I decided to accept Grant’s (TheScaryDBA) challenge found here- http://www.scarydba.com/2017/03/02/random-blog-post-challenge/ where we have to write a technical blog post that incorporates a certain image of a certain individual. There was someone quite mischievous on my SQL Server, I needed to find out what … Continue reading
Tags: SQL Server
Identity Security Risk Assessment
Get a free AD security assessment to evaluate your environment and identify the most actionable issues.
Related Articles

Solving Communication problems between DB and ASM instances
Introduction Most of the time I write how-to articles or I am introducing a new feature of Oracle Database. Those articles contain new information that’s good to know and help people fix issues or to ...

Toad Data Point – How to build a query in Toad Data Point Query Builder
The Query Builder enables you to create a query without writing or editing SQL statements. Even if you are familiar with SQL, the graphical interface makes it easier to create relationships and visual...

How to query Salesforce data within Toad Data Point
This video shows how to query Salesforce data within Toad Data Point....