Tag: Database

In previous Oracle versions there were many different ways to setup auditing and separate auditing trails for components.  There were also various layouts to the information provided within those audit trails.  Oracle 12c introduces a new auditing framework where all auditing is written to a single repository and accessed by a single view.  This framework is more secure…

In previous Oracle versions there were many different ways to setup auditing and separate auditing trails for components.  There were also various layouts to the information provided within those audit trails.  Oracle 12c introduces a new auditing framework where all auditing is written to a single repository and accessed by a single view.  This framework is more secure…

To properly secure an Oracle database requires significant effort and often expensive security add-on products.  The Thrifty DBA likes having secure databases, but doesn’t like to spend money on expensive security products when equivalent zero or low-cost solutions are available.  The Thrifty DBA will show you thrifty yet effective security solutions to solve auditing, encryption,…

Containers have taken the IT world by storm, and for good reason. The reduction in setup time, administration time, and resource consumption that containers provide makes a very strong case for using container technologies throughout the data center. Docker can be used to containerize many applications, including the Oracle Database. While Oracle Database is not…

OakTable World: RAC Cache Fusion internals - visit the OakTable World page for more details

In this presentation, we will explore various internal topics to better understand RAC Grid Infrastructure clusterware better. I will explore the background processes, startup sequence, resources, and attributes of the resources. Then, we will explore various log files of the background processes and explain how to use the log files to better understand the Grid…

In this presentation, we will review ASM , high level overview of ASM files, disks, ASM extents, and allocation units etc. Then we will review a few of ASM header structures and how ASM identifies the disks etc. We will dump headers using few tools and show the output of those dumps. We will explore…

OakTable World: RAC Cache Fusion internals - visit the OakTable World page for more details

OakTable World: RAC Cache Fusion internals - visit the OakTable World page for more details

This session features a discussion on defining the attack surface and what attack vectors are relevant to each node on the attack surface. Learn the concept of exploiting different nodes on the system, how attack vectors change for nodes, and mitigation changes for nodes. Discover the trusted path concept and how to apply mitigation to…