Using profiles for password management is an effective way to restrict unsolicited database usage. Every DBA should verify the password restrictions and setup an appropriate number of profiles for the groups or types of users within the database.
The iPad might be dominating the headlines this week, but the security folks at Apple have been busy, too, releasing an update to the QuickTime software that patches 16 vulnerabilities.
<b>Click:</b> "I turned on my laptop running the Ubuntu 10.04 Lucid beta (I think we're still technically on "beta 2") and found more than 100 updates ready for me."
<b>Geek Ride:</b> "Everyone is not as lucky as having a full fletched email client like thunderbird or kmail to send mails. There is one unlucky group known as system administrators who have to send the mails either through the command line or a script running on the remote server."
<b>DeveloperWorks: </b>"A recent addition to Linux's impressive selection of file systems is Ceph, a distributed file system that incorporates replication and fault tolerance while maintaining POSIX compatibility."
Sitting at the heart of every Linux OS distribution is a Linux kernel. When it comes to the upcoming Red Hat Enterprise Linux (RHEL) 6 release, the issue of which kernel is being used is not a cut and dried answer, however.
This article presents some of the changes in Visual Studio 2010 for Visual C++, focusing on new the build system (MSBuild), multi-targeting, IntelliSense and browsing experience.
<b>Netstat -vat:</b> "A year and a half ago, I was among those that celebrated the release of Songbird 1.0 -- a Mozilla based open source music challenger to iTunes."
Looking to protect your e-mail from hackers, especially when you're on the road? For starters, don't use Yahoo. Here are some guidelines to keep your communication secure.
Don’t be fooled by a netbook configuration that sounds, well, run-of the-mill. The HP Mini 5102 tops the company's high-end netbook computers, with a price tag to prove it. Is it worth the price?
<b>The ERACC Web Log:</b> "This is part one of a two part article about a “real life” control system that is a candidate for moving to a VM on Linux. This control system is being used right now in a real manufacturing facility."
Tip of the Trade: There are three major ways of invoking bash, all of which behave differently when reading in settings files. The one to pick depends on the scope and implementation of the settings being changed.
Following months of testing and a long history of security vulnerabilities with its popular Reader and Acrobat products, Adobe is planning to debut its new software update system next week.
Toshiba's 15.6-inch business notebook doesn't skimp on features, with everything from an old-fashioned RS-232 port to facial recognition software, not to mention a fast Core i7 CPU and Nvidia graphics. Does this $1,349 laptop PC have the right stuff to serve as a desktop replacement?