Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tags T-SQL, Security Rss

   Items 1 to 20 of 36    Older >>
 

Signing options

By Steve Jones 2015/02/20 | Category: t-sql
Rating: (not yet rated) |  Discuss |   Briefcase | 1,650 reads

Not Again!

By Steve Knox 2015/02/18 | Category: aggregates
Rating: (not yet rated) |  Discuss |   Briefcase | 2,342 reads

BCP results

By Stuart Davies 2014/07/28 | Category: t-sql
Rating: (not yet rated) |  Discuss |   Briefcase | 1,886 reads

Drop Me? No, I Don't Think So

By Andy Warren 2014/05/14 | Category: login
Rating: (not yet rated) |  Discuss |   Briefcase | 2,147 reads

Double Keys

By Steve Jones 2014/04/22 | Category: encryption
Rating: (not yet rated) |  Discuss |   Briefcase | 1,835 reads

Symmetric Key Use

By Steve Jones 2014/04/08 | Category: encryption
Rating: (not yet rated) |  Discuss |   Briefcase | 1,404 reads

Permission scripting over all databases

Scripts permissions/roles for db user across all databases.  Read more...
By W Louw 2013/10/01 | Source: SQLServerCentral.com | Category: permissions
Rating: |  Discuss |   Briefcase | 13,291 reads

Master Keys

By Stanley Kapfunde 2012/05/25 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 2,239 reads

HASHBYTES

By Steve Jones 2012/02/09 | Category: t-sql
Rating: (not yet rated) |  Discuss |   Briefcase | 2,074 reads

Hashing

By Steve Jones 2012/01/24 | Category: t-sql
Rating: (not yet rated) |  Discuss |   Briefcase | 2,454 reads

who can do what?

list each user has the right to do  Read more...
Rating: |  Discuss |   Briefcase | 2,215 reads

Securing Reporting Services Reports

Learn how you can get the userid of someone connected to Reporting Services and use that information to determine if they can view the report.  Read more...
By Mohamed Idttalbe 2010/05/18 | Source: SQLServerCentral.com | Category: t-sql
Rating: |  Discuss |   Briefcase | 7,139 reads

Find weak login passwords in your server

Use this script to search for SQL Server logins who use weak password  Read more...
By Th Tr 2010/01/05 | Source: SQLServerCentral.com | Category: t-sql
Rating: |  Discuss |   Briefcase | 3,628 reads

Extending the REVERT statement using the WITH COOKIE clause in SQL Server 2005

In a previous tip on Switching Execution Context using the REVERT clause, you have seen how to switch execution context to a more privileged user and revert back to the original context of the caller within a programmable object. The REVERT clause accepts a parameter WITH COOKIE to provide an even more granular option. How do we use it?  Read more...
By Additional Articles 2009/01/15 | Source: MSSQLTips.com
Rating: (not yet rated)  Rate this |   Briefcase | 2,523 reads

public access to extended SP's

check public access to extended stored procedures  Read more...
By Mani Singh 2008/08/08 | Source: SQLServerCentral.com | Category: t-sql
Rating: |  Discuss |   Briefcase | 894 reads

Find Guest user access level in all databases

Search for GUEST Access Level in all   Read more...
By Mani Singh 2008/08/06 | Source: SQLServerCentral.com | Category: sp_msforeachdb
Rating: |  Discuss |   Briefcase | 1,265 reads

A Hex on Your Database

By GSquared 2008/06/06 | Category: t-sql
Rating: (not yet rated) |  Discuss |   Briefcase | 4,054 reads

Why Object Qualification is important.

You have all read about why object qualification is important. You also must have heard of why stored Proc should not have sp_ as prefix to the name. Now let us proove if this is all true.  Read more...
By Roy Ernest 2008/03/10 | Source: SQLServerCentral.com | Category: t-sql
Rating: |  Discuss |   Briefcase | 8,431 reads

GrantExecAllUserAllSpandfunctions.sql

Grant permits execution to all user on all sp and functions  Read more...
By @fracionero 2008/01/04 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 889 reads

Encrypting Data With the Encrypt Function

One of the major problems in the database field is when people store sensitive data unencrypted into SQL Server. This article shows you one of the most basic ways to encrypt data to the casual viewer.   Read more...
By Brian Knight 2006/05/29 (first published: 2001/07/17) | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 33,020 reads
   Items 1 to 20 of 36    Older >>
 
Tags
sql server 7 (13)    
miscellaneous (7)    
administration (6)    
stored procedures (6)    
advanced querying (5)    
encryption (4)    
programming (4)    
configuring (3)    
performance tuning (3)    
strategies (3)    
backup / restore (2)    
dts (2)    
indexing (2)    
installation (2)    
monitoring (2)    
permissions (2)    
triggers (2)    
user (2)    
user defined function (udf) (2)    
.net (1)    
administrator (1)    
aggregates (1)    
bcp (bulk copy program) (1)    
databases (1)    
distributed queries (1)    
english query (1)    
execute as (1)    
extended stored procedures (1)    
grant (1)    
grantee (1)    
grantor (1)    
guest user (1)    
hashbytes (1)    
hexadecimal (1)    
list (1)    
login (1)    
logins (1)    
openxml (1)    
permission (1)    
public (1)    
replication (1)    
reporting services (ssrs) (1)    
revert (1)    
role (1)    
script (1)    
scripting (1)    
sp_msforeachdb (1)    
sql puzzles (1)    
sql server 2005 (1)    
sql server 2008 (1)    
sql server 6.5 (1)    
sql-dmo (1)    
type (1)    
updategrams (1)    
xml (1)    
xsl (1)