SQL Clone
SQLServerCentral is supported by Redgate
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tag Security Rss

<< Newer    Items 21 to 40 of 979    Older >>
 

Changing Linked Server Passwords

How to article on changing passwords for linked servers via TSQL and SSMS.  Read more...
By Thomas Liddle 2017/01/26 | Source: SQLServerCentral.com | Category: linked server
Rating: |  Discuss |   Briefcase | 1,568 reads

ADMINISTER BULK OPERATIONS

By Steve Jones 2017/01/19 | Category: bulk insert
Rating: (not yet rated) |  Discuss |   Briefcase | 1,009 reads

EXECUTE as SELF

By Steve Jones 2017/01/18 | Category: t-sql
Rating: (not yet rated) |  Discuss |   Briefcase | 1,174 reads

Five Useful SQL Server Management Practices

This article outlines five SQL Server capabilities you can use to enhance your efficiency as a DBA.  Read more...
By Kenneth Igiri 2017/01/18 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 2,986 reads

Delaying Patches is Problematic

Many of our security issues come down to not patching software when there are updates available.  Read more...
By Steve Jones 2017/01/17 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 97 reads

Securing Your Instances

This week Steve Jones looks at moving the port numbers of your instances for a bit of security.  Read more...
By Steve Jones 2017/01/13 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 57 reads

Backup Data Security

We need better security for our data, especially for our choices in managing data.  Read more...
By Steve Jones 2017/01/12 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 75 reads

Killing Statistics Jobs

By Steve Jones 2017/01/10 | Category: administration
Rating: (not yet rated) |  Discuss |   Briefcase | 1,087 reads

Execute As Security

By Steve Jones 2017/01/06 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,065 reads

Dynamic Data Masking Feature in SQL Server 2016

Microsoft has introduced very impressive new security feature in SQL Server 2016 called Dynamic Data Masking (DDM).Dynamic Data Masking allow user to decide how much of the sensitive data to reveal with minimal impact on the application layer.   Read more...
By Pankaj Chakole 2017/01/05 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 1,233 reads

Number Security

Numbers are both very useful and also susceptible to all sorts of attacks when their domain is limited. Steve Jones looks at some issues occurring in today's world.  Read more...
By Steve Jones 2017/01/04 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 88 reads

The data encryptors

By Steve Jones 2016/12/22 | Category: always encrypted
Rating: (not yet rated) |  Discuss |   Briefcase | 857 reads

The Future of Auditing

Auditing is a weak point in SQL Server according to Steve Jones. He looks at a few of its flaws.  Read more...
By Steve Jones 2016/12/22 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 266 reads

Always Encrypted Certificates

By Steve Jones 2016/12/13 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 868 reads

Password Policy

By Steve Jones 2016/12/07 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,016 reads

Wow. Just Wow

Today Steve Jones looks at the loss of a database backup on a public website.  Read more...
By Steve Jones 2016/11/21 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 154 reads

Change Login Auditing Option

Configure Login Auditing   Read more...
By ESAT ERKEC 2016/11/14 | Source: SQLServerCentral.com | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 263 reads

Deploy Security Changes with Copy-SqlLogin

Moving security changes between server instances can be a cumbersome process, but it doesn't need to be with the PowerShell cmdlet, Copy-SqlLogin.  Read more...
By Steve Jones 2016/11/01 | Source: SQLServerCentral.com | Category: powershell
Rating: |  Discuss |   Briefcase | 1,380 reads

The Backup Operator

By Steve Jones 2016/10/19 | Category: backup and restore
Rating: (not yet rated) |  Discuss |   Briefcase | 1,139 reads

Coming Attacks

What happens if we can't access the Internet? We should be prepared, at home and work. Steve Jones has a few comments.  Read more...
By Steve Jones 2016/10/03 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 88 reads
<< Newer    Items 21 to 40 of 979    Older >>
 
