Monthly Archives: April 2012

SQL Injection Tools

I wouldn’t recommend you use any of the tools in this article for attacking anyone, but they could help you to understand the vulnerabilities in your own application. The tools cover a variety of possible ways that injection attacks can … Continue reading

Posted in Blog | Tagged , , | 1 Comment

The Best of the Best

Today’s editorial was originally pubished on June 26, 2007. It is being re-run today as Steve is traveling.    Of the best of the best, sir! (remember that one?) Where’s the best place to work? Here’s the list from Computerworldfor 2007. … Continue reading

Posted in Editorial | Tagged , | Comments Off on The Best of the Best

Creating a User without a Login – Contained Databases

In SQL Server 2012, we have a new feature: partially contained databases. In a previous post, I showed how to enable this, and this post will look at one of the advantages of contained databases: users without logins. Contained Users … Continue reading

Posted in Blog | Tagged , , , | 1 Comment

Key Storage

One of the issues with encryption, perhaps the biggest issue, is the management of the keys that protect the encrypted data. I have been an advocate of keeping the backup of the keys far away from the backup of the … Continue reading

Posted in Editorial | Tagged , , | Comments Off on Key Storage