Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tag Security Rss

<< Newer    Items 21 to 40 of 841    Older >>
 

Linked Server Tribulations In SQL Server

In this article, Thomas chronicles the difficulties of troubleshooting a linked server set up, with helpful tips and an exposé of a Linked Server UI flaw.   Read more...
By Thomas Knight 2014/08/05 | Source: SQLServerCentral.com | Category: linked server
Rating: |  Discuss |   Briefcase | 5,198 reads

Spackle: Making sure you can connect to the DAC

The DAC is an important tool and several things can go wrong when trying to connect to it.  Read more...
By Kenneth Fisher 2014/07/31 | Source: SQLServerCentral.com | Category: dac
Rating: |  Discuss |   Briefcase | 2,948 reads

Data Driven Security

Set a security standard across environments that developers can see and run, but not change.  Read more...
By Andre Quitta 2014/07/30 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 3,579 reads

Elevation of Privileges

The elevation of privileges is a large security problem and Steve Jones discusses his fears. Would you know if someone successfully attacked your instance?  Read more...
By Steve Jones 2014/07/30 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 113 reads

New SQL Server 2014 Permissions: CONNECT ANY DATABASE

CONNECT ANY DATABASE is one of three new permissions in SQL Server 2014 that can be granted to server logins. What is this new permission good for and why would we ever want this?  Read more...
By Edward Pollack 2014/07/29 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 5,406 reads

BCP results

By Stuart Davies 2014/07/28 | Category: t-sql
Rating: (not yet rated) |  Discuss |   Briefcase | 1,813 reads

Frustration with Bad Design

It can be frustrating to deal with poorly implemented systems, but Steve Jones notes that you can't take things into your own hands.  Read more...
By Steve Jones 2014/07/28 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 289 reads

The Case Of the Downward Pointing Arrow

By Andy Warren 2014/07/02 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 2,024 reads

Database Permissions

Here is a short How To article on querying for permissions in a SQL Server database  Read more...
By C.J. Garcia 2014/07/01 | Source: SQLServerCentral.com | Category: database permissions
Rating: |  Discuss |   Briefcase | 5,596 reads

Lockdown or Let Them Free

Do we take security too far? Are we creating unnecessary rules for those that need to use the resources we support? Steve Jones talks today about security and how we might want to approach it when handling rights for developers.  Read more...
By Steve Jones 2014/06/27 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 205 reads

Reading, Writing, and Riskmetic

By Andy Warren 2014/06/19 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,500 reads

Stairway to SQL Server Security Level 2: Authentication

Authentication is the first step in letting a principal get access to an instance of SQL Server, essentially resolving the question, Who are you? In this stairway level you’ll learn about the basics of authentication and the authentication options available. This level covers logins and users and you’ll learn about the password policies that can help strengthen SQL Server authentication.  Read more...
By Don Kiely 2014/06/18 | Source: SQLServerCentral.com | Category: stairway series
Rating: |  Discuss |   Briefcase | 3,447 reads

Cloud Storage Security: Are You Doing Your Part?

If the level cloud storage encryption are so high, then why is the cloud security industry experiencing such distrust?  Read more...
By Natalie Lehrer 2014/06/18 | Source: SQLServerCentral.com | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 65 reads

Server Role Membership Validation

Need to know how to verify if a login has server-level access to your SQL Server instance?  Read more...
By Shawn Melton 2014/06/17 | Source: SQLServerCentral.com | Category: server roles
Rating: |  Discuss |   Briefcase | 2,288 reads

How Safe is Cloud Storage?

As more and more companies look to the cloud for their data storage needs, the same questions are being asked over and over again: if a security breech were to occur, who would be responsible and how much of a guarantee could the provider give us that our data would be safe from prying eyes.  Read more...
By Additional Articles 2014/06/17 | Source: Database Journal | Category: cloud
Rating: (not yet rated)  Rate this |   Briefcase | 4,987 reads

I Gotta See the Code

By Andy Warren 2014/06/16 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,794 reads

Stairway to SQL Server Security Level 1: Overview of SQL Server Security

The ubiquity of databases and the potentially valuable information stored in them makes them attractive targets for people who want to steal data or harm its owner by tampering with it. Making sure that your data is secure is a critical part of configuring SQL Server and developing applications that use it to store data.  Read more...
By Don Kiely 2014/06/04 | Source: SQLServerCentral.com | Category: stairway series
Rating: |  Discuss |   Briefcase | 5,806 reads

Access Granted or Not?

