Download Lists That Contain Weak Passwords and Previously Breached Passwords and to Attack Offline Password Hashes

Total Page:16

File Type:pdf, Size:1020Kb

Download Lists That Contain Weak Passwords and Previously Breached Passwords and to Attack Offline Password Hashes An investigation of the security of passwords derived from African languages Submitted in partial fulfilment for the requirements of the degree of Master of Science of Rhodes University Sibusiso Sishi Grahamstown, South Africa March 2019 i Abstract Password authentication has become ubiquitous in the cyber age. To-date, there have been several studies on country based passwords by authors who studied, amongst others, English, Finnish, Italian and Chinese based passwords. However, there has been a lack of focused study on the type of passwords that are being created in Africa and whether there are benefits in creating passwords in an African language. For this research, password databases containing LAN Manager (LM) and NT LAN Man- ager (NTLM) hashes extracted from South African organisations in a variety of sectors in the economy, were obtained to gain an understanding of user behaviour in creating passwords. Analysis of the passwords obtained from these hashes (using several cracking methods) showed that many organisational passwords are based on the English language. This is understandable considering that the business language in South Africa is English even though South Africa has 11 official languages. African language based passwords were derived from known English weak passwords and some of the passwords were appended with numbers and special characters. The African based passwords created using eight Southern African languages were then uploaded to the Internet to test the security around using passwords based on African languages. Since most of the passwords were able to be cracked by third party researchers, we conclude that any password that is derived from known weak English words marked no improvement in the security of a password written in an African language, especially the more widely spoken languages, namely, isiZulu, isiXhosa and Setswana. ii Acknowledgement I would like to thank my supervisor Professor K. Bradshaw for all the help and guidance with this research paper and to my family for being the foundation. iii ACM Computing Classification System Classification • Security and privacy ~ Authentication • Security and privacy ~ Multi-factor authentication • Security and privacy ~ Usability in security and privacy Glossary AD Active Directory.3,6,8, 21, 22, 23, 24, 25, 30, 39, 43, 44, 58, 74 API Application Programming Interface. 23 ASCII American Standard Code for Information Interchange.9, 10 CIS Center for Internet Security.8,9, 10, 13, 29, 58 CPU Central Processing Unit. 35 CSV Comma-Separated Values. 42, 49 DES Data Encryption Standard. 24, 25, 51 DSA Directory System Agent. 23 ESE Extensible Storage Engine. 21, 23 GPU Graphics Processing Unit.3, 35, 36 IT information technology.1,6, 11, 13, 15, 16 LDAP Lightweight Directory Access Protocol. 22, 23, 24 LM LAN Manager. viii,x, xii,4, 24, 25, 30, 31, 32, 35, 36, 37, 38, 39, 40, 42, 43, 44, 45, 44, 45, 46, 47, 48, 49, 50, 51, 74 MD4 Message Digest 4. 25 NIST National Institute of Standards and Technology.3,9, 10, 13, 14, 29, 58, 74 NTLM NT LAN Manager. viii,x, xii,3,4,8, 24, 25, 30, 31, 32, 35, 36, 37, 38, 39, 40, 41, 42, 45, 47, 48, 49, 50, 51, 58, 68, 70 iv Glossary v SASL Simple Authentication and Security Layer. 24 SHA1 Secure Hash Algorithm 1. 17 SID Security ID. 38, 42 SMS Short Message Service. 10 SSL Secure Sockets Layer. 24 TLS Transport Layer Security. 24 Contents Glossary iv List of Figures xi List of Tables xiii 1 Introduction1 1.1 Context of the research.............................1 1.2 Research statement...............................2 1.3 Research objectives...............................3 1.4 Approach....................................3 1.5 Limitations...................................4 1.6 Document structure...............................4 2 Literature review6 2.1 Overview of passwords.............................6 2.2 Organisational password policy........................7 2.2.1 Typical South African password policies............... 10 2.2.2 Password policy concerns........................ 14 vi CONTENTS vii 2.2.3 Selection of passwords......................... 15 2.3 Password attack methods............................ 16 2.3.1 Attacks using dictionaries....................... 17 2.3.2 Brute-force attacks........................... 17 2.3.3 Attacks using rainbow tables...................... 18 2.3.4 Attacks using part-of-speech tagging................. 18 2.3.5 Keyboard walking............................ 19 2.4 Microsoft active directory database...................... 21 2.4.1 Password storage............................ 23 2.4.2 Windows password hashing algorithms................ 