Tag Archives: security

Deleting a User that Owns a Schema

This was an interesting question I saw posted recently. Through SQL Server 2000, trying to delete a user that owned objects was a pain. We had to actually rebuild all the objects, which was problematic. With SQL Server 2005 and … Continue reading

Posted in Blog | Tagged , | Leave a comment

Protecting Our Stream of Data

Protecting the data our companies collect is important. Many of us go to great lengths to secure our databases, firewall connections, limit access, and more. However, we can’t secure the data before it gets to us, and that can be … Continue reading

Posted in Editorial | Tagged | 1 Comment

The Weakest Link

I noticed another data breach recently. This breach was from PageUp, a firm that helps companies find employees. This means that they have lots of information, potentially PII data, and some of it might be out there. Since they provide job … Continue reading

Posted in Editorial | Tagged | Leave a comment

Getting the Role Permissions–#SQLNewBlogger

Another post for me that is simple and hopefully serves as an example for people trying to get blogging as #SQLNewBloggers. If you are wondering what permissions a role has, and don’t want to spend time searching and digging through … Continue reading

Posted in Blog | Tagged , , | Leave a comment

Granting CONTROL on a database–#SQLNewBlogger

Another post for me that is simple and hopefully serves as an example for people trying to get blogging as #SQLNewBloggers. I wanted to grant a login the CONTROL permission on a database. This wasn’t a simple as I expected. … Continue reading

Posted in Blog | Tagged , | 4 Comments

The Combinations of Software

Security issues seem to be appearing more frequently, not less. I’d expect that we would be getting better at writing software, and I think many of us are. The problem is that more and more people are writing software and … Continue reading

Posted in Editorial | Tagged , | Leave a comment

Storage that Expires

Whether you like the idea of the GDPR (and the new California law), I’m sure you agree that these laws will likely change our data handling in business. Even if they are weakened through legal challenges, many companies have already started to comply … Continue reading

Posted in Editorial | Tagged , , | 1 Comment

Code I Can’t Live Without–T-SQL Tuesday #104

Bert Wagner has a good invitation this month, a T-SQL Tuesday question about code, specifically code you can’t live without. I’ve got my thoughts below. This is a monthly blog party, and you can participate. Write a post on this … Continue reading

Posted in Blog | Tagged , , | Leave a comment

Setting Up Pi-Hole.Net

I saw a tweet a short time ago from Drew Furgiuele about pi-hole.net. He noted this was a near use of a Raspberry Pi, and I wanted to give it a try. I got one awhile ago, and used it … Continue reading

Posted in Blog | Tagged , , , | 4 Comments

Republish: The Opportunistic Hacker

Still in Ireland: The Opportunistic Hacker.

Posted in Editorial | Tagged