Category Archives: Secure Data

ballad for a data miner

First you save some tuples, then you lose your scruples people help you along your way, not for your deeds, but how you say to take their privacy and freedom, just remind ’em they don’t pay take their money too … Continue reading

Rate this:

Posted in Privacy | Leave a comment

ad hoc T-SQL via TLS (SSL): Almost Perfect Forward Secrecy

The day the Heartbleed OpenSSL ‘vulnerability’ [don’t they mean backdoor?] hits the newswires seems an ideal moment to bring up an easy way to wrap your query results in an SSL tunnel between the database server and where ever you … Continue reading

Rate this:

Posted in Privacy, Secure Data | 3 Comments

Background Checks for EVERYBODY!

A background check simply filters and formats personal information about an eating, breathing person into a somewhat standard and therefore, presumably, useful “packet”. Much of the information in a background check is already out there in the public domain. Most … Continue reading

Rate this:

Posted in Privacy | Leave a comment

Tails from a Diskless Hyper-V

The Amnesic Incognito Live System (Tails) is open source privacy software. Tails “helps you to use the Internet anonymously almost anywhere you go and on any computer but leave no trace…”. This post explores how a Windows private cloud or … Continue reading

Rate this:

Posted in Privacy, Secure Data | 2 Comments

For Privacy Open the Source & Close the Back Door

There is no surprise in the many recent corporate self-admissions that they too have given our private information. After all, they got us to release our privacy to their care with barely a flick and a click. As a direct consequence – and without … Continue reading

Rate this:

Posted in Code Review, Privacy, Secure Data | Leave a comment

It’s [Still!] the SQL Injection… Stupid

Did you see Imperva’s October 2012 Hacker Intelligence Report? The report is a data mining study directed toward the on-line forum behaviors among a purportedly representative group of hackers. The milestone for October 2012 is that Imperva now has a … Continue reading

Rate this:

Posted in Code Review, Data Loading, Secure Data, Testing | Leave a comment

TSQL Cryptographic Patterns – part 9: we’d better take this OFFLINE

There is a compelling defense-in-depth rationale for enabling AUTO_CLOSE on a database where sensitive data is stored. ALTER DATABASE $(ANY_USER_DATABASE) SET AUTO_CLOSE ON; When AUTO_CLOSE is ON the database will cleanly shutdown when the last active user session disconnects or … Continue reading

Rate this:

Posted in Encryption Hierarchies, Secure Data, Testing | Leave a comment