By Jan Stafford – A security breach is never pretty. When a hacker gets into a database, however, things get downright ugly.
Author: SSWUG Research
Who Needs Change Management
Have you ever found yourself in this situation? Something gets changed and you don’t know about until there’s a problem. Or someone makes a change and says “Don’t worry it’s a small change. No one will even notice.” I think we have all found ourselves in these situations. This article discusses some
Working XML: Creating a project
Work continues on the integration of Eclipse — IBM’s open-source project to build an extensible Integrated Development Environment (IDE) for Java developers — and Benoît Marchal’s simple content-management solution known as XM. In this installment, Benoît adds a wizard to initialize a new project.
Web Services and Security
By sridevi krishnan – A key benefit of the emerging web services architecture is the ability to deliver integrated, interoperable software solutions using web-based standards. Ensuring the security of web services through a comprehensive security model is critical, both for organizations and their c
XML/Web Services 100 Interview Questions – Part 2 of 5
Preparing for an interview? Or just want to refresh your XML skills? Here are 100 questions on XML and related technologies. The Part I in this series presented 20 questions to assess the basic concepts. Now, the Part II focuses on XML implementation questions specific to Microsoft platform.
Use SYS_CONTEXT to Obtain Session Information
by Ahbaid Gaffoor – Use the SYS_CONTEXT call to extract session infomation for your application.Here’s a sample script which I use frequently to obtain a session’s information when connected in SQL*Plus:
Leaving the History Behind with Oracle’s Fine Grained Access Control
Marin Komadina explains how to export tables from a user schema–without having to export the history tables as well.
Counting the Costs
By Itzik Ben-Gan – You can use date and time manipulations for calculating call costs across different rate periods as long as you stick to the basics.
Administrators Fight Back Against Slammer
By George V. Hulme – The impact of the Slammer worm subsided Monday as companies scrambled to patch systems and block the worm’s ability to spread. Slammer is being touted as the worst attack on the Internet since the summer of 2001, when a worm called Code Red attacked hundreds of thousands of syst
How Using the Windows 2000 Encrypted File System to Secure SQL Server Databases and Backups Affects SQL Server’s Performance
by Chris Kempster – While Windows 2000’s encrypted file system option provides needed security, how does it affect SQL Server’s performance?
