Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tags Security, SQL Server 7 Rss

<< Newer    Items 21 to 40 of 128    Older >>
 

Implementing Encrypting File System (EFS) with SQL Server

EFS provides a mechanism for encrypting files completely transparent to higher level applications such as SQL Server. In this article by Brian Kelley, he shows you how to implement this type of security in your environment.   Read more...
By Brian Kelley 2006/12/01 (first published: 2002/12/09) | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 29,115 reads

Anticipate the worst when developing SQL Server databases

Arthur Fuller advises DBAs to try to break their software in order to make sure their SQL Server databases can withstand potential attacks. See if your code can hold up to his suggested tests.  Read more...
By Additional Articles 2006/10/12 | Source: Builder.com | Category: security
Rating:  Rate this |   Briefcase | 3,178 reads

Ownership Chaining

Security in SQL Server is not too complex, following a fairly simple framework for allowing and preventing access to data. However there are a few places where it can get tricky and some concepts that many people do not understand. Rob Farley brings us an explanation of one of those areas: ownership chaining. Read about how ownership chaining can be useful and also how it may open security holes in your environment.   Read more...
By Rob Farley 2006/10/03 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 5,507 reads

Encrypting Data With the Encrypt Function

One of the major problems in the database field is when people store sensitive data unencrypted into SQL Server. This article shows you one of the most basic ways to encrypt data to the casual viewer.   Read more...
By Brian Knight 2006/05/29 (first published: 2001/07/17) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 32,987 reads

Password cracking tools for SQL Server

If you're performing a penetration test or higher-level security audit of your SQL Server systems, there's one test you must not miss. It seems obvious, but many people overlook it: SQL Server password testing. Given the inherent weaknesses compared with more secure Windows authentication, you should especially test for password flaws if you're using SQL Server authentication in mixed mode. Password testing will help you determine how easily others can break into your database and help you ensure SQL Server users are being responsible with their accounts.  Read more...
By Additional Articles 2006/05/16 | Source: Other | Category: security
Rating:  Rate this |   Briefcase | 4,199 reads

SQL 2000 DBA Toolkit Part 1

SQL Server 2005 builds some great encryption tools into the product, but what if you are stuck with SQL Server 2000? SQL Server expert Michael Coles brings us the first part of a series along with a free toolkit to manage encryption and keys.   Read more...
By Michael Coles 2007/06/22 (first published: 2006/04/13) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 30,279 reads

Free Encryption

Free SQL Server 2000 Encryption for your data!!! Author Michael Coles has put together a tolljit and some XPs that you can use to encrypt your data with the Blowfish algorithm. It is hard to write good applications that encrpyt data and manage the keys and security. This will give you a great headstart on protecting your data.   Read more...
By Michael Coles 2008/04/25 (first published: 2005/07/21) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 75,280 reads

SQL Server 2000 SP 3: What's New in Security

Service Pack 3 for SQL Server 2000 is huge. There are significant changes in it and they apply to all three products: the core SQL Server, MSDE, and Analysis Services. Because there are so many changes, this first article in the series will only focus on the security changes.   Read more...
By Brian Kelley 2005/12/09 (first published: 2003/06/05) | Source: SQLServerCentral.com | Category: service packs
Rating: |  Discuss |   Briefcase | 29,971 reads

SQL Server Security Part 2

In part one Chris Kempster covered a variety of security recommendations primarily for production systems. In Part two of this series he continues to explore security at a variety of levels where you may not realize you are vulnerable.   Read more...
By Chris Kempster 2005/11/04 (first published: 2004/01/30) | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 35,072 reads

SQL Server 2000 SP3 and xp_cmdshell Woes

The problems caused by the SQL Sapphire Worm, also know as the SQL Slammer, have caused many sites to do a quick upgrade to SQL Server 2000 Service Pack 3 (SP3). It includes the fix that prevents infection by the worm. While moving to the latest service pack is usually a good thing, to do so without thorough testing risks breaking a working application. That is exactly what happened to one of my clients over the weekend.  Read more...
By Additional Articles 2005/11/02 | Source: Other | Category: security
Rating:  Rate this |   Briefcase | 2,022 reads

Conducting a SQL Server Operational Audit

Auditing, analyzing and documenting your SQL Server installation is becoming more important all the time, especially as more and more attention is being paid to the security of your environment. Chad Miller brings us a look at a framework and a sample document you can use in your environment to conduct an audit.   Read more...
By Chad Miller 2005/10/24 | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 13,170 reads

Logins, Users, and Roles - Getting Started

Do you know the difference between a login and a user? What's the best way to add them; Enterprise Manager, T-SQL, or SQL-DMO? In this beginner level article Andy demonstrates how to use all three methods to add logins and users and offers his view of which is the best technique.   Read more...
By Andy Warren 2005/09/30 (first published: 2003/02/19) | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 35,266 reads

