| | |
Description | Compatibility | Level/ Author | Views/ Date Submitted | User Rating |
| |
| |
 |
How to rename a SQL user login | SQL Server 7.0, Other | Advanced / James Travis | 40348 since 2/15/2002 7:40:41 AM |
By 5 Users 4 Excellent Ratings
|
| |
To demonstrate how to effectively rename SQL user account without dropping and recreating them. The following method and information is primamrily for educational purpose only. |
| |
| |
| |
 |
lockdown_disable_guest.sql | SQL Server 2000 | Advanced / Brent Glover | 3426 since 6/17/2003 5:51:58 AM | Unrated
|
| |
This Script trolls through all the databases on a given SS2K server and disables the "guest" user within each.
Closes a security hole where a login potentially can read data from a database they should not.
|
| |
| |
| |
 |
master engle | Other | Intermediate / engle calaro | 2533 since 7/6/2006 2:16:58 AM | Unrated
|
| |
this fed_up (file encryption and decryption utility program) has the purpose of encrypting a file. this code is created in turboc++. it is a great contribution for a principle of encrypting a file. |
| |
| |
| |
 |
Oracle Password Decrypt | Oracle | Beginner / quasi_nut_royce | 39448 since 1/26/2004 6:47:54 AM | Unrated
|
| |
You can use this algo to manually create the encrypted password generated by the Oracle Mapping Work Bench. This can also be used of course with a little work to Decrypt the password stored in the xml file. |
| |
| |
| |
 |
RC4 stored proc functions | SQL Server 2000 | Intermediate / Stuart Dee | 5601 since 11/8/2002 4:14:17 AM | Unrated
|
| |
Implements standard RC4 algorithms using memory tables through sql functions. No active x needed. Speed can be improved by pre generating and storing key state table. |
| |
| |
| |
 |
SetRights | SQL Server 2000, SQL Server 7.0 | Advanced / Rob Waibel | 4924 since 11/22/2004 12:35:35 PM |
By 1 Users
|
| |
Quickly Set the rights of objects in a MS SQL database |
| |
| |
| |
 |
spObjectPermissions | SQL Server 7.0 | Advanced / John C Kirwin | 18683 since 2/12/2001 8:07:39 PM |
By 7 Users 7 Excellent Ratings
|
| |
Stored Procedure to query object permissions for specified user |
| |
| |
| |
 |
Sql Server Number of Connections | SQL Server 2000, SQL Server 7.0 | Intermediate / Jabin. C | 8236 since 5/8/2008 12:44:28 PM | Unrated
|
| |
For checking the concurrent connections per server |
| |
| |
| |
 |
SQLCrypto And XLSure Encryption Utilities | SQL Server 2000, SQL Server 7.0 | Advanced / Brad G Skidmore | 2992 since 9/24/2007 4:52:37 AM | Unrated
|
| |
SQLCrypto Base Encryption + Hash
ZIP files include the SQLCrypto Install, as well as Demo Scripts that install a sample database and all the encryption utilities you would need to start securing your sensitive passwords.
Why pay tens of thousands of doll ...(description truncated) |
| |
| |
| |
 |
T-SQL implementation of SkipJack algorithm | Other | Advanced /
| 7642 since 12/12/2001 7:27:22 AM |
By 2 Users 2 Excellent Ratings
|
| |
Online crypting (and decrypting :o)) data stored at MS-SQL server 2000 (ScreenShot) |
| |