If a hacker sets sights on your SQL Server, there are four primary methods he can use to take control and carry out unauthorized, malicious activity. I will look at each method in the following tip.
TABLE OF CONTENTS
For full article:
http://searchwindowssecurity.techtarget ... 58,00.html