Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tag Security Rss

<< Newer    Items 41 to 60 of 842    Older >>
 

The Danger of Algorithms

What problems occur because of the algorithm chosen to generate data? A new report says that social security numbers in the US can be predicted. Steve Jones has a few warnings about what algoriothms you choose.  Read more...
By Steve Jones 2014/04/28 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 303 reads

Double Keys

By Steve Jones 2014/04/22 | Category: encryption
Rating: (not yet rated) |  Discuss |   Briefcase | 1,772 reads

If or When?

Are data breaches a question of if they will happen to you or when will they happen to you?  Read more...
By Steve Jones 2014/04/10 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 149 reads

Symmetric Key Use

By Steve Jones 2014/04/08 | Category: encryption
Rating: (not yet rated) |  Discuss |   Briefcase | 1,372 reads

Data Security Policies

Does your organization have policies around data security? Perhaps they should, or perhaps you should ask for some to be created and education available for users.  Read more...
By Steve Jones 2014/04/07 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 109 reads

Get the all user and their server role

The script give you the list of all users and their respective Server roles  Read more...
By Mitesh Oswal 2014/04/02 | Source: SQLServerCentral.com | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,278 reads

Default schema

By Anoo S Pillai 2014/03/31 | Category: schema
Rating: (not yet rated) |  Discuss |   Briefcase | 1,852 reads

Can't See The Forest For the Logins

By Andy Warren 2014/03/28 | Category: login
Rating: (not yet rated) |  Discuss |   Briefcase | 1,801 reads

The Unusable User

By Andy Warren 2014/03/26 | Category: login
Rating: (not yet rated) |  Discuss |   Briefcase | 1,998 reads

The Endless Upgrade Cycle

Steve Jones notes that security can be a reason to upgrade your systems, but it can also result in an endless cycle.  Read more...
By Steve Jones 2014/03/26 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 103 reads

Members of windows group

By Yogeshwar Phull 2014/03/13 | Category: administration
Rating: (not yet rated) |  Discuss |   Briefcase | 1,646 reads

Schema & Renaming Fun

By Andy Warren 2014/03/12 | Category: schema
Rating: (not yet rated) |  Discuss |   Briefcase | 1,780 reads

View My Definition

By Andy Warren 2014/03/07 | Category: roles
Rating: (not yet rated) |  Discuss |   Briefcase | 1,810 reads

Lawsuits and Data Breaches

Steve Jones notes that a data breach resulted in a lawsuit. How long before that's a common practice, and should we be preparing as data professionals.  Read more...
By Steve Jones 2014/02/25 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 112 reads

Auditing Matters

We might not be able to stop hacks, attacks, or issues with our databases, but knowing that they've occurred is important. Steve Jones notes that we might need auditing more than security.  Read more...
By Steve Jones 2014/02/24 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 137 reads

SQL Server Security Checklist

SQL Server security related tasks can be divided into four main categories: physical security, operating system level security, SQL Server configuration and user management. Here is your SQL Server security checklist.  Read more...
By Additional Articles 2014/02/20 | Source: MSSQLTips.com | Category: security
Rating:  Rate this |   Briefcase | 3,318 reads

The Security of Interconnected Systems

We are interconnecting more and more computer systems and applications all the time. Security becomes a problem when one of these systems hasn't been properly configured, secured, or coded. Steve Jones notes this is becoming a real problem.  Read more...
By Steve Jones 2014/02/18 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 113 reads

Database User Superfluousness In SQL Server

In this article, Thomas Knight analyzes and critiques the design of, and experience with, the "dual-level" user security in SQL Server. He then demonstrates a better theoretical alternative.  Read more...
By Thomas Knight 2014/02/04 | Source: SQLServerCentral.com | Category: users
Rating: |  Discuss |   Briefcase | 3,894 reads

Managing SSIS Security with Database Roles

SQL Server 2012 introduced the new project deployment model for Integration Services. This tip will guide you through the process of setting up security for the SSIS 2012 catalog.  Read more...
Rating: (not yet rated)  Rate this |   Briefcase | 2,205 reads

Script DB Level Permissions v2.1

Scripts role membership, object-level permissions for all DB users.  Read more...
By S. Kusen 2014/01/24 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 4,882 reads
<< Newer    Items 41 to 60 of 842    Older >>
 
