Home Code Snippets Oracle Reference Oracle Functions Oracle Error Codes Forum Oracle Jobs Oracle Blogs

Tag Archives: network

Oracle’s New ‘Private Cloud’ Appliance

Things are heating up in the appliance world. Oracle's CEO Larry Ellison took the lead at the keynote of Oracle OpenWorld to announce the launch of 'Exalogic Elastic Compute Cloud' (EECC), which is a slick new box that contains both a full server and storage hardware.

Posted in Uncategorized | Also tagged , , 1 Comment

How to Hack Millions of Routers

More Good News: most home routers, like the one you're using right now, are "easily hackable".  A researcher named Craig Heffner from the security consultancy company Seismic says about half the existing models of home routers are vulnerable to hackers. This includes most Linksys, Dell, and Verizon FiOS or DSL routers, plus others. The technique […]

Posted in Uncategorized | Also tagged , , Comments Off

Security Through Ubiquity? For Botnets, It Works

You may be familiar with "security through obscurity", a principle in security engineering which attempts to use secrecy of design, implementation, or other factors to provide security. Security through obscurity is a poor design concept in general and is widely derided among professionals. But what about security through ubiquity, "ubiquity" in this case meaning multiple […]

Posted in Uncategorized | Also tagged , , Comments Off

Software: Oracle Toolbox

Oracle Toolbox is a collection of PHP scripts that permit you to administer an Oracle database via your Web browser in a single interface. You can find out more about it and get it here: http://www.oracletoolbox.org/ Oracle Toolbox gives you a wealth of information on processes, uptime, stats, and other metrics. It also lets you […]

Posted in Uncategorized | Also tagged , Comments Off

Gumblar Botnet Gets Trickier

A report from ThreatPost.com says the Gumblar botnet is shifting tactics in order to evade detection, but also to try and keep botnet researchers from obtaining and analyzing the new versions of Gumblar. Apparently, the newer versions perform a test to see what country a newly-infected machine is located in. This geolocation check happens during […]

Posted in General | Also tagged , , Comments Off

Finally: Build A Botnet, Go To Jail

Build a botnet, go to jail- that's the way it should be. If all goes well, two botnet builders fromTexas will spend some real time in prison for building and spreading their botnet over the internet. According to court documents, David Anthony Edwards will plead guilty to charges that he and another jerk man, Thomas […]

Posted in Uncategorized | Also tagged , Comments Off

Good News For Stalkers

Security Researchers Find All GSM Phones Open To Hacking & Tracking Yes, it's good news for stalkers and indentity thieves everywhere: Don Bailey from iSec Partners and security researcher Nick DePetrillo have found a vulnerability in all GSM cell phones that can give an attacker the unrestricted ability to locate any GSM handset anywhere in […]

Posted in Uncategorized | Also tagged , , , Comments Off