24 2.5 Analysis of Chinese regional breached passwords............... 26 2.6 Summary.................................... 29 3 Research design 31 3.1 High-level overview of research......................... 31 3.2 Password databases............................... 32 3.3 Breached password lists............................ 33 3.3.1 HaveIbeenPwned............................ 33 3.3.2 Breachcompilation........................... 33 3.3.3 Weakpass_2a.............................. 33 3.4 Rules used.................................... 34 3.5 Creating African language derived passwords................. 34 3.6 Hardware/software configuration....................... 36 3.7 Hashcat attack modes............................. 36 3.8 Summary.................................... 37 CONTENTS viii 4 Analysis of LM and NTLM hashes 38 4.1 Extraction software............................... 38 4.2 Extraction of hashes.............................. 41 4.3 LAN Manager (LM) hashes.......................... 43 4.4 NT LAN Manager (NTLM) hashes...................... 46 4.5LM hash attack................................. 47 4.6 NTLM hash attack............................... 48 4.7 Characters forLM and NTLM hashes..................... 49 4.8 Summary.................................... 50 5 Analysis and discussion of organisational passwords 51 5.1 Cracked passwords............................... 51 5.2 Top ten passwords............................... 52 5.3 Top ten base words............................... 52 5.4 Keyboard walking patterns........................... 55 5.5 Password length analysis............................ 58 5.6 Analysis of digits used............................. 60 5.7 Use of characters in passwords......................... 61 5.8 Letter frequency analysis............................ 62 5.9 Character set usage............................... 64 5.10 Summary.................................... 65 CONTENTS ix 6 Generating and analysing passwords using African languages 66 6.1 Creation of African language passwords.................... 66 6.2 Further processing of passwords generated.................. 69 6.3 Analysis of African derived passwords..................... 70 6.3.1 African language base words found.................. 71 6.3.2 Passwords found............................ 72 6.4 Summary.................................... 73 7 Conclusion and future work 74 7.1 Summary.................................... 74 7.2 Future work................................... 75 List of Figures 2.1 Password examples taken from CapeNature(2007).............. 13 2.2 Example of keyboard walking......................... 20 2.3 Second example of keyboard walking..................... 20 2.4 Third example of keyboard walking...................... 20 2.5 Square keyboard walking............................ 20 2.6 Directional keyboard walking......................... 21 2.7 Rectanglular east and west pattern...................... 21 2.8 Physical components of the Data store taken from Microsoft(2014).... 22 2.9 Data store architecture taken from Microsoft(2014)............. 23 2.10LM hash creation from Johansson(n.d.)................... 25 2.11 NTLM hash creation from Johansson(n.d.)................. 26 2.12 Top weak Chinese and English characters obtained from Li et al. (2014).. 27 4.1 Extract of Impacket’s secretsdump...................... 38 4.2 NTDS.dit, SYSTEM and SECURITY extraction using NTDSUtil ..... 40 4.3 NTDS.dit and SYSTEM extraction using Vssadmin ............. 41 4.4LM hash treemap top 100........................... 44 x LIST OF FIGURES xi 4.5LM hash top ten................................ 45 4.6 NTLM hash top 20............................... 46 5.1 Cracking passwords using keyboard walking................. 56 5.2 Keypad walking patterns used......................... 57 5.3 Top 20 character counts in cracked password list............... 61 5.4 Top 20 character heatmap where darker colours show higher frequency of use 62 5.5 English letter frequency............................ 63 5.6 Cracked password letter frequency....................... 63 6.1 Venda special characters............................ 66 List of Tables 2.1 Li et al. (2014) leaked password datasets................... 26 2.2 Top weak Chinese and English passwords obtained from Li et al. (2014).. 27 2.3 Top five Chinese Pinyins and English words obtained from Li et al. (2014) 28 2.4 Eight character date formats used obtained from Li et al. (2014)...... 29 2.5 Six character dates used obtained from Li et al. (2014)........... 29 3.1 Hardware used to extract and analyse the NTLM andLM hashes..... 36 3.2 Software used to obtain clear text passwords................. 36 4.1 Hashes collected................................. 42 4.2 Count of least frequently appearingLM hashes................ 45 4.3 Count of least frequently appearing NTLM hashes.............. 47 4.4 NTLM passwords found using wordlists and rules.............. 48
Recommended publications
