Security

Technical Article

Manipulating Microsoft SQL Server Using SQL Injection

  • Article

Focuses on advanced techniques that can be used in an attack on an application utilizing Microsoft SQL Server as a backend. These techniques demonstrate how an attacker could use a SQL Injection vulnerability to retrieve the database content from behind a firewall and penetrate the internal network. Also provided are recommendations on how to prevent such attacks.

2005-01-05

2,626 reads

Technical Article

Common Vulnerabilities in Database Security

  • Article

Creating an enterprise security plan is a complex endeavour. It involves evaluating multiple threats that gain access through many network paths to a hodgepodge of different applications and systems. With the focus on systems and paths, databases are frequently overlooked. Securing the database should be a fundamental tenet for any security practitioner when developing his or her security plan. The database is the source of data, the "crown jewels" in the information economy. Any security effort must start with this in mind and end with the strongest level of controls applied at the database layer.

2004-11-26

2,129 reads

External Article

SQL Server 2000 Security - Part 13 - SQL Injection attack

  • Article

Typically, access to data is provided via client applications, which increases the range of potential vulnerabilities and places an equal share of responsibility for data security on software developers. This is especially important since application flaws can have just as catastrophic implications as a misconfigured or unsecured SQL Server installation.

2004-10-19

2,337 reads

Blogs

Streamlining Azure VM Moves Into Availability Zones

By

One of the more frustrating aspects about creating an Azure virtual machine is that...

Monday Monitor Tips: Native Replication Monitoring

By

Redgate Monitor has been able to monitor replication for a long term, but it...

Advice I Like: Art

By

Superheroes and saints never make art. Only imperfect beings can make art because art...

Read the latest Blogs

Forums

Think LSNs Are Unique? Think Again - Preventing Data Loss in CDC ETL

By utsav

Comments posted to this topic are about the item Think LSNs Are Unique? Think...

A Big PK

By Steve Jones - SSC Editor

Comments posted to this topic are about the item A Big PK

The AI Bubble and the Weak Foundation Beam

By dbakevlar

Comments posted to this topic are about the item The AI Bubble and the...

Visit the forum

Question of the Day

A Big PK

In SQL Server 2025, how many columns can be included in a Primary  Key constraint?

See possible answers