Tracking Illicit Users
Longtime SQL Server guru David Poole brings us a look at one of the thorny problems a DBA faces: tracking down illicit users.
2008-01-15
7,876 reads
Longtime SQL Server guru David Poole brings us a look at one of the thorny problems a DBA faces: tracking down illicit users.
2008-01-15
7,876 reads
Part 2 of this article discusses how to hack/de-cipher the data that has been encrypted by passphrase.
2008-01-10
4,751 reads
2012-08-03 (first published: 2008-01-09)
2,307 reads
Learn how using basic SQL Server security practices of least privilege, delegated administration and separation of duties will protect SQL Server databases.
2008-01-09
3,806 reads
Script one or all roles in a database. Includes users, obect permissions and column permissions.
2011-09-08 (first published: 2008-01-08)
5,257 reads
SQL Server 2005 provides four methods of encryption. Part one of this article covers encryption and decryption by passphrase.
2008-01-07
3,647 reads
Greg Larsen discusses the different options available within SQL Server 2005 for managing security.
2008-01-01
2,853 reads
How anonymous are your ratings and other opinions on the Internet? Not as much as you might think.
2007-12-27
196 reads
Study encryption and hashing algorithm options for data security in SQL Server 2005 and use symmetric/asymmetric keys to encrypt and decrypt SQL Server data.
2007-12-25
3,463 reads
2007-12-21
1 reads
By Steve Jones
I’m leaving again tomorrow for a trip. This time I head back to Boston...
By Tim Mitchell
Most of us who work with data have, at least a few times, been...
By Rob Sewell
The Social Web Foundation is aiming to grow the fediverse and make the social...
Comments posted to this topic are about the item 7 sept, scheduled book
Comments posted to this topic are about the item 7 sept, schedlued article
Comments posted to this topic are about the item 6 sept, published book
Azure Data Lake Storage Gen 2 is built on ...?
See possible answers