Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations strongm on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Search results for query: *

  1. rayj00

    ISDN Vulnerabilities

    I am wondering if anyone knows of documentation that talks about ISDN (PRI) vulnerabilities? I'd appreciate it.... Ray Raymond C. Jender - CISSP, CEH
  2. rayj00

    SQL Authentication Types

    Thanks for all of the replies, guys. You've been a big help... Ray
  3. rayj00

    SQL Authentication Types

    Since MS suggests to always use Windows authentication, what are the security implications if you use SQL or even mixed authentication? Thanks for your quick replies guys, I appreciate it!! Rayj00
  4. rayj00

    SQL Authentication Types

    I know enough about SQL to be dangerous. I do not normally use the product, but I do perform security audits on it. My question has to do with authentication. There are 3 methods to use: 1. Windows 2. SQL 3. Both From my little experience, I know that number 1 (Windows) is the recommended...

Part and Inventory Search

Back
Top