The Home Password Cracker
Passwords cracked in under an hour using modern hardware have Steve shaking his head.
2022-10-22
250 reads
Passwords cracked in under an hour using modern hardware have Steve shaking his head.
2022-10-22
250 reads
2022-10-21
2022-09-12
487 reads
Learn how to find all securable objects in SQL Server and the permissions for each securable object using the system function fn_builtin_permissions.
2022-08-31
DevOps is often thought of as bringing more features to customers, but it can also help security.
2022-08-15
118 reads
In this article, we look at how to mask/hide data for users using Dynamic Data Masking in SQL Server and Data Redaction in Oracle
2022-08-08
Learn how to more easily manage permissions in the Power BI service using PowerShell.
2022-06-06
2,549 reads
2022-05-25
461 reads
SQL Server has many features to keep the database secure, but you must implement them to benefit. In this article, Priyanka Chouhan describes how to do a vulnerability assessment of SQL Server.
2022-05-18
Project Zero from Google aims to study zero day vulnerabilities. Steve hopes it leads to better security.
2022-05-04
93 reads
By Brian Kelley
In information security (INFOSEC), there several foundational concepts and principles. One of the ones...
By Steve Jones
the standard blues– n. the dispiriting awareness that the twists and turns of your...
By Chris Yates
A brief introduction to the tool and its advantages for database migrations DevOps is...
Comments posted to this topic are about the item One more reason to use...
I'm tracing activity on one database and would like to include the client_app_name in...
select Custno, Addr1, City, Res_Phone, Bus_Phone, Fax_Phone, Marine_Phone, Pager_Phone, Other_Phone, email1, email2 from customer...
I want to mark a transaction in the log as a recovery point. How do I do this in my code if I use the transaction, myTran?
See possible answers