From: Steven Cheng[MSFT] on
Thanks for your further followup Phil,

I think your current solution is not bad. Even better than using COM object
since using Inproc COM object is possible to corrupt the hosting process
and use some out of process approach will make our server/host application
more secure.

Regards,

Steven Cheng
Microsoft Online Support

Get Secure! www.microsoft.com/security
(This posting is provided "AS IS", with no warranties, and confers no
rights.)

First  |  Prev  | 
Pages: 1 2
Prev: sa password rules
Next: database object hierarchy