Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tags Security, SQL Server 6.5 Rss

   Items 1 to 16 of 16   
 

SQL Server Security: Server Roles

As yo probably know, Brian covers security topics for us and does a great job. This week he looks at the fixed roles and points out a few things you may not have thought about.   Read more...
By Brian Kelley 2007/05/04 (first published: 2003/10/29) | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 54,114 reads

Encrypting Data With the Encrypt Function

One of the major problems in the database field is when people store sensitive data unencrypted into SQL Server. This article shows you one of the most basic ways to encrypt data to the casual viewer.   Read more...
By Brian Knight 2006/05/29 (first published: 2001/07/17) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 32,989 reads

SQL Server Security Part 2

In part one Chris Kempster covered a variety of security recommendations primarily for production systems. In Part two of this series he continues to explore security at a variety of levels where you may not realize you are vulnerable.   Read more...
By Chris Kempster 2005/11/04 (first published: 2004/01/30) | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 35,072 reads

10 Steps to Securing your SQL Server

Securing your SQL Server can be an arduous task, but very rewarding. This article covers 10 steps to properly protecting your data.   Read more...
By Brian Knight 2005/05/27 (first published: 2003/04/03) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 43,775 reads

SQL Server Security Part 1

In this series of articles, Chris Kempster will discuss some of the finer aspects of SQL Server security and also touch on OS, physical and application security to open up this science for general discussion.   Read more...
By Chris Kempster 2005/02/11 (first published: 2002/01/14) | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 49,995 reads

Dump SQL Permissions

We saw a note from Chad about a tool he wrote in the forums and asked him to write up some notes. Not only did we get notes, we got the source code! See what a DBA can do with some DMO.   Read more...
By Chad Miller 2004/03/17 | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 17,649 reads

SQL Server Security Part 2

In part one Chris Kempster covered a variety of security recommendations primarily for production systems. In Part two of this series he continues to explore security at a variety of levels where you may not realize you are vulnerable.   Read more...
By Chris Kempster 2005/11/04 (first published: 2004/01/30) | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 35,072 reads

SQL Server Security: Server Roles

As yo probably know, Brian covers security topics for us and does a great job. This week he looks at the fixed roles and points out a few things you may not have thought about.   Read more...
By Brian Kelley 2007/05/04 (first published: 2003/10/29) | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 54,114 reads

10 Steps to Securing your SQL Server

Securing your SQL Server can be an arduous task, but very rewarding. This article covers 10 steps to properly protecting your data.   Read more...
By Brian Knight 2005/05/27 (first published: 2003/04/03) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 43,775 reads

How Safe are Your Passwords?

How safe are your SQL passwords? Use these free tools to find out how secure your passwords are and generate more secure passwords.   Read more...
By Joseph Gama 2002/12/10 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 6,780 reads

SQL Server Encryption Best and Worst Practices

In this article by Neil Weicher, he talks about encryption of data and files for SQL Server.   Read more...
By Neil Weicher 2002/01/30 | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 6,579 reads

SQL Server Security Part 1

In this series of articles, Chris Kempster will discuss some of the finer aspects of SQL Server security and also touch on OS, physical and application security to open up this science for general discussion.   Read more...
By Chris Kempster 2005/02/11 (first published: 2002/01/14) | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 49,995 reads

SQL Server 6.5 Security Modes

A look at the different security modes availabe in SQL Server 6.5   Read more...
By Alexander Chigrik 2001/07/19 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 2,380 reads

Encrypting Data With the Encrypt Function

One of the major problems in the database field is when people store sensitive data unencrypted into SQL Server. This article shows you one of the most basic ways to encrypt data to the casual viewer.   Read more...
By Brian Knight 2006/05/29 (first published: 2001/07/17) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 32,989 reads

Securing Your SQL Server

Poorly managed SQL Server Security can not only leave your SQL Server vulnerable, but also leave your NT Server and network open to attacks.   Read more...
By Brian Knight 2001/05/14 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 6,429 reads

Using the Public Role to Manage Permissions

This article by Andy Warren discusses both how to use the Public Role and how using Public may cause you more problems than it's worth. Great examples!   Read more...
By Andy Warren 2001/05/10 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 17,270 reads
   Items 1 to 16 of 16   
 
Tags
sql server 7 (9)    
administration (5)    
strategies (3)    
advanced querying (1)    
best and worst practices (1)    
configuring (1)    
dts (1)    
programming (1)    
sql-dmo (1)    
t-sql (1)    
worst practices (1)