2010-06-16
2,971 reads
2010-06-16
2,971 reads
A look at how you might recover from a disaster using encryption and an HSM module in SQL Server 2008.
2010-06-02
6,765 reads
I need to encrypt my data within SQL Server and I plan on using the built-in encryption functionality in SQL Server 2005 and 2008. However, I'm looking at symmetric and asymmetric key algorithms and while I see information saying to use symmetric keys, I don't understand why. What's the difference between the two and why is a symmetric key algorithm preferred over the asymmetric key ones?
2009-12-02
3,414 reads
2009-06-12
3,067 reads
Authenticators are additional data that gets encrypted along with the data to be stored in an encrypted manner. When it comes to decrypt the data, if the right authenticator isn't specified, SQL Server doesn't return the data in the decrypted form. Rather, a NULL value is returned, just as if the wrong key was used.
2009-06-12
2,384 reads
2009-05-26
2,533 reads
Learn why choosing against the encryption of personal info in your SQL Server database can leave your organization vulnerable to certain compliance issues.
2009-03-13
3,568 reads
Part 2 of this article discusses how to hack/de-cipher the data that has been encrypted by passphrase.
2008-01-10
4,751 reads
By Steve Jones
Thanks to everyone that came to my talks. Slides are below. Best Practices for...
By Steve Jones
I can’t remember how I heard about Small Data SF 2024, but it caught...
By Steve Jones
moledro – n. a feeling of resonant connection with an author or artist you’ll...
Comments posted to this topic are about the item New article
Comments posted to this topic are about the item Monitoring Azure Blob Storage
Azure Data Lake Storage Gen 2 is built on ...?
See possible answers