THE SQL Server Blog Spot on the Web

Welcome to SQLblog.com - The SQL Server blog spot on the web Sign in | |
in Search

Browse by Tags

All Tags » SQL Server 2008 » security   (RSS)
  • Server level permissions for developers–why you should read books

    It is quite difficult recently for me to find some time to write a new post, so I don’t seem to be leading the rankings of the most frequent bloggers. I rarely recently have opportunity to lay my hands on the code too, so natural sources of ‘inspiration’ are less often. Hopefully this will change in 2012 and I will have more opportunities to write ...
    Posted to Piotr Rodak (Weblog) by rodak.p@gmail.com on January 1, 2012
  • More information on the Patch Tuesday updates for SQL Server

    Last week, Microsoft released a series of patches for all supported versions of SQL Server (from SQL Server 2005 SP3 all the way to SQL Server 2008 R2). The reason for the patch against SQL Server installations is largely a client-side issue with the XML viewer application, and for SQL Server specifically, the exploit is limited to potential ...
    Posted to Aaron Bertrand (Weblog) by AaronBertrand on June 19, 2011
  • Security updates for all supported versions of SQL Server

    It's patch Tuesday! [UPDATE June 19 : Please see my follow-up post about this security update.]  Today Microsoft released a security bulletin covering several issues that could potentially affect SQL Server; these exploits include remote code execution, denial of service, information disclosure and elevation of privilege. You should test ...
    Posted to Aaron Bertrand (Weblog) by AaronBertrand on June 14, 2011
  • Transparent Data Encryption and the Latest Data Breach

    Well, It’s happened again. Hundreds of thousands of private records were stolen from a database. This one, however, was different. No one stole any passwords, no one did any social engineering, nothing was captured in-line. No, this one was accomplished by stealing the actual hard drives themselves!  When a thief breaks in and steals hard ...
    Posted to Buck Woody (Weblog) by BuckWoody on February 1, 2010
  • SQL 2008 Encryption EKM Virtual Event

    I'll be presenting at a SafeNet-sponsored virtual event on Dec. 15.  The topic is ''SQL 2008 Encryption EKM Scenarios''.  We'll be discussing the practical applications of EKM in SQL Server 2008, and the most common scenarios that require EKM functionality.  If you wonder what EKM is, or if you do know what EKM is but ...
    Posted to Michael Coles: Sergeant SQL (Weblog) by Mike C on December 10, 2009
  • Fixing Orphaned Users

    This is a problem that plagues DBAs everywhere. When you restore a database, you run the risk of orphaning the users in the database. All users are linked via a SID to a login and if you have SQL Server logins, who’s SIDs are managed by SQL Server, you are at risk. Typically a restore to the same server from which the backup was taken ...
    Posted to Eric Johnson (Weblog) by ejohnson2010 on October 17, 2008
  • Application Roles: You’ve seen them, but have you really ever used them?

    They have been around forever, but have you really ever implemented Application Roles in SQL Server? For that matter, do you really know what they are and how to use them? In this short tip, I hope to explain just that. First off, we need to talk briefly about how application security can be implemented in SQL Server. There is some debate over ...
    Posted to Eric Johnson (Weblog) by ejohnson2010 on October 8, 2008
  • Scripting SQL Server Logins

    You ever find yourself with the need to copy SQL Server logins from one server to another? Maybe you are setting up a failover site, building a replacement server, setting up a reporting instance, or maybe you just want to backup the logins just in case. If you are using Windows Logins, this is a simple matter of scripting the login and applying ...
    Posted to Eric Johnson (Weblog) by ejohnson2010 on September 30, 2008
Powered by Community Server (Commercial Edition), by Telligent Systems
  Privacy Statement