Oracle, Security Secure your SQL scripts with an Oracle wallet 16.12.2022 by Jérôme Dubar How to secure your SQL script and remove password using Oracle wallets(…)
Cloud, Database Administration & Monitoring, Database management, SQL Server, Security Data Platform Virtual Summit 2022 – Day 1 19.09.2022 by Stéphane Haby Today the Data Platform Virtual Summit begin at 00:30 am for us… It’s a little bit early but when we like our work and like to learn, we stay up with plaisir. My schedule for the day: After the login,(…)
Database Administration & Monitoring, Database management, SQL Server, Security, Technology Survey SQL Server 2022 security: Do you know Ledger? 15.08.2022 by Stéphane Haby You probably hear or view that on the security point of view, the next version of SQL Server: SQL Server 2022, has a feature named Ledger. It’s already used in Azure but what is Ledger? In 2 points, I will(…)
Security Performance problems on a ZyWALL USG 10.08.2022 by Grégory Steulet ZyWALL USG 50 Are you experiencing performance problems with your Zyxel ZyWALL USG firewall? You will find in this blog an example of a real case I faced and how I solved it. Introduction From one day to the next,(…)
Database Administration & Monitoring, SQL Server, Security SQL Server Security: Check if the guest is active on all user-databases through the CMS 08.08.2022 by Stéphane Haby Today, a customer asks me to have look on each SQL Server instance to control if the user-database Guest is active or not. The easiest way is to go through the CMS (Central Management Servers) with a query but witch(…)
Business Intelligence, Database Administration & Monitoring, Security Power BI – Active Directory data integration 15.07.2022 by Christophe Cosme Introduction This documentation explains how to integrate Active Directory data in a Power BI report. It explains also how to link this data with another data source. To illustrate the method, we will integrate Active Directory Computer data and link(…)
Security Facial recognition, between advanced biometrics and needs for privacy… – Part 2 of 4 21.06.2022 by Dominique Althuser Continuation of our series on facial recognition. After defining facial recognition among the biometric processes (see here), let’s see the techniques used for its application. State of the art of the techniques used for its application The(…)
Security Facial recognition, between advanced biometrics and needs for privacy… – Part 4 of 4 14.06.2022 by Dominique Althuser Last part of our series on facial recognition (first part here, second part here and third part here). Let’s see if there are countermeasures and how to implement them if they(…)
Security Facial recognition, between advanced biometrics and needs for privacy… – Part 3 of 4 14.06.2022 by Dominique Althuser Continuation of this series on facial recognition. After having defined facial recognition among the biometric processes (see here) and seen the techniques used for its application (see here), let’s see what the current laws(…)
Security Facial recognition, between advanced biometrics and needs for privacy… – Part 1 of 4 14.06.2022 by Dominique Althuser Among today’s biometric applications, one in particular is the subject of much controversy and discussion: facial recognition. One of the most controversial applications of facial recognition is face recognition based on a photograph, as done by the company Clearview(…)