Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tag Security Rss

   Items 1 to 20 of 878    Older >>
 

Generate Login Script(2008R2 And Older)

Generate Script from Logins of Sql Server to recreate in another instance  Read more...
By Bahram Shayan 2015/08/25 | Source: SQLServerCentral.com | Category: logins
Rating: |  Discuss |   Briefcase | 1,032 reads

Changing roles

By Steve Jones 2015/08/18 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,229 reads

Cloud Security Issues

The cloud is always going to be a challenge for security, but is it harder or easier than on premises? Steve Jones has a few comments.  Read more...
By Steve Jones 2015/08/04 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 119 reads

Stairway to SQL Server Security Level 10: Row-Level Security

Unlike some other industrial-strength database servers, SQL Server lacks a built-in mechanism for protecting individual data records, called row-level security. This stairway level explores why you might want to use such a low-level granularity of data access security and how you can implement row-level security.  Read more...
By Don Kiely 2015/07/29 | Source: SQLServerCentral.com | Category: stairway series
Rating: |  Discuss |   Briefcase | 2,952 reads

Azure SQL Database Security Features

The Microsoft Azure platform is evolving fast. Azure SQL Database is riding high on the cloud wave with new features enabled at a fast pace. In this article, Kun Cheng shares a few Azure SQL Database security features that could help developers and DBAs develop and manage a secure SQL Database solution.  Read more...
By Additional Articles 2015/07/17 | Source: SQLCAT | Category: azure sql database
Rating: (not yet rated)  Rate this |   Briefcase | 5,279 reads

MS15-058: Vulnerabilities in SQL Server could allow remote code execution

A vulnerability has been released that can affect SQL Server 2008, 208 R2, 2012, and 2014.  Read more...
By Press Release 2015/07/15 | Source: SQLServerCentral.com | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 5,327 reads

Grant User Access to All SQL Server Databases

Consider a situation when you have a large number of databases on your SQL Server, and you are requested to grant user access to all SQL Server databases. How can you grant access to a user for all databases on a SQL Server instance?  Read more...
By Additional Articles 2015/06/30 | Source: MSSQLTips.com | Category: security
Rating: (not yet rated)  Rate this |   Briefcase | 5,327 reads

Stored Procedures and SQL Injection

Why do stored procedures help with security? In this piece, MVP Brian Kelley explains why SQL Injection and information gathering are hampered with stored procedures.  Read more...
By Brian Kelley 2015/06/12 (first published: 2013/02/18) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 19,933 reads

DBCC InputBuffer Permissions

By Steve Jones 2015/05/29 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,282 reads

Hack Us

A challenge from United intrigues Steve Jones. How many other companies would make a challenge like this?  Read more...
By Steve Jones 2015/05/26 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 173 reads

Default Endpoint Encryption

By Steve Jones 2015/05/21 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,194 reads

PCI Best Practices Guide for SQL Server DBAs

Tibor Nagy has put together some best practices to help SQL Server DBAs navigate the many different requirements around PCI compliance.  Read more...
By Additional Articles 2015/05/21 | Source: MSSQLTips.com | Category: best practices
Rating: (not yet rated)  Rate this |   Briefcase | 6,234 reads

How to Get SQL Server Security Horribly Wrong

It is no good doing some or most of the aspects of SQL Server security right. You have to get them all right, because any effective penetration of your security is likely to spell disaster. If you fail in any of the ways that Robert Sheldon lists and describes, then you can't assume that your data is secure, and things are likely to go horribly wrong.  Read more...
By Additional Articles 2015/05/13 | Source: SimpleTalk | Category: security
Rating:  Rate this |   Briefcase | 8,129 reads

Passively detect attempts to guess passwords

Review the error log for possible brute force or dictionary attacks on your SQL Server instance.  Read more...
By Daniel Brink 2015/05/08 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 2,367 reads

How to Recover a SQL Server Login Password

I will describe a simple method anyone can use to obtain lost password information for a SQL Server login.  Read more...
By Geoff Albin 2015/04/24 (first published: 2013/03/04) | Source: SQLServerCentral.com | Category: password cracking
Rating: |  Discuss |   Briefcase | 30,518 reads

The Opportunistic Hacker

Sometimes the crimes of opportunity might be the worst ones for our data.  Read more...
By Steve Jones 2015/04/14 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 195 reads

Stairway to SQL Server Security Level 7: Security Across Databases with Cross-Database Ownership Chaining

Sometimes you need to reach outside a database and access data and objects from multiple databases, which raises some security issues and increases the complexity of data access. In this stairway level, you’ll learn about cross-database ownership chaining so that you can reach across database boundaries securely.  Read more...
By Don Kiely 2015/04/08 | Source: SQLServerCentral.com | Category: stairway series
Rating: |  Discuss |   Briefcase | 2,434 reads

Source Code Security

The code you use may contain security information. Be extra careful in this case, especially when you use encryption.  Read more...
By Steve Jones 2015/03/31 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 107 reads

Secure Checks

By Steve Jones 2015/03/25 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,708 reads

Backing up from SETUSER

By Steve Jones 2015/03/19 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,933 reads
   Items 1 to 20 of 878    Older >>
 