  • Illustrated Tutorial: Creating a Bootable USB Flash Drive for Windows XP
    Illustrated tutorial: Creating a bootable Version 1.0 February 15, 2007 USB flash drive for Windows XP By Greg Shultz The ability to boot Windows XP from a USB Flash Drive (UFD) offers endless possibilities. For example, you might make an easy-to-use troubleshooting tool for booting and analyzing seemingly dead PCs. Or you could transport your favorite applications back and forth from home to work without having to install them on both PCs. However, before you can create a bootable UFD, you must clear a few hurdles. You saw that one coming didn’t you? The first hurdle is having a PC in which the BIOS will allow you to configure the USB port to act as a bootable device. The second hurdle is having a UFD that that will work as a bootable device and that’s large enough and fast enough to boot an operating system such as Windows XP. The third hurdle is finding a way to condense and install Windows XP on a UFD. If you have a PC that was manufactured in the last several years, chances are that its BIOS will allow you to configure the USB port to act as a bootable device. If you have a good qual- ity UFD that’s at least 512 KB and that was manufactured in the last couple of years, you’ve probably cleared the second hurdle. And once you’ve cleared those first two hur- dles, the third one is a piece of cake. All you have to do is download and run some free soft- ware to create the bootable UFD.
    [Show full text]
  • Sourcefire White Paper
    And Its Role in the Security Model www.sourcefire.com June 2002 Sourcefire, Inc. 7095 Samuel Morse Drive Suite 100 Columbia, MD 21046 410.290.1616 | 410.290.0024 TABLE OF CONTENTS Table of Contents ............................................................................................................2 Open Source Software: OSS...........................................................................................3 What is OSS?..........................................................................................................................3 History.....................................................................................................................................4 Opinions on OSS.....................................................................................................................4 Arguments in favor of OSS ......................................................................................................5 Security, Stability, and Cost .......................................................................................................................5 Standards, Immediacy, and Lack of Restrictions......................................................................................7 Arguments Against OSS..........................................................................................................7 Status Quo and Security.............................................................................................................................8 Poor Packaging and Support .....................................................................................................................9
    [Show full text]
  • Windows Server 2012 Refresh: How to Manage the Migration
    WINDOWS SERVER 2012 REFRESH: HOW TO MANAGE THE MIGRATION A guide to overcoming the challenges during the transition from Windows Server 2003 to Windows Server 2012 TABLE OF CONTENTS 5 Performing an application inventory 8 Upgrading Active Directory 9 Considering a hardware refresh 12 A move to virtualization 13 Certification, compliance and security 2 “Let’s face it. It’s the applications you’re running that are driving use of Windows Server 2003. Those are the things that are the beginning and end of what the Windows migration is all about.” AL GILLIN Program Vice President for Servers and System Software at IDC 3 INTRODUCTION With support ending for Windows Server 2003 in July 2015, companies need to ensure that their servers will adequately support the latest server OS and critical applications. By upgrading to Windows Server 2012, companies can increase their parallel computing capabilities and gain improved control over power consumption. Upgrading to the latest version of Windows Server brings the opportunity for businesses to lower their operating costs. “It’s an expensive proposition to continue supporting those old operating systems,” said Al Gillin, program vice president for servers and system software at IDC. Running one operating system rather than varieties of Server 2008, 2008 R2 and Server 2003R2 will make IT data centers more efficient. “If you have four different versions in place like that, that makes it more difficult for you to run your infrastructure,” Gillin said. When preparing for a Windows Server migration, companies should test all applications using a software tool such as Dell ChangeBASE before going live in the new OS.
