Despite the plentiful information in Books Online and on the official “SQL Server 2000 Security” document Microsoft offers online, setting up a truly secure SQL Server remains a difficult task. In ...
How to protect your database from SQL injection, data theft, rogue users, and well-meaning meddlers without tying your environment in knots Like so much of IT, database security requirements largely ...
UPDATE: The story that originally got my attention has been updated in all of the places I could still find it yesterday, so I’m pulling my references to the story and just focusing on the positive ...
Windows domains rely on policy-based security mechanisms, but Windows security policy deployment can be confusing to the uninitiated. What’s the difference between the local security policy, domain ...
In the past, the question of how to perform auditing under SQL Server has had a simple answer: Do it yourself. But now, SQL Server 2000 has eased the burden of auditing by introducing an extensive and ...
Sentrigo discovered a new security hole in SQL Server, but so far Microsoft isn't paying attention. Let me show you why they should Last week Sentrigo brought a security hole in SQL Server to my ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results