Sty - COMPUTER ENGINEERING
It's all about Internet, Security, Vulnerability, Programming, Networking, Software, and also Open Source Software. May this weblog can be your source of IT 's articles.

When you want to connect to a SQL Server database, you have to authenticate, so the database know which user is trying to access. Microsoft SQL Server supports two authentication method: SQL Server Authentication and Windows Authentication (often called Integrated Security).

SQL Server Authentication

First, I would explain SQL Server Authentication. SQL Server takes care of user management, means that users and their passwords are managed by SQL Server. You can access the user management functionality in SQL Server through the Enterprise Manager (for SQL Server 2000) or the SQL Server Management Studio (for SQL Server 2005).

To connect to a SQL Server instance that uses SQL Server authentication, you need to pass a user name and password in the connection string of your application, ex:ASP.NET Web Application. Connection string usualy looks like this:

Data Source=;Initial Catalog=;
User Id=UserName;Password=Password;


Windows Authentication

Next, Windows Authentication, the OS (Windows) takes care of user management. All interaction with the database is done in the context of the calling user so the database knows who's accessing the system, without an explicit user name and password being passed in the connection string. You still need to map a Windows account to a SQL Server account so SQL Server can determine whether the account has sufficient permissions.

Connection string using Windows Authentication usualy looks like this:

Data Source=;Initial Catalog=;
Integrated Security=SSPI;


or

Data Source=YourServer;Initial Catalog=YourDatabase;
Trusted_Connection=True;


Windows or SQL Server Authentication?

In general, it's recommended to use Windows authentication. The fact that you don't need to use a password in the connection string, means your application will be a bit safer. You don't need to send the password over the wire, and there's no need to store it in a configuration file for your application where it can be viewed by anyone with access to that file.

However, SQL Server Authentication is a bit easier to use. Since you specify your own user name and password, you don't need to know the final user account that your application runs under.

Sty - Knowledge is Free
Read More..

I try to compiled this guide for Acer 4520 users, some variants of this model may work with this tips, the other may not, hope you the lucky number one . This guide below I write in Indonesian, sorry for disappointing you, because lacks of guide about this issues in Indonesian.

http://sty-thehybrid.blogspot.com/2008/03/installing-ubuntu-710-aka-gutsy-gibbon.html

Sty - Knowledge is Free
Read More..

Your Ad Here