    [Show full text]
  • Microsoft Service Pack & Security Bulletin Support
    Microsoft Service Pack & Security Bulletin Support ReadMe Revision History Date Revised Changes Made March 23, 2020 March 2020 Microsoft Security Update Contents What’s New? . 1 Microsoft Security Bulletins . 2 Current Microsoft Security Bulletin Status . 2 Enabling Windows Updates on Avid Systems . 6 Using a Microsoft WSUS Server for distributing Windows Updates. 7 Historical List of Microsoft Security Bulletin Exceptions . 7 What’s New? For March security bulletins, see “Current Microsoft Security Bulletin Status” on page 2. The section on “Notification Regarding the January 2020 Windows Updates” on page 3 has been updated to include information on MediaCentral Asset Management and MediaCentral Newsroom Management. See also http://avid.force.com/pkb/articles/en_US/Troubleshooting/en239659. Microsoft Security Bulletins Microsoft Security Bulletins Install Windows Security Patches and Service Packs. To download patches, run Windows Update. By default Avid supports all Windows Service Packs and security patches (sometimes referred to as “hot fixes”) which apply to the environments in which Avid products are deployed. We refer to them as Windows Updates in this document. Customers can schedule the download and installation of Windows Updates whenever they are available and make sense in their production environment. Avid tests the updates within several days of their availability. However, customers do not have to wait for the testing to be complete before installing the updates. Our current testing methodology is to utilize Windows Update on a representative sample of Avid products upon notification of new Security Bulletin availability by Microsoft. These systems are updated and observed while under test. Once the test period has completed (approx.
    [Show full text]
  • System Requirements
    Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files, release notes, and the latest version of the applicable user documentation, which are available from the Trend Micro website at: http://docs.trendmicro.com/en-us/enterprise/officescan.aspx Trend Micro, the Trend Micro t-ball logo, and OfficeScan are trademarks or registered trademarks of Trend Micro Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Copyright © 2017 Trend Micro Incorporated. All rights reserved. Release Date: October 2017 Protected by U.S. Patent No. 5,623,600; 5,889,943; 5,951,698; 6,119,165 Table of Contents Chapter 1: OfficeScan Server Installations Fresh Installations on Windows Server 2008 R2 Platforms .............................................................................................................................................................................. 1-2 Fresh Installations on Windows Server 2012 Platforms ..................................................................................................................................................................................... 1-3 Fresh Installations on Windows Server 2016 Platforms ..................................................................................................................................................................................... 1-4 Fresh Installations
    [Show full text]
  • Migrating Active Directory to Windows Server 2012 R2
    Windows Server 2012 R2 Migrating Active Directory to Windows Server 2012 R2 Hands-on lab In this lab, you will complete a migration of a Windows Server 2008 R2 domain environment to Windows Server 2012 R2 with no downtime to clients. All roles currently held including FSMO, DHCP and DNS will be transferred to enable the Windows Server 2008 R2 domain controller to be retired. Produced by HynesITe, Inc. Version 1.0 12/15/2013 This document supports a preliminary release of a software product that may be changed substantially prior to final commercial release. This document is provided for informational purposes only and Microsoft makes no warranties, either express or implied, in this document. Information in this document, including URL and other Internet Web site references, is subject to change without notice. The entire risk of the use or the results from the use of this document remains with the user. Unless otherwise noted, the companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted in examples herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation.
