SQL Server has a long list of roles for server, database, and applications that outline things like permissions, data selection and modification, and disk management. Examine how roles play a part in ...
In my next several posts, I'd like to take a good look at SQL Server security. We'll primarily focus on SQL Server 2008 R2, which is the latest release. Many of the concepts I plan to discuss will ...
I have worked with SQL Server for many years now, back to Sybase SQL Server days and there has always been confusion over Logins and Users. Even though they typically use the same name they are ...
Sentrigo discovered a new security hole in SQL Server, but so far Microsoft isn't paying attention. Let me show you why they should Last week Sentrigo brought a security hole in SQL Server to my ...
For those of you still using SQL Server 2005, Microsoft will completely end support on April 12th 2016. You can head over here to check out upgrade guidelines, download migration tools, and read more ...
How to protect your database from SQL injection, data theft, rogue users, and well-meaning meddlers without tying your environment in knots Like so much of IT, database security requirements largely ...
A few days ago, Microsoft shocked us when it announced that it would soon bring its SQL Server database to Linux. It’ll take until 2017 before SQL Server will be available on Linux, though. Until then ...
SEATTLE — In the aftermath of the Slammer worm that wreaked havoc with many SQL Server users early this year, Microsoft Corp. is trying to make its database software more secure. But there’s still ...
If you manage a Windows server currently, then you're familiar with security from the user and group standpoint. Whether you're using the older LAN Manager structure (Windows NT-style domains), the ...
Microsoft is aiming to shore up the security of its SQL Server database management software. The next version of SQL Server, code-named "Yukon," will include a long list of new security-related ...
Microsoft SQL Server installation is simple when system requirements and edition choices are planned.Choosing the right authentication mode, such as ...