News

Examine the similarities and differences between Windows security and SQL Server security and you'll find that most of the concepts you already know from managing a network will map quite nicely ...
Understand SQL Server Security SQL Server grew out of the UNIX world, and administrators maintained accounts (at that time) in a fashion similar to the "no domain" scenario in Windows. They created ...
Examine the similarities and differences between Windows security and SQL Server security and you'll find that most of the concepts you already know from managing a network will map quite nicely into ...
Despite the plentiful information in Books Online and on the official “SQL Server 2000 Security” document Microsoft offers online, setting up a truly secure SQL Server remains a difficult task ...
SQL Server has a long list of roles for server, database, and applications that outline things like permissions, data selection and modification, and disk management. Examine how roles play a part ...
Despite the plentiful information in Books Online and on the official “SQL Server 2000 Security” document Microsoft offers online, setting up a truly secure SQL Server remains a difficult task. In ...
The company says it's tightening up security in "Yukon," the next version of its SQL Server database management software, to make it easier to plug holes--and to keep hackers out.
Sentrigo discovered a new security hole in SQL Server, but so far Microsoft isn't paying attention. Let me show you why they should ...
“Security is the most important thing in our business,” said Gordon Mangione, vice president in charge of SQL Server. Microsoft had already started to focus more resources on SQL Server ...
Additionally, Microsoft will subject SQL Server 2005 to the federal government’s Common Criteria certification from the National Security Agency. Common Criteria certification carries a more ...
Understand SQL Server Security SQL Server grew out of the UNIX world, and administrators maintained accounts (at that time) in a fashion similar to the "no domain" scenario in Windows. They created ...