Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Articles with tag Security Rss

Search for any content tagged security

   Items 1 to 20 of 563    Older >>
 

How to Recover a SQL Server Login Password

I will describe a simple method anyone can use to obtain lost password information for a SQL Server login.  Read more...
By Geoff Albin 2015/04/24 (first published: 2013/03/04) | Source: SQLServerCentral.com | Category: password cracking
Rating: |  Discuss |   Briefcase | 26,687 reads

The Opportunistic Hacker

Sometimes the crimes of opportunity might be the worst ones for our data.  Read more...
By Steve Jones 2015/04/14 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 176 reads

Stairway to SQL Server Security Level 7: Security Across Databases with Cross-Database Ownership Chaining

Sometimes you need to reach outside a database and access data and objects from multiple databases, which raises some security issues and increases the complexity of data access. In this stairway level, you’ll learn about cross-database ownership chaining so that you can reach across database boundaries securely.  Read more...
By Don Kiely 2015/04/08 | Source: SQLServerCentral.com | Category: stairway series
Rating: |  Discuss |   Briefcase | 1,986 reads

Source Code Security

The code you use may contain security information. Be extra careful in this case, especially when you use encryption.  Read more...
By Steve Jones 2015/03/31 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 104 reads

SQL Injection, Still?

We still have problems with SQL Injection. Steve Jones has a few thoughts on why.  Read more...
By Steve Jones 2015/02/17 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 231 reads

Stairway to SQL Server Security Level 6: Execution Context and Code Signing

A fundamental way that SQL Server determines whether a principal has the permissions necessary to execute code is with its execution context rules. It’s all complicated by the possibility that a principal has permission to execute code but doesn’t have permission on the underlying objects accessed by the code, such as the data in a table. This stairway level will explore SQL Server’s execution context, ownership chains, and impersonation, as well as show you how you can control access to data via T-SQL code.  Read more...
By Don Kiely 2015/02/04 | Source: SQLServerCentral.com | Category: stairway series
Rating: |  Discuss |   Briefcase | 2,260 reads

Database ownership and TRUSTWORTHY

Database ownership is an old topic for SQL Server pro's. Check this simple lab to learn the risks your databases can be exposed to.  Read more...
By Raul Gonzalez 2015/01/29 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 3,317 reads

Data Mining Part 23: Security

In this chapter we will talk about security recommendations for SQL Server Data Mining.  Read more...
By Daniel Calbimonte 2015/01/27 | Source: SQLServerCentral.com | Category: roles
Rating: |  Discuss |   Briefcase | 1,927 reads

SQL Server PCI DSS Security Patching Checklist

PCI DSS has strict requirements about implementing security updates and using only applications which are supported by the vendors. How do you create a patching policy for SQL Servers?  Read more...
By Additional Articles 2015/01/12 | Source: MSSQLTips.com | Category: security
Rating: (not yet rated)  Rate this |   Briefcase | 5,209 reads

What counts for a DBA: Responsibility

Whose fault is it if a database is hacked and its contents appear on a hacker’s site? Louis Davidson suggests that, regardless of limitations, the DBA always bears some responsibility.  Read more...
By Louis Davidson (@drsql) 2014/12/22 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 124 reads

It's Not Just Poor Coding

It's not just poor coding that threatens security, as a new survey shows.  Read more...
By Steve Jones 2014/11/13 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 226 reads

A Fundamental Security Mistake

Steve Jones thinks Microsoft is making a fundamental security mistake in the way they build features for the various editions of SQL Server. Read today's editorial and see if you agree.  Read more...
By Steve Jones 2014/11/03 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 402 reads

Have You Been Hacked?

Security is a big deal, and Steve Jones wonders if most data professionals would be aware that they had been hacked.  Read more...
By Steve Jones 2014/10/30 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 154 reads

Who Watches the Watchers?

Who checks on those who manage our systems? Is there auditing in place for those accidental DBAs?  Read more...
By Brandie Tarvin 2014/10/16 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 281 reads

Stairway to SQL Server Security Level 4: Permissions

A permission gives a principal access to an object to perform certain actions on or with the object. SQL Server has a mind-numbingly huge number of permissions that you can grant to a principal, and you can even deny or revoke those permissions. This sounds a bit complicated, but by the end of this stairway level you’ll understand how SQL Server permissions work and how you can exert very granular control over object creation, data access, and other types of actions on database and server objects.  Read more...
By Don Kiely 2014/10/15 | Source: SQLServerCentral.com | Category: stairway series
Rating: |  Discuss |   Briefcase | 3,748 reads

Connecting to Analysis Services in Another Domain

Connecting to resources in untrusted domains with windows authentication can be tricky. Here's how to make it easy.  Read more...
By Ian Massi 2014/10/06 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 2,313 reads

Protect Confidential SQL Server Data Q and A

Following on from a webcast, Tim Smith answers some questions on SQL Server security like: Is It Better To Mask At the Application Level Or The SQL Server Database Level? Are there any options to find SSNs in SQL Server besides RegEx? And, why would anyone store sensitive data un-encrypted in SQL Server?   Read more...
By Additional Articles 2014/10/02 | Source: MSSQLTips.com | Category: security
Rating:  Rate this |   Briefcase | 7,668 reads

Prevent Confidential Data at the Application Layer from getting into SQL Server

In this tip Tim Smith looks at different approaches to stop confidential data from getting into the database.  Read more...
By Additional Articles 2014/09/22 | Source: MSSQLTips.com | Category: security
Rating: (not yet rated)  Rate this |   Briefcase | 7,679 reads

A few reflections on security by a weary application developer

Data security? No worries! Tell me how much you are willing to pay.  Read more...
By George Copeland 2014/09/03 | Source: SQLServerCentral.com | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 114 reads

Yet Another Attack Vector

The lack of progress in amending our laws to handle the digital revolution in our leaves may leave us open to unexpected attacks.  Read more...
By Steve Jones 2014/08/20 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 112 reads
   Items 1 to 20 of 563    Older >>