2019-05-20
850 reads
2019-05-20
850 reads
SQL Server contains many built-in views and functions that can be used to understand what is going on “under the hood,” and security is no exception. In this article, Robert Sheldon explains the security related catalogue views, dynamic management views, and system functions.
2019-05-20
When "work" can happen in any place, security breaches can happen any time and any way.
2019-05-14
2019-05-13
1,044 reads
A pair of Russia-designed cryptographic algorithms -- the Kuznyechik block cipher and the Streebog hash function -- have the same flawed S-box that is almost certainly an intentional backdoor....
2019-05-10
I recently did some research on the source of data breaches and in this article, I’m going to talk a bit about my current favorite source for breach information,...
2019-05-09
A skimming campaign continues to infect sites with malicious JavaScript.
2019-05-08
A year after 911 system hit, most of city's networks are down.
2019-05-08
The new Verizon 2019 Data Breach Investigations Report finds good and bad news on the security front.
2019-05-08
The sa account is the most powerful account in a SQL Server instance, and most DBAs disable it. There are several other built-in accounts that you may not think about that often. Robert Sheldon continues his SQL Server security series with an article about built-in accounts.
2019-05-08
By Steve Jones
I was looking back at my year and decided to see if SQL Prompt...
In the era of cloud-native applications, Kubernetes has become the default standard platform for...
By Steve Jones
I’ve often done some analysis of my year in different ways. Last year I...
Hi, below i show various results trying to reach our ftp site (a globalscape...
Comments posted to this topic are about the item Finding Motivation
Comments posted to this topic are about the item The Last Binary Value of...
What does this code return?
SELECT cast(0x2025 AS NVARCHAR(20))Image 1: