Security

Technical Article

Hacker's-eye view of SQL Server

  • Article

If a hacker sets sights on your SQL Server, there are four primary methods he can use to take control and carry out unauthorized, malicious activity. I will look at each of these: Password compromise, Account compromise, SQL injection, Buffer overflows

2005-10-07

4,718 reads

SQLServerCentral Article

Updated SQL Injection

  • Article

SQL injection has been a hot topic the last couple years and there are some great articles at SQLServerCentral.com on this topic. Michael Coles brings us an updated look at this SQL Server security issue with some new examples you might not have previously thought.

(30)

You rated this post out of 5. Change rating

2008-03-21 (first published: )

85,100 reads

SQLServerCentral Article

Free Encryption

  • Article

Free SQL Server 2000 Encryption for your data!!! Author Michael Coles has put together a tolljit and some XPs that you can use to encrypt your data with the Blowfish algorithm. It is hard to write good applications that encrpyt data and manage the keys and security. This will give you a great headstart on protecting your data.

(11)

You rated this post out of 5. Change rating

2018-10-10 (first published: )

78,916 reads

SQLServerCentral Article

Easy Auditing a Shared Account

  • Article

Despite the major advances made with Profiler in SQL Server 2005, auditing changes isn't one of the strengths of the product. New author Sergey Pustovit brings us his technique that allows auditing of actions using shared accounts from an application. A few minor code changes, but overall this is a very interesting idea.

(2)

You rated this post out of 5. Change rating

2005-07-20

7,519 reads

Blogs

Streamlining Azure VM Moves Into Availability Zones

By

One of the more frustrating aspects about creating an Azure virtual machine is that...

Monday Monitor Tips: Native Replication Monitoring

By

Redgate Monitor has been able to monitor replication for a long term, but it...

Advice I Like: Art

By

Superheroes and saints never make art. Only imperfect beings can make art because art...

Read the latest Blogs

Forums

Think LSNs Are Unique? Think Again - Preventing Data Loss in CDC ETL

By utsav

Comments posted to this topic are about the item Think LSNs Are Unique? Think...

A Big PK

By Steve Jones - SSC Editor

Comments posted to this topic are about the item A Big PK

The AI Bubble and the Weak Foundation Beam

By dbakevlar

Comments posted to this topic are about the item The AI Bubble and the...

Visit the forum

Question of the Day

A Big PK

In SQL Server 2025, how many columns can be included in a Primary  Key constraint?

See possible answers