Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tags T-SQL, Security Rss

   Items 1 to 20 of 32    Older >>
 

Double Keys

By Steve Jones 2014/04/22 | Category: encryption
Rating: (not yet rated) |  Discuss |   Briefcase | 999 reads

Symmetric Key Use

By Steve Jones 2014/04/08 | Category: encryption
Rating: (not yet rated) |  Discuss |   Briefcase | 1,224 reads

Permission scripting over all databases

Scripts permissions/roles for db user across all databases.  Read more...
By W Louw 2013/10/01 | Source: SQLServerCentral.com | Category: permissions
Rating: |  Discuss |   Briefcase | 12,202 reads

Master Keys

By Stanley Kapfunde 2012/05/25 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 2,218 reads

HASHBYTES

By Steve Jones 2012/02/09 | Category: t-sql
Rating: (not yet rated) |  Discuss |   Briefcase | 2,035 reads

Hashing

By Steve Jones 2012/01/24 | Category: t-sql
Rating: (not yet rated) |  Discuss |   Briefcase | 2,423 reads

who can do what?

list each user has the right to do  Read more...
Rating: |  Discuss |   Briefcase | 2,153 reads

Securing Reporting Services Reports

Learn how you can get the userid of someone connected to Reporting Services and use that information to determine if they can view the report.  Read more...
By Mohamed Idttalbe 2010/05/18 | Source: SQLServerCentral.com | Category: t-sql
Rating: |  Discuss |   Briefcase | 7,031 reads

Find weak login passwords in your server

Use this script to search for SQL Server logins who use weak password  Read more...
By Th Tr 2010/01/05 | Source: SQLServerCentral.com | Category: t-sql
Rating: |  Discuss |   Briefcase | 3,480 reads

Extending the REVERT statement using the WITH COOKIE clause in SQL Server 2005

In a previous tip on Switching Execution Context using the REVERT clause, you have seen how to switch execution context to a more privileged user and revert back to the original context of the caller within a programmable object. The REVERT clause accepts a parameter WITH COOKIE to provide an even more granular option. How do we use it?  Read more...
By Additional Articles 2009/01/15 | Source: MSSQLTips.com
Rating: (not yet rated)  Rate this |   Briefcase | 2,385 reads

public access to extended SP's

check public access to extended stored procedures  Read more...
By Mani Singh 2008/08/08 | Source: SQLServerCentral.com | Category: t-sql
Rating: |  Discuss |   Briefcase | 883 reads

Find Guest user access level in all databases

Search for GUEST Access Level in all   Read more...
By Mani Singh 2008/08/06 | Source: SQLServerCentral.com | Category: sp_msforeachdb
Rating: |  Discuss |   Briefcase | 1,245 reads

A Hex on Your Database

By GSquared 2008/06/06 | Category: t-sql
Rating: (not yet rated) |  Discuss |   Briefcase | 4,035 reads

Why Object Qualification is important.

You have all read about why object qualification is important. You also must have heard of why stored Proc should not have sp_ as prefix to the name. Now let us proove if this is all true.  Read more...
By Roy Ernest 2008/03/10 | Source: SQLServerCentral.com | Category: t-sql
Rating: |  Discuss |   Briefcase | 8,391 reads

GrantExecAllUserAllSpandfunctions.sql

Grant permits execution to all user on all sp and functions  Read more...
By @fracionero 2008/01/04 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 882 reads

Encrypting Data With the Encrypt Function

One of the major problems in the database field is when people store sensitive data unencrypted into SQL Server. This article shows you one of the most basic ways to encrypt data to the casual viewer.   Read more...
By Brian Knight 2006/05/29 (first published: 2001/07/17) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 32,965 reads

Logins, Users, and Roles - Getting Started

Do you know the difference between a login and a user? What's the best way to add them; Enterprise Manager, T-SQL, or SQL-DMO? In this beginner level article Andy demonstrates how to use all three methods to add logins and users and offers his view of which is the best technique.   Read more...
By Andy Warren 2005/09/30 (first published: 2003/02/19) | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 35,253 reads

Dynamic SQL or Stored Procedure

We've had a lot of coverage of dynamic sql (including another great one from Robert Marda later this week) but this one is a little different. Done in a question/answer format, Andy tries to explain to junior developers why dynamic sql is to be avoided, how to do so, what to do when you can't.   Read more...
By Andy Warren 2005/08/26 (first published: 2003/04/23) | Source: SQLServerCentral.com | Category: performance tuning
Rating: |  Discuss |   Briefcase | 47,227 reads

Stop SQL Injection Attacks Before They Stop You

A new article from MSDN magazine on stopping SQL Injection attacks by examining how the SQL can be exploited. It's a good basic article for developers as well as DBAs who might have to review code.  Read more...
By Additional Articles 2004/08/20 | Source: MSDN Communities | Category: security
Rating:  Rate this |   Briefcase | 2,373 reads

Save Your Password

Storing passwords in SQL Server for authentication by your application is a common practice. But not always a good one. Someone with access could easily see all passwords and perhaps cause mischief inside your application. Imagine the office gossip getting access to your HR application as the HR director! Not a good thing. Dinesh Asanka has written a short piece on how you can use a built in function in SQL Server to encrypt these passwords and use them with a minimum of effort.   Read more...
By Dinesh Asanka 2004/07/12 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 13,133 reads
   Items 1 to 20 of 32    Older >>
 
Tags
sql server 7 (13)    
miscellaneous (7)    
administration (6)    
advanced querying (5)    
stored procedures (5)    
encryption (4)    
programming (4)    
configuring (3)    
performance tuning (3)    
strategies (3)    
backup / restore (2)    
dts (2)    
indexing (2)    
installation (2)    
monitoring (2)    
triggers (2)    
user defined function (udf) (2)    
.net (1)    
administrator (1)    
databases (1)    
distributed queries (1)    
english query (1)    
execute as (1)    
extended stored procedures (1)    
grant (1)    
grantee (1)    
grantor (1)    
guest user (1)    
hashbytes (1)    
hexadecimal (1)    
list (1)    
logins (1)    
openxml (1)    
permission (1)    
permissions (1)    
public (1)    
replication (1)    
reporting services (ssrs) (1)    
revert (1)    
role (1)    
script (1)    
scripting (1)    
sp_msforeachdb (1)    
sql puzzles (1)    
sql server 2005 (1)    
sql server 2008 (1)    
sql server 6.5 (1)    
sql-dmo (1)    
type (1)    
updategrams (1)    
user (1)    
xml (1)    
xsl (1)