed to … Continue reading
Cloud Hacking
Not everyone is down on the cloud. Apparently someone found a great use for pay-as-you-go computing in the cloud by using it to hack wireless networks. What’s next, someone using Amazon’s Mechanical Turk to find security holes in police patrols … Continue reading