Problem with connect mysql databases of remote

I’m getting error with connect remote mysql database. Firstly;

1-) I use windows 10 machine and my remote server also windows 10 machine.

2-) My database at locale at remote windows machine with root.

I tried so many things but enter image description here and

ı took error picture enter image description here

Also I CREATE USER user but again ı have a problem. How can ı fixed and connect remote database

Please help me?

Changes to server configuration option remote access are not supported in SQL Database Managed Instances

Having just set up our new SQL Server Managed Instance, restored a sample database for testing, and run Azure’s vulnerability assessment, it produces this high risk finding:

VA2120 – Features that may affect security should be disabled

The more SQL Server features and services you enable, the larger its surface attack area becomes, making your system more vulnerable to potential attacks. These fetures should be disabled unless it is absolutely needed in this environment.

Remediation Script:

EXECUTE sp_configure 'show advanced options', 1; RECONFIGURE WITH OVERRIDE; EXECUTE sp_configure 'remote access', 0; RECONFIGURE; EXECUTE sp_configure 'show advanced options', 0; RECONFIGURE; 

Turning to Google before doing anything, I found this Microsoft Docs article stating that (emphasis mine):

This topic is about the "Remote Access" feature. This configuration option is an obscure SQL Server to SQL Server communication feature that is deprecated, and you probably shouldn’t be using it.

Can anyone therefore please provide some clarity on the following?

  1. Why is it enabled given Microsoft’s description?
  2. Does it need to be enabled in Azure SQLMI? Because…
  3. When I run the remediation script I get this error:

Changes to server configuration option remote access are not supported in SQL Database Managed Instances.

PayDo: Remote European IBAN opening for high-risk business

Hi guys!

We all know that forex trading has a reputation for being a high-risk business. Since many forex business owners provide their services without a license it casts a shadow over the entire industry.

It is difficult for this type of business to obtain a license due to the constantly tightening regulation by supervisory authorities.

But we at PayDo have a solution.

What do we offer?

  • PayDo offers opening a merchant account for forex and crypto…

PayDo: Remote European IBAN opening for high-risk business

How do I accommodate a blind player at my remote table?

For remote play at our table, we use a camera stuck on a microphone-boom-arm that we can rotate by 360°. We found out that we prefer it to have our rest position at about 45°, instead of top-down because the top-down angle creates nausea for some of our players, and it simulates sitting at a table. We use a 19 by 19 go-board with numbered and lettered tiles to make calls based on a grid for combat encounters and other visualisation when appropriate. For indicating features, we use a mix of miniatures that were part of the 2002 D&D boardgame by Hasbro and cardboard printouts that create terrain objects by sliding them together at a 90° angle with little plastic sockets, so they don’t topple over.

I designed our base set-up for remote play to feign an in-person feeling by visualisation.

I will have a remote guest player for three sessions who is blind, and I’m looking for preparations and ways to accommodate them and make our set-up as accessible as reasonable. What can I do to optimise the experience for them in particular, and so in turn for all of us?

How to make a remote server be invisible to a user

I have a webserver www.example.com that takes user input and calculates results on a remote server: <form action="www2.example.com/action.cgi">

Now the user is on the second server. How do I keep the user on the main server (or make www2 invisible to the user)?

One possibility is to do an Ajax query in the background, but that would mean results are transferred from www2 to www and then to the user, which adds delay and bandwidth costs.

What are some possibilities to accomplish this?

Also, if, in future, we have multiple remote servers www2, www3, etc. what would be the best way to accomplish this?

Query to polybase external table giving error “Access to the remote server is denied because no login-mapping exists.”

we have successfully created all pre-requisite of creating external tables using SQL Server 2017 Standard Edition CU22 Polybase.

The issue we have is the non-sysadmin login can’t query those external tables .It shows below error.

Msg 7416, Level 16, State 2, Line 29 Access to the remote server is denied because no login-mapping exists.

The sysadmin login can query external tables without any issue. Is there anybody saw this issue and can help to resolve it.

Capturing SQL calls sent to a remote server from application

First of all, I’m not well versed in SQL anything at all. Closest I’ve ever needed to get was storing and retrieving data from a local SQLite db.

In essence I think I have a simple problem but it’s hard to orient yourself when everything is new.

