Title Summary File
Hashing Credit Card Numbers: Unsafe Application Practices

Cryptographic hash functions seem to be an ideal method for protecting and securely storing credit card numbers in e-commerce and payment...

Security Resources File
Oracle Jinitiator 1.1.8 Vulnerabilities

US-CERT released an advisory on August 28, 2007 regarding multiple stack buffer overflows in the Oracle Jinitiator product (Vulnerability Note VU#...

Oracle Applications Password Decryption

Most Oracle Applications 11i implementations are vulnerable to a significant security weakness in the encryption of passwords within the...

Security Resources File
An Introduction to SQL Injection Attacks for Oracle Developers

Most application developers underestimate the risk of SQL injections attacks against web applications that use Oracle as the back-end database....

Security Resources File
Oracle Database Listener Security Guide

A guide to properly securing the Oracle Database Listener. Integrigy Consulting has found the Database Listener to be one of the most frequently...

Security Resources File
11i: Setting Listener Passwords

Oracle has released a Metalink Note on the proper procedure for setting passwords for the database and FNDFS listeners.  It is important to...

11i: Best Practices for Securing the E-Business Suite Updated July 2007

Oracle has updated the white paper "Best Practices for Securing the E-Business Suite 11i" ...

Oracle Critical Patch Update - July 2007 - E-Business Suite Impact

Oracle released the tenth Critical Patch Update (CPU) yesterday.  This quarter is the same as the...

OAUG eLearning: Oracle Critical Patch Update July 2007

This quarters Oracle Critical Patch Update (CPU) will be released on Tuesday, July 17th.   In order to provide a better understanding of...

Critical Patch Update July 2007 Pre-Release Analysis

Here is a brief analysis of the pre-release...

Pages