Viewing 15 posts - 2,641 through 2,655 (of 6,035 total)
Where I work now, most instances are virtualized and that's the default configuration for all new instances, so we can scale them up if needed. What that means is that...
May 2, 2016 at 10:33 am
pietlinden (4/30/2016)
<insert TERRIBLE advice here> ... and don't forget to ascribe to someone who actually knows what he's talking about.
Sorry, couldn't resist!
The question reminded me of some "documentation" of a...
May 2, 2016 at 10:16 am
Yes, you can prevent the web application from interrogating employee SSNs by implementing role based security and abstracting the application from the employee table(s) by using stored proceure(s). Ideally, you...
April 30, 2016 at 6:44 am
If you really want, you can also model an entire database containing objects with only spaces for names.
create database [ ];
GO
use [ ];
GO
create schema [ ];
GO
create table [...
April 29, 2016 at 1:37 pm
Jeff Moden (4/28/2016)
April 29, 2016 at 12:38 pm
Sergiy (4/28/2016)
Since SSN has only 9 digits, changing hash function will not suffice because attacker can simply apply the function to all 10^9 SSN's and match the result against the...
April 29, 2016 at 10:00 am
You don't want indexes on a table that arn't being used (don't benefit queries or insure uniqueness), because they require I/O to maintain whenever the table is inserted, updated, or...
April 29, 2016 at 9:18 am
Implementing a Data Warehouse with Microsoft SQL Server 2012/2014
April 28, 2016 at 3:15 pm
A table lock (TABLOCK) will improve the performance of a bulk table insert, but it will also hold a lock on the entire table. If you can tolerate somewhat longer...
April 28, 2016 at 11:59 am
I'm assuming what you want to do is roll your own Change Data Capture, where you are capturing only those columns that changed within a row, and then insert into...
April 28, 2016 at 9:27 am
If all the organization's databases and backups are encrypted, then a far more realistic scenario (although still improbable) is that an insider figures out a way to somehow copy and...
April 28, 2016 at 8:59 am
Steve Jones - SSC Editor (4/27/2016)
Losing the salt would be the equivalent of losing the symmetric key, if the domain is known. In the case of a social security...
April 28, 2016 at 7:43 am
The "Right To Be Forgotten" is an interesting legal concept. Not only is it technically and logistically impossible, but apparently it doesn't apply equally to all individuals (ie: regular folks...
April 28, 2016 at 6:52 am
GilaMonster (4/27/2016)
Eric M Russell (4/27/2016)
at this point you might as well use symmetric key encryption instead of hashing.
I disagree. If you're using symmetric encryption and the key is compromised,...
April 27, 2016 at 1:41 pm
Steve Jones - SSC Editor (4/27/2016)
Eric M Russell (4/26/2016)
April 27, 2016 at 1:11 pm
Viewing 15 posts - 2,641 through 2,655 (of 6,035 total)