Tags
editorial (167)    
sql server 7 (105)    
administration (74)    
sql server 2005 (56)    
blogs (53)    
encryption (49)    
strategies (40)    
t-sql (38)    
editorial - ipod (25)    
editorial - wmv (25)    
permissions (25)    
editorial - mp3 (24)    
auditing (23)    
logins (21)    
backup and restore (15)    
miscellaneous (15)    
passwords (15)    
sql server 2008 (15)    
transparent data encryption (tde) (15)    
roles (12)    
programming (11)    
reporting services (ssrs) (11)    
sql injection (11)    
sql server 6.5 (11)    
stored procedures (10)    
configuring (9)    
grant (9)    
software development (9)    
database design (8)    
database weekly (8)    
friday poll (8)    
role (8)    
best and worst practices (7)    
integration services (ssis) (7)    
sql agent (7)    
sql server (7)    
sql server 2008 r2 (7)    
user (7)    
active directory (6)    
database roles (6)    
database security (6)    
stairway series (6)    
users (6)    
advanced querying (5)    
always encrypted (5)    
analysis services (ssas) (5)    
career (5)    
disaster recovery (dr) (5)    
execute as (5)    
hackers (5)    
news (5)    
orphaned users (5)    
schemas (5)    
secure programming (5)    
triggers (5)    
worst practices (5)    
authentication (4)    
biometrics (4)    
data retention (4)    
installation (4)    
legal issues (4)    
monitoring (4)    
performance tuning (4)    
row-level security (rls) (4)    
server roles (4)    
sql server 2000 (4)    
sql server 2012 (4)    
agent jobs (3)    
best practices (3)    
certificates (3)    
cloud computing (3)    
ddl triggers (3)    
deny (3)    
development (3)    
devops (3)    
dts (3)    
impersonation (3)    
kerberos (3)    
other (3)    
powershell (3)    
principals (3)    
professional development (3)    
replication (3)    
service accounts (3)    
service broker (3)    
sql server 2016 (3)    
sql server express (3)    
sql university (3)    
surface area configuration tool (3)    
training (3)    
windows security (3)    
active directory groups (2)    
ad (2)    
ad groups (2)    
advanced (2)    
azure (2)    
central management server (cms) (2)    
comparison (2)    
compliance (2)    
dac (2)    
database master key (dmk) (2)    
database principals (2)    
databases (2)    
dbcc (2)    
dynamic data masking (2)    
firewall (2)    
guest user (2)    
indexing (2)    
integrated security (2)    
linked server (2)    
logon triggers (2)    
members (2)    
ownership (2)    
ownership chaining (2)    
patches (2)    
patching (2)    
permission (2)    
policy based management (pbm) (2)    
privilege escalation (2)    
product reviews (2)    
profiler (2)    
rants (2)    
revert (2)    
reviews (2)    
scripting (2)    
secure (2)    
service packs (2)    
setuser (2)    
sid (2)    
spn (2)    
sql server 2014 (2)    
sql server architecture (2)    
sql-dmo (2)    
survey (2)    
tcp/ip (2)    
tools (2)    
user defined function (udf) (2)    
xml (2)    
xsl (2)    
.net (1)    
access restriction (1)    
administrator (1)    
ado (1)    
aggregates (1)    
alerts (1)    
alias (1)    
always on (1)    
analysis services (1)    
application design (1)    
architecture (1)    
asymmetric keys (1)    
audit (1)    
automation (1)    
azure sql database (1)    
backup and recovery (1)    
bcp (bulk copy program) (1)    
broker security (1)    
browser service (1)    
bugs (1)    
bulk insert (1)    
bulkadmin (1)    
c# (1)    
change db owner (1)    
cissp (1)    
cloud (1)    
clustering (1)    
code signing (1)    
conferences/user groups (1)    
configuration (1)    
connect any database (1)    
continuous integration (ci) (1)    
control server (1)    
create database (1)    
credentials (1)    
credit card numbers (1)    
cross-database ownership chaining (1)    
cryptography (1)    
data (1)    
data driven subscriptions (1)    
data mining (1)    
data security (1)    
database (1)    
database mail (1)    
database object permissions (1)    
database owner (1)    
database ownership (1)    
database permissions (1)    
database users (1)    
dbatools.io (1)    
ddl (1)    
default trace (1)    
dimensions (1)    
distributed queries (1)    
dmk (1)    
dmv's (1)    
dynamic sql (1)    
endpoints (1)    
english query (1)    
eventdata (1)    
events (1)    
execution context (1)    
extended stored procedures (1)    
filestream (1)    
fixed server roles (1)    
general administration (1)    
grantee (1)    
grantor (1)    
hashbytes() (1)    
hexadecimal (1)    
integrated security. (1)    
is_member() (1)    
linked servers (1)    
list (1)    
login (1)    
logon trigger (1)    
maintenance (1)    
management studio (ssms) (1)    
microsoft sql server (1)    
msdb (1)    
networking (1)    
openxml (1)    
oracle (1)    
parameter (1)    
pass (1)    
password (1)    
password cracking (1)    
politics (1)    
presenting (1)    
privacy (1)    
professional organization for sql server (1)    
proxy accounts (1)    
public (1)    
rename (1)    
report server (1)    
responsibilities (1)    
restore (1)    
sa (1)    
sanpshot (1)    
script (1)    
securables (1)    
security awareness (1)    
securityadmin (1)    
server principals (1)    
server_principals (1)    
sharepoint (1)    
sid mismatch check (1)    
smk (1)    
sp_cycle_errorlog (1)    
sp_msforeachdb (1)    
sql jobs (1)    
sql logins (1)    
sql puzzles (1)    
sql server permissions (1)    
sql spackle (1)    
sqlrx (1)    
sqlservercentral (1)    
ssl (1)    
sspi (1)    
stored procedure (1)    
storing passwords (1)    
symmetric keys (1)    
sysadmin (1)    
system databases (1)    
system development life cycle (1)    
tabular model (1)    
today (1)    
trust (1)    
trustworthy (1)    
type (1)    
updategrams (1)    
upgrading (1)    
virtualization (1)    
visual basic 6 (1)    
vulnerability (1)    
warehouse (1)    
windows (1)    
xp_logininfo (1)