Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tag Security Rss

<< Newer    Items 41 to 60 of 814    Older >>
 

Blocking Users by IP

SQL Server MVP Brian Kelley brings us a great new article that solves a problem that might help your security. In this short piece, we learn how we can use logon triggers to block users based on their IP address.  Read more...
By Brian Kelley 2013/11/08 (first published: 2009/03/09) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 32,878 reads

Security Queries: Server-level

A set of queries which attempt to gather as much security-related information on a server instance as possible.  Read more...
By Greg Drake 2013/11/05 | Source: SQLServerCentral.com | Category: secure
Rating: |  Discuss |   Briefcase | 1,186 reads

Security Queries: Database-level

A set of queries which attempt to gather as much security-related information on a single database as possible.  Read more...
By Greg Drake 2013/11/04 | Source: SQLServerCentral.com | Category: secure
Rating: |  Discuss |   Briefcase | 1,721 reads

Orphaned users

By Jens-Peter Giersch 2013/10/31 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 2,054 reads

List all Usernames, Roles for all the databases.

Generates a list of ALL Users and their database Roles for all Databases (Or for a specific user).  Read more...
By Shiva Challa 2013/12/30 | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 20,184 reads

List all permission in all databases

This script will allow you get all the users and roles with permission on objects on all databases.  Read more...
By Alejandro Pelc 2013/10/24 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 14,876 reads

Execute As

Learn how you can use Execute As in a stored procedure to control permissions. This article includes an example that limits access to encryption routines for users.  Read more...
By Patrick Cahill 2013/10/11 (first published: 2011/02/02) | Source: SQLServerCentral.com | Category: execute as
Rating: |  Discuss |   Briefcase | 16,121 reads

Letting People Go Securely

Having employees leave your company is a reality of life. But how do you handle letting your IT workers go and protect your systems? Steve Jones isn't sure there is much you can do to prevent issues, but you can deal with them.  Read more...
By Steve Jones 2013/10/09 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 323 reads

The Challenges of Being Safe

Securing your data is a challenge. Steve Jones has a few comments no just how hard it can be to obfuscate your production data as you move it to development environments.  Read more...
By Steve Jones 2013/10/03 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 233 reads

Secure Programming

Writing secure programs is hard. Steve Jones has a few comments on what some of the issues are with training developers.  Read more...
By Steve Jones 2013/10/02 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 459 reads

Permission scripting over all databases

Scripts permissions/roles for db user across all databases.  Read more...
By W Louw 2013/10/01 | Source: SQLServerCentral.com | Category: permissions
Rating: |  Discuss |   Briefcase | 12,461 reads

Loginless Database Users and Dynamic SQL

Implement Loginless Database Users to maintain data security and preserve interface when dynamic SQL is being used within a stored procedure.  Read more...
By Orlando Colamatteo 2013/09/10 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 6,460 reads

Lost in the Noise

Can a honeypot provide you with more security? It's an interesting idea from Steve Jones today that might help you detect, and respond, to security events.  Read more...
By Steve Jones 2013/08/27 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 96 reads

Physical Security

The physical security of our systems might be a bigger problem in the future as more and more hackers are finding ways into secure areas.  Read more...
By Steve Jones 2013/08/26 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 106 reads

Schneier's Thoughts on the Future of IT Security and the Impact of the Internet on Power

If you've got an hour to spare, you might want to check out this presentation by Bruce Schneier where he...  Read more...
By 2013/08/23 | Source: SQLServerCentral.com | Category: blogs
Rating: (not yet rated) |  Discuss |   Briefcase | 931 reads

Review Your Code

Steve Jones notes that SQL Injection is still a problem, and while it might be for some time to come, we should not be adding to the issues. Learn how to write secure code.  Read more...
By Steve Jones 2013/08/12 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 318 reads

User Defined Server Roles

By Steve Jones 2013/08/09 | Category: server roles
Rating: (not yet rated) |  Discuss |   Briefcase | 1,542 reads

Resolving Errors While Connecting to SSIS

This article will help you solve connection errors with SSIS due to permission issues.  Read more...
Rating: |  Discuss |   Briefcase | 3,413 reads

Password Ninjas

How do you keep track of passwords? A few experts out there share some of their techniques and Steve Jones adds his thoughts.  Read more...
By Steve Jones 2013/07/18 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 250 reads
<< Newer    Items 41 to 60 of 814    Older >>
 
