Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tag Security Rss

   Items 1 to 20 of 834    Older >>
 

SETSPN

By Steve Jones 2014/10/17 | Category: administration
Rating: (not yet rated) |  Discuss |   Briefcase | 1,288 reads

Who Watches the Watchers?

Who checks on those who manage our systems? Is there auditing in place for those accidental DBAs?  Read more...
By Brandie Tarvin 2014/10/16 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 256 reads

Stairway to SQL Server Security Level 4: Permissions

A permission gives a principal access to an object to perform certain actions on or with the object. SQL Server has a mind-numbingly huge number of permissions that you can grant to a principal, and you can even deny or revoke those permissions. This sounds a bit complicated, but by the end of this stairway level you’ll understand how SQL Server permissions work and how you can exert very granular control over object creation, data access, and other types of actions on database and server objects.  Read more...
By Don Kiely 2014/10/15 | Source: SQLServerCentral.com | Category: stairway series
Rating: |  Discuss |   Briefcase | 2,669 reads

Connecting to Analysis Services in Another Domain

Connecting to resources in untrusted domains with windows authentication can be tricky. Here's how to make it easy.  Read more...
By Ian Massi 2014/10/06 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 1,993 reads

Protect Confidential SQL Server Data Q and A

Following on from a webcast, Tim Smith answers some questions on SQL Server security like: Is It Better To Mask At the Application Level Or The SQL Server Database Level? Are there any options to find SSNs in SQL Server besides RegEx? And, why would anyone store sensitive data un-encrypted in SQL Server?   Read more...
By Additional Articles 2014/10/02 | Source: MSSQLTips.com | Category: security
Rating:  Rate this |   Briefcase | 7,122 reads

Prevent Confidential Data at the Application Layer from getting into SQL Server

In this tip Tim Smith looks at different approaches to stop confidential data from getting into the database.  Read more...
By Additional Articles 2014/09/22 | Source: MSSQLTips.com | Category: security
Rating: (not yet rated)  Rate this |   Briefcase | 7,359 reads

List all permissions in all databases

This script will allow you get all the users and roles with permission on objects on all databases.  Read more...
By Alejandro Pelc 2014/09/18 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 16,310 reads

A few reflections on security by a weary application developer

Data security? No worries! Tell me how much you are willing to pay.  Read more...
By George Copeland 2014/09/03 | Source: SQLServerCentral.com | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 108 reads

Continuous Integration/Delivery without Testing!

Anything we can do to automate our builds and deployment should be considered. After all, the point isn’t just to...  Read more...
By Brian Kelley 2014/08/28 | Source: SQLServerCentral Blogs | Category: blogs
Rating: (not yet rated) |  Discuss |   Briefcase | 6,403 reads

Change password for user 'sa'

Last week one of my team members was supposed to create a SQL Authenticated ID on a SQL Server 2005 instance. This was as per the request of the Application team who would be using it for an Application.   Read more...
By gogulatorul 2014/08/20 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 1,488 reads

Yet Another Attack Vector

The lack of progress in amending our laws to handle the digital revolution in our leaves may leave us open to unexpected attacks.  Read more...
By Steve Jones 2014/08/20 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 108 reads

We Don't Care about Data and IT Security

Most of us say we care about IT and data security. Our actions speak differently.  Read more...
By Brian Kelley 2014/08/11 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 314 reads

Service Principal Names

By Tom Nicol 2014/08/07 | Category: administration
Rating: (not yet rated) |  Discuss |   Briefcase | 1,695 reads

Linked Server Tribulations In SQL Server

In this article, Thomas chronicles the difficulties of troubleshooting a linked server set up, with helpful tips and an exposé of a Linked Server UI flaw.   Read more...
By Thomas Knight 2014/08/05 | Source: SQLServerCentral.com | Category: linked server
Rating: |  Discuss |   Briefcase | 5,132 reads

Spackle: Making sure you can connect to the DAC

The DAC is an important tool and several things can go wrong when trying to connect to it.  Read more...
By Kenneth Fisher 2014/07/31 | Source: SQLServerCentral.com | Category: dac
Rating: |  Discuss |   Briefcase | 2,919 reads

Data Driven Security

Set a security standard across environments that developers can see and run, but not change.  Read more...
By Andre Quitta 2014/07/30 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 3,530 reads

Elevation of Privileges

The elevation of privileges is a large security problem and Steve Jones discusses his fears. Would you know if someone successfully attacked your instance?  Read more...
By Steve Jones 2014/07/30 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 109 reads

New SQL Server 2014 Permissions: CONNECT ANY DATABASE

CONNECT ANY DATABASE is one of three new permissions in SQL Server 2014 that can be granted to server logins. What is this new permission good for and why would we ever want this?  Read more...
By Edward Pollack 2014/07/29 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 5,292 reads

BCP results

By Stuart Davies 2014/07/28 | Category: t-sql
Rating: (not yet rated) |  Discuss |   Briefcase | 1,777 reads

Frustration with Bad Design

It can be frustrating to deal with poorly implemented systems, but Steve Jones notes that you can't take things into your own hands.  Read more...
By Steve Jones 2014/07/28 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 284 reads
   Items 1 to 20 of 834    Older >>
 
