Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tags Security, T-SQL Rss

   Items 1 to 20 of 36    Older >>
 

Signing options

By Steve Jones 2015/02/20 | Category: t-sql
Rating: (not yet rated) |  Discuss |   Briefcase | 1,539 reads

Not Again!

By Steve Knox 2015/02/18 | Category: aggregates
Rating: (not yet rated) |  Discuss |   Briefcase | 2,198 reads

BCP results

By Stuart Davies 2014/07/28 | Category: t-sql
Rating: (not yet rated) |  Discuss |   Briefcase | 1,861 reads

Drop Me? No, I Don't Think So

By Andy Warren 2014/05/14 | Category: login
Rating: (not yet rated) |  Discuss |   Briefcase | 2,124 reads

Double Keys

By Steve Jones 2014/04/22 | Category: encryption
Rating: (not yet rated) |  Discuss |   Briefcase | 1,803 reads

Symmetric Key Use

By Steve Jones 2014/04/08 | Category: encryption
Rating: (not yet rated) |  Discuss |   Briefcase | 1,383 reads

Permission scripting over all databases

Scripts permissions/roles for db user across all databases.  Read more...
By W Louw 2013/10/01 | Source: SQLServerCentral.com | Category: permissions
Rating: |  Discuss |   Briefcase | 12,969 reads

Master Keys

By Stanley Kapfunde 2012/05/25 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 2,235 reads

HASHBYTES

By Steve Jones 2012/02/09 | Category: t-sql
Rating: (not yet rated) |  Discuss |   Briefcase | 2,060 reads

Hashing

By Steve Jones 2012/01/24 | Category: t-sql
Rating: (not yet rated) |  Discuss |   Briefcase | 2,448 reads

who can do what?

list each user has the right to do  Read more...
Rating: |  Discuss |   Briefcase | 2,199 reads

Securing Reporting Services Reports

Learn how you can get the userid of someone connected to Reporting Services and use that information to determine if they can view the report.  Read more...
By Mohamed Idttalbe 2010/05/18 | Source: SQLServerCentral.com | Category: t-sql
Rating: |  Discuss |   Briefcase | 7,122 reads

Find weak login passwords in your server

Use this script to search for SQL Server logins who use weak password  Read more...
By Th Tr 2010/01/05 | Source: SQLServerCentral.com | Category: t-sql
Rating: |  Discuss |   Briefcase | 3,551 reads

Extending the REVERT statement using the WITH COOKIE clause in SQL Server 2005

In a previous tip on Switching Execution Context using the REVERT clause, you have seen how to switch execution context to a more privileged user and revert back to the original context of the caller within a programmable object. The REVERT clause accepts a parameter WITH COOKIE to provide an even more granular option. How do we use it?  Read more...
By Additional Articles 2009/01/15 | Source: MSSQLTips.com
Rating: (not yet rated)  Rate this |   Briefcase | 2,483 reads

public access to extended SP's

check public access to extended stored procedures  Read more...
By Mani Singh 2008/08/08 | Source: SQLServerCentral.com | Category: t-sql
Rating: |  Discuss |   Briefcase | 893 reads

Find Guest user access level in all databases

Search for GUEST Access Level in all   Read more...
By Mani Singh 2008/08/06 | Source: SQLServerCentral.com | Category: sp_msforeachdb
Rating: |  Discuss |   Briefcase | 1,264 reads

A Hex on Your Database

By GSquared 2008/06/06 | Category: t-sql
Rating: (not yet rated) |  Discuss |   Briefcase | 4,052 reads

Why Object Qualification is important.

You have all read about why object qualification is important. You also must have heard of why stored Proc should not have sp_ as prefix to the name. Now let us proove if this is all true.  Read more...
By Roy Ernest 2008/03/10 | Source: SQLServerCentral.com | Category: t-sql
Rating: |  Discuss |   Briefcase | 8,417 reads

GrantExecAllUserAllSpandfunctions.sql

Grant permits execution to all user on all sp and functions  Read more...
By @fracionero 2008/01/04 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 887 reads

Encrypting Data With the Encrypt Function

One of the major problems in the database field is when people store sensitive data unencrypted into SQL Server. This article shows you one of the most basic ways to encrypt data to the casual viewer.   Read more...
By Brian Knight 2006/05/29 (first published: 2001/07/17) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 33,008 reads
   Items 1 to 20 of 36    Older >>
 
Tags
sql server 7 (13)    
miscellaneous (7)    
administration (6)    
stored procedures (6)    
advanced querying (5)    
encryption (4)    
programming (4)    
configuring (3)    
performance tuning (3)    
strategies (3)    
backup / restore (2)    
dts (2)    
indexing (2)    
installation (2)    
monitoring (2)    
permissions (2)    
triggers (2)    
user (2)    
user defined function (udf) (2)    
.net (1)    
administrator (1)    
aggregates (1)    
bcp (bulk copy program) (1)    
databases (1)    
distributed queries (1)    
english query (1)    
execute as (1)    
extended stored procedures (1)    
grant (1)    
grantee (1)    
grantor (1)    
guest user (1)    
hashbytes (1)    
hexadecimal (1)    
list (1)    
login (1)    
logins (1)    
openxml (1)    
permission (1)    
public (1)    
replication (1)    
reporting services (ssrs) (1)    
revert (1)    
role (1)    
script (1)    
scripting (1)    
sp_msforeachdb (1)    
sql puzzles (1)    
sql server 2005 (1)    
sql server 2008 (1)    
sql server 6.5 (1)    
sql-dmo (1)    
type (1)    
updategrams (1)    
xml (1)    
xsl (1)