Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tags security, sql server 2005 Rss

<< Newer    Items 21 to 40 of 64    Older >>
 

Understanding DDL Triggers in SQL Server 2005

SQL Server 2005 includes a number of new security enhancements to aid the DBA in managing their SQL Server. DDL triggers allow you to trap all kinds of DDL events that occur on your server. S. Srivathsani brings us a look at these new events.   Read more...
By S. Srivathsani 2007/07/04 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 15,099 reads

Script to determine permissions in SQL Server 2005

Although a few different options (Management Studio, system stored procedures, system views, custom scripts, etc.) exist to determine your permissions in SQL Server, in this tip we want to outline the functionality from the fn_my_permissions table valued function.   Read more...
By Additional Articles 2008/03/10 | Source: MSSQLTips.com | Category: security
Rating:  Rate this |   Briefcase | 4,002 reads

Application Roles

By Additional Articles 2008/03/05 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 2,750 reads

Securing the SA Account in SQL Server 2005

SQL Server 2005 has greatly changed the security paradigm for SQL Server DBAs. The sa account still exists, but for many tasks you can now avoid using it. New author Ken Johnson brings us some ides for properly securing this highly privileged account.   Read more...
By Ken Johnson 2007/03/14 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 16,387 reads

Script a Database Role

Script one or all roles in a database. Includes users, obect permissions and column permissions.  Read more...
By Ed Vassie 2011/09/08 | Source: SQLServerCentral.com | Category: sql server 7
Rating: |  Discuss |   Briefcase | 5,011 reads

SQL Server 2005 Best Practices Analyzer (January 2008) -- Now Available!

An upgrade to the Best Practices Analyzer from Microsoft is now available. Here's a blog post from the SQL CAT team.  Read more...
By Additional Articles 2008/01/21 | Source: SQLServerCentral.com | Category: sql server 2005
Rating: (not yet rated)  Rate this |   Briefcase | 3,534 reads

SQL Server 2005 - Hacking password Encryption

Part 2 of this article discusses how to hack/de-cipher the data that has been encrypted by passphrase.  Read more...
By Additional Articles 2008/01/10 | Source: Database Journal | Category: encryption
Rating: (not yet rated)  Rate this |   Briefcase | 3,831 reads

SQL Server 2005 Encryption types

SQL Server 2005 provides four methods of encryption. Part one of this article covers encryption and decryption by passphrase.  Read more...
By Additional Articles 2008/01/07 | Source: Database Journal | Category: security
Rating: (not yet rated)  Rate this |   Briefcase | 2,686 reads

SQL Server Security Model

Greg Larsen discusses the different options available within SQL Server 2005 for managing security.  Read more...
By Additional Articles 2008/01/01 | Source: Database Journal | Category: sql server 2005
Rating: (not yet rated)  Rate this |   Briefcase | 2,664 reads

SQL Server encryption vs. hashing for data security

Study encryption and hashing algorithm options for data security in SQL Server 2005 and use symmetric/asymmetric keys to encrypt and decrypt SQL Server data.  Read more...
By Additional Articles 2007/12/25 | Source: SearchSQLServer | Category: security
Rating: (not yet rated)  Rate this |   Briefcase | 2,273 reads

Login creation in SQL Server 2005 for SQL Server Authentication Mode

Its a graphical representation of login creation in SQL Server 2005 for SQL Server Authentication Mode.  Read more...
By Abdul Basit 2007/12/18 | Source: SQLServerCentral.com | Category: sql server 2005
Rating: |  Discuss |   Briefcase | 9,901 reads

Reorganize permissions in SQL Server 2005 step by step

Learn how to reorganize permissions in SQL Server 2005 in a multiple database environment.   Read more...
By Additional Articles 2007/11/29 | Source: SearchSQLServer | Category: security
Rating: (not yet rated)  Rate this |   Briefcase | 2,959 reads

Security and ownership.

By 2007/10/26 | Category: sql server 2005
Rating: (not yet rated) |  Discuss |   Briefcase | 2,713 reads

Understanding the Difference between Owners and Schemas in SQL Server

SQL Server 2005 introduces the concept of schemas as opposed to object owners found in previous versions. This article will explain the differences between the two and, hopefully, clear up some of the confusion that still exists about schemas.  Read more...
By Additional Articles 2007/10/18 | Source: SQLTeam.com | Category: sql server 2005
Rating: (not yet rated)  Rate this |   Briefcase | 5,033 reads

Setting Up Delegation for Linked Servers

Learn how to set up delegation on your SQL Server instances, so you can use the impersonate options when setting up the security properties of linked server definitions.  Read more...
By Additional Articles 2007/09/11 | Source: Database Journal | Category: administration
Rating:  Rate this |   Briefcase | 2,447 reads

SQL 2005 Symmetric Encryption

One of the more interesting new features with SQL Server 2005 is the native encryption built into the product. Expert SQL crpytographer, Michael Coles, brings us a look at the symmetric keys in SQL Server 2005 and how they can be used to encrypt data and be secured by a certificate.   Read more...
By Michael Coles 2007/08/24 (first published: 2007/05/11) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 51,410 reads

An Auditing Solution with XML And XSL

Auditing is something that almost every DBA needs to tackle at some point in his or her career. David McKinney brings a new twist on the solution by using XML and XSL to help implement auditing in your SQL Server application.   Read more...
By David McKinney 2007/08/20 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 4,980 reads

Data Security: Stop SQL Injection Attacks Before They Stop You

This article discusses: How SQL injection attacks work, Testing for vulnerabilities, Validating user input, Using .NET features to prevent attacks, Importance of handling exceptions  Read more...
By Additional Articles 2007/08/09 | Source: MSDN Communities | Category: security
Rating:  Rate this |   Briefcase | 2,900 reads

A Simple Approach to SQL Server 2005 Encryption

SQL Server 2005 has added encryption capabilities to the platform, much to the delight of many DBAs. However setting up encryption can be confusing and difficult for most DBAs. New author Mike Good brings us a perspective from someone who is brand new to this set of features and has spent time working through the functions and documenting them for the rest of us.   Read more...
By Mike Good 2007/08/02 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 19,884 reads

SQL Server Password Management:

Improving SQL Server password management includes thorough password testing and securing SQL Server installations beyond the main database server.  Read more...
By Additional Articles 2007/07/31 | Source: SearchSQLServer | Category: security
Rating:  Rate this |   Briefcase | 2,402 reads
<< Newer    Items 21 to 40 of 64    Older >>
 
Tags
sql server 2008 (7)    
sql server 7 (6)    
administration (4)    
blogs (4)    
encryption (4)    
sql server 2000 (4)    
database security (3)    
sql server (3)    
strategies (3)    
development (2)    
sql server 2008 r2 (2)    
sql server architecture (2)    
advanced (1)    
backup / restore (1)    
conferences/user groups (1)    
database design (1)    
database mail (1)    
database roles (1)    
jobs (1)    
logins (1)    
maintenance (1)    
miscellaneous (1)    
password (1)    
permissions (1)    
presenting (1)    
professional development (1)    
professional organization for sql server (1)    
proxy accounts (1)    
sql agent (1)    
sql university (1)    
tools (1)    
training (1)    
transparent data encryption (tde) (1)    
t-sql (1)    
windows security (1)    
xml (1)    
xsl (1)