Updated SQL Injection

SQL injection has been a hot topic the last couple years and there are some great articles at SQLServerCentral.com on this topic. Michael Coles brings us an updated look at this SQL Server security issue with some new examples you might not have previously thought.   Read more...
By Michael Coles 2008/03/21 (first published: 2005/09/21) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 83,754 reads

Troubleshooting Cannot Generate SSPI Context Errors

As a DBA you do not need to know how to setup an Active Directory domain or a DNS server, but you still need to know how Kerberos, Service Principle Names, and hostnames are used to perform integrated authentication to a SQL Server. This article by new columnist Chad Miller shows you some of the more integral parts of troubleshooting running Windows Authentication security in a SQL Server environmnet.   Read more...
By Chad Miller 2005/08/19 (first published: 2003/02/27) | Source: SQLServerCentral.com | Category: installation
Rating: |  Discuss |   Briefcase | 65,314 reads

Free Encryption

Free SQL Server 2000 Encryption for your data!!! Author Michael Coles has put together a tolljit and some XPs that you can use to encrypt your data with the Blowfish algorithm. It is hard to write good applications that encrpyt data and manage the keys and security. This will give you a great headstart on protecting your data.   Read more...
By Michael Coles 2008/04/25 (first published: 2005/07/21) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 75,280 reads

10 Steps to Securing your SQL Server

Securing your SQL Server can be an arduous task, but very rewarding. This article covers 10 steps to properly protecting your data.   Read more...
By Brian Knight 2005/05/27 (first published: 2003/04/03) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 43,775 reads

SQL Server 2000 Security - Part 6 - Ownership and Object Permissions

We have described, so far, authorization based on a predefined fixed server (determining a set of SQL server-wide privileges) and database (applying to database objects and activities) roles. We have also discussed application roles, which makes the level of permissions independent of those assigned to a SQL Server login or a database user account. Now it is time to look into permissions from the point of view of database objects. There are two main factors that play a role in determining how access rights to them are evaluated - their ownership and custom permissions. We will discuss the first one of these topics in this article and will continue with the other one in the next installment of this series.   Read more...
By Additional Articles 2005/03/22 | Source: Database Journal | Category: security
Rating:  Rate this |   Briefcase | 2,268 reads

Securing SQL Backups

SQL Server does many things very well, but securing itself is not one of them. While securing your server requires some effort, there is an area that many people forget. Securing your backups! Brian Kelley, our resident security expert, brings some advice and ideas for ensuring your data will not be stolen.   Read more...
By Brian Kelley 2005/03/21 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 8,770 reads

SQL Server Security Part 1

In this series of articles, Chris Kempster will discuss some of the finer aspects of SQL Server security and also touch on OS, physical and application security to open up this science for general discussion.   Read more...
By Chris Kempster 2005/02/11 (first published: 2002/01/14) | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 49,991 reads

Removing the Builtin Administrators - Some Pitfalls to Avoid

The SQL Server 2000 security model is not the best one of all the RDBMS platforms and requires some work to secure properly. One of the practices that is recommended is removing the builtin/administrators group from accessing the SQL Server. New author Kathi Kellenberger shows us some of the pitfalls she encountered when removing this group from her servers.   Read more...
By Kathi Kellenberger 2007/08/10 (first published: 2005/01/12) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 29,433 reads
<< Newer    Items 21 to 40 of 128    Older >>
 
Tags
administration (34)    
strategies (17)    
miscellaneous (13)    
t-sql (13)    
configuring (9)    
programming (9)    
sql server 6.5 (9)    
sql server 2005 (6)    
best and worst practices (5)    
news (5)    
advanced querying (4)    
installation (4)    
stored procedures (4)    
dts (3)    
monitoring (3)    
worst practices (3)    
backup / restore (2)    
best practices (2)    
indexing (2)    
logins (2)    
permissions (2)    
product reviews (2)    
replication (2)    
reviews (2)    
service packs (2)    
sql-dmo (2)    
triggers (2)    
user defined function (udf) (2)    
.net (1)    
ado (1)    
bugs (1)    
database roles (1)    
databases (1)    
disaster recovery (dr) (1)    
distributed queries (1)    
english query (1)    
grant (1)    
jobs (1)    
maintenance (1)    
openxml (1)    
other (1)    
performance tuning (1)    
proxy accounts (1)    
rants (1)    
role (1)    
script (1)    
scripting (1)    
sql agent (1)    
sql server 2008 (1)    
system databases (1)    
updategrams (1)    
user (1)    
visual basic 6 (1)    
xml (1)    
xsl (1)