Tweet I’ve been asked, “Do you do Access Database programming?” ?I simply answer, “No”, I would rather be stand on the street corner with a sign saying, “Will work for food”. It’s not that Access is the evil of all evils. ?I would rather use a database that has a built security model that protects […]
Tweet As I continue to get emails from companies stating my information may have been compromised, I think to myself, “Are people really comprehending the magnitude of the data breaches in today’s world?” Sure, it was just emails (they think), but point is that they were released my information without permission. What’s the risk? ?Well, […]
Tweet Below is a script that will read all the?Foreign?Key references and create a SQL Server script to create and drop the constraints from the database. Of course, this code is to be used at your own risk.