Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tag security Rss

<< Newer    Items 41 to 60 of 800    Older >>
 

Physical Security

The physical security of our systems might be a bigger problem in the future as more and more hackers are finding ways into secure areas.  Read more...
By Steve Jones 2013/08/26 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 105 reads

Schneier's Thoughts on the Future of IT Security and the Impact of the Internet on Power

If you've got an hour to spare, you might want to check out this presentation by Bruce Schneier where he...  Read more...
By 2013/08/23 | Source: SQLServerCentral.com | Category: blogs
Rating: (not yet rated) |  Discuss |   Briefcase | 887 reads

Review Your Code

Steve Jones notes that SQL Injection is still a problem, and while it might be for some time to come, we should not be adding to the issues. Learn how to write secure code.  Read more...
By Steve Jones 2013/08/12 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 314 reads

User Defined Server Roles

By Steve Jones 2013/08/09 | Category: server roles
Rating: (not yet rated) |  Discuss |   Briefcase | 1,525 reads

Resolving Errors While Connecting to SSIS

This article will help you solve connection errors with SSIS due to permission issues.  Read more...
Rating: |  Discuss |   Briefcase | 3,404 reads

Password Ninjas

How do you keep track of passwords? A few experts out there share some of their techniques and Steve Jones adds his thoughts.  Read more...
By Steve Jones 2013/07/18 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 246 reads

Hack Resistant?

Can we make a hack resistant database? A vendor claims this, but Steve Jones thinks it's not really a good claim to make and that we ought to make it our job to secure databases.  Read more...
By Steve Jones 2013/07/16 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 144 reads

List orphaned users from all databases

The script returns all orphaned database users across a SQL Server.  Read more...
By James Howard 2013/07/15 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 3,810 reads

TDE DR

By Steve Jones 2013/07/12 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 2,219 reads

More Data Security Issues

The state of data security is getting better in the US, according to the 2013 survey from Symmatec. However we still have issues.  Read more...
By Steve Jones 2013/06/25 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 101 reads

Backup a password, change it, then restore it.

A couple of months ago I talked about moving a login from one server to another without the password. The...  Read more...
By Kenneth Fisher 2013/06/05 | Source: SQLServerCentral.com | Category: blogs
Rating: (not yet rated) |  Discuss |   Briefcase | 1,216 reads

Security Questions: Accessing SQL Server Securables

As I mentioned in the introductory post, during the Introduction to SQL Server Security session for Pragmatic Work’sTraining on the T’s, I...  Read more...
By StrateSQL 2013/06/04 | Source: SQLServerCentral.com | Category: blogs
Rating: (not yet rated) |  Discuss |   Briefcase | 908 reads

SQL Server security webinar series is coming soon!

I've gotten in contact with most of the speakers who submitted SQL Server security talks for the PASS Summit. All...  Read more...
By 2013/06/04 | Source: SQLServerCentral.com | Category: blogs
Rating: (not yet rated) |  Discuss |   Briefcase | 1,055 reads

Passively detect attempts to guess passwords

Review the error log for possible brute force or dictionary attacks on your SQL Server instance.  Read more...
By Daniel Brink 2013/05/29 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 1,331 reads

Security Questions: Differences between “Grant” and “With Grant?”

As I mentioned in the introductory post, in the Introduction to SQL Server Security session for Pragmatic Work’sTraining on the T’s, I...  Read more...
By StrateSQL 2013/05/28 | Source: SQLServerCentral.com | Category: blogs
Rating: (not yet rated) |  Discuss |   Briefcase | 1,142 reads

To Check for Orphaned Users in a Database

This script is helpful to identify the orphaned users in a database, useful when we restore a database from a different location.  Read more...
By Rinu George Philip 2013/05/22 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 2,520 reads

CREATE SCHEMA can do what?!?!?

So I was studying for the 70-451 and ended up reading the BOL entry for CREATE SCHEMA. I honestly can’t...  Read more...
By Kenneth Fisher 2013/05/21 | Source: SQLServerCentral.com | Category: blogs
Rating: (not yet rated) |  Discuss |   Briefcase | 3,100 reads

Loginless In Seattle

Identify orphaned Database Users and differentiate them from "Loginless" Database Users.  Read more...
By Orlando Colamatteo 2013/05/13 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 2,912 reads

The Security of You

There is a lot of data out there that is specific to an individual, none more important perhaps than biometric data. Steve Jones writes a bit about the security implications involved in working with this data. (This editorial was originally published on Nov 10, 2008. It is being re-run as Steve is at SQL Bits.)  Read more...
By Steve Jones 2013/05/03 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 184 reads

Getting the lowdown on 18456 errors

If you can establish a connection to a SQL Server, but are having problems logging in to it, you will...  Read more...
By Wayne Sheffield 2013/04/30 | Source: SQLServerCentral.com | Category: blogs
Rating: (not yet rated) |  Discuss |   Briefcase | 1,246 reads
<< Newer    Items 41 to 60 of 800    Older >>
 
