Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tag security Rss

   Items 1 to 20 of 863    Older >>
 

The Opportunistic Hacker

Sometimes the crimes of opportunity might be the worst ones for our data.  Read more...
By Steve Jones 2015/04/14 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 159 reads

Stairway to SQL Server Security Level 7: Security Across Databases with Cross-Database Ownership Chaining

Sometimes you need to reach outside a database and access data and objects from multiple databases, which raises some security issues and increases the complexity of data access. In this stairway level, you’ll learn about cross-database ownership chaining so that you can reach across database boundaries securely.  Read more...
By Don Kiely 2015/04/08 | Source: SQLServerCentral.com | Category: stairway series
Rating: |  Discuss |   Briefcase | 1,883 reads

Source Code Security

The code you use may contain security information. Be extra careful in this case, especially when you use encryption.  Read more...
By Steve Jones 2015/03/31 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 103 reads

Secure Checks

By Steve Jones 2015/03/25 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,570 reads

Backing up from SETUSER

By Steve Jones 2015/03/19 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,849 reads

Move DB roles

This script will script the role members for all roles on the database.  Read more...
By Shanjan Sapra 2015/03/10 | Source: SQLServerCentral.com | Category: restore
Rating: |  Discuss |   Briefcase | 996 reads

Creating schemas

By Steve Jones 2015/03/03 | Category: administration
Rating: (not yet rated) |  Discuss |   Briefcase | 1,590 reads

Signing options

By Steve Jones 2015/02/20 | Category: t-sql
Rating: (not yet rated) |  Discuss |   Briefcase | 1,577 reads

Not Again!

By Steve Knox 2015/02/18 | Category: aggregates
Rating: (not yet rated) |  Discuss |   Briefcase | 2,247 reads

SQL Injection, Still?

We still have problems with SQL Injection. Steve Jones has a few thoughts on why.  Read more...
By Steve Jones 2015/02/17 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 230 reads

Master Key creation

By Steve Jones 2015/02/10 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,348 reads

Signing Procedures

By Steve Jones 2015/02/09 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,513 reads

Login options

By Steve Jones 2015/02/05 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 1,786 reads

Stairway to SQL Server Security Level 6: Execution Context and Code Signing

A fundamental way that SQL Server determines whether a principal has the permissions necessary to execute code is with its execution context rules. It’s all complicated by the possibility that a principal has permission to execute code but doesn’t have permission on the underlying objects accessed by the code, such as the data in a table. This stairway level will explore SQL Server’s execution context, ownership chains, and impersonation, as well as show you how you can control access to data via T-SQL code.  Read more...
By Don Kiely 2015/02/04 | Source: SQLServerCentral.com | Category: stairway series
Rating: |  Discuss |   Briefcase | 2,230 reads

Users , Roles and Logins

Useful script in cases where auditors would like to know roles for each user in each database of an instance as well as the status of associated logins.  Read more...
By Kenneth Igiri 2015/02/03 | Source: SQLServerCentral.com | Category: auditing
Rating: |  Discuss |   Briefcase | 2,085 reads

Alter database owner to SA from any user details on all user databases

Alter database owner to SA from any other user details against all user databases  Read more...
Rating: |  Discuss |   Briefcase | 1,200 reads

Database ownership and TRUSTWORTHY

Database ownership is an old topic for SQL Server pro's. Check this simple lab to learn the risks your databases can be exposed to.  Read more...
By Raul Gonzalez 2015/01/29 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 3,314 reads

Data Mining Part 23: Security

In this chapter we will talk about security recommendations for SQL Server Data Mining.  Read more...
By Daniel Calbimonte 2015/01/27 | Source: SQLServerCentral.com | Category: roles
Rating: |  Discuss |   Briefcase | 1,884 reads

Find Deny permissions on database objects

This script allows the DBA to quickly determine if a deny statement is stopping a user from accessing db objects.  Read more...
Rating: |  Discuss |   Briefcase | 759 reads

Verify Login SID and Machine SID

This script is to verify which login accounts have SID values that don’t match the correct SID values defined on the machine or in the domain.  Read more...
Rating: |  Discuss |   Briefcase | 1,294 reads
   Items 1 to 20 of 863    Older >>
 
