SQL hack. BI impostor. Destroyer of reports. Vanquisher of environs. Beater of clusters. Disrupter of availability groups. Dropper of tables. Deleter of users. Denyer of permissions.