My main tool at work is an ERP software, which is basically a front end to an SQL db.

Problem I have with it is that it’s very clumsy and doesn’t allow automation of even the most basic tasks.

What I want to do, is bypass the front-end completely and interact directly with the db to automate most of my tasks with python.

I can connect to the database just fine from python environment, but the schema is gigantic, there’s no way I’ll be able to find whatever it is I might be looking for.

So I need to capture the call front-end sends when I click a button (telling it to display specific set of data) to use that call as a guide.

Basically, how can I, an SQL noob, capture calls that a desktop application sends to a remote server?

Edit 1: My job is mostly analytical, so all of my automation will be for retrieval, analysis and visualization. I’m not very likely to mess anything up.

Edit 2: Tried running a Profiler and got the message:

"In order to run a trace against SQL Server you must be a member of sysadmin fixed server role or have the ALTER TRACE permission."

I’m not a sysadmin, don’t have an alter trace permission and reeeally don’t feel like asking for it 😀

Do I need port forwarding for msfconsole remote target exploitation

I was running a series of test attacks on my virtual test machine. Here i had to set the RHOST option to the Ip-address of the target and LHOST to the Ip-address of my local machine. I am certain that this works well locally because both machines would be on the same private network, with private ip addresse. But what if i had my linux machine(not vm) connected to my phone which is serving as a router. If i ran such an attack on a machine on the internet, RHOST would be the public Ip-address of the target machine; i am skeptical as to what ip address i would put for my LHOST option; can i just use my private ip address(given to my linux from my phone hotspot) as this option or do i have to type in the public ip-address for my phone. And if i do have to put in my phone’s public IP is port forwarding needed in such a case or it would work just fine?

Remote command using Sophos Management

in a recent analysis of a ransomware attack, where BitLocker was used to encrypt the disk, I found that the company was using Sophos.

In the folder C:577-Sophos\AutoUpdate\data\warehouse I found some files that contain executable code and activate BitLocker, using command like the following from disk F: to Z:

manage-bde -on F: -rp 599368-358941-467368-368093-397672-261921-132506-522577 -sk C:\ -s

I’m not really into Sophos management and administration, but I read that the folder warehous can be use as cache for the update installations.

Are these files false positive? Or the malicious actors could use Sophos to spread malicious commands?

Store cookies for multiple sites on remote server and connect from multiple clients


Would it be secure to:

  1. Store all my website cookies (stack sites, webhost, github, web-based email, etc) on a remote server (using an customized open-source VPN or something)
  2. Login to the server with password + 2fa (and maybe have a trusted devices list?)
  3. Keep the cookies only on the server… never actually download them to any of my devices
  4. When visiting stackexchange.com, for example, my server would send the cookies to stack exchange, get the response, and send it back to me, but REMOVE any cookies & store them only on my server

Benefits (I think):

  1. I could keep diverse and very strong passwords for every website, but don’t store the passwords anywhere digitally (keep them on paper in a safe at home or something)
  2. logging in to all the sites I use on a new device only requires one sign in (to my custom VPN server)
  3. Only cookies would be stored digitally, so if anything went wrong server-side, my passwords would be safe & I could disable all the logins through each site’s web-interface

Problems (I think):

  1. If the authentication to my custom VPN is cracked, then every website I’ve logged into would be accessible
  2. The time & energy & learning required to set something like this up.

Improvement idea:

  1. When I sign in to the server the first time, the server creates an encryption key, encrypts all the cookies with it, and sends the encryption key to me as a cookie. Then on every request, my browser uploads the key, the website’s cookie is decrypted, then the request is made to whatever website I’m visiting. Then only one client could be logged in at a time (unless the encryption cookie were stolen)
  2. Encrypt each cookie with a simple password, short password or pin number
  3. An encryption key that updates daily (somehow)
  4. Keep a remote list of trusted devices, identified by IP address? Or maybe by cookie?

Why not just sign into the browser and sync cookies across devices?

  • Signing into Firefox mobile & Firefox on my computer doesn’t give the cookies to Twitter’s or Facebook’s web-browsers (that frustratingly always open first instead of taking me to my actual browser!)
  • It’s not as cool?
  • That would require me to trust a third-party (of course, I’ll ultimately have to trust my web-host to some extent)