Tags
editorial (114)    
sql server 7 (105)    
administration (64)    
sql server 2005 (56)    
blogs (52)    
strategies (40)    
encryption (34)    
t-sql (30)    
editorial - ipod (25)    
editorial - wmv (25)    
editorial - mp3 (24)    
auditing (21)    
permissions (19)    
miscellaneous (15)    
sql server 2008 (14)    
passwords (13)    
logins (12)    
backup / restore (11)    
programming (11)    
sql server 6.5 (11)    
transparent data encryption (tde) (11)    
configuring (9)    
reporting services (ssrs) (9)    
database design (8)    
role (8)    
roles (8)    
sql injection (8)    
best and worst practices (7)    
friday poll (7)    
integration services (ssis) (7)    
software development (7)    
sql agent (7)    
user (7)    
database roles (6)    
database security (6)    
database weekly (6)    
grant (6)    
sql server (6)    
sql server 2008 r2 (6)    
stored procedures (6)    
advanced querying (5)    
analysis services (ssas) (5)    
career (5)    
disaster recovery (dr) (5)    
hackers (5)    
login (5)    
news (5)    
secure programming (5)    
triggers (5)    
worst practices (5)    
authentication (4)    
biometrics (4)    
data retention (4)    
installation (4)    
legal issues (4)    
performance tuning (4)    
schema (4)    
server roles (4)    
sql server 2000 (4)    
users (4)    
ddl triggers (3)    
dts (3)    
execute as (3)    
impersonation (3)    
kerberos (3)    
monitoring (3)    
other (3)    
principals (3)    
professional development (3)    
replication (3)    
service broker (3)    
sql server 2012 (3)    
sql server express (3)    
sql university (3)    
surface area configuration tool (3)    
training (3)    
windows security (3)    
active directory (2)    
advanced (2)    
best practices (2)    
central management server (cms) (2)    
certificates (2)    
cloud computing (2)    
comparison (2)    
compliance (2)    
database principals (2)    
databases (2)    
development (2)    
firewall (2)    
guest user (2)    
indexing (2)    
jobs (2)    
logon triggers (2)    
members (2)    
ownership (2)    
ownership chaining (2)    
patches (2)    
permission (2)    
policy based management (pbm) (2)    
powershell (2)    
product reviews (2)    
profiler (2)    
rants (2)    
reviews (2)    
scripting (2)    
secure (2)    
service accounts (2)    
service packs (2)    
sql server architecture (2)    
sql-dmo (2)    
stairway series (2)    
tools (2)    
user defined function (udf) (2)    
xml (2)    
xsl (2)    
.net (1)    
access restriction (1)    
administrator (1)    
ado (1)    
alerts (1)    
alias (1)    
architecture (1)    
automation (1)    
azure (1)    
backup / recovery (1)    
broker security (1)    
browser service (1)    
bugs (1)    
c# (1)    
change db owner (1)    
cloud (1)    
conferences/user groups (1)    
configuration (1)    
control server (1)    
create database (1)    
credentials (1)    
cryptography (1)    
dac (1)    
database mail (1)    
database owner (1)    
database permissions (1)    
database users (1)    
ddl (1)    
dimensions (1)    
distributed queries (1)    
dmv's (1)    
dynamic sql (1)    
english query (1)    
eventdata (1)    
events (1)    
extended stored procedures (1)    
filestream (1)    
fixed server roles (1)    
general administration (1)    
grantee (1)    
grantor (1)    
hashbytes (1)    
hexadecimal (1)    
job (1)    
list (1)    
logon trigger (1)    
maintenance (1)    
management studio (ssms) (1)    
microsoft sql server (1)    
msdb (1)    
networking (1)    
openxml (1)    
orphaned (1)    
orphaned user (1)    
orphaned users (1)    
parameter (1)    
pass (1)    
password (1)    
password cracking (1)    
patching (1)    
presenting (1)    
privacy (1)    
privilege escalation (1)    
professional organization for sql server (1)    
proxy accounts (1)    
public (1)    
rename (1)    
revert (1)    
sanpshot (1)    
script (1)    
securables (1)    
securityadmin (1)    
server principals (1)    
server_principals (1)    
sharepoint (1)    
sid (1)    
sp_cycle_errorlog (1)    
sp_msforeachdb (1)    
sql jobs (1)    
sql puzzles (1)    
sql server permissions (1)    
sqlservercentral (1)    
ssl (1)    
sspi (1)    
stored procedure (1)    
survey (1)    
sysadmin (1)    
system databases (1)    
system development life cycle (1)    
tabular model (1)    
tcp/ip (1)    
today (1)    
trust (1)    
type (1)    
updategrams (1)    
upgrading (1)    
virtualization (1)    
visual basic 6 (1)    
vulnerability (1)    
windows (1)    
xp_logininfo (1)