Oracle Database 10g Release 1 Enterprise Manager (EM) Configuration pack introduced the policy manager which has the ability to scan databases and look for security related configuration status. The Oracle database provides robust security features which can be used to enhance existing application security. Furthermore, proper use of its security features and adherence to basic security practices will help protect against database-related threats and attacks. This paper recaps the security checklist which can be found in newer versions of the Oracle Database Security Guide.
This document describes a proposed strategy for addressing security within a Web service environment. It defines a comprehensive Web service security model that supports, integrates and unifies several popular security models, mechanisms, and technologies (including both symmetric and public key technologies) in a way that enables a variety of systems to securely interoperate in a platform- and language-neutral manner. It also describes a set of specifications and scenarios that show how these specifications might be used together.
The IT industry has been talking about Web services for almost two years. The benefits of having a loosely-coupled, language-neutral, platform-independent way of linking applications within organizations, across enterprises, and across the Internet are becoming more evident as Web services are used in pilot programs and in wide-scale production. Moving forward, our customers, industry analysts,
Oracle Password Repository is a Unix-based secure tool for storage & retrieval of Oracle database passwords. By replacing hardcoded passwords in scripts with a call to OPR, it helps to keep your Oracle environment secure and easier to maintain.
What's New in This Release:
· The INSTALL file informed that you need to be able to see the oracle oci libraries, but it fact you need these only at runtime. You do need access to the OCI headers files during runtime though. But these rights are enabled by default oracle installations.
PDF Password Remover can be used to decrypt protected Adobe Acrobat PDF files, which have "owner" password set, preventing the file from editing (changing), printing, selecting text and graphics (and copying them into the Clipboard), or adding/changing annotations and form fields. Decryption is being done instantly. Decrypted file can be opened in any PDF viewer (e.g. Adobe Acrobat Reader) without any restrictions -- i.e. with edit/copy/print functions enabled. All versions of Adobe Acrobat (including 9.x, which features 128-bit encryption) are supported.
From the moment people started using passwords, it didn't take long to realize how many people picked the very same passwords over and over. Even the way people misspell words is consistent. In fact, people are so predictable that most hackers make use of lists of common passwords just like these. To give you some insight into how predictable humans are, the following is a list of the 500 most common passwords. If you see your password on this list, please change it immediately. Keep in mind that every password listed here has been used by at least hundreds if not thousands of other people.
There are some interesting passwords on this list that show how people try to be clever, but even human cleverness is predictable. For example, look at these passwords that I found interesting:
ncc1701 The ship number for the Starship Enterprise
thx1138 The name of George Lucas's first movie, a 1971 remake of an earlier student project
qazwsx Follows a simple pattern when typed on a typical keyboard
666666 Six sixes
7777777 Seven sevens
ou812 The title of a 1988 Van Halen album
8675309 The number mentioned in the 1982 Tommy Tutone song. The song supposedly caused an epidemic of people dialing 867- 5309 and asking for "Jenny"