    [Show full text]
  • Security Policy for FIPS 140-2 Validation
    BitLocker Windows Resume Security Policy for FIPS 140‐2 Validation BitLocker® Windows Resume (winresume) in Microsoft Windows 8.1 Enterprise Windows Server 2012 R2 Windows Storage Server 2012 R2 Surface Pro 3 Surface Pro 2 Surface Pro Windows Embedded 8.1 Industry Enterprise StorSimple 8000 Series DOCUMENT INFORMATION Version Number 2.0 Updated On April 22, 2015 © 2015 Microsoft. All Rights Reserved Page 1 of 19 This Security Policy is non‐proprietary and may be reproduced only in its original entirety (without revision). BitLocker Windows Resume The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. This work is licensed under the Creative Commons Attribution-NoDerivs- NonCommercial License (which allows redistribution of the work). To view a copy of this license, visit http://creativecommons.org/licenses/by-nd-nc/1.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
    [Show full text]
  • Exploring the Windows Server 2008 Interface
    LAB 1 EXPLORING THE WINDOWS SERVER 2008 INTERFACE This lab contains the following projects and activities: Project 1.1 Modifying Basic Server Settings Project 1.2 Configuring TCP/IP Settings Project 1.3 Configuring a Second Windows Server 2008 Computer (Optional) Project 1.4 Configuring a Windows Server 2008 Server Core Computer (Optional) Lab Review Questions Lab Challenge Verifying Active Directory SRV Records 1.1 COPYRIGHTED MATERIAL BEFORE YOU BEGIN Lab 1 assumes that setup has been completed as specified in the setup document and that your computer has connectivity to other lab computers and the Internet. To perform all projects in Lab 1, you will need: • Two (2) full installations of Windows Server 2008 • One (1) Server Core installation of Windows Server 2008 2 Microsoft Windows Server 2008 Active Directory Configuration For subsequent labs, optional projects are provided that involve a second server running the full GUI version of Windows Server 2008 to be configured as a Read- Only Domain Controller and a third server running Windows Server 2008 Server Core. You can use multiple physical computers, or you can use Microsoft Virtual PC or Virtual Server to install and run multiple servers on a single machine. This manual assumes that you are using multiple virtual machines under Microsoft Virtual PC. In the optional projects for this lab, Projects 1.3 and 1.4, you will configure the second and third servers necessary to perform the optional projects in future lessons. The instructor PC is preconfigured as a domain controller in the lucernepublishing.com domain for demonstration purposes; it is named INSTRUCTOR01.
    [Show full text]
  • Microsoft Windows Server 2012 R2
    MICROSOFT WINDOWS SERVER 2012 R2 APPLICATION-FOCUSED SERVICES TOP 3 BENEFITS Windows Server 2012 R2 enables you to build and deploy applications in your data center that utilize higher-level, ❒4 Comprehensive Cloud Platform cloud-based application services and APIs that are ❒4 Cost Savings and Increased Efficiencies compatible with service provider clouds and Windows Azure. This functionality provides improved application ❒4 Support for a Modern Work Style portability between on-premises, public and partner- hosted clouds, increasing the flexibility and elasticity of your IT services. OPTIMIZE YOUR CLOUD BUSINESS Windows Server 2012 R2 also provides frameworks, With the world of IT changing rapidly, traditional services and tools to increase scalability and elasticity approaches to solving infrastructure problems are for multitenant-aware applications and websites. inadequate. The Microsoft vision for this new era of IT is to provide one consistent platform for infrastructure, apps, and data: the Cloud OS. The Cloud OS spans customer data centers, service provider data centers and the Microsoft PEOPLE WHO GET IT public cloud. At the heart of the solution is Windows Server 2012 R2. With Windows Server 2012 R2, you gain Along with your dedicated account manager, an enterprise-grade platform to cost-effectively optimize CDW has Microsoft trained and certified your business with a cloud. experts who can help find the right data center technologies for you, including: SIMPLE AND COST-EFFECTIVE DESIGN Windows Server 2012 R2 enables you to blend your Professional Services: on-premises solutions with the cloud without having • 500 engineers and project managers, to reengineer infrastructure, systems management or including 90+ Microsoft engineers applications.
