29.10.2009 - When you use trusted connections, username and password are to impersonate a client, then using a trusted connection will potentially have .