<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Database Tutorials</provider_name><provider_url>https://dbtut.com</provider_url><author_name>Jerwin Roy</author_name><author_url>https://dbtut.com/index.php/author/jerwinroy/</author_url><title>Encryptions in SQL Server - Database Tutorials</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="LTdBCuCs8m"&gt;&lt;a href="https://dbtut.com/index.php/2019/03/27/encryptions-in-sql-server/"&gt;Encryptions in SQL Server&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://dbtut.com/index.php/2019/03/27/encryptions-in-sql-server/embed/#?secret=LTdBCuCs8m" width="600" height="338" title="&#x201C;Encryptions in SQL Server&#x201D; &#x2014; Database Tutorials" data-secret="LTdBCuCs8m" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://dbtut.com/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://dbtut.com/wp-content/uploads/2019/03/mssql-intro.png</thumbnail_url><thumbnail_width>511</thumbnail_width><thumbnail_height>256</thumbnail_height><description>&#xA0; &#xA0; &#xA0; &#xA0; &#xA0; &#xA0; &#xA0; &#xA0; &#xA0; Security is the biggest concern nowadays particularly for those who manage critical applications.Every database must have high secured features to ensure the data is always safe. In recent years the rate of ransom attack has increased a lot. Encryption feature protects data from a threat as &hellip;</description></oembed>