Tags
editorial (127)    
sql server 7 (105)    
administration (69)    
sql server 2005 (56)    
blogs (53)    
strategies (40)    
encryption (39)    
t-sql (33)    
editorial - ipod (25)    
editorial - wmv (25)    
editorial - mp3 (24)    
auditing (22)    
permissions (22)    
logins (19)    
miscellaneous (15)    
sql server 2008 (15)    
passwords (13)    
backup / restore (12)    
programming (11)    
roles (11)    
sql server 6.5 (11)    
transparent data encryption (tde) (11)    
sql injection (10)    
configuring (9)    
reporting services (ssrs) (9)    
database design (8)    
role (8)    
software development (8)    
stored procedures (8)    
best and worst practices (7)    
friday poll (7)    
grant (7)    
integration services (ssis) (7)    
sql agent (7)    
sql server 2008 r2 (7)    
user (7)    
database roles (6)    
database security (6)    
database weekly (6)    
sql server (6)    
stairway series (6)    
advanced querying (5)    
analysis services (ssas) (5)    
career (5)    
disaster recovery (dr) (5)    
hackers (5)    
news (5)    
schemas (5)    
secure programming (5)    
triggers (5)    
worst practices (5)    
authentication (4)    
biometrics (4)    
data retention (4)    
installation (4)    
legal issues (4)    
performance tuning (4)    
server roles (4)    
sql server 2000 (4)    
sql server 2012 (4)    
users (4)    
active directory (3)    
best practices (3)    
cloud computing (3)    
ddl triggers (3)    
dts (3)    
execute as (3)    
impersonation (3)    
kerberos (3)    
monitoring (3)    
other (3)    
principals (3)    
professional development (3)    
replication (3)    
service accounts (3)    
service broker (3)    
sql server express (3)    
sql university (3)    
surface area configuration tool (3)    
training (3)    
windows security (3)    
advanced (2)    
central management server (cms) (2)    
certificates (2)    
comparison (2)    
compliance (2)    
dac (2)    
database principals (2)    
databases (2)    
development (2)    
firewall (2)    
guest user (2)    
indexing (2)    
jobs (2)    
logon triggers (2)    
members (2)    
ownership (2)    
ownership chaining (2)    
patches (2)    
permission (2)    
policy based management (pbm) (2)    
powershell (2)    
privilege escalation (2)    
product reviews (2)    
profiler (2)    
rants (2)    
reviews (2)    
scripting (2)    
secure (2)    
service packs (2)    
setuser (2)    
sid (2)    
spn (2)    
sql server 2014 (2)    
sql server architecture (2)    
sql-dmo (2)    
tcp/ip (2)    
tools (2)    
user defined function (udf) (2)    
xml (2)    
xsl (2)    
.net (1)    
access restriction (1)    
administrator (1)    
ado (1)    
aggregates (1)    
alerts (1)    
alias (1)    
analysis services (1)    
architecture (1)    
asymmetric keys (1)    
automation (1)    
azure (1)    
azure sql database (1)    
backup / recovery (1)    
bcp (bulk copy program) (1)    
broker security (1)    
browser service (1)    
bugs (1)    
c# (1)    
change db owner (1)    
cissp (1)    
cloud (1)    
code signing (1)    
conferences/user groups (1)    
configuration (1)    
connect any database (1)    
continuous integration (1)    
control server (1)    
create database (1)    
credentials (1)    
credit card numbers (1)    
cross-database ownership chaining (1)    
cryptography (1)    
data driven (1)    
data mining (1)    
data security (1)    
database mail (1)    
database master key (dmk) (1)    
database object permissions (1)    
database owner (1)    
database ownership (1)    
database permissions (1)    
database users (1)    
dbcc (1)    
ddl (1)    
deny (1)    
dimensions (1)    
distributed queries (1)    
dmv's (1)    
dynamic sql (1)    
endpoints (1)    
english query (1)    
eventdata (1)    
events (1)    
execution context (1)    
extended stored procedures (1)    
filestream (1)    
fixed server roles (1)    
general administration (1)    
grantee (1)    
grantor (1)    
hashbytes (1)    
hexadecimal (1)    
job (1)    
linked server (1)    
list (1)    
logon trigger (1)    
maintenance (1)    
management studio (ssms) (1)    
microsoft sql server (1)    
msdb (1)    
networking (1)    
openxml (1)    
orphaned (1)    
orphaned user (1)    
orphaned users (1)    
parameter (1)    
pass (1)    
password (1)    
password cracking (1)    
patching (1)    
presenting (1)    
privacy (1)    
professional organization for sql server (1)    
proxy accounts (1)    
public (1)    
rename (1)    
report server (1)    
responsibilities (1)    
restore (1)    
revert (1)    
row-level security (rls) (1)    
sa (1)    
sanpshot (1)    
script (1)    
securables (1)    
security awareness (1)    
securityadmin (1)    
server principals (1)    
server_principals (1)    
sharepoint (1)    
sid mismatch check (1)    
sp_cycle_errorlog (1)    
sp_msforeachdb (1)    
sql jobs (1)    
sql puzzles (1)    
sql server permissions (1)    
sql spackle (1)    
sqlservercentral (1)    
ssl (1)    
sspi (1)    
stored procedure (1)    
survey (1)    
sysadmin (1)    
system databases (1)    
system development life cycle (1)    
tabular model (1)    
today (1)    
trust (1)    
trustworthy (1)    
type (1)    
updategrams (1)    
upgrading (1)    
virtualization (1)    
visual basic 6 (1)    
vulnerability (1)    
windows (1)    
xp_logininfo (1)