    [Show full text]
  • When Windows 2000 Or Windows Server 2003 Is Introduced
    IMPORTANT INFORMATION FOR PRIMERGY CUSTOMERS July 11th, 2007 FUJITSU, LTD. NOTICE: Any server using an Intel Xeon 7100 or higher model CPU and has either Windows 2000, Windows 2000 Server, or Windows 2003 Server installed may encounter a “blue screen.” The problem occurs when the operating system running on a computer with a fast processor and a large L3 cache encounters a timing problem with asynchronous hardware. Although Fujitsu has not received any reports of this problem to date, there is a possibility that PRIMERGY server products may be affected. Problem: Any computer running any edition of Windows 2000, Windows 2000 Server, or Windows 2003 with an Intel Xeon processor (model 7100 or higher) that utilizes a large L3 cache may generate a “blue screen.” An error similar to: STOP 0x0000008E(parameter1, parameter2, parameter3, parameter4) KERNEL_MODE_EXCEPTION_NOT_HANDLED or STOP 0x0000001E(parameter1, parameter2, parameter3, parameter4) KERNEL_MODE_EXCEPTION_NOT_HANDLED may be displayed with Windows 2003-based and Windows 2000-based computers, respectively. Affected Operating Systems: Microsoft® Windows® 2000 Server Microsoft® Windows® 2000 Advanced Server Microsoft® Windows Server® 2003, Standard Edition (*) Microsoft® Windows Server® 2003, Enterprise Edition (*) (*)This problem has been corrected in Service Pack 1 for Windows Server 2003. Therefore Windows 2003 Server SP1 is not affected by this problem. Affected Fujitsu PRIMERGY models: The following models use Intel Xeon 7100 or higher processors. PRIMERGY Models, Product Codes, and CPU z PRIMERGY RX600 S3 (SAS), Product codes PGR603D* and PGR603B* ¾ Dual Core Intel® Xeon® Processor 7140M (3.40GHz)/7120M (3GHz) z PRIMERGY RX600 S3, Product codes PGR6038* and PGR6036* ¾ Dual Core Intel® Xeon® Processor 7140M (3.40GHz)/7120M (3GHz) * Changes by type.
    [Show full text]
  • Bastian Ballmann Attack and Defense with Python 3 2Nd Edition
    Bastian Ballmann Understanding Network Hacks Attack and Defense with Python 3 2nd Edition Understanding Network Hacks Bastian Ballmann Understanding Network Hacks Attack and Defense with Python 3 2nd Edition Bastian Ballmann Uster, Switzerland ISBN 978-3-662-62156-1 ISBN 978-3-662-62157-8 (eBook) https://doi.org/10.1007/978-3-662-62157-8 © Springer-Verlag GmbH Germany, part of Springer Nature 2015, 2021 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifcally the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microflms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specifc statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affliations. Responsible Editor: Martin Börger This Springer imprint is published by the registered company Springer-Verlag GmbH, DE part of Springer Nature.
    [Show full text]
  • Introduction to Microsoft Core Licensing Models
    Licensing brief October 2020 Introduction to Microsoft Core licensing models This brief applies to all Microsoft Licensing programs. Contents Summary ...................................................................................................................................................................................................................... 1 Definitions ................................................................................................................................................................................................................... 2 Introduction to Per Core Licensing ................................................................................................................................................................... 4 Per Core licensing model ............................................................................................................................................................................. 5 Per Core/CAL licensing model ................................................................................................................................................................... 5 Management Servers licensing model ................................................................................................................................................... 6 SQL Server .............................................................................................................................................................................................................
    [Show full text]