Prev: sa password rules
Next: database object hierarchy
From: Steven Cheng[MSFT] on 12 Feb 2006 21:15 Thanks for your further followup Phil, I think your current solution is not bad. Even better than using COM object since using Inproc COM object is possible to corrupt the hosting process and use some out of process approach will make our server/host application more secure. Regards, Steven Cheng Microsoft Online Support Get Secure! www.microsoft.com/security (This posting is provided "AS IS", with no warranties, and confers no rights.) |