September 2012 Entries

Capture a Query Executed By An Application Or User Against a SQL Server Database in Less Than a Minute
At times a Database Administrator, or even a developer is required to wear a spy’s hat. This necessity oftentimes is dictated by a need to take a glimpse into a black-box application for reasons varying from a performance issue to an unauthorized access to data or resources, or as in my most recent case, a closed source custom application that was abandoned by a deserted contractor without source code. It may not be news or unknown to most IT people that SQL Server has always provided means of back-door ......

Posted On Monday, September 24, 2012 12:05 PM | Comments (1)