Category

Publish Year

Bryian Tan's resources

SSRS Audit: All reports that had been executed/not-executed in the past mo...

8y 1.7k 0 5

The godfather of ransomware returns: Locky is back and sneakier than ever

8y 1.3k 0 5

SQL Server Encryption: Always Encrypted

8y 1.6k 0 5

Step by Step Configuring a Dedicated Network for Availability Group

8y 1.5k 0 5

Security 101: BYOD Best Practices: What You Need to Know and Do

8y 1.4k 0 5

5 Security Questions For Your Hosting Company

8y 1.2k 0 5

Everything you need to know about testing .NET applications

8y 1.1k 0 5

Enable Trace Flags in SQL Server

8y 2.5k 0 5

Deep Packet Inspection: The Smart Person's Guide

8y 1.9k 0 5

How to become a master cyber-detective

8y 1.1k 2 5

Clone A SQL Server Login And Password To A New Server

8y 1.3k 0 5

How To Answer Tough Interview Questions: 8 Tips

8y 1.4k 0 5

Five easily installed utilities for improving your online privacy

8y 897 0 5

Capturing Baselines on Production SQL Servers

8y 1.2k 0 5

Free Charging Stations Can Hack Your Phone

8y 1.2k 2 5

8 Best Practices For Microservices Security

8y 1.6k 0 5

SQL Server vs SQL Server v.Next

8y 1.2k 0 5

Researchers trick 'CEO' email scammer into giving up identity

8y 1.2k 0 5

Everything old is new again: Experts predict a flood of denial-of-service ...

8y 1.2k 0 5

Top 5 Cybercrime Vectors

8y 913 0 5

Google kills support for Gmail in these Chrome versions: Check if you'...

8y 1.3k 0 5

The five biggest headaches for software developers

8y 1.3k 0 5

Top 5 ways to back up your data

8y 859 2 5

XMLRPC or WP-Login: Which do Brute Force Attackers Prefer

8y 1.4k 0 5

Windows 10 Tip: Reset Your PC Completely

8y 1.3k 2 5
 26 - 50 of 58