SQL Server and SOX
The Sarbanes-Oxley act has changed many IT jobs, usually requiring more work and documentation. Johan Bijnens brings us a list of some things his team has had to do to comply with SOX regulations.
2007-10-02
5,737 reads
The Sarbanes-Oxley act has changed many IT jobs, usually requiring more work and documentation. Johan Bijnens brings us a list of some things his team has had to do to comply with SOX regulations.
2007-10-02
5,737 reads
This article discusses: How SQL injection attacks work, Testing for vulnerabilities, Validating user input, Using .NET features to prevent attacks, and Importance of handling exceptions
2007-09-19
4,869 reads
A patch to your SQL Server system can cause problems, but an unpatched SQL Server is unprotected. Learn the pros and cons of SQL Server patches.
2007-09-04
3,000 reads
Auditing is something that almost every DBA needs to tackle at some point in his or her career. David McKinney brings a new twist on the solution by using XML and XSL to help implement auditing in your SQL Server application.
2007-08-20
5,168 reads
This article discusses: How SQL injection attacks work, Testing for vulnerabilities, Validating user input, Using .NET features to prevent attacks, Importance of handling exceptions
2007-08-09
2,954 reads
SQL Server 2005 has added encryption capabilities to the platform, much to the delight of many DBAs. However setting up encryption can be confusing and difficult for most DBAs. New author Mike Good brings us a perspective from someone who is brand new to this set of features and has spent time working through the functions and documenting them for the rest of us.
2007-08-02
21,450 reads
Improving SQL Server password management includes thorough password testing and securing SQL Server installations beyond the main database server.
2007-07-31
2,653 reads
2007-07-23
1,542 reads
You are asked for the sa password for a SQL Server in order to perform a software upgrade. You, the DBA, don't know the password and it's not documented. Rodney Landrum provides a way out of this dilemma, demonstrating two techniques for temporarily changing the password, and then returning it to its previous unknown value.
2007-07-18
4,312 reads
Many state data-breach laws exempt encrypted data from PR-nightmare public-notice requirements, but don't let that fool you into thinking it's an easy answer to the data privacy challenge. Here's the lowdown on loopholes, caveats and options to consider when applying encryption.
2007-07-17
2,316 reads
By Steve Jones
It’s that time of the month, and I’m late. My apologies. I had a...
By Chris Yates
For decades, enterprises have approached data management with the same mindset as someone stuffing...
Truncate Table Pitfalls Truncating a table can be gloriously fast—and spectacularly dangerous when used carelessly....
Comments posted to this topic are about the item The Improvement Limit
Comments posted to this topic are about the item Migrate SSRS Reports to a...