David Njoku Introduction to Oracle Password Verification and Complexity Function Security is in the news again. It seems there’s no greater click-bait than a story about indecent photos of beautiful young Hollywood actresses stolen from... 16 September 2014 5 min read
Saurabh Dhoble Setting Up Your SQL Server Agent Correctly It is important to set up SQL Server Agent Security on the principles of 'executing with minimum privileges', and ensure that errors are properly logged... 28 May 2014 15 min read
Buck Woody Which New Technology Should I Chase? It is a question that almost anybody working in IT occasionally ask themselves. 'How can I best develop my career to make sure my skills... 06 May 2014 18 min read
Kevin Feasel SQL Injection: How it Works and How to Thwart it This article is an extract from the book Tribal SQL. In this article, Kevin Feasel explains SQL injection attacks, how to defend against them, and... 24 April 2014 33 min read
Syed Jaffar Hussain How is data security maintained and what’s new in Oracle 12c database security – Part 1 Securing enterprise business-critical data is as important for DBAs as database tuning and data protection. Oracle provides comprehensive and powerful security controls/solutions to ensure data... 16 April 2014 5 min read
Dino Esposito Thoughts on ASP.NET MVC Authorization and Security It is only a matter of time in developing most websites that you'll need to implement a way of restricting access to parts of the... 22 July 2013 11 min read
Feodor Georgiev Collecting the Information in the Default Trace The default trace is still the best way of getting important information to provide a security audit of SQL Server, since it records such information... 02 July 2013 14 min read
Alexander Karmanov An Incremental Database Development and Deployment Framework Often, an existing database application must evolve quickly by incremental steps. Alex describes a tried and tested system to provide an automated approach to deploying... 12 February 2013 27 min read
Bert Jan van der Steeg Database Management for SharePoint 2010 With each revision, SharePoint becomes more a SQL Server Database application, with everything that implies for planning and deployment. There are advantages to this: SharePoint... 10 May 2011 13 min read
Timothy Wiseman SQL Injection: Defense in Depth So much has been written about SQL Injection, yet such attacks continue to succeed, even against security consultants' websites. The problem is often that only... 17 March 2011 11 min read
Wesley David Game-over! Gaining Physical access to a computer Security requires defense in depth. The cleverest intrusion detection system, combined with the best antivirus, won't help you if a malicious person can gain physical... 15 March 2011 11 min read
Feodor Georgiev The default trace in SQL Server – the power of performance and security auditing Since the introduction of SQL Server 2005, there is a simple lightweight trace that is left running by default on every SQL Server. This provides... 14 March 2011 17 min read
Matteo Slaviero Code Access Security in ASP.NET 4.0 In the third, and final article that introduces Code Access Security in .NET Framework 4.0, Matteo explains, with examples, how the Level2 Security Transparent Model... 14 September 2010 18 min read
Matteo Slaviero What’s New in Code Access Security in .NET Framework 4.0 – Part 2 Having introduced us to the basics of the new Code Access Security Model available in .NET Framework 4.0, Matteo Slaviero explains how to use this... 13 July 2010 24 min read
Matteo Slaviero What’s New in Code Access Security in .NET Framework 4.0 – Part I The Code Access Security model has been completely redesigned in the .NET Framework 4.0, to the point where CAS policies have been completely removed, and... 15 June 2010 24 min read
Elie Bou Issa An Introduction to Information Rights Management in Exchange 2010 If you're a Systems Administrator concerned about information security, you could do worse than implementing Microsoft's Information Rights Management system; especially if you already have... 06 May 2010 12 min read
Elie Bou Issa Getting Started with Active Directory Rights Management Services for Exchange 2010 With security concerns being a constant litany, it's worth considering Active Directory Rights Management Services as a powerful tool in your access-control arsenal, particularly when... 06 April 2010 13 min read
Richard Morris Bruce Schneier: Geek of the Week If one were to close one's eyes and imagine a BT Executive, one would never conjure up Bruce Schneier. He is one of the greatest... 16 February 2010 12 min read
Dr. Masha Petrova Increase Your Value as a Professional in the Technical Industry It has never been so important to enhance your employability as it is today. Job security can never be taken for granted. Employability, increasing your... 17 November 2009 7 min read
Richard Morris Luca Cardelli: Geek of the Week Luca Cardelli is probably best known for Polyphonic C# and Biocomputing, but he has designed a number of experimental languages and published a variety of... 02 September 2009 7 min read