Tag Archives: security

Key Storage

One of the issues with encryption, perhaps the biggest issue, is the management of the keys that protect the encrypted data. I have been an advocate of keeping the backup of the keys far away from the backup of the … Continue reading

Posted in Editorial | Tagged , , | Comments Off on Key Storage

Hashing Collisions

One of the problems with hashing is that you can have collisions from values that are not very similar. This means that if you are using hashing as a way to identify similar values, you need to make further checks … Continue reading

Posted in Blog | Tagged , , , | 4 Comments

Certificates Everywhere

One of the things that I think has been most disappointing to me in technology over the last few decades is the lack of progress is managing security keys and certificates. There hasn’t been a really good method designed that … Continue reading

Posted in Editorial | Tagged | Comments Off on Certificates Everywhere

Ownership Chains in SQL Server

Someone asked the question recently about allowing a user to run a process,but not execute the individual pieces of the process. I replied that ownership chains allow this, and then explained things. Here’s a short example of that. Let’s suppose … Continue reading

Posted in Blog | Tagged , , | Comments Off on Ownership Chains in SQL Server