↓ Skip to Main Content
Vedran Kesegic Blog
Vedran Kesegic Blog

Main Navigation

  • Home
  • sp_xdetails
  • Performance Logging

Category: Security and encryption

Immutable backup against crypto attacks

By Vedran Posted on 2025-10-09 Posted in Backup and Recovery, Security and encryption Tagged with Backup, Cryptovirus, Security

Have you heard about Retention lock, Immutable Shared Folder, WORM (Write Once Read Many)? Many NAS and storage manufacturers have that feature, including QNAP, Synology, HPE, NetApp and many others. They all are referring to the same concept: after backup …

Immutable backup against crypto attacks Read more »

Confusion between Login and User in SQL Server

By Vedran Posted on 2018-04-28 Posted in Security and encryption

There is often confusion between Login and User in SQL Server. What is the difference and what is the link? I hope to clear that out in this short video:

Procedure with Execute as login?

By Vedran Posted on 2013-03-24 Posted in Security and encryption

Sometimes we need a low-privileged user to do a specific administration task or task that require some server-level permissions (such as VIEW SERVER STATE, ALTER TRACE etc). Of course, we do not want to give that account server-level privilege, because …

Procedure with Execute as login? Read more »

Our Mission

Our Mission

Databases should be fast and simple to use. We make them so. Do not let your customers wait for a slow database response - hire a top professional! We are passionate about creating highly-tuned SQL Server systems. Do you want yours to become one? Simply call us or send email, and we will take care of the rest.

Vedran Kesegić, M.Sc.
SQL Server Database Consultant
Email: [email protected]

A Random Thought

If nobody reacted to alert from monitoring system, that alert should not exist. Quality of alerts is measured by number of reactions divided by number of raised messages. Should be close to 100%. If below 50%, it is a spamming system, not alerting system. Nobody reacts to real alerts if so many false ones occur. Be savvy with alerts.

Categories

  • Backup and Recovery
    • Transaction Log
  • BI
  • Conferences
  • Data Engine
  • Performance
  • Security and encryption
  • Storage
  • TSQL and SQL Client Code
  • Uncategorized

Recent posts

  • Immutable backup against crypto attacks
  • Database recovery IMPORTANT rule
  • SUSPECT database
  • How to partition a really big table?
  • How to pass arrays to SQL? TVP – The Ultimate Guide
Copyright © 2025 Vedran Kesegic Blog | Powered by Responsive Theme
Visit Us On TwitterVisit Us On FacebookCheck Our FeedVisit Us On LinkedinVisit Us On Youtube