Tags
editorial (125)    
sql server 7 (105)    
administration (69)    
sql server 2005 (56)    
blogs (53)    
strategies (40)    
encryption (38)    
t-sql (33)    
editorial - ipod (25)    
editorial - wmv (25)    
editorial - mp3 (24)    
auditing (22)    
permissions (22)    
miscellaneous (15)    
sql server 2008 (14)    
logins (13)    
passwords (13)    
backup / restore (12)    
programming (11)    
sql server 6.5 (11)    
transparent data encryption (tde) (11)    
roles (10)    
sql injection (10)    
configuring (9)    
reporting services (ssrs) (9)    
database design (8)    
role (8)    
software development (8)    
stored procedures (8)    
best and worst practices (7)    
friday poll (7)    
grant (7)    
integration services (ssis) (7)    
sql agent (7)    
user (7)    
database roles (6)    
database security (6)    
database weekly (6)    
sql server (6)    
sql server 2008 r2 (6)    
advanced querying (5)    
analysis services (ssas) (5)    
career (5)    
disaster recovery (dr) (5)    
hackers (5)    
login (5)    
news (5)    
schemas (5)    
secure programming (5)    
stairway series (5)    
triggers (5)    
worst practices (5)    
authentication (4)    
biometrics (4)    
data retention (4)    
installation (4)    
legal issues (4)    
performance tuning (4)    
server roles (4)    
sql server 2000 (4)    
users (4)    
active directory (3)    
ddl triggers (3)    
dts (3)    
execute as (3)    
impersonation (3)    
kerberos (3)    
monitoring (3)    
other (3)    
principals (3)    
professional development (3)    
replication (3)    
service accounts (3)    
service broker (3)    
sql server 2012 (3)    
sql server express (3)    
sql university (3)    
surface area configuration tool (3)    
training (3)    
windows security (3)    
advanced (2)    
best practices (2)    
central management server (cms) (2)    
certificates (2)    
cloud computing (2)    
comparison (2)    
compliance (2)    
dac (2)    
database principals (2)    
databases (2)    
development (2)    
firewall (2)    
guest user (2)    
indexing (2)    
jobs (2)    
logon triggers (2)    
members (2)    
ownership (2)    
ownership chaining (2)    
patches (2)    
permission (2)    
policy based management (pbm) (2)    
powershell (2)    
privilege escalation (2)    
product reviews (2)    
profiler (2)    
rants (2)    
reviews (2)    
scripting (2)    
secure (2)    
service packs (2)    
setuser (2)    
sid (2)    
spn (2)    
sql server architecture (2)    
sql-dmo (2)    
tcp/ip (2)    
tools (2)    
user defined function (udf) (2)    
xml (2)    
xsl (2)    
.net (1)    
access restriction (1)    
administrator (1)    
ado (1)    
aggregates (1)    
alerts (1)    
alias (1)    
analysis services (1)    
architecture (1)    
asymmetric keys (1)    
automation (1)    
azure (1)    
backup / recovery (1)    
bcp (bulk copy program) (1)    
broker security (1)    
browser service (1)    
bugs (1)    
c# (1)    
change db owner (1)    
cissp (1)    
cloud (1)    
code signing (1)    
conferences/user groups (1)    
configuration (1)    
connect any database (1)    
continuous integration (1)    
control server (1)    
create database (1)    
credentials (1)    
cross-database ownership chaining (1)    
cryptography (1)    
data driven (1)    
data mining (1)    
data security (1)    
database mail (1)    
database master key (dmk) (1)    
database object permissions (1)    
database owner (1)    
database ownership (1)    
database permissions (1)    
database users (1)    
ddl (1)    
deny (1)    
dimensions (1)    
distributed queries (1)    
dmv's (1)    
dynamic sql (1)    
english query (1)    
eventdata (1)    
events (1)    
execution context (1)    
extended stored procedures (1)    
filestream (1)    
fixed server roles (1)    
general administration (1)    
grantee (1)    
grantor (1)    
hashbytes (1)    
hexadecimal (1)    
job (1)    
linked server (1)    
list (1)    
logon trigger (1)    
maintenance (1)    
management studio (ssms) (1)    
microsoft sql server (1)    
msdb (1)    
networking (1)    
openxml (1)    
orphaned (1)    
orphaned user (1)    
orphaned users (1)    
parameter (1)    
pass (1)    
password (1)    
password cracking (1)    
patching (1)    
presenting (1)    
privacy (1)    
professional organization for sql server (1)    
proxy accounts (1)    
public (1)    
rename (1)    
report server (1)    
responsibilities (1)    
restore (1)    
revert (1)    
sa (1)    
sanpshot (1)    
script (1)    
securables (1)    
security awareness (1)    
securityadmin (1)    
server principals (1)    
server_principals (1)    
sharepoint (1)    
sid mismatch check (1)    
sp_cycle_errorlog (1)    
sp_msforeachdb (1)    
sql jobs (1)    
sql puzzles (1)    
sql server 2014 (1)    
sql server permissions (1)    
sql spackle (1)    
sqlservercentral (1)    
ssl (1)    
sspi (1)    
stored procedure (1)    
survey (1)    
sysadmin (1)    
system databases (1)    
system development life cycle (1)    
tabular model (1)    
today (1)    
trust (1)    
trustworthy (1)    
type (1)    
updategrams (1)    
upgrading (1)    
virtualization (1)    
visual basic 6 (1)    
vulnerability (1)    
windows (1)    
xp_logininfo (1)