Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tag security Rss

<< Newer    Items 21 to 40 of 800    Older >>
 

Central Management Server Security

By Steve Jones 2013/12/24 | Category: administration
Rating: (not yet rated) |  Discuss |   Briefcase | 1,167 reads

Encrypt Everything

Yahoo recently announced they are encrypting their traffic between data centers. Steve Jones thinks we should encrypt all traffic.  Read more...
By Steve Jones 2013/12/16 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 193 reads

The Future of Auditing

Auditing is a weak point in SQL Server according to Steve Jones. He looks at a few of its flaws.  Read more...
By Steve Jones 2013/12/05 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 179 reads

Automated Permissions Auditing With Powershell and T-SQL: Part 5

If you’ve followed along to this point, and have assembled the pieces as I’ve given them to you, you’re now...  Read more...
By Tracy McKibben 2013/11/26 | Source: SQLServerCentral Blogs | Category: blogs
Rating: (not yet rated) |  Discuss |   Briefcase | 1,495 reads

sysadmins

By Steve Jones 2013/11/22 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,845 reads

Cyberwar

Today Steve Jones talks about the prospect of cyberwar and the potential impacts on corporate systems. Perhaps we ought to be building better, more secure software.   Read more...
By Steve Jones 2013/11/11 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 80 reads

Blocking Users by IP

SQL Server MVP Brian Kelley brings us a great new article that solves a problem that might help your security. In this short piece, we learn how we can use logon triggers to block users based on their IP address.  Read more...
By Brian Kelley 2013/11/08 (first published: 2009/03/09) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 32,716 reads

Security Queries: Server-level

A set of queries which attempt to gather as much security-related information on a server instance as possible.  Read more...
By Greg Drake 2013/11/05 | Source: SQLServerCentral.com | Category: secure
Rating: |  Discuss |   Briefcase | 1,093 reads

Security Queries: Database-level

A set of queries which attempt to gather as much security-related information on a single database as possible.  Read more...
By Greg Drake 2013/11/04 | Source: SQLServerCentral.com | Category: secure
Rating: |  Discuss |   Briefcase | 1,594 reads

Orphaned users

By Jens-Peter Giersch 2013/10/31 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 2,020 reads

List all Usernames, Roles for all the databases.

Generates a list of ALL Users and their database Roles for all Databases (Or for a specific user).  Read more...
By Shiva Challa 2013/12/30 | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 19,656 reads

List all permission in all databases

This script will allow you get all the users and roles with permission on objects on all databases.  Read more...
By Alejandro Pelc 2013/10/24 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 14,692 reads

Execute As

Learn how you can use Execute As in a stored procedure to control permissions. This article includes an example that limits access to encryption routines for users.  Read more...
By Patrick Cahill 2013/10/11 (first published: 2011/02/02) | Source: SQLServerCentral.com | Category: execute as
Rating: |  Discuss |   Briefcase | 16,037 reads

Letting People Go Securely

Having employees leave your company is a reality of life. But how do you handle letting your IT workers go and protect your systems? Steve Jones isn't sure there is much you can do to prevent issues, but you can deal with them.  Read more...
By Steve Jones 2013/10/09 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 321 reads

The Challenges of Being Safe

Securing your data is a challenge. Steve Jones has a few comments no just how hard it can be to obfuscate your production data as you move it to development environments.  Read more...
By Steve Jones 2013/10/03 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 233 reads

Secure Programming

Writing secure programs is hard. Steve Jones has a few comments on what some of the issues are with training developers.  Read more...
By Steve Jones 2013/10/02 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 458 reads

Permission scripting over all databases

Scripts permissions/roles for db user across all databases.  Read more...
By W Louw 2013/10/01 | Source: SQLServerCentral.com | Category: permissions
Rating: |  Discuss |   Briefcase | 12,188 reads

Loginless Database Users and Dynamic SQL

Implement Loginless Database Users to maintain data security and preserve interface when dynamic SQL is being used within a stored procedure.  Read more...
By Orlando Colamatteo 2013/09/10 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 6,429 reads

Lost in the Noise

Can a honeypot provide you with more security? It's an interesting idea from Steve Jones today that might help you detect, and respond, to security events.  Read more...
By Steve Jones 2013/08/27 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 95 reads
<< Newer    Items 21 to 40 of 800    Older >>
 
