security

SQLServerCentral Article

Can We Please Stop Sending Passwords Over the Wire?

  • Article

While analyzing SQL Server's network protocol, I came across a weird fact: when a database client logs in using SQL Server authentication (as opposed to Windows authentication), it has to send the user's password to the server, in blatant violation of common security guidelines. At first, I couldn't believe it; SQL Server generally does an […]

(8)

You rated this post out of 5. Change rating

2022-03-02

5,540 reads

SQLServerCentral Article

Query control made easy

  • Article

Overview As we all know, data security is a never-ending battle. Every day, we hear of new data breaches. It's a hard problem, and there is no single solution, other than a defense in depth. Let's look at one of those defenses for databases: query control. Query control is a simple idea: most applications access […]

(4)

You rated this post out of 5. Change rating

2022-01-07

4,023 reads

SQLServerCentral Article

SQL Server Data Classification Comes Alive

  • Article

Overview Microsoft SQL Server 2012 introduced a feature called data classification, which allows you to mark certain columns with labels, indicating that these columns contain sensitive or special-handling data. For instance, you may want to mark a column containing credit card numbers as "confidential", or sales numbers as "management only". The problem is that you […]

(1)

You rated this post out of 5. Change rating

2021-12-10

5,217 reads

SQLServerCentral Article

SQL Server Data Masking: a comparison with Gallium Data

  • Article

Introduction In SQL Server 2016, Microsoft introduced a new feature called dynamic data masking, which allows you to mask the values of certain columns and keep that data hidden from certain users, without having to modify your applications. Let's take a look at how SQL Server does data masking, and compare it to the way Gallium Data […]

You rated this post out of 5. Change rating

2021-12-03

1,946 reads

Blogs

Streamlining Azure VM Moves Into Availability Zones

By

One of the more frustrating aspects about creating an Azure virtual machine is that...

Monday Monitor Tips: Native Replication Monitoring

By

Redgate Monitor has been able to monitor replication for a long term, but it...

Advice I Like: Art

By

Superheroes and saints never make art. Only imperfect beings can make art because art...

Read the latest Blogs

Forums

Think LSNs Are Unique? Think Again - Preventing Data Loss in CDC ETL

By utsav

Comments posted to this topic are about the item Think LSNs Are Unique? Think...

A Big PK

By Steve Jones - SSC Editor

Comments posted to this topic are about the item A Big PK

The AI Bubble and the Weak Foundation Beam

By dbakevlar

Comments posted to this topic are about the item The AI Bubble and the...

Visit the forum

Question of the Day

A Big PK

In SQL Server 2025, how many columns can be included in a Primary  Key constraint?

See possible answers