All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.
declare @lname as nvarchar(128); DECLARE custom_cursor CURSOR fast_forward FOR select name from sys.syslogins; OPEN custom_cursor FETCH NEXT FROM custom_cursor into @lname; SET @lname = @lname WHILE @@FETCH_STATUS = 0 BEGIN ALTER LOGIN @lname ENABLE --PRINT @lname FETCH NEXT FROM custom_cursor into @lname; end close custom_cursor; deallocate custom_cursor;
|Restore Procedure question||4||28|
|MS SQL server Varchar and nvarchar, GMT_DATE||23||49|
|Update foreign key reference after insert||9||30|
|Finding records between to times and spanning over midnight||21||43|
Join the community of 500,000 technology professionals and ask your questions.
Connect with top rated Experts
11 Experts available now in Live!