Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tags SQL Server 2005, Security, SQL Server 7 Rss

   Items 1 to 8 of 8   
 

Logins created in the last X Days

These scripts give you the list of logins created in the Last X Days for SQL Server 2000 or 2005.  Read more...
By Mani Singh 2011/12/23 | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 2,264 reads

Script a Database Role

Script one or all roles in a database. Includes users, obect permissions and column permissions.  Read more...
By Ed Vassie 2011/09/08 | Source: SQLServerCentral.com | Category: sql server 7
Rating: |  Discuss |   Briefcase | 5,078 reads

Proxy Accounts in SQL Server

Yan Pan explains how to set up proxies in SQL Server 2000, 2005 and 2008, and compares the differences between them  Read more...
By Additional Articles 2008/12/30 | Source: Database Journal | Category: proxy accounts
Rating: (not yet rated)  Rate this |   Briefcase | 3,484 reads

Logins created in the last X Days

These scripts give you the list of logins created in the Last X Days for SQL Server 2000 or 2005.  Read more...
By Mani Singh 2011/12/23 | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 2,264 reads

Script a Database Role

Script one or all roles in a database. Includes users, obect permissions and column permissions.  Read more...
By Ed Vassie 2011/09/08 | Source: SQLServerCentral.com | Category: sql server 7
Rating: |  Discuss |   Briefcase | 5,078 reads

Hacking SQL Server

In this presentation at the Jacksonville SQL Server Users Group, Bayer White playS the part of a developer protecting his application and Brian Knight attempts to hack his application using SQL Injection and cross-site scripting. Then, Bayer will show you how to protect yourself from the hacker and then Brian tries again. Back and forth the chess match goes until someone wins!   Read more...
By Additional Articles 2007/02/12 | Source: JumpStartTV | Category: security
Rating:  Rate this |   Briefcase | 4,970 reads

Anticipate the worst when developing SQL Server databases

Arthur Fuller advises DBAs to try to break their software in order to make sure their SQL Server databases can withstand potential attacks. See if your code can hold up to his suggested tests.  Read more...
By Additional Articles 2006/10/12 | Source: Builder.com | Category: security
Rating:  Rate this |   Briefcase | 3,185 reads

Ownership Chaining

Security in SQL Server is not too complex, following a fairly simple framework for allowing and preventing access to data. However there are a few places where it can get tricky and some concepts that many people do not understand. Rob Farley brings us an explanation of one of those areas: ownership chaining. Read about how ownership chaining can be useful and also how it may open security holes in your environment.   Read more...
By Rob Farley 2006/10/03 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 5,512 reads
   Items 1 to 8 of 8   
 
Tags
administration (1)    
database roles (1)    
jobs (1)    
logins (1)    
maintenance (1)    
permissions (1)    
proxy accounts (1)    
sql agent (1)    
sql server 2008 (1)    
strategies (1)