Tags
editorial (113)    
sql server 7 (105)    
administration (64)    
sql server 2005 (56)    
blogs (52)    
strategies (40)    
encryption (33)    
t-sql (28)    
editorial - ipod (25)    
editorial - wmv (25)    
editorial - mp3 (24)    
auditing (21)    
permissions (18)    
miscellaneous (15)    
sql server 2008 (14)    
passwords (13)    
logins (12)    
programming (11)    
sql server 6.5 (11)    
transparent data encryption (tde) (11)    
backup / restore (10)    
configuring (9)    
reporting services (ssrs) (9)    
database design (8)    
role (8)    
roles (8)    
sql injection (8)    
best and worst practices (7)    
friday poll (7)    
integration services (ssis) (7)    
software development (7)    
sql agent (7)    
database roles (6)    
database security (6)    
database weekly (6)    
grant (6)    
sql server (6)    
sql server 2008 r2 (6)    
stored procedures (6)    
user (6)    
advanced querying (5)    
analysis services (ssas) (5)    
career (5)    
disaster recovery (dr) (5)    
hackers (5)    
news (5)    
secure programming (5)    
triggers (5)    
worst practices (5)    
biometrics (4)    
data retention (4)    
installation (4)    
legal issues (4)    
login (4)    
performance tuning (4)    
schema (4)    
sql server 2000 (4)    
users (4)    
authentication (3)    
ddl triggers (3)    
dts (3)    
execute as (3)    
impersonation (3)    
kerberos (3)    
monitoring (3)    
other (3)    
principals (3)    
professional development (3)    
replication (3)    
service broker (3)    
sql server 2012 (3)    
sql server express (3)    
sql university (3)    
surface area configuration tool (3)    
training (3)    
windows security (3)    
active directory (2)    
advanced (2)    
best practices (2)    
central management server (cms) (2)    
certificates (2)    
cloud computing (2)    
comparison (2)    
compliance (2)    
databases (2)    
development (2)    
firewall (2)    
guest user (2)    
indexing (2)    
jobs (2)    
logon triggers (2)    
members (2)    
ownership (2)    
ownership chaining (2)    
patches (2)    
permission (2)    
policy based management (pbm) (2)    
powershell (2)    
product reviews (2)    
rants (2)    
reviews (2)    
scripting (2)    
secure (2)    
server roles (2)    
service accounts (2)    
service packs (2)    
sql server architecture (2)    
sql-dmo (2)    
tools (2)    
user defined function (udf) (2)    
xml (2)    
xsl (2)    
.net (1)    
access restriction (1)    
administrator (1)    
ado (1)    
alerts (1)    
alias (1)    
architecture (1)    
automation (1)    
azure (1)    
backup / recovery (1)    
broker security (1)    
browser service (1)    
bugs (1)    
c# (1)    
change db owner (1)    
conferences/user groups (1)    
configuration (1)    
control server (1)    
create database (1)    
credentials (1)    
cryptography (1)    
dac (1)    
database mail (1)    
database owner (1)    
database principals (1)    
database users (1)    
ddl (1)    
dimensions (1)    
distributed queries (1)    
dmv's (1)    
dynamic sql (1)    
english query (1)    
eventdata (1)    
events (1)    
extended stored procedures (1)    
filestream (1)    
fixed server roles (1)    
general administration (1)    
grantee (1)    
grantor (1)    
hashbytes (1)    
hexadecimal (1)    
job (1)    
list (1)    
logon trigger (1)    
maintenance (1)    
management studio (ssms) (1)    
microsoft sql server (1)    
msdb (1)    
networking (1)    
openxml (1)    
orphaned (1)    
orphaned user (1)    
orphaned users (1)    
parameter (1)    
pass (1)    
password (1)    
password cracking (1)    
patching (1)    
presenting (1)    
privacy (1)    
privilege escalation (1)    
professional organization for sql server (1)    
profiler (1)    
proxy accounts (1)    
public (1)    
rename (1)    
revert (1)    
sanpshot (1)    
script (1)    
securables (1)    
securityadmin (1)    
server principals (1)    
server role (1)    
server_principals (1)    
sharepoint (1)    
sid (1)    
sp_cycle_errorlog (1)    
sp_msforeachdb (1)    
sql jobs (1)    
sql puzzles (1)    
sqlservercentral (1)    
ssl (1)    
sspi (1)    
survey (1)    
sysadmin (1)    
system databases (1)    
system development life cycle (1)    
tabular model (1)    
tcp/ip (1)    
today (1)    
trust (1)    
type (1)    
updategrams (1)    
upgrading (1)    
virtualization (1)    
visual basic 6 (1)    
vulnerability (1)    
windows (1)    
xp_logininfo (1)