Do you think you can recreate a symmetric key that is protected by a certificate, by just using that same certificate? You might be in for a big surprise…
Did you always want to get to the root of symmetric key encryption in SQL Server and actually decrypt a protected symmetric key? In some circumstances this can actually be done. Find out how to do this now.
Don’t get caught in this nasty trap that will cause all your encrypted data to be wiped out. Discover how to use the OPEN SYMMETRIC KEY statement correctly to protect yourself (and your data) from this ugly surprise.
When it comes to security related investments, we often make excuses why we should not invest now. But think about the impact a random breach can have., not only on you but on your clients, the very people that trusted you.
The HASHBYTES function provides a simple way to calculate cryptographic hash values in T-SQL. Read on to learn how to use this function and discover its two limitations.