Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tags SQL Server 2005, Security Rss

   Items 1 to 20 of 64    Older >>
 

Create_sp_help_revlogin_DB

Enhanced sp_help_revlogin  Read more...
By David A. Long 2012/08/01 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 2,282 reads

Three Attack Vectors in SQL Server 2005

This article outlines three different tried and tested methods of obtaining access to databases in SQL Server 2005 where no database-level administrative access exists.  Read more...
By Derek Colley 2012/03/07 | Source: SQLServerCentral.com | Category: password
Rating: |  Discuss |   Briefcase | 6,839 reads

Logins created in the last X Days

These scripts give you the list of logins created in the Last X Days for SQL Server 2000 or 2005.  Read more...
By Mani Singh 2011/12/23 | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 2,250 reads

Script a Database Role

Script one or all roles in a database. Includes users, obect permissions and column permissions.  Read more...
By Ed Vassie 2011/09/08 | Source: SQLServerCentral.com | Category: sql server 7
Rating: |  Discuss |   Briefcase | 5,050 reads

Vote for Me for a PASS SQLRally Precon on SQL Server Security

Unless James Bond is in the picture, security is usually not a sexy topic. However, we all lament the lack...  Read more...
By 2010/10/28 | Source: SQLServerCentral.com | Category: blogs
Rating: (not yet rated)  Rate this |   Briefcase | 1,836 reads

For SQL Server 2005/2008, Consider SecurityAdmin = SysAdmin

In a recent thread here on SQL Server Central, it was pointed out that a member of the securityadmin fixed...  Read more...
By Brian Kelley 2010/07/23 | Source: SQLServerCentral.com | Category: blogs
Rating: (not yet rated)  Rate this |   Briefcase | 3,969 reads

Find weak login passwords in your server

Use this script to search for SQL Server logins who use weak password  Read more...
By Th Tr 2010/01/05 | Source: SQLServerCentral.com | Category: t-sql
Rating: |  Discuss |   Briefcase | 3,505 reads

Using a Certificate Signed Stored Procedure to Execute sp_send_dbmail

Learn how to create a certificate signed stored procedure to solve common permissions problems using sp_send_dbmail. MVP Jonathan Kehayias brings us a short tutorial that discusses your options and code to show you how to implement certificate security.  Read more...
By Jonathan Kehayias 2009/12/17 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 7,777 reads

How to simulate transparent data encryption (TDE) with SQL 2000 and 2005

Encryption of data at rest is becoming more and more crucial in today‚Äôs world. This tip is aimed to help businesses that do not have the budgets or resources to purchase hardware encryption tools or to upgrade to SQL 2008. It basically illustrates how to achive transparent file encryption with SQL 2005 or SQL 2000.  Read more...
Rating:  Rate this |   Briefcase | 3,082 reads

Why We Recommend Against xp_cmdshell

Every so often I see a post in a forum or on Twitter about the use of xp_cmdshell. Usually it is someone looking for...  Read more...
By 2009/11/19 | Source: SQLServerCentral.com | Category: blogs
Rating:  Rate this |   Briefcase | 6,847 reads

SQL University: Multiple Paths and Ownership Chaining

Welcome back to our last class this term on security in SQL Server here at SQL University. According to the syllabus,...  Read more...
By 2009/11/03 | Source: SQLServerCentral.com | Category: blogs
Rating: (not yet rated)  Rate this |   Briefcase | 1,636 reads

Proxy Accounts in SQL Server

Yan Pan explains how to set up proxies in SQL Server 2000, 2005 and 2008, and compares the differences between them  Read more...
By Additional Articles 2008/12/30 | Source: Database Journal | Category: proxy accounts
Rating: (not yet rated)  Rate this |   Briefcase | 3,428 reads

Database Security

By Steve Jones 2008/12/05 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 3,705 reads

Logins created in the last X Days

These scripts give you the list of logins created in the Last X Days for SQL Server 2000 or 2005.  Read more...
By Mani Singh 2011/12/23 | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 2,250 reads

usp_ShowOrphanUsers - SQL 2k5

Check Orphaned logins ie, not associated with any database on the current instance.  Read more...
By Pedro Lopes MS 2008/07/16 | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 1,582 reads

usp_SecurCreation - SQL 2k5/2k8

Creates statements for securables creation.  Read more...
By Pedro Lopes MS 2008/06/30 | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 2,558 reads

Identify SQL Server 2005 Standard Login Settings

Gaining insight into my SQL Server standard and Windows logins has historically been a challenge in terms of determining password changes, failed login attempts, etc. I have noticed that you have experienced the same issue with your tip entitled 'When was the last time the SQL Server sa password changed' and I have noticed some information in the forums on the topic as well.   Read more...
By Additional Articles 2008/04/21 | Source: MSSQLTips.com | Category: sql server 2005
Rating:  Rate this |   Briefcase | 3,030 reads

SQL Server 2005 Logins

Security was a major focus of SQL Server 2005 during its development, both in terms of making the product secure as well as enhancing the options. Security expert Brian Kelley brings us a look at how the paradigm of logins has changed and what you need to look for in SQL Server 2005.   Read more...
By Brian Kelley 2008/04/11 (first published: 2006/07/05) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 116,966 reads

Create_sp_help_revlogin_DB

Enhanced sp_help_revlogin  Read more...
By David A. Long 2012/08/01 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 2,282 reads

Application Roles

By Additional Articles 2008/03/19 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 3,038 reads
   Items 1 to 20 of 64    Older >>
 
Tags
sql server 2008 (7)    
sql server 7 (6)    
administration (4)    
blogs (4)    
encryption (4)    
sql server 2000 (4)    
database security (3)    
sql server (3)    
strategies (3)    
development (2)    
sql server 2008 r2 (2)    
sql server architecture (2)    
advanced (1)    
backup / restore (1)    
conferences/user groups (1)    
database design (1)    
database mail (1)    
database roles (1)    
jobs (1)    
logins (1)    
maintenance (1)    
miscellaneous (1)    
password (1)    
permissions (1)    
presenting (1)    
professional development (1)    
professional organization for sql server (1)    
proxy accounts (1)    
sql agent (1)    
sql university (1)    
tools (1)    
training (1)    
transparent data encryption (tde) (1)    
t-sql (1)    
windows security (1)    
xml (1)    
xsl (1)