This post explores what can happen if you are too liberal with permissions for the sake of convenience.
2010
Let's talk about blindly clicking next, next, next during a SQL Server install.
IDENTITY columns are very useful, but consider whether they are needed on every single table.
I give two real-world examples of vulnerabilities allowing for SQL injection.
I talk about what I forgot to talk about at a recent presentation on Management Studio.
Decrypting an encrypted stored procedure is not difficult – but is it ethical?
I was tagged in a meme about the three events that brought me to where I am in my career today.
I tried to deploy nested stored procedures that both had a cursor with the same name. It didn't go so well.