Tags
editorial (119)    
sql server 7 (105)    
administration (67)    
sql server 2005 (56)    
blogs (53)    
strategies (40)    
encryption (34)    
t-sql (31)    
editorial - ipod (25)    
editorial - wmv (25)    
editorial - mp3 (24)    
auditing (21)    
permissions (21)    
miscellaneous (15)    
sql server 2008 (14)    
passwords (13)    
logins (12)    
backup / restore (11)    
programming (11)    
sql server 6.5 (11)    
transparent data encryption (tde) (11)    
configuring (9)    
reporting services (ssrs) (9)    
sql injection (9)    
database design (8)    
role (8)    
roles (8)    
best and worst practices (7)    
friday poll (7)    
integration services (ssis) (7)    
software development (7)    
sql agent (7)    
user (7)    
database roles (6)    
database security (6)    
database weekly (6)    
grant (6)    
sql server (6)    
sql server 2008 r2 (6)    
stored procedures (6)    
advanced querying (5)    
analysis services (ssas) (5)    
career (5)    
disaster recovery (dr) (5)    
hackers (5)    
login (5)    
news (5)    
secure programming (5)    
triggers (5)    
worst practices (5)    
authentication (4)    
biometrics (4)    
data retention (4)    
installation (4)    
legal issues (4)    
performance tuning (4)    
schema (4)    
server roles (4)    
sql server 2000 (4)    
users (4)    
active directory (3)    
ddl triggers (3)    
dts (3)    
execute as (3)    
impersonation (3)    
kerberos (3)    
monitoring (3)    
other (3)    
principals (3)    
professional development (3)    
replication (3)    
service accounts (3)    
service broker (3)    
sql server 2012 (3)    
sql server express (3)    
sql university (3)    
stairway series (3)    
surface area configuration tool (3)    
training (3)    
windows security (3)    
advanced (2)    
best practices (2)    
central management server (cms) (2)    
certificates (2)    
cloud computing (2)    
comparison (2)    
compliance (2)    
dac (2)    
database principals (2)    
databases (2)    
development (2)    
firewall (2)    
guest user (2)    
indexing (2)    
jobs (2)    
logon triggers (2)    
members (2)    
ownership (2)    
ownership chaining (2)    
patches (2)    
permission (2)    
policy based management (pbm) (2)    
powershell (2)    
product reviews (2)    
profiler (2)    
rants (2)    
reviews (2)    
scripting (2)    
secure (2)    
service packs (2)    
spn (2)    
sql server architecture (2)    
sql-dmo (2)    
tcp/ip (2)    
tools (2)    
user defined function (udf) (2)    
xml (2)    
xsl (2)    
.net (1)    
access restriction (1)    
administrator (1)    
ado (1)    
alerts (1)    
alias (1)    
analysis services (1)    
architecture (1)    
automation (1)    
azure (1)    
backup / recovery (1)    
bcp (bulk copy program) (1)    
broker security (1)    
browser service (1)    
bugs (1)    
c# (1)    
change db owner (1)    
cissp (1)    
cloud (1)    
conferences/user groups (1)    
configuration (1)    
connect any database (1)    
continuous integration (1)    
control server (1)    
create database (1)    
credentials (1)    
cryptography (1)    
data driven (1)    
data security (1)    
database mail (1)    
database owner (1)    
database permissions (1)    
database users (1)    
ddl (1)    
dimensions (1)    
distributed queries (1)    
dmv's (1)    
dynamic sql (1)    
english query (1)    
eventdata (1)    
events (1)    
extended stored procedures (1)    
filestream (1)    
fixed server roles (1)    
general administration (1)    
grantee (1)    
grantor (1)    
hashbytes (1)    
hexadecimal (1)    
job (1)    
linked server (1)    
list (1)    
logon trigger (1)    
maintenance (1)    
management studio (ssms) (1)    
microsoft sql server (1)    
msdb (1)    
networking (1)    
openxml (1)    
orphaned (1)    
orphaned user (1)    
orphaned users (1)    
parameter (1)    
pass (1)    
password (1)    
password cracking (1)    
patching (1)    
presenting (1)    
privacy (1)    
privilege escalation (1)    
professional organization for sql server (1)    
proxy accounts (1)    
public (1)    
rename (1)    
revert (1)    
sanpshot (1)    
script (1)    
securables (1)    
security awareness (1)    
securityadmin (1)    
server principals (1)    
server_principals (1)    
sharepoint (1)    
sid (1)    
sp_cycle_errorlog (1)    
sp_msforeachdb (1)    
sql jobs (1)    
sql puzzles (1)    
sql server 2014 (1)    
sql server permissions (1)    
sql spackle (1)    
sqlservercentral (1)    
ssl (1)    
sspi (1)    
stored procedure (1)    
survey (1)    
sysadmin (1)    
system databases (1)    
system development life cycle (1)    
tabular model (1)    
today (1)    
trust (1)    
type (1)    
updategrams (1)    
upgrading (1)    
virtualization (1)    
visual basic 6 (1)    
vulnerability (1)    
windows (1)    
xp_logininfo (1)