home |  contact
Insight Home
The Basics
Policies and Procedures
Regulations and Standards
Countermeasures
Attack Techniques
Tools
The Tools area features the various weapons in our information security arsenal to enforce our security policy.
Exploits

Oracle Access Control

by Mary Gail Manes

External attacks by hackers and internal abuses by employees are on the rise; CERT reported that computer security incidents doubled in 2001 over 2000. More specifically, hack attempts against Oracle have increased significantly since the Oracle "unbreakable" campaign began (as much as 15 times by some estimates), requiring even more diligence on the part of DBAs.

More...

»



Home

Services

Partners

About Us

Contact Us

 

©2001-2003 by Itillious, Inc. All Rights Reserved.
Privacy Policy