In this article we look at the vulnerabilities associated with enabling SQL Mail and look at ways to work around such security issues
For SQL users, enabling an email database for replying to database queries is possible, since queries are handled by the database itself. However a minimum requirement for activating an email database in the application is to run SQL Server with a domain account having access to local admin privileges. However one of the drawbacks of using mail activated SQL...
Read more »
In this article we look at key security vulnerabilities that one can possibly be exposed to while working with SQL Server Express edition.
All editions of SQL Server although come with a lot of security features, the user might still have to face security issues in almost all of its editions. Quite in sync with the popular belief that cheap goods are low in quality and expensive ones are high, the SQL Server Express Edition, available for free, has much more security issues than the paid...
Read more »
We’ve said it before, but it’s worth repeating - linked tables can be really useful in your databases for a number of reasons. But one big drawback of linked tables is performance – running queries against them, especially if they aren’t Microsoft Access tables (i.e. if they’re Excel, CSV, or DBF files). They can be painfully s l o w to work with. There are a few ways you can work around that – we’ll work with one way here, and that’s to convert a linked table into a local table. Sure – you...
Read more »