• September 21, 2005 21 Sep'05

    hashing

    Hashing is the transformation of a string of characters into a usually shorter fixed-length value or key that represents the original string.  Continue Reading

  • September 21, 2005 21 Sep'05

    rollback

    A rollback is the undoing of partly completed database changes when a database transaction is determined to have failed.  Continue Reading

  • September 21, 2005 21 Sep'05

    schema

    In computer programming, a schema (pronounced SKEE-mah) is the organization or structure for a database.  Continue Reading

  • September 20, 2005 20 Sep'05

    Defending against SQL injection

    Learn how to defend against SQL injection in this excerpt from "The Database Hacker's Handbook: Defending Database Servers" by David Litchfield, Chris Anley, John Heasman and Bill Grindlay.  Continue Reading

  • September 20, 2005 20 Sep'05

    Vulnerable stored procedures

    Learn about security vulnerabilities in SQL Server Stored procedures in this excerpt from "The Database Hacker's Handbook: Defending Database Servers" by David Litchfield, Chris Anley, John Heasman and Bill Grindlay.  Continue Reading

  • September 20, 2005 20 Sep'05

    Take caution when cleansing redundant delimiters

    Delimiters aid in human comprehension of data, but you'll most likely want to cleanse data of these characters for storage. Contributor Serdar Yegulalp explains how to take caution doing so: Removal of some delimiters can destroy your data integrity  Continue Reading

  • September 20, 2005 20 Sep'05

    Hacker's-eye view of SQL Server

    Hackers can devastate your SQL Server workflow and cripple your company's business. Contributor Hilary Cotter outlines the four primary methods used to hack into SQL Server and offers defenses to prevent security breach.  Continue Reading

  • September 20, 2005 20 Sep'05

    Restoring a database without a backup

    Don't have a backup of your database? Learn how to restore your database using .mdf, .ldf and .ndf files in this expert response.  Continue Reading

  • September 19, 2005 19 Sep'05

    Performance differences between Windows and Linux-based databases

    Get help making an apples-to-apples comparison of database performance in Windows vs. Linux systems. Performance and Tuning expert Jeremy Kadlec gives you several factors to consider.  Continue Reading

  • September 16, 2005 16 Sep'05

    Exploiting SQL Server design flaws

    Learn how attackers may exploit SQL Server design flaws in this excerpt from "The Database Hacker's Handbook: Defending Database Servers" by David Litchfield, Chris Anley, John Heasman and Bill Grindlay.  Continue Reading

  • September 16, 2005 16 Sep'05

    System-level SQL Server attacks

    Learn about system-level SQL Server attacks in this excerpt from "The Database Hacker's Handbook: Defending Database Servers" by David Litchfield, Chris Anley, John Heasman and Bill Grindlay.  Continue Reading

  • September 16, 2005 16 Sep'05

    Time delay SQL injections

    Learn about time delays in this excerpt from "The Database Hacker's Handbook: Defending Database Servers" by David Litchfield, Chris Anley, John Heasman and Bill Grindlay.  Continue Reading

  • September 16, 2005 16 Sep'05

    Port scanning for SQL Server services

    Learn about port scanning for SQL Server services in this excerpt from "The Database Hacker's Handbook: Defending Database Servers" by David Litchfield, Chris Anley, John Heasman and Bill Grindlay.  Continue Reading

-ADS BY GOOGLE

SearchBusinessAnalytics

SearchDataCenter

SearchDataManagement

SearchAWS

SearchOracle

SearchContentManagement

SearchWindowsServer

Close