Scripting all permissions in a SQL Server database is not trivial. Discover how to generate the necessary statements yourself with this simple query. (Well, copy & paste of the query is simple…)
Did you always want to get to the root of symmetric key encryption in SQL Server and actually decrypt a protected symmetric key? In some circumstances this can actually be done. Find out how to do this now.
SQL Server stores passwords as salted hash values, preventing us from directly checking or enforcing their strength. However, using PWDCOMPARE we can try to crack them to identify weak ones.
Sometimes it is helpful to know on which page exactly SQL Server has stored a particular row. You can use the undocumented %%physloc%% virtual column, together with its supporting functions sys.fn_PhysLocFormatter and sys.fn_PhysLocCracker, to find out.
Do you have a symmetric key in a SQL Server database but forgot how it is encrypted? Discover how you can use the sys.key_encryptions catalog view to find out which protection mechanisms were used to encrypt the symmetric keys in the current database.