By Andy Warren 2014/06/03 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,889 reads

Drop Me? No, I Don't Think So

By Andy Warren 2014/05/14 | Category: login
Rating: (not yet rated) |  Discuss |   Briefcase | 2,079 reads

The Danger of Algorithms

What problems occur because of the algorithm chosen to generate data? A new report says that social security numbers in the US can be predicted. Steve Jones has a few warnings about what algoriothms you choose.  Read more...
By Steve Jones 2014/04/28 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 303 reads
<< Newer    Items 21 to 40 of 841    Older >>
 
Tags
editorial (121)    
sql server 7 (105)    
administration (67)    
sql server 2005 (56)    
blogs (53)    
strategies (40)    
encryption (36)    
t-sql (31)    
editorial - ipod (25)    
editorial - wmv (25)    
editorial - mp3 (24)    
auditing (21)    
permissions (21)    
miscellaneous (15)    
sql server 2008 (14)    
passwords (13)    
backup / restore (12)    
logins (12)    
programming (11)    
sql server 6.5 (11)    
transparent data encryption (tde) (11)    
configuring (9)    
reporting services (ssrs) (9)    
sql injection (9)    
database design (8)    
role (8)    
roles (8)    
best and worst practices (7)    
friday poll (7)    
integration services (ssis) (7)    
software development (7)    
sql agent (7)    
user (7)    
database roles (6)    
database security (6)    
database weekly (6)    
grant (6)    
sql server (6)    
sql server 2008 r2 (6)    
stored procedures (6)    
advanced querying (5)    
analysis services (ssas) (5)    
career (5)    
disaster recovery (dr) (5)    
hackers (5)    
login (5)    
news (5)    
secure programming (5)    
triggers (5)    
worst practices (5)    
authentication (4)    
biometrics (4)    
data retention (4)    
installation (4)    
legal issues (4)    
performance tuning (4)    
schema (4)    
server roles (4)    
sql server 2000 (4)    
users (4)    
active directory (3)    
ddl triggers (3)    
dts (3)    
execute as (3)    
impersonation (3)    
kerberos (3)    
monitoring (3)    
other (3)    
principals (3)    
professional development (3)    
replication (3)    
service accounts (3)    
service broker (3)    
sql server 2012 (3)    
sql server express (3)    
sql university (3)    
stairway series (3)    
surface area configuration tool (3)    
training (3)    
windows security (3)    
advanced (2)    
best practices (2)    
central management server (cms) (2)    
certificates (2)    
cloud computing (2)    
comparison (2)    
compliance (2)    
dac (2)    
database principals (2)    
databases (2)    
development (2)    
firewall (2)    
guest user (2)    
indexing (2)    
jobs (2)    
logon triggers (2)    
members (2)    
ownership (2)    
ownership chaining (2)    
patches (2)    
permission (2)    
policy based management (pbm) (2)    
powershell (2)    
product reviews (2)    
profiler (2)    
rants (2)    
reviews (2)    
scripting (2)    
secure (2)    
service packs (2)    
spn (2)    
sql server architecture (2)    
sql-dmo (2)    
tcp/ip (2)    
tools (2)    
user defined function (udf) (2)    
xml (2)    
xsl (2)    
.net (1)    
access restriction (1)    
administrator (1)    
ado (1)    
alerts (1)    
alias (1)    
analysis services (1)    
architecture (1)    
asymmetric keys (1)    
automation (1)    
azure (1)    
backup / recovery (1)    
bcp (bulk copy program) (1)    
broker security (1)    
browser service (1)    
bugs (1)    
c# (1)    
change db owner (1)    
cissp (1)    
cloud (1)    
conferences/user groups (1)    
configuration (1)    
connect any database (1)    
continuous integration (1)    
control server (1)    
create database (1)    
credentials (1)    
cryptography (1)    
data driven (1)    
data security (1)    
database mail (1)    
database owner (1)    
database permissions (1)    
database users (1)    
ddl (1)    
dimensions (1)    
distributed queries (1)    
dmv's (1)    
dynamic sql (1)    
english query (1)    
eventdata (1)    
events (1)    
extended stored procedures (1)    
filestream (1)    
fixed server roles (1)    
general administration (1)    
grantee (1)    
grantor (1)    
hashbytes (1)    
hexadecimal (1)    
job (1)    
linked server (1)    
list (1)    
logon trigger (1)    
maintenance (1)    
management studio (ssms) (1)    
microsoft sql server (1)    
msdb (1)    
networking (1)    
openxml (1)    
orphaned (1)    
orphaned user (1)    
orphaned users (1)    
parameter (1)    
pass (1)    
password (1)    
password cracking (1)    
patching (1)    
presenting (1)    
privacy (1)    
privilege escalation (1)    
professional organization for sql server (1)    
proxy accounts (1)    
public (1)    
rename (1)    
report server (1)    
revert (1)    
sanpshot (1)    
script (1)    
securables (1)    
security awareness (1)    
securityadmin (1)    
server principals (1)    
server_principals (1)    
sharepoint (1)    
sid (1)    
sp_cycle_errorlog (1)    
sp_msforeachdb (1)    
sql jobs (1)    
sql puzzles (1)    
sql server 2014 (1)    
sql server permissions (1)    
sql spackle (1)    
sqlservercentral (1)    
ssl (1)    
sspi (1)    
stored procedure (1)    
survey (1)    
sysadmin (1)    
system databases (1)    
system development life cycle (1)    
tabular model (1)    
today (1)    
trust (1)    
type (1)    
updategrams (1)    
upgrading (1)    
virtualization (1)    
visual basic 6 (1)    
vulnerability (1)    
windows (1)    
xp_logininfo (1)