THE SQL Server Blog Spot on the Web

Welcome to SQLblog.com - The SQL Server blog spot on the web Sign in | |
in Search

Browse by Tags

All Tags » Security   (RSS)
Showing page 1 of 9 (85 total posts)
  • Secure Connections Management in SSIS, Part 2

    SQL Server Integration Services (SSIS) is built to move data. SSIS ships with features to support the secure transmission of data. In this series, my goal is to promote awareness of these features and advocate for their use. SSIS Connection Managers In Secure Connections Management in SSIS, Part 1, I demonstrated configuring an SSIS Connection ...
    Posted to Andy Leonard (Weblog) by andyleonard on March 2, 2015
  • Secure Connections Management in SSIS, Part 1

    SQL Server Integration Services (SSIS) is built to move data. SSIS ships with features to support the secure transmission of data. In this series, my goal is to promote awareness of these features and advocate for their use. SSIS Connection Managers Let’s begin by examining ways to connect to a database – any database – using SSIS. ...
    Posted to Andy Leonard (Weblog) by andyleonard on February 25, 2015
  • Administering SSIS: Security-related SSIS Questions

    I credit my friend and brother, Chris Yates (Blog | @YatesSQL), for inspiring me to write this post with his (excellent) post: Reports in SSIS. If I had a nickel for each time I’ve been asked, “What permissions are required for SSIS?” I would have a lot of nickels. It’s a fair question with an unfair answer, “It depends.” “It Depends on ...
    Posted to Andy Leonard (Weblog) by andyleonard on January 19, 2015
  • Third Party Applications and Other Acts of Violence Against Your SQL Server

    I just got finished reading a great blog post from my buddy, Thomas LaRock (t | b), in which he describes a useful personal policy he used to track changes made to his SQL Servers when installing third-party products. Note that I'm talking about line-of-business applications here - your inventory management systems and help desk ...
    Posted to Kevin Kline (Weblog) by KKline on August 12, 2014
  • DevOps for Windows Azure

    ''DevOps'' (Short for Developer Operations) is one of a group of new terms such as ''Cloud'', ''Big Data'' and ''Data Scientist'' - words that are somewhere between marketing and tasks we've actually had around in other forms for years.However, working in a Distributed Environment (Both on and off premises)  like Windows Azure does bring a ...
    Posted to Buck Woody (Weblog) by BuckWoody on March 12, 2013
  • The Importance of Paranoia for the Technical Professional

    I recently read a blog post from a technical professional who’s account had been hacked (http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all/)  – not because he used poor passwords or unsafe practices, but because the hackers used some social engineering to get around the safety he had put into ...
    Posted to Buck Woody (Weblog) by BuckWoody on August 8, 2012
  • High-Availability White Papers and Resources for SQL Server

    In foreground, attendee makes dreaded ''shoot myself'' hand sign to the speaker.I was just telling the good people of Charlotte about how they (and how YOU) need to read all things by Paul Randal (blog | twitter), except for all of his cheesy romance novels like Caress and Conquer written under the nom de plum of ...
    Posted to Kevin Kline (Weblog) by KKline on July 26, 2012
  • Ghost Records, Backups, and Database Compression…With a Pinch of Security Considerations

      Today Jeffrey Langdon (@jlangdon) posed on #SQLHelp the following questions: So I set to answer his question, and I said to myself: “Hey, I haven’t blogged in a while, how about I blog about this particular topic?”. Thus, this post was born. (If you have never heard of Ghost Records and/or the Ghost Cleanup Task, go see this blog post ...
    Posted to Argenis Fernandez (Weblog) by Argenis on May 30, 2012
  • SQL Azure and Trust Services

    Microsoft is working on a new Windows Azure service called “Trust Services”. Trust Services takes a certificate you upload and uses it to encrypt and decrypt sensitive data in the cloud. Of course, like any security service, there’s a bit more to it than that. I’ll give you a quick overview of how you can use this product ...
    Posted to Buck Woody (Weblog) by BuckWoody on March 27, 2012
  • SQL Azure - Requiring Encrypt=True

    (Many thanks to Peter Gvozdjak and Dan Benediktson here at Microsoft who worked with me on this issue and provided the bulk of information for this post) Recently I had a customer inquire about some performance tuning he wanted to do for SQL Azure, and as part of that he found that it was possible to remove the “Encrypt=True” setting on the ...
    Posted to Buck Woody (Weblog) by BuckWoody on March 6, 2012
1 2 3 4 5 Next > ... Last »
Powered by Community Server (Commercial Edition), by Telligent Systems
  Privacy Statement