Security

Technical Article

Hacker's-eye view of SQL Server

  • Article

If a hacker sets sights on your SQL Server, there are four primary methods he can use to take control and carry out unauthorized, malicious activity. I will look at each of these: Password compromise, Account compromise, SQL injection, Buffer overflows

2005-10-07

4,718 reads

SQLServerCentral Article

Updated SQL Injection

  • Article

SQL injection has been a hot topic the last couple years and there are some great articles at SQLServerCentral.com on this topic. Michael Coles brings us an updated look at this SQL Server security issue with some new examples you might not have previously thought.

4.03 (30)

You rated this post out of 5. Change rating

2008-03-21 (first published: )

85,061 reads

SQLServerCentral Article

Free Encryption

  • Article

Free SQL Server 2000 Encryption for your data!!! Author Michael Coles has put together a tolljit and some XPs that you can use to encrypt your data with the Blowfish algorithm. It is hard to write good applications that encrpyt data and manage the keys and security. This will give you a great headstart on protecting your data.

4.18 (11)

You rated this post out of 5. Change rating

2018-10-10 (first published: )

78,898 reads

SQLServerCentral Article

Easy Auditing a Shared Account

  • Article

Despite the major advances made with Profiler in SQL Server 2005, auditing changes isn't one of the strengths of the product. New author Sergey Pustovit brings us his technique that allows auditing of actions using shared accounts from an application. A few minor code changes, but overall this is a very interesting idea.

5 (2)

You rated this post out of 5. Change rating

2005-07-20

7,514 reads

Technical Article

Keep Bad Guys at Bay with the Advanced Security Features in SQL Server

  • Article

In this article I'll explore the most interesting security enhancements in SQL Server 2005 from a developer's viewpoint. I covered admin security features in the Spring 2005 issue of TechNet Magazine. But there are plenty of dev-specific security enhancements I can explore, such as endpoint authentication and support for the security context of managed code that executes on the server.

2005-05-27

2,315 reads

Blogs

Down the Rabbit Hole: Dealing with Ad-Hoc Data Requests

By

"But I don’t want to go among mad people," Alice remarked."Oh, you can’t help...

Adding a Local Model to Ollama through the GUI

By

I saw some good reviews of the small gemma3 model in a few places...

Connect resiliently to SQL Server

By

 Why you should connect resiliently to SQL Server Transient failures happen — in the cloud...

Read the latest Blogs

Forums

using different credentials when debugging ssis

By stan

hi, now and then i want one connection in my ssis pkgs to use...

AlwaysON health check alerts

By Srinivas Merugu

Comments posted to this topic are about the item AlwaysON health check alerts

Bat and SQL script to generate DB user permissions for all Databases in SQL server

By Srinivas Merugu

Comments posted to this topic are about the item Bat and SQL script to...

Visit the forum

Question of the Day

PWDCompare

What does the PWDCOMPARE function do?

See possible answers