-->
SQL Clone
SQLServerCentral is supported by Redgate
 
Log in  ::  Register  ::  Not logged in
 
 
 

Zora's SQL Tips

Hi! I am Zora Stalin, an IT geek and a passionate learner of technology. Besides my job as an Information Technology Analyst, I love searching and sharing new things that excite me help for others.

Archives: September 2014

Understanding Kerberos and SQL Server Relationship

Kerberos is used as a network authentication protocol to provide secure process of authentication between client and server entities over an open network. In order to use Kerberos authentication with SQL server, users must have a Service Principal Name (SPN) filed with Active Directly. The Kerberos comprises of Key Distribution…

Read more

0 comments, 1,121 reads

Posted in Zora's SQL Tips on 22 September 2014

Understanding the Core of Cryptography in SQL Server

Cryptography in SQL Server is the advance technique of encrypting and decrypting the data existing in SQL Server databases for preventing unauthorized access. This technique is important to protect databases from illegal activities as it helps in authentication, authorization, assigning permissions and encryption\ decryption operations. There are various functions that…

Read more

0 comments, 421 reads

Posted in Zora's SQL Tips on 11 September 2014

An Overview on SQL Server SSIS Security

SQL Server SSIS security comprises of different layers that offers completely secured environment to these services. These layers consist of the following components:
  1. Digital Signature;
  2. Package Properties;
  3. Database roles;
  4. Operating System Permissions.
These components; when used together for implementing security measures, serves as a protective shield for the SQL packages.

Read more

0 comments, 873 reads

Posted in Zora's SQL Tips on 9 September 2014

Brief Description about SQL Server Encryption

Encryption is a good technique using which a particular data is obfuscated with a key or password. This makes the data useless until any decryption key or password is used to unlock it. Encryption makes data secure and prevents data loss, even if access controls are bypassed. Users can use…

Read more

0 comments, 593 reads

Posted in Zora's SQL Tips on 5 September 2014