July 15, according to foreign media reports, Oracle said in a statement in Thursday that it plans to release 78 patches in Tuesday to repair the security vulnerabilities of many of its software products, including 13 patches to repair Oracle's main database software vulnerabilities. Oracle will release a database patch involving many versions of the database, including 11g R1 and R2 as well as 10G R1 and R2. Two of these vulnerabilities can be exploited on the network by an attacker and do not require a logon certificate. There are three patches to repair Oracle's secure backup products. All three vulnerabilities can be exploited remotely without the need for ...
Oracle (Oracle) announced at the company's annual OpenWorld meeting in San Francisco last week that it was trying to become a iaashttp://www.aliyun.com/zixun/aggregation/13743.html "> Public cloud service providers. In this respect, foreign science and Technology blog wrote that, if the lack of innovation, Oracle and other companies will be difficult to become the AWS killer, and gave the Oracle innovation path suggestions. Here's what the article reads: Oracle as a public IaaS provides ...
On September 21, according to foreign media reports, Oracle has advised administrators to update the system because of a significant security breach found in the company's HTTP server products based on Apache 2.0 or 2.2. The vulnerability component, which exists in the Fusion middleware 11g and creator Server 10g platform, triggers a denial-of-service attack. This vulnerability can be exploited remotely, without the need for a local login or a user name password and other legal authentication. More complete details can be secured in Oracle ...
NetEase Science and technology news October 9, according to Reuters, Microsoft announced in Tuesday, the award of a discovery of its software security vulnerabilities in the well-known hacker experts more than 100,000 dollars. This is the highest amount of technology companies have so far rewarded hackers. The company also released high-profile IE updates, fixing a loophole that could be used to launch a remote attack. According to Microsoft, James Forshaw, head of vulnerability research at the information security of the London safety consulting firm, found wind ...
The database server is actually the foundation of every electronic transaction, financial and enterprise resource Planning (ERP) system, and it often includes sensitive information from business partners and customers. Although the data integrity and security of these systems are important, the level of security checks taken against the database is not as high as the security measures of the operating system and the network. Many factors can disrupt data integrity and lead to illegal access, including complexity, poor password security, misconfigured, undetected system backdoor, and mandatory routine use of adaptive database security methods ...
August 8 News, according to foreign http://www.aliyun.com/zixun/aggregation/31646.html "> Media reports, A competition at the world's largest hacking conference in Las Vegas this weekend shows why big companies are vulnerable to cyber criminals: staff training in safety is bad. After a series of high-profile cyber attacks on large institutions such as Sony and the International Monetary Fund, many big companies are thought to be paying particular attention recently ...
Database security Policy Database security issues have been around the database administrator's nightmare, the loss of database data and the database by illegal user intrusion makes the database administrator physically and mentally exhausted. This paper puts forward some security policies around the security of the database, hoping to help the database administrator, no longer nightmares every night. Database security issues should include two parts: first, the security of database data it should be able to ensure that when the database system downtime, when the database data storage media is corrupted and when the database user misoperation, database data ...
SQL injection attacks are known to be the most common Web application attack technologies. The security damage caused by SQL injection attacks is also irreparable. The 10 SQL tools listed below can help administrators detect vulnerabilities in a timely manner. bSQL Hacker bSQL Hacker was developed by the Portcullis Lab, bSQL Hacker is an SQL Automatic injection tool (which supports SQL blinds) designed to enable SQL overflow injection of any database. bSQL ...
Oracle claims that its new 12c database is faster and stronger than other databases, and that the new database will be able to serve multiple databases of different sizes and ranges based on the needs of specific users. Senior vice president of database server technology Andy Mendelssohn says many Oracle customers are excited about 12c for some reason. "Customers tell us that they want a database, a service, an in-house deployment service," he said. "12c was launched in June and includes a widely publicized feature ...
April 8, 2014, Microsoft formally put an end to the technical support of Windows XP, as the longest service in human history of the computer operating system, in its lockout, user information security, and even national information security are facing serious challenges. How can this kind of security threat be effectively resolved after 5 months? Browser is an important way to attack viruses, in a comprehensive software market, how can we choose safe and effective tools and measures to prevent this ensuing security crisis? September 24-25th, at home and abroad hundreds of security field top ...
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.