Tags
editorial (113)    
sql server 7 (105)    
administration (64)    
sql server 2005 (56)    
blogs (52)    
strategies (40)    
encryption (33)    
t-sql (28)    
editorial - ipod (25)    
editorial - wmv (25)    
editorial - mp3 (24)    
auditing (21)    
permissions (18)    
miscellaneous (15)    
sql server 2008 (14)    
passwords (13)    
logins (12)    
programming (11)    
sql server 6.5 (11)    
transparent data encryption (tde) (11)    
backup / restore (10)    
configuring (9)    
reporting services (ssrs) (9)    
database design (8)    
role (8)    
roles (8)    
sql injection (8)    
best and worst practices (7)    
friday poll (7)    
integration services (ssis) (7)    
software development (7)    
sql agent (7)    
database roles (6)    
database security (6)    
database weekly (6)    
grant (6)    
sql server (6)    
sql server 2008 r2 (6)    
stored procedures (6)    
user (6)    
advanced querying (5)    
analysis services (ssas) (5)    
career (5)    
disaster recovery (dr) (5)    
hackers (5)    
news (5)    
secure programming (5)    
triggers (5)    
worst practices (5)    
biometrics (4)    
data retention (4)    
installation (4)    
legal issues (4)    
login (4)    
performance tuning (4)    
schema (4)    
sql server 2000 (4)    
users (4)    
authentication (3)    
ddl triggers (3)    
dts (3)    
execute as (3)    
impersonation (3)    
kerberos (3)    
monitoring (3)    
other (3)    
principals (3)    
professional development (3)    
replication (3)    
service broker (3)    
sql server 2012 (3)    
sql server express (3)    
sql university (3)    
surface area configuration tool (3)    
training (3)    
windows security (3)    
active directory (2)    
advanced (2)    
best practices (2)    
central management server (cms) (2)    
certificates (2)    
cloud computing (2)    
comparison (2)    
compliance (2)    
databases (2)    
development (2)    
firewall (2)    
guest user (2)    
indexing (2)    
jobs (2)    
logon triggers (2)    
members (2)    
ownership (2)    
ownership chaining (2)    
patches (2)    
permission (2)    
policy based management (pbm) (2)    
powershell (2)    
product reviews (2)    
rants (2)    
reviews (2)    
scripting (2)    
secure (2)    
server roles (2)    
service accounts (2)    
service packs (2)    
sql server architecture (2)    
sql-dmo (2)    
tools (2)    
user defined function (udf) (2)    
xml (2)    
xsl (2)    
.net (1)    
access restriction (1)    
administrator (1)    
ado (1)    
alerts (1)    
alias (1)    
architecture (1)    
automation (1)    
azure (1)    
backup / recovery (1)    
broker security (1)    
browser service (1)    
bugs (1)    
c# (1)    
change db owner (1)    
conferences/user groups (1)    
configuration (1)    
control server (1)    
create database (1)    
credentials (1)    
cryptography (1)    
dac (1)    
database mail (1)    
database owner (1)    
database principals (1)    
database users (1)    
ddl (1)    
dimensions (1)    
distributed queries (1)    
dmv's (1)    
dynamic sql (1)    
english query (1)    
eventdata (1)    
events (1)    
extended stored procedures (1)    
filestream (1)    
fixed server roles (1)    
general administration (1)    
grantee (1)    
grantor (1)    
hashbytes (1)    
hexadecimal (1)    
job (1)    
list (1)    
logon trigger (1)    
maintenance (1)    
management studio (ssms) (1)    
microsoft sql server (1)    
msdb (1)    
networking (1)    
openxml (1)    
orphaned (1)    
orphaned user (1)    
orphaned users (1)    
parameter (1)    
pass (1)    
password (1)    
password cracking (1)    
patching (1)    
presenting (1)    
privacy (1)    
privilege escalation (1)    
professional organization for sql server (1)    
profiler (1)    
proxy accounts (1)    
public (1)    
rename (1)    
revert (1)    
sanpshot (1)    
script (1)    
securables (1)    
securityadmin (1)    
server principals (1)    
server role (1)    
server_principals (1)    
sharepoint (1)    
sid (1)    
sp_cycle_errorlog (1)    
sp_msforeachdb (1)    
sql jobs (1)    
sql puzzles (1)    
sqlservercentral (1)    
ssl (1)    
sspi (1)    
survey (1)    
sysadmin (1)    
system databases (1)    
system development life cycle (1)    
tabular model (1)    
tcp/ip (1)    
today (1)    
trust (1)    
type (1)    
updategrams (1)    
upgrading (1)    
virtualization (1)    
visual basic 6 (1)    
vulnerability (1)    
windows (1)    
xp_logininfo (1)