Tags
editorial (122)    
sql server 7 (105)    
administration (67)    
sql server 2005 (56)    
blogs (53)    
strategies (40)    
encryption (36)    
t-sql (31)    
editorial - ipod (25)    
editorial - wmv (25)    
editorial - mp3 (24)    
auditing (21)    
permissions (21)    
miscellaneous (15)    
sql server 2008 (14)    
passwords (13)    
backup / restore (12)    
logins (12)    
programming (11)    
sql server 6.5 (11)    
transparent data encryption (tde) (11)    
configuring (9)    
reporting services (ssrs) (9)    
sql injection (9)    
database design (8)    
role (8)    
roles (8)    
best and worst practices (7)    
friday poll (7)    
integration services (ssis) (7)    
software development (7)    
sql agent (7)    
user (7)    
database roles (6)    
database security (6)    
database weekly (6)    
grant (6)    
sql server (6)    
sql server 2008 r2 (6)    
stored procedures (6)    
advanced querying (5)    
analysis services (ssas) (5)    
career (5)    
disaster recovery (dr) (5)    
hackers (5)    
login (5)    
news (5)    
secure programming (5)    
triggers (5)    
worst practices (5)    
authentication (4)    
biometrics (4)    
data retention (4)    
installation (4)    
legal issues (4)    
performance tuning (4)    
schema (4)    
server roles (4)    
sql server 2000 (4)    
users (4)    
active directory (3)    
ddl triggers (3)    
dts (3)    
execute as (3)    
impersonation (3)    
kerberos (3)    
monitoring (3)    
other (3)    
principals (3)    
professional development (3)    
replication (3)    
service accounts (3)    
service broker (3)    
sql server 2012 (3)    
sql server express (3)    
sql university (3)    
stairway series (3)    
surface area configuration tool (3)    
training (3)    
windows security (3)    
advanced (2)    
best practices (2)    
central management server (cms) (2)    
certificates (2)    
cloud computing (2)    
comparison (2)    
compliance (2)    
dac (2)    
database principals (2)    
databases (2)    
development (2)    
firewall (2)    
guest user (2)    
indexing (2)    
jobs (2)    
logon triggers (2)    
members (2)    
ownership (2)    
ownership chaining (2)    
patches (2)    
permission (2)    
policy based management (pbm) (2)    
powershell (2)    
product reviews (2)    
profiler (2)    
rants (2)    
reviews (2)    
scripting (2)    
secure (2)    
service packs (2)    
spn (2)    
sql server architecture (2)    
sql-dmo (2)    
tcp/ip (2)    
tools (2)    
user defined function (udf) (2)    
xml (2)    
xsl (2)    
.net (1)    
access restriction (1)    
administrator (1)    
ado (1)    
alerts (1)    
alias (1)    
analysis services (1)    
architecture (1)    
asymmetric keys (1)    
automation (1)    
azure (1)    
backup / recovery (1)    
bcp (bulk copy program) (1)    
broker security (1)    
browser service (1)    
bugs (1)    
c# (1)    
change db owner (1)    
cissp (1)    
cloud (1)    
conferences/user groups (1)    
configuration (1)    
connect any database (1)    
continuous integration (1)    
control server (1)    
create database (1)    
credentials (1)    
cryptography (1)    
data driven (1)    
data security (1)    
database mail (1)    
database owner (1)    
database permissions (1)    
database users (1)    
ddl (1)    
dimensions (1)    
distributed queries (1)    
dmv's (1)    
dynamic sql (1)    
english query (1)    
eventdata (1)    
events (1)    
extended stored procedures (1)    
filestream (1)    
fixed server roles (1)    
general administration (1)    
grantee (1)    
grantor (1)    
hashbytes (1)    
hexadecimal (1)    
job (1)    
linked server (1)    
list (1)    
logon trigger (1)    
maintenance (1)    
management studio (ssms) (1)    
microsoft sql server (1)    
msdb (1)    
networking (1)    
openxml (1)    
orphaned (1)    
orphaned user (1)    
orphaned users (1)    
parameter (1)    
pass (1)    
password (1)    
password cracking (1)    
patching (1)    
presenting (1)    
privacy (1)    
privilege escalation (1)    
professional organization for sql server (1)    
proxy accounts (1)    
public (1)    
rename (1)    
report server (1)    
responsibilities (1)    
revert (1)    
sanpshot (1)    
script (1)    
securables (1)    
security awareness (1)    
securityadmin (1)    
server principals (1)    
server_principals (1)    
sharepoint (1)    
sid (1)    
sp_cycle_errorlog (1)    
sp_msforeachdb (1)    
sql jobs (1)    
sql puzzles (1)    
sql server 2014 (1)    
sql server permissions (1)    
sql spackle (1)    
sqlservercentral (1)    
ssl (1)    
sspi (1)    
stored procedure (1)    
survey (1)    
sysadmin (1)    
system databases (1)    
system development life cycle (1)    
tabular model (1)    
today (1)    
trust (1)    
type (1)    
updategrams (1)    
upgrading (1)    
virtualization (1)    
visual basic 6 (1)    
vulnerability (1)    
windows (1)    
xp_logininfo (1)