Funny hacker in action on his keyboard

Introduction Crypto-viruses encrypt your data. If it asks money (a ransom) to decrypt, we call them “ransomware”. They cannot encypt your SQL Server databases because sql data and log files are in use by sqlservr.exe process, but they can encrypt …

Crypto-virus resistent backup Read more »

Tagged with: , , , , ,

In almost every database we have a process that filters the same data with different filters. Typically, query is within a stored procedure that has many filtering parameters that are optional. The problem is – a query optimized builds only ONE plan that will handle every filter combination you throw at it.

Tagged with: , , ,