Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Articles with tag Security Rss

Search for any content tagged security

<< Newer    Items 41 to 60 of 537    Older >>
 

Securing SQL Server: Vulnerabilities You Might Not Have Considered

A short look at the vulnerabilities your data may be susceptible to outside of the database tables.   Read more...
By Ashvin Kamaraju 2013/03/07 | Source: SQLServerCentral.com | Category: encryption
Rating: |  Discuss |   Briefcase | 5,794 reads

Data We Don't Want

There's potentially an exploit that can download lots of data to a machine. This shouldn't be a concern for servers, but you never know.  Read more...
By Steve Jones 2013/03/05 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 143 reads

How to recover a SQL Server login password.

I will describe a simple method anyone can use to obtain lost password information for a SQL Server login.  Read more...
By Geoff Albin 2013/03/04 | Source: SQLServerCentral.com | Category: password cracking
Rating: |  Discuss |   Briefcase | 18,419 reads

Stored Procedures and SQL Injection

Why do stored procedures help with security? In this piece, MVP Brian Kelley explains why SQL Injection and information gathering are hampered with stored procedures.  Read more...
By Brian Kelley 2013/02/18 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 11,618 reads

Serious Security

The password issue has Steve Jones concerned. So many of us that use computing devices don't do a good job of securing our information.  Read more...
By Steve Jones 2013/01/17 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 109 reads

Statistical Protection

Statistical databases contain lots of information that can be used in a variety of ways, but it can also be abused. Steve Jones talks about some of the problems and potential solutions.  Read more...
By Steve Jones 2013/01/08 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 98 reads

The $50,000 Laptop

The average value of a lost laptop has been found to be much more than you might expect. Steve Jones talks about a recent study.  Read more...
By Steve Jones 2013/01/07 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 202 reads

Regulators, Mount Up

If you are bound by HIPAA regulations, you may have more auditing in your future. If you're not, perhaps you should still pay attention to the criteria being used for auditing.  Read more...
By Steve Jones 2012/11/28 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 102 reads

Password Insecurities

Tony Davis argues that the Standards and best practices exist to avoid being hacked, but implementing them requires time and investment and often there simply doesn't seem to be the will to do it.  Read more...
By Tony Davis 2012/11/26 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 77 reads

Unprotected Queries

There are over half a million database servers out on the Internet without protection. How can this happen?  Read more...
By Steve Jones 2012/11/06 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 463 reads

SQL Server Reporting Services 2012 Permissions

As you begin developing reports for deployment to a Report Server, what security considerations need to be taken into account in order to grant users access to run a report.  Read more...
By Additional Articles 2012/10/31 | Source: MSSQLTips.com | Category: reporting services (ssrs)
Rating: (not yet rated)  Rate this |   Briefcase | 3,116 reads

Protecting the SQL Server Backup folder

I want to backup my SQL Server databases to a folder, but I want to minimize who has access to the folder. In other words, I want to make sure that members of the Windows Local Administrators group don't get to the backups without intentionally trying to bypass the security. How do I do that?   Read more...
By Additional Articles 2012/10/02 | Source: SQLServerCentral.com | Category: security
Rating: (not yet rated)  Rate this |   Briefcase | 2,908 reads

Database Security Survey

A database security survey for a CS student. If you can spare a few minutes, I know he'd appreciate it.   Read more...
By Press Release 2012/09/26 | Source: SQLServerCentral.com | Category: survey
Rating: (not yet rated)  Rate this |   Briefcase | 1,828 reads

Rewrite the Coding Rules

If we rewrite the coding rules, will software be more secure? Steve Jones thinks it might and that we should be constantly looking to change the techniques, patterns, and skills we have.  Read more...
By Steve Jones 2012/09/24 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 182 reads

Data Worms

Worms have been around a long time in computer systems. However changes in the global policies of governments and the possible retaliation for cyber warfare should have DBAs concerned.  Read more...
By Steve Jones 2012/09/20 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 140 reads

Make a Backup First

The hack on a Gizmodo writer using Amazon and Apple customer service security holes was shocking. Steve Jones notes that while security is important, backups are even more important.  Read more...
By Steve Jones 2012/08/22 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 156 reads

Separate Accounts

Security is a complex process, one that is becoming more and more important to DBAs all the time. This week Steve Jones wants to know how security is handled for your service accounts.   Read more...
By Steve Jones 2012/08/10 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 185 reads

How to Audit Login Changes on a SQL Server

I've been charged with coming up with a quick solution to audit login changes on my SQL Servers. However, there's no budget so I'm going to have to come up with basic scripts and the like to do the work. Is this tip we cover a solution for you to audit login changes.  Read more...
By Additional Articles 2012/08/06 | Source: MSSQLTips.com | Category: auditing
Rating: (not yet rated)  Rate this |   Briefcase | 2,294 reads

Issues Determining an Individual SQL Server User's Permissions

Recently I was supporting a third party application. It queries to determine what tables it has permissions to before it proceeds with the rest of its functionality. We had implemented permissions based on the best practice of creating roles, assigning the permissions to the roles, and then making the users members of the roles. The application was querying INFORMATION_SCHEMA.TABLE_PRIVILEGES and of course didn't find any permissions directly against the user in question. We ended up granting explicit permissions to the user so the application would work, but I'm more interested in the general case. How can I determine permissions for an individual user?  Read more...
By Additional Articles 2012/08/02 | Source: MSSQLTips.com | Category: security
Rating:  Rate this |   Briefcase | 2,555 reads

Performance Data

Great DBAs collect all kinds of metrics on their instances and let them manage themselves. However many administrators need help monitoring and interpreting the data. Today Steve Jones asks if you think this data needs extra security or is it less of an issue than other PII data.  Read more...
By Steve Jones 2012/07/27 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 342 reads
<< Newer    Items 41 to 60 of 537    Older >>