ALTER LOGIN can be used to change the password of a SQL Login. Read on to see the required permissions and what you need to do to change your own password.
What is a Salt Value and how does it help to protect the stored passwords of your application’s users from attacks involving Rainbow Tables? Read on to find out now.
Certificates are containers for asymmetric encryption keys that can be used to establish a chain of trust between communicating parties. Read on to see how this works in practice.
Asymmetric key encryption (aka public-key encryption) works with two separate keys, a public key to encrypt and a private key to decrypt. Read on to see the advantages and disadvantages of this type of encryption.
Cryptographic terminology can be sometimes somewhat “cryptic”. This post starts out a series to provide a glossary of cryptographic terms. Each post in this series will cover one cryptographic expression in detail.