Azure SQL Database
Copied!
Home
Options
295
dutchdatadude on 10-17-2019 08:52 AM
1,568
Ajay Jagannathan on 10-11-2019 02:13 PM
818
dutchdatadude on 10-10-2019 11:46 AM
609
dutchdatadude on 10-10-2019 11:37 AM
794
dutchdatadude on 10-03-2019 07:37 AM
1,456
Denzil Ribeiro on 09-30-2019 11:06 AM
1,599
dutchdatadude on 09-26-2019 01:14 PM
2,084
dutchdatadude on 09-19-2019 11:19 AM
11.5K
norheim on 09-11-2019 02:51 PM
2,338
dutchdatadude on 09-05-2019 02:24 PM
4,846
JovanPop on 08-30-2019 01:09 AM
1,847
dutchdatadude on 08-29-2019 08:51 AM
1,024
JovanPop on 08-26-2019 12:13 PM
2,493
Michal Bar on 08-21-2019 03:07 PM
7,397
Ninar_Nuemah on 08-21-2019 08:38 AM
2,499
JovanPop on 08-19-2019 05:19 AM
2,160
dutchdatadude on 08-15-2019 09:20 AM
1,530
Ajay Jagannathan on 08-12-2019 08:41 PM
1,846
dutchdatadude on 08-07-2019 05:36 PM
1,901
dutchdatadude on 08-01-2019 09:22 AM
2,065
AndreasWolter on 07-30-2019 12:55 PM
1,789
dutchdatadude on 07-26-2019 11:04 AM
973
dutchdatadude on 07-23-2019 02:30 PM
2,458
Pedro Lopes on 07-23-2019 07:00 AM
1,723
dutchdatadude on 07-12-2019 12:10 PM
2,959
Mine Tokus on 07-09-2019 11:54 AM
4,835
bonova on 07-08-2019 05:48 AM
1,414
JovanPop on 06-18-2019 07:25 AM
4,365
JovanPop on 06-11-2019 06:52 AM
Latest Comments
This is all true, unless you have a large database. A BACPAC file is not a true backup, it is a compressed script consisting of a series of commands to recreate your database's structure, and then populate it by inserting the data into each table (in an order optimized to avoid foreign key issues) o...
0 Likes
@Trayce_Jordan The actions we perform are of similar nature as what a debugger would do, so it's not necessarily the case that antivirus software would conclude it's malware. In either case, an exclusion can be registered as @R A pointed out.
0 Likes
@Trayce_Jordan , if you execute this procedure from application which was configure in the white list of the anti-virus app then what is the issue? Any anti-virus app today has options to configure white list
0 Likes
In this process, how you "stay under the radar" with anti-virus and advanced threat protection software. I would think this process could easily be interpreted as an attack.
0 Likes
How to login to the test database using the SSMS and not through code? Is this even supported? If yes, What would be the option to choose for authentication to sign in and is the secret key the password?
0 Likes