Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tags SQL Server 7, T-SQL, Security Rss

   Items 1 to 15 of 15   
 

Permission scripting over all databases

Scripts permissions/roles for db user across all databases.  Read more...
By W Louw 2013/10/01 | Source: SQLServerCentral.com | Category: permissions
Rating: |  Discuss |   Briefcase | 12,191 reads

Encrypting Data With the Encrypt Function

One of the major problems in the database field is when people store sensitive data unencrypted into SQL Server. This article shows you one of the most basic ways to encrypt data to the casual viewer.   Read more...
By Brian Knight 2006/05/29 (first published: 2001/07/17) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 32,962 reads

Logins, Users, and Roles - Getting Started

Do you know the difference between a login and a user? What's the best way to add them; Enterprise Manager, T-SQL, or SQL-DMO? In this beginner level article Andy demonstrates how to use all three methods to add logins and users and offers his view of which is the best technique.   Read more...
By Andy Warren 2005/09/30 (first published: 2003/02/19) | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 35,253 reads

Stop SQL Injection Attacks Before They Stop You

A new article from MSDN magazine on stopping SQL Injection attacks by examining how the SQL can be exploited. It's a good basic article for developers as well as DBAs who might have to review code.  Read more...
By Additional Articles 2004/08/20 | Source: MSDN Communities | Category: security
Rating:  Rate this |   Briefcase | 2,373 reads

How to Make Sure You Have Good Passwords

As Robin points out there is no built in way to make sure users have strong passwords when using SQL authentication. There are a couple changes you can make (with appropriate warnings!) that will allow you to do this. Read on to find out why and how.   Read more...
By Robin Back 2004/03/02 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 6,626 reads

SQL Injection!

Do your developers really understand how to prevent injection attacks? Or scarier still, how many know what an injection attack is? Chris has some great examples of how sql injection works and how to prevent it.   Read more...
By Christoffer Hedgate 2004/02/02 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 16,670 reads

Review of SQL 2000 Fast Answers

A monster book at 980 pages, it's written in 'how-to' format and has a ton of good material. Andy gave it the once over for us and reports back - see what he thinks!   Read more...
By Andy Warren 2003/04/18 | Source: SQLServerCentral.com | Category: installation
Rating: |  Discuss |   Briefcase | 18,204 reads

Logins, Users, and Roles - Getting Started

Do you know the difference between a login and a user? What's the best way to add them; Enterprise Manager, T-SQL, or SQL-DMO? In this beginner level article Andy demonstrates how to use all three methods to add logins and users and offers his view of which is the best technique.   Read more...
By Andy Warren 2005/09/30 (first published: 2003/02/19) | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 35,253 reads

The Case for SQL Logins - Part Two

In this follow up to one of our most popular articles, Andy responds to comments posted by readers and discusses how to manage SQL logins effectively in your applications.   Read more...
By Andy Warren 2002/08/19 | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 6,769 reads

Review of SQL Server 2000 Programming (MSPress)

Andy sits down with an entry level book to see if he should use it at work as a teaching aid. Did he like it? Should you buy it? Read the review now!   Read more...
By Andy Warren 2002/06/04 | Source: SQLServerCentral.com | Category: installation
Rating: (not yet rated) |  Discuss |   Briefcase | 6,398 reads

Auditing Your SQL Server Environment Part II Auditing Your SQL Server

In this article by Randy Dyess he shares with you the script on how he audits his environment and outputs reports of the permissions that users have.  Read more...
By Randy Dyess 2002/05/30 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 9,522 reads

Auditing Your SQL Server Environment Part I

Ever been placed into a new environment and couldn't find an ounce of documentation? This article is the first in a series that will help you make an audit of your new environment and determine if any SQL Server login does not have a password, has a password the same as the login name or a password that is only one character long.  Read more...
By Randy Dyess 2002/04/02 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 10,349 reads

Dynamic SQL vs. Static SQL Part 1 - Security

Sooner or later everyone who works with SQL Server hears that it is better to avoid dynamic SQL at all cost. Dynamic SQL will force you to give out more permissions than static SQL. This article by Robert Marda shows you some of the security issues with dynamic SQL.   Read more...
By Robert Marda 2002/02/27 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 11,298 reads

Using Java to Encrypt Passwords

Lots of applications store user names and passwords in the database. This article presents a method for encypting this information using Java.   Read more...
By Les Smith 2001/07/19 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 13,387 reads

Encrypting Data With the Encrypt Function

One of the major problems in the database field is when people store sensitive data unencrypted into SQL Server. This article shows you one of the most basic ways to encrypt data to the casual viewer.   Read more...
By Brian Knight 2006/05/29 (first published: 2001/07/17) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 32,962 reads
   Items 1 to 15 of 15   
 
Tags
miscellaneous (6)    
administration (5)    
advanced querying (4)    
stored procedures (4)    
configuring (3)    
programming (3)    
backup / restore (2)    
dts (2)    
indexing (2)    
installation (2)    
monitoring (2)    
triggers (2)    
user defined function (udf) (2)    
.net (1)    
databases (1)    
distributed queries (1)    
english query (1)    
grant (1)    
logins (1)    
openxml (1)    
performance tuning (1)    
permissions (1)    
replication (1)    
role (1)    
script (1)    
scripting (1)    
sql server 6.5 (1)    
sql-dmo (1)    
strategies (1)    
updategrams (1)    
user (1)    
xml (1)    
xsl (1)