ALTER LOGIN can be used to change the password of a SQL Login. Read on to see the required permissions and what you need to do to change your own password.
What is a Salt Value and how does it help to protect the stored passwords of your application’s users from attacks involving Rainbow Tables? Read on to find out now.
Hash functions calculate a fixed length binary digest of a document. Read on to see what additional requirements turn an ordinary hash function into a cryptographic hash function and what use cases require the use of cryptographic hash functions.
Certificates are containers for asymmetric encryption keys that can be used to establish a chain of trust between communicating parties. Read on to see how this works in practice.
Asymmetric key encryption (aka public-key encryption) works with two separate keys, a public key to encrypt and a private key to decrypt. Read on to see the advantages and disadvantages of this type of encryption.