Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tags Security, Miscellaneous Rss

   Items 1 to 18 of 18   
 

Free Encryption

Free SQL Server 2000 Encryption for your data!!! Author Michael Coles has put together a tolljit and some XPs that you can use to encrypt your data with the Blowfish algorithm. It is hard to write good applications that encrpyt data and manage the keys and security. This will give you a great headstart on protecting your data.   Read more...
By Michael Coles 2008/04/25 (first published: 2005/07/21) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 75,211 reads

An Auditing Solution with XML And XSL

Auditing is something that almost every DBA needs to tackle at some point in his or her career. David McKinney brings a new twist on the solution by using XML and XSL to help implement auditing in your SQL Server application.   Read more...
By David McKinney 2007/08/20 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 4,980 reads

Free Encryption

Free SQL Server 2000 Encryption for your data!!! Author Michael Coles has put together a tolljit and some XPs that you can use to encrypt your data with the Blowfish algorithm. It is hard to write good applications that encrpyt data and manage the keys and security. This will give you a great headstart on protecting your data.   Read more...
By Michael Coles 2008/04/25 (first published: 2005/07/21) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 75,211 reads

Conducting a SQL Server Operational Audit

Auditing, analyzing and documenting your SQL Server installation is becoming more important all the time, especially as more and more attention is being paid to the security of your environment. Chad Miller brings us a look at a framework and a sample document you can use in your environment to conduct an audit.   Read more...
By Chad Miller 2005/10/24 | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 13,150 reads

Dynamic SQL or Stored Procedure

We've had a lot of coverage of dynamic sql (including another great one from Robert Marda later this week) but this one is a little different. Done in a question/answer format, Andy tries to explain to junior developers why dynamic sql is to be avoided, how to do so, what to do when you can't.   Read more...
By Andy Warren 2005/08/26 (first published: 2003/04/23) | Source: SQLServerCentral.com | Category: performance tuning
Rating: |  Discuss |   Briefcase | 47,225 reads

Free Encryption

Free SQL Server 2000 Encryption for your data!!! Author Michael Coles has put together a tolljit and some XPs that you can use to encrypt your data with the Blowfish algorithm. It is hard to write good applications that encrpyt data and manage the keys and security. This will give you a great headstart on protecting your data.   Read more...
By Michael Coles 2008/04/25 (first published: 2005/07/21) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 75,211 reads

Stop SQL Injection Attacks Before They Stop You

A new article from MSDN magazine on stopping SQL Injection attacks by examining how the SQL can be exploited. It's a good basic article for developers as well as DBAs who might have to review code.  Read more...
By Additional Articles 2004/08/20 | Source: MSDN Communities | Category: security
Rating:  Rate this |   Briefcase | 2,373 reads

How to Make Sure You Have Good Passwords

As Robin points out there is no built in way to make sure users have strong passwords when using SQL authentication. There are a couple changes you can make (with appropriate warnings!) that will allow you to do this. Read on to find out why and how.   Read more...
By Robin Back 2004/03/02 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 6,626 reads

SQL Injection!

Do your developers really understand how to prevent injection attacks? Or scarier still, how many know what an injection attack is? Chris has some great examples of how sql injection works and how to prevent it.   Read more...
By Christoffer Hedgate 2004/02/02 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 16,670 reads

RC4 Encryption in a Stored Procedure

Joseph gathered together some various bits of code and came up with a solution that lets you do RC4 encryption via the sp_oa~ procedures.   Read more...
By Joseph Gama 2004/01/09 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 8,644 reads

Worst Practice - Bad Connection Strings and Bad Info in Sysprocesses

Andy returns to the Worst Practice series this week with a short article looking at how connection strings in applications affect what you see in sysprocesses. Perhaps less controversial (in our opinion) that some of the other worst practices, this is something easy to fix and definitely worth fixing! Read the article and post a comment - explore other points of view! Readers posting a comment will be entered in a drawing for a copy of the SQL Server 2000 Resource Kit.   Read more...
By Andy Warren 2003/08/01 | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 15,012 reads

Dynamic SQL or Stored Procedure

We've had a lot of coverage of dynamic sql (including another great one from Robert Marda later this week) but this one is a little different. Done in a question/answer format, Andy tries to explain to junior developers why dynamic sql is to be avoided, how to do so, what to do when you can't.   Read more...
By Andy Warren 2005/08/26 (first published: 2003/04/23) | Source: SQLServerCentral.com | Category: performance tuning
Rating: |  Discuss |   Briefcase | 47,225 reads

Review of SQL 2000 Fast Answers

A monster book at 980 pages, it's written in 'how-to' format and has a ton of good material. Andy gave it the once over for us and reports back - see what he thinks!   Read more...
By Andy Warren 2003/04/18 | Source: SQLServerCentral.com | Category: installation
Rating: |  Discuss |   Briefcase | 18,204 reads

The Case for SQL Logins - Part Two

In this follow up to one of our most popular articles, Andy responds to comments posted by readers and discusses how to manage SQL logins effectively in your applications.   Read more...
By Andy Warren 2002/08/19 | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 6,769 reads

The Case for SQL Logins - Part 1

Andy says Windows Authentication "is bad". What? That's not what Microsoft says! Heck, that's not even what we say! Everyone knows NT authentication is the way to go. Then again, when was the last time Andy wrote an article that wasn't worth reading?! Read the article, rate it and add a comment - and automatically be entered in a drawing for a copy of SQL Server 2000 Performance Tuning donated by Microsoft Press.   Read more...
By Andy Warren 2002/06/25 | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 12,593 reads

Review of SQL Server 2000 Programming (MSPress)

Andy sits down with an entry level book to see if he should use it at work as a teaching aid. Did he like it? Should you buy it? Read the review now!   Read more...
By Andy Warren 2002/06/04 | Source: SQLServerCentral.com | Category: installation
Rating: (not yet rated) |  Discuss |   Briefcase | 6,398 reads

Worst Practices - Encrypting Data

Continuing with the Worst Practices Series: Steve Jones examines why encryption in the database is a bad idea.   Read more...
By Steve Jones 2002/01/08 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 8,370 reads

Enforcing Security in Multi-Tier Applications

The major part of the article, however, is dedicated to a topic that often confuses people and leads to some of the strongest disagreements among IT professionals and developers: the benefits and drawbacks of enforcing security in the middle (or business) tier versus the data tier.   Read more...
By Additional Articles 2001/12/25 | Source: Microsoft MSDN | Category: security
Rating:  Rate this |   Briefcase | 1,441 reads
   Items 1 to 18 of 18   
 
Tags
sql server 7 (13)    
programming (8)    
t-sql (7)    
administration (6)    
strategies (6)    
configuring (5)    
stored procedures (4)    
backup / restore (2)    
best and worst practices (2)    
dts (2)    
indexing (2)    
installation (2)    
monitoring (2)    
performance tuning (2)    
replication (2)    
triggers (2)    
user defined function (udf) (2)    
worst practices (2)    
xml (2)    
xsl (2)    
.net (1)    
ado (1)    
development (1)    
distributed queries (1)    
english query (1)    
openxml (1)    
sql puzzles (1)    
sql server 2005 (1)    
updategrams (1)    
visual basic 6 (1)