Title | Summary | File | |
---|---|---|---|
Hashing Credit Card Numbers: Unsafe Application Practices |
Cryptographic hash functions seem to be an ideal method for protecting and securely storing credit card numbers in e-commerce and payment... |
Security Resources | File |
Oracle Database Listener Security Guide |
A guide to properly securing the Oracle Database Listener. Integrigy Consulting has found the Database Listener to be one of the most frequently... |
Security Resources | File |
An Introduction to SQL Injection Attacks for Oracle Developers |
Most application developers underestimate the risk of SQL injections attacks against web applications that use Oracle as the back-end database.... |
Security Resources | File |
Oracle Applications Password Decryption |
Most Oracle Applications 11i implementations are vulnerable to a significant security weakness in the encryption of passwords within the... |
Security Resources | File |
Integrigy Guide to Auditing and Logging in Oracle E-Business Suite |
Most Oracle E-Business Suite implementations do not fully take advantage of the auditing and logging features. These features are sophisticated... |
Security Resources | File |