Archive for the ‘Technology’ Category

DBA: SQL Audit Checklist For Internal Security Review

To stay on top of security you need to regularly review your server configurations. It’s helpful to build a checklist to be used as part of an internal security audit review. Below is just such a checklist, specifically tailored to audit a SQL 2008 Server running on Windows Server 2008. Most of what’s in this…
Read On…

DBA: SQL Server Security Best Practices

As part of an internal security review, I put together the following best practices guideline to secure SQL servers. This is just an example, and is not meant to be a comprehensive list of SQL server security parameters. DATABASE CREATION AND CHANGES New databases must be requested using a SQL database request form with proper…
Read On…

Secure Passwords: What You’ve Been Taught Is Wrong

A guide for LAN Administrators who want to secure their systems without a user revolt. GOLDEN RULE OF PASSWORD CREATION: length + the uniqueness of your brain More on that in a moment. But first, if only we could trust our fellow human beings, there would be no need to secure our sensitive data. No need…
Read On…

Windows Server 2012: This file might be blocked to help protect this computer.

Are you unable to “Unblock” a file after copying it from a network location to a Windows 2012 server? When you right-click the file in Windows Explorer and choose properties, do you see this message? Security: This file came from another computer and might be blocked to help protect this computer. PROBLEM When you click…
Read On…

WordPress UserOnline Plugin: Dashboard Issue After 2.8.1 Update

The WordPress UserOnline Plugin is a useful way to see how many guests and search engine bots are currently viewing/scanning your content. But do you see this in the “Right Now” section of your WordPress Dashboard, Users: [YourUserName] %GUESTS_SEPERATOR%%BOTS_SEPERATOR% when you should instead see something closer to this? Users: [YourUserName], 18 Guests, 7 Bots This…
Read On…