Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tag Security Rss

   Items 1 to 20 of 829    Older >>
 

Prevent Confidential Data at the Application Layer from getting into SQL Server

In this tip Tim Smith looks at different approaches to stop confidential data from getting into the database.  Read more...
By Additional Articles 2014/09/22 | Source: MSSQLTips.com | Category: security
Rating: (not yet rated)  Rate this |   Briefcase | 6,523 reads

List all permissions in all databases

This script will allow you get all the users and roles with permission on objects on all databases.  Read more...
By Alejandro Pelc 2014/09/18 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 16,185 reads

A few reflections on security by a weary application developer

Data security? No worries! Tell me how much you are willing to pay.  Read more...
By George Copeland 2014/09/03 | Source: SQLServerCentral.com | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 107 reads

Continuous Integration/Delivery without Testing!

Anything we can do to automate our builds and deployment should be considered. After all, the point isn’t just to...  Read more...
By Brian Kelley 2014/08/28 | Source: SQLServerCentral Blogs | Category: blogs
Rating: (not yet rated) |  Discuss |   Briefcase | 6,231 reads

Change password for user 'sa'

Last week one of my team members was supposed to create a SQL Authenticated ID on a SQL Server 2005 instance. This was as per the request of the Application team who would be using it for an Application.   Read more...
By gogulatorul 2014/08/20 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 1,391 reads

Yet Another Attack Vector

The lack of progress in amending our laws to handle the digital revolution in our leaves may leave us open to unexpected attacks.  Read more...
By Steve Jones 2014/08/20 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 107 reads

We Don't Care about Data and IT Security

Most of us say we care about IT and data security. Our actions speak differently.  Read more...
By Brian Kelley 2014/08/11 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 307 reads

Service Principal Names

By Tom Nicol 2014/08/07 | Category: administration
Rating: (not yet rated) |  Discuss |   Briefcase | 1,671 reads

Linked Server Tribulations In SQL Server

In this article, Thomas chronicles the difficulties of troubleshooting a linked server set up, with helpful tips and an exposé of a Linked Server UI flaw.   Read more...
By Thomas Knight 2014/08/05 | Source: SQLServerCentral.com | Category: linked server
Rating: |  Discuss |   Briefcase | 5,094 reads

Spackle: Making sure you can connect to the DAC

The DAC is an important tool and several things can go wrong when trying to connect to it.  Read more...
By Kenneth Fisher 2014/07/31 | Source: SQLServerCentral.com | Category: dac
Rating: |  Discuss |   Briefcase | 2,897 reads

Data Driven Security

Set a security standard across environments that developers can see and run, but not change.  Read more...
By Andre Quitta 2014/07/30 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 3,484 reads

Elevation of Privileges

The elevation of privileges is a large security problem and Steve Jones discusses his fears. Would you know if someone successfully attacked your instance?  Read more...
By Steve Jones 2014/07/30 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 107 reads

New SQL Server 2014 Permissions: CONNECT ANY DATABASE

CONNECT ANY DATABASE is one of three new permissions in SQL Server 2014 that can be granted to server logins. What is this new permission good for and why would we ever want this?  Read more...
By Edward Pollack 2014/07/29 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 5,228 reads

BCP results

By Stuart Davies 2014/07/28 | Category: t-sql
Rating: (not yet rated) |  Discuss |   Briefcase | 1,762 reads

Frustration with Bad Design

It can be frustrating to deal with poorly implemented systems, but Steve Jones notes that you can't take things into your own hands.  Read more...
By Steve Jones 2014/07/28 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 282 reads

The Case Of the Downward Pointing Arrow

By Andy Warren 2014/07/02 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,992 reads

Database Permissions

Here is a short How To article on querying for permissions in a SQL Server database  Read more...
By C.J. Garcia 2014/07/01 | Source: SQLServerCentral.com | Category: database permissions
Rating: |  Discuss |   Briefcase | 5,476 reads

Lockdown or Let Them Free

Do we take security too far? Are we creating unnecessary rules for those that need to use the resources we support? Steve Jones talks today about security and how we might want to approach it when handling rights for developers.  Read more...
By Steve Jones 2014/06/27 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 203 reads

Reading, Writing, and Riskmetic

By Andy Warren 2014/06/19 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,482 reads

Stairway to SQL Server Security Level 2: Authentication

Authentication is the first step in letting a principal get access to an instance of SQL Server, essentially resolving the question, Who are you? In this stairway level you’ll learn about the basics of authentication and the authentication options available. This level covers logins and users and you’ll learn about the password policies that can help strengthen SQL Server authentication.  Read more...
By Don Kiely 2014/06/18 | Source: SQLServerCentral.com | Category: stairway series
Rating: |  Discuss |   Briefcase | 2,917 reads
   Items 1 to 20 of 829    Older >>
 
