SQL Clone
SQLServerCentral is supported by Redgate
Log in  ::  Register  ::  Not logged in

K. Brian Kelley - Databases, Infrastructure, and Security

IT Security, MySQL, Perl, SQL Server, and Windows technologies.

Archives: August 2013

Before Asking for Help...

I have a standard rule that I use before going and bugging a co-worker or posting via social media/message forum about a technical question I might have. I invoke this rule except in cases where there's a production down or impaired situation and seconds count. Here's the rule:


Before I… Read more

Specify the Parameter Names for Stored Procedures

I just ran across a case where a script was failing. Here's the part that's failing:


EXEC sp_addrolemember 'MyDomain\MyGroup', 'SomeRole';

 Do you see the issue? If not, that's understandable. Because this is correct:


EXEC sp_addsrvrolemember 'MyDomain\MyGroup', 'SomeRole';

The problem with the first query is due to… Read more

Boorish Behavior? No, Worse. Death Threats Against Developers/Designers.

I know DBAs and developers have a rocky relationship. However, I don't believe we go as far as some of the fanatics in the gaming space. A friend of mine linked to this article:


BioWare writer quits after death threats to family


This isn't the first occurrence, as… Read more

Schneier's Thoughts on the Future of IT Security and the Impact of the Internet on Power

If you've got an hour to spare, you might want to check out this presentation by Bruce Schneier where he gives his thoughts on the future of security (it's evolving into a feudal model) and what the Internet means with respect to power. He talks a lot about privacy concerns,… Read more

Windows Phone Security Advisory - Weakness in Security Protocol

If you're using a Windows phone, versions 7.8 or 8, there is a new security advisory out with respect to weakness in one of the authentication protocols:

Microsoft Security Advisory (2876146) - Wireless PEAP-MS-CHAPv2 Authentication Could Allow Information Disclosure


There is a recommended security update - not in the… Read more

More on SQL Server Built-In Cryptography Options

I wrote a series of articles at MSSQLTips.com to cover the cryptographic algorithms that are available with Microsoft SQL Server. Basically, I distilled what the current view is on each algorithm and whether or not it's okay to use. If you're looking at securing data using the cryptography SQL Server provides,… Read more