SQL Server Database Corruption, Part II: Simulating Corruption