Category Archives: Personal Blogs

Strategies for developing an Internet emergency response system

Published on PCWorld.al Control the flow of information All events occurring in the security field i.e. vulnerabilities, compromises, crashes, different attacks, or cause-of-action takes the basis and the starting point for the information flow. A process or cycle that defines … Continue reading

Posted in CyberSec, Personal Blogs | Tagged , , , , | Leave a comment

Metadata and Privacy: Limits of Freedom online

Published on PCWorld.al The data collection boundary (IP, Time, User, Receiver, etc.), preserving the privacy of the citizen and observing the regulations in force are the ethical principles of the democratic system that everyone has to adhere. Metadata is information … Continue reading

Posted in CyberSec, Home, Personal Blogs | Tagged , , , | Leave a comment

Don’t use the SQL Browser service.

The SQL Browser service is not required to use SQL Server. You may recall that it was the target of the attackers. Turning off this service eliminates possible attacks. How SQL Browser works SQL Server Browser listens for all incoming … Continue reading

Gallery | Tagged , , , , , | Leave a comment

Descriptions of New features SQL Server 2008

Unlike SQL Server 2005 version of SQL Server 2008 comes with a host of changes and new opportunities. The whole purpose was to facilitate the work of the administrator in the management of databases of this as best possible with … Continue reading

Gallery | Tagged , , , , , , , , , , , | Leave a comment

DATABASE Configuration and Maintenance

This gallery contains 1 photo.

Files and Filegroups SQL Server to store in the database uses two different types of files: data and transaction log files. Instead of defining the storage of objects directly to a data file, SQL Server provide an abstraction layer for … Continue reading

Gallery | Tagged , , , , , , , , , | Leave a comment

Distributing and Partitioning Data in SQL Server 2008

This gallery contains 1 photo.

A Partition Function defines the set of boundary points for which data will be partitioned, otherwise a partition scheme provide an alternate definition for storage. You define a partition scheme to encompass one or more file groups. The final step … Continue reading

Gallery | Tagged , , , , , | Leave a comment

FAILOVER CLUSTERING in SQL Server 2008

This gallery contains 1 photo.

Failover Clustering in wider sense is designed to maintain the system against hardware failure. Windows clustering allows more hardware to act out parts as one in impact, a platform. Such hardware part in any cluster is called cluster node. Any … Continue reading

Gallery | Tagged , , , , , , , | 3 Comments