Database Security

A database management system, or DBMS, is a tool that creates and manipulates databases. Examples that are used regularly are Google Spreadsheets and Microsoft Excel. Other programs that are more widely used by database developers include MySQL, Microsoft Access, and Microsoft SQL Server. Unfortunately, there are many people out there who would like to get into your database for your information. Learn how to secure your information here.

Information Security Concepts: Confidentiality

Confidentiality is one of four core concepts of Information Security examined in this series of articles. To understand Confidentiality, we must understand the concept of privacy. Further, we must have an understanding of what information should be protected, and how to define “authorized.”

Spybot: A Free Spyware Killer for Windows

Spybot – S&D is free security software that has been fixing and protecting Windows computers for years. The latest version of Spybot is certainly the fastest yet, but how well will it protect you from spyware, adware and other internet security threats? Read this Spybot review to find out!

Tips on Protecting Your SQL Database with Security Roles

Is your Microsoft SQL Server truly secure? With SQL Analysis services, individual roles should be defined for each user who has access to the database. These roles define what the individual user can and cannot do. Roles are bound to the individual users and should be taken into consideration.

WinPatrol 2009: A Malware-Monitor for Windows

On this second part of WinPatrol 2009 review, we’ll describe a unique method in managing critical areas in Windows is by using a handy and useful tool, WinPatrolToGo and the feature you’ll get in WinPatrol Plus.

What are the security risks when using VoIP?

According to Gartner, VoIP-enabled systems will account for about 97% of
all telephony systems sold; however, there is plenty of uncertainty about its security in the VoIP arena. What are the risk factors when using VoIP or which are the major VoIP security threats? Read on to find out…

How to Encrypt a Microsoft Access Database

If you are looking to keep your information free from prying eyes, or hacking eyes, then one simple and easy way to add an extra layer of protection to your system is by encrypting your database. This user guide will show you how to do just that.

Protecting Your SQL Server

Microsoft’s SQL Server is one of the most widely used databases in the world. With assets in the database, the individual tables are capable of holding millions of records. SQL Servers can lie on your intranet, extranet or on the internet.