Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tags Security, SQL Server 7 Rss

   Items 1 to 20 of 128    Older >>
 

Permission scripting over all databases

Scripts permissions/roles for db user across all databases.  Read more...
By W Louw 2013/10/01 | Source: SQLServerCentral.com | Category: permissions
Rating: |  Discuss |   Briefcase | 12,579 reads

Logins created in the last X Days

These scripts give you the list of logins created in the Last X Days for SQL Server 2000 or 2005.  Read more...
By Mani Singh 2011/12/23 | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 2,251 reads

Script a Database Role

Script one or all roles in a database. Includes users, obect permissions and column permissions.  Read more...
By Ed Vassie 2011/09/08 | Source: SQLServerCentral.com | Category: sql server 7
Rating: |  Discuss |   Briefcase | 5,055 reads

Read_Only Database

By Unknown . 2009/04/10 | Category: sql server 7
Rating: (not yet rated) |  Discuss |   Briefcase | 3,923 reads

Proxy Accounts in SQL Server

Yan Pan explains how to set up proxies in SQL Server 2000, 2005 and 2008, and compares the differences between them  Read more...
By Additional Articles 2008/12/30 | Source: Database Journal | Category: proxy accounts
Rating: (not yet rated)  Rate this |   Briefcase | 3,436 reads

Logins created in the last X Days

These scripts give you the list of logins created in the Last X Days for SQL Server 2000 or 2005.  Read more...
By Mani Singh 2011/12/23 | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 2,251 reads

SQL Server Security: Pros and Cons of Application Roles

Application roles often interesting possibilities in theory. In practice? Brian explores how they work and some of the pros/cons you should consider before selecting them for use in your applications.   Read more...
By Brian Kelley 2008/07/25 (first published: 2003/08/27) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 39,580 reads

usp_SecurCreation - SQL 2k

Creates statements for securables creation.  Read more...
By Pedro Lopes MS 2008/06/26 | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 874 reads

Free Encryption

Free SQL Server 2000 Encryption for your data!!! Author Michael Coles has put together a tolljit and some XPs that you can use to encrypt your data with the Blowfish algorithm. It is hard to write good applications that encrpyt data and manage the keys and security. This will give you a great headstart on protecting your data.   Read more...
By Michael Coles 2008/04/25 (first published: 2005/07/21) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 75,274 reads

Updated SQL Injection

SQL injection has been a hot topic the last couple years and there are some great articles at SQLServerCentral.com on this topic. Michael Coles brings us an updated look at this SQL Server security issue with some new examples you might not have previously thought.   Read more...
By Michael Coles 2008/03/21 (first published: 2005/09/21) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 83,752 reads

Script a Database Role

Script one or all roles in a database. Includes users, obect permissions and column permissions.  Read more...
By Ed Vassie 2011/09/08 | Source: SQLServerCentral.com | Category: sql server 7
Rating: |  Discuss |   Briefcase | 5,055 reads

Removing the Builtin Administrators - Some Pitfalls to Avoid

The SQL Server 2000 security model is not the best one of all the RDBMS platforms and requires some work to secure properly. One of the practices that is recommended is removing the builtin/administrators group from accessing the SQL Server. New author Kathi Kellenberger shows us some of the pitfalls she encountered when removing this group from her servers.   Read more...
By Kathi Kellenberger 2007/08/10 (first published: 2005/01/12) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 29,433 reads

Beginning SQL Server - Logins and Users

Part 3 of Steve Jones' series on beginning SQL Server from the perspective of a system administrator or someone not used to working with SQL Server. If you've been designated the new administrator, take a look at this series for some help in coming up to speed on this product. This article looks at logins and basic security.   Read more...
By Steve Jones 2007/08/03 (first published: 2004/09/02) | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 41,046 reads

SQL Server Security: Pros and Cons of Application Roles

Application roles often interesting possibilities in theory. In practice? Brian explores how they work and some of the pros/cons you should consider before selecting them for use in your applications.   Read more...
By Brian Kelley 2008/07/25 (first published: 2003/08/27) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 39,580 reads

SQL 2000 DBA Toolkit Part 1

SQL Server 2005 builds some great encryption tools into the product, but what if you are stuck with SQL Server 2000? SQL Server expert Michael Coles brings us the first part of a series along with a free toolkit to manage encryption and keys.   Read more...
By Michael Coles 2007/06/22 (first published: 2006/04/13) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 30,275 reads

SQL Server Auditing - Part 1

Our SQL Server Security expert, Brian Kelley, brings us the first part of a new series on auditing. Most of the auditing articles we've had are based on how you audit changes to data. Brian looks at auditing from the server itself, explaining the different levels of auditing built into SQL Server 2000.   Read more...
By Brian Kelley 2007/06/01 (first published: 2004/08/05) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 38,570 reads

Auditing with SQL Profiler

SQL Server includes a great auditing tool: Profiler. It's not the easiest tool to use, however, and it's one that takes some getting used to. Our resident security export, Brian Kelley looks at a simple example of using this tool to audit logins.   Read more...
By Brian Kelley 2007/04/20 (first published: 2004/09/01) | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 33,827 reads

Hacking SQL Server

In this presentation at the Jacksonville SQL Server Users Group, Bayer White playS the part of a developer protecting his application and Brian Knight attempts to hack his application using SQL Injection and cross-site scripting. Then, Bayer will show you how to protect yourself from the hacker and then Brian tries again. Back and forth the chess match goes until someone wins!   Read more...
By Additional Articles 2007/02/12 | Source: JumpStartTV | Category: security
Rating:  Rate this |   Briefcase | 4,956 reads

SQL Server Security: Fixed Database Roles

Brian is back with a new security article, this time working through the details of the fixed database roles. There are some important concepts here. In particular if you're not totally clear on the difference between dbo and db_owner, read this article.   Read more...
By Brian Kelley 2007/01/19 (first published: 2003/12/12) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 60,462 reads

Updated SQL Injection

SQL injection has been a hot topic the last couple years and there are some great articles at SQLServerCentral.com on this topic. Michael Coles brings us an updated look at this SQL Server security issue with some new examples you might not have previously thought.   Read more...
By Michael Coles 2008/03/21 (first published: 2005/09/21) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 83,752 reads
   Items 1 to 20 of 128    Older >>
 
Tags
administration (34)    
strategies (17)    
miscellaneous (13)    
t-sql (13)    
configuring (9)    
programming (9)    
sql server 6.5 (9)    
sql server 2005 (6)    
best and worst practices (5)    
news (5)    
advanced querying (4)    
installation (4)    
stored procedures (4)    
dts (3)    
monitoring (3)    
worst practices (3)    
backup / restore (2)    
best practices (2)    
indexing (2)    
logins (2)    
permissions (2)    
product reviews (2)    
replication (2)    
reviews (2)    
service packs (2)    
sql-dmo (2)    
triggers (2)    
user defined function (udf) (2)    
.net (1)    
ado (1)    
bugs (1)    
database roles (1)    
databases (1)    
disaster recovery (dr) (1)    
distributed queries (1)    
english query (1)    
grant (1)    
jobs (1)    
maintenance (1)    
openxml (1)    
other (1)    
performance tuning (1)    
proxy accounts (1)    
rants (1)    
role (1)    
script (1)    
scripting (1)    
sql agent (1)    
sql server 2008 (1)    
system databases (1)    
updategrams (1)    
user (1)    
visual basic 6 (1)    
xml (1)    
xsl (1)