Tags
editorial (119)    
sql server 7 (105)    
administration (66)    
sql server 2005 (56)    
blogs (53)    
strategies (40)    
encryption (34)    
t-sql (31)    
editorial - ipod (25)    
editorial - wmv (25)    
editorial - mp3 (24)    
auditing (21)    
permissions (20)    
miscellaneous (15)    
sql server 2008 (14)    
passwords (13)    
logins (12)    
backup / restore (11)    
programming (11)    
sql server 6.5 (11)    
transparent data encryption (tde) (11)    
configuring (9)    
reporting services (ssrs) (9)    
sql injection (9)    
database design (8)    
role (8)    
roles (8)    
best and worst practices (7)    
friday poll (7)    
integration services (ssis) (7)    
software development (7)    
sql agent (7)    
user (7)    
database roles (6)    
database security (6)    
database weekly (6)    
grant (6)    
sql server (6)    
sql server 2008 r2 (6)    
stored procedures (6)    
advanced querying (5)    
analysis services (ssas) (5)    
career (5)    
disaster recovery (dr) (5)    
hackers (5)    
login (5)    
news (5)    
secure programming (5)    
triggers (5)    
worst practices (5)    
authentication (4)    
biometrics (4)    
data retention (4)    
installation (4)    
legal issues (4)    
performance tuning (4)    
schema (4)    
server roles (4)    
sql server 2000 (4)    
users (4)    
ddl triggers (3)    
dts (3)    
execute as (3)    
impersonation (3)    
kerberos (3)    
monitoring (3)    
other (3)    
principals (3)    
professional development (3)    
replication (3)    
service accounts (3)    
service broker (3)    
sql server 2012 (3)    
sql server express (3)    
sql university (3)    
surface area configuration tool (3)    
training (3)    
windows security (3)    
active directory (2)    
advanced (2)    
best practices (2)    
central management server (cms) (2)    
certificates (2)    
cloud computing (2)    
comparison (2)    
compliance (2)    
dac (2)    
database principals (2)    
databases (2)    
development (2)    
firewall (2)    
guest user (2)    
indexing (2)    
jobs (2)    
logon triggers (2)    
members (2)    
ownership (2)    
ownership chaining (2)    
patches (2)    
permission (2)    
policy based management (pbm) (2)    
powershell (2)    
product reviews (2)    
profiler (2)    
rants (2)    
reviews (2)    
scripting (2)    
secure (2)    
service packs (2)    
spn (2)    
sql server architecture (2)    
sql-dmo (2)    
stairway series (2)    
tcp/ip (2)    
tools (2)    
user defined function (udf) (2)    
xml (2)    
xsl (2)    
.net (1)    
access restriction (1)    
administrator (1)    
ado (1)    
alerts (1)    
alias (1)    
architecture (1)    
automation (1)    
azure (1)    
backup / recovery (1)    
bcp (bulk copy program) (1)    
broker security (1)    
browser service (1)    
bugs (1)    
c# (1)    
change db owner (1)    
cissp (1)    
cloud (1)    
conferences/user groups (1)    
configuration (1)    
connect any database (1)    
continuous integration (1)    
control server (1)    
create database (1)    
credentials (1)    
cryptography (1)    
data driven (1)    
data security (1)    
database mail (1)    
database owner (1)    
database permissions (1)    
database users (1)    
ddl (1)    
dimensions (1)    
distributed queries (1)    
dmv's (1)    
dynamic sql (1)    
english query (1)    
eventdata (1)    
events (1)    
extended stored procedures (1)    
filestream (1)    
fixed server roles (1)    
general administration (1)    
grantee (1)    
grantor (1)    
hashbytes (1)    
hexadecimal (1)    
job (1)    
linked server (1)    
list (1)    
logon trigger (1)    
maintenance (1)    
management studio (ssms) (1)    
microsoft sql server (1)    
msdb (1)    
networking (1)    
openxml (1)    
orphaned (1)    
orphaned user (1)    
orphaned users (1)    
parameter (1)    
pass (1)    
password (1)    
password cracking (1)    
patching (1)    
presenting (1)    
privacy (1)    
privilege escalation (1)    
professional organization for sql server (1)    
proxy accounts (1)    
public (1)    
rename (1)    
revert (1)    
sanpshot (1)    
script (1)    
securables (1)    
security awareness (1)    
securityadmin (1)    
server principals (1)    
server_principals (1)    
sharepoint (1)    
sid (1)    
sp_cycle_errorlog (1)    
sp_msforeachdb (1)    
sql jobs (1)    
sql puzzles (1)    
sql server 2014 (1)    
sql server permissions (1)    
sql spackle (1)    
sqlservercentral (1)    
ssl (1)    
sspi (1)    
stored procedure (1)    
survey (1)    
sysadmin (1)    
system databases (1)    
system development life cycle (1)    
tabular model (1)    
today (1)    
trust (1)    
type (1)    
updategrams (1)    
upgrading (1)    
virtualization (1)    
visual basic 6 (1)    
vulnerability (1)    
windows (1)    
xp_logininfo (1)