Title Summary File
Hashing Credit Card Numbers: Unsafe Application Practices

Cryptographic hash functions seem to be an ideal method for protecting and securely storing credit card numbers in e-commerce and payment...

Security Resources File
Oracle Database Listener Security Guide

A guide to properly securing the Oracle Database Listener. Integrigy Consulting has found the Database Listener to be one of the most frequently...

Security Resources File
An Introduction to SQL Injection Attacks for Oracle Developers

Most application developers underestimate the risk of SQL injections attacks against web applications that use Oracle as the back-end database....

Security Resources File
Oracle Applications Password Decryption

Most Oracle Applications 11i implementations are vulnerable to a significant security weakness in the encryption of passwords within the...

Security Resources File
Integrigy Guide to Auditing and Logging in Oracle E-Business Suite

Most Oracle E-Business Suite implementations do not fully take advantage of the auditing and logging features. These features are sophisticated...

Security Resources File