
Problem solve
Get help with specific problems with your technologies, process and projects.
SQL Server Security
Create a user-defined server role in SQL Server 2012 with T-SQL, SSMS
Ashish Mehta shows two ways – with T-SQL and with SSMS -- to make a user-defined server role in SQL Server 2012. Continue Reading
SQL Server encryption features in SQL Server 2014
Learn about SQL Server encryption features and enhancements in SQL 14, including Transparent Data Encryption and encrypting backups. Continue Reading
Configuring and implementing a SQL Server contained database
Learn how to implement and configure contained databases in SQL Server 2012. Continue Reading
-
The ins and outs of the SQL Server 2012 contained database
Contained databases could be one of the most important features of SQL Server 2012. Continue Reading
Microsoft SQL Server security best practices checklist
Authentication, complex passwords and limiting permissions are three of the top bullet points on this SQL Server security best practices checklist. Continue Reading
SQL Server meets database application security
Make sure your SQL Server is secure by studying these general guidelines for secure database applications from SQL Server expert Roman Rehak.Continue Reading
Essential SQL Server security tools
Read this tip where writer Ashish Kumar Mehta shares his all-time favorite native and third-party SQL Server security tools.Continue Reading
SQL Server 2012 security: Changes for the newest version
SQL Server 2012 is here, and many DBAs wonder what kinds of changes to expect in SQL Server security. Basit Farooq explains what we can anticipate.Continue Reading
Why SQL Server security matters: A case study
With a DBA's multiple responsibilities, it's easy to neglect SQL Server security. This case study by Basit Farooq explains why this is so dangerous.Continue Reading
Managing linked server security in SQL Server
What do you need to know to effectively manage your linked server? Find out in this tip from SQL Server expert Roman Rehak.Continue Reading
-
Best practices for preventing a SQL injection attack
One of the sneakiest ways for a hacker to invade your system is via a SQL injection attack. Expert Robert Sheldon explains how to keep hackers out.Continue Reading
SQL Server security: The implications of user-defined roles
SQL Server security is a topic on many DBAs' minds. But what are the implications of user-defined roles? Expert Serdar Yegulalp explains.Continue Reading
BI for the SMB: Don't give away business intelligence
With the various challenges SMBs face, securing their business intelligence efforts may seem unimportant. Not so, says expert Don Jones. Find out why.Continue Reading
SQL Server management trick: Connecting when admins are locked out
How do you connect to SQL Server when all admins have been locked out? Read this tip from Ashish Mehta and learn a new SQL Server management trick.Continue Reading
Different ways to audit SQL Server security
Strong SQL Server security has become a more important part of a robust defense. But what are your options for security auditing?Continue Reading