This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

 

Thursday, March 29, 2007

Introduction to Database Driven Development, PHP and MySQL

By Adam Knife
PHP is one of the “scripting languages” of the Web. It is an interpreted language, interpreted by the official PHP interpreter, developed specifically for web programming. Being quite similar to ASP in many ways, chances are a change from ASP to PHP would not be all that difficult for a seasoned developer who was experienced in a C-style language.

PHP, combined with Apache, or another web server handles all the “standard” web serving side of development; it watches for requests, it hands them off to the appropriate handlers, it sends the required headers, and it finalizes the job.

On it’s own, PHP is a language capable of many simple things: date functions, file manipulation, mathematics, logic, all the traditional programming language stuff (including some very feature-filled mechanics for topics such as string manipulation and date manipulation) - but it doesn’t expand in to the power given by database driven web applications. Luckily, there are standard libraries such as the MySQL library, which allow you to easily integrate databases in to your project.

A database is simply that, a collection of data. MySQL is both a relational database server, and query language. It allows users to easily create tables of information, which are sortable by a number of columns, and capable of handling millions of rows of information. Rather impressive when you look at it’s simplicity.

MySQL (pronounced My Sequel) is an implementation of the popular SQL - “structured query language” - don’t worry if you’ve never heard of SQL before - we’ll get there in a later lesson. Information can be stored in a SQL database, and accessed in a range of different ways, manipulated, modified, and stored rapidly.

But wait, why the heck do we want to store our content in a database? Why not just store it in flat files? That’s an easy question. If by flat files, you mean storing it in plain text files and loading it in to a PHP-powered templating system - the database is faster. If by flat files, you mean storing it in HTML files and linking them around, you’ve probably already answered your own question. HTML-only websites are messy, frequently ending up with hundreds of files, each with their own copy of the template, among other things. A simple change for an HTML-only site could take days to implement, where in a PHP-MySQL-powered site it would take minutes.

On top of that, by integrating PHP + MySQL in to your project you open a range of new uses. In the future you could set up a web-service for a software application to contact your database server and get the content, you could sell your database of content, or you could further manipulate the way the content is stored.

The advantages to a database driven, scripting language powered site are numerous, and you shall realize them more and more as you get deeper in to web development.

Adam X. Knife is a professional web developer and author of the new Code Hippo programming "blog"-style site. When he's not writing articles on programming, or developing code himself, he's reviewing laptops or MP3 Players.

Article Source: http://EzineArticles.com/?expert=Adam_Knife

MySQL for Beginners - How to Create a MySQL Database

By Don Beavers
Whether you are an experienced web programmer or a complete novice attempting to provide data interactivity with your web site, MyQSL is an easy to use and free database solution that can allow you to store and configure data to be displayed on your web site.

The best way to create and manage a MySQL database is to download an open source (free) program called PhpMyAdmin. PHPMyAdmin allows you to manage all aspects of both your database structure and data from one easy to use interface. This tool is intended to handle the administration of MySQL over the Web.

This tool provides an interface that allows you to create and drop databases, create, drop, or alter tables, delete, edit, or add fields, execute any SQL statement, manage keys on fields, manage privileges, and import and export data into various formats. That sounds like a complicated set of activities, but the easy to use graphical tools make things quite simple and easy to understand. If you make a mistake, the software even provides instructions on where you made your error.

For a complete demo see: http://www.phpmyadmin.net/phpMyAdmin/
For documentation visit: http://www.phpmyadmin.net/home_page/docs.php

Most Linux based web hosting companies provide PhpMyAdmin as a standard feature with their packages. It is also available in a “Windows” IIS version. If your hosting provider does not already have this product installed they will often install it for you, or even allow you to install it yourself. Setup is quick and easy if you follow the step-by-step installation documentation.

Step One: Creating your new database

When you log in to your PhpMyAdmin welcome page, the first step is to enter a name for your new database in a text box provided. You can name your database anything that you wish, however if you are creating the database to use with a script or software package that you purchased somewhere, the script provider will often suggest a “preferred” database name. You should always create your database using the following format:

username_ databasename
Example: myusername_mydatabase

Your complete database name should always begin with your username followed by an underscore, then followed by the database name. This allows the server to know which user is in control of the new database, and it will also provide permission to access the database to only specific users. This also allows different users on the same server to use the same name for their own database, as you did, without interfering with your data – that is helpful if more than one user on your server bought similar software for their own site. They can then also use the software providers “preferred” database name.

Step Two: Creating a table for your new database

After you have created a database, the next step is to create a table, or even multiple tables, for you to store data. A table is the part of your new database that actually stores data.

You create a table by selecting the database that you created from the drop box list of databases. Once a database is selected a new form appears and asks for you to create a new table.

You must decide what you want to name your table and enter that name into the name box. Try to choose a name that reflects the type of data that will be stored in the table, such as orders, users, or inventory.

You then must decide how many “fields” or columns of data that you want to store for each record. If you need for the table to store five (5) different items, such as username, users email address, users telephone number, users account number, and the users age, than you would need five (5) fields. Simply enter the number 5 in the appropriate box. Once you hit create, the system will create a table and will add those fields into the table for you. Don’t worry about the number of fields you might need right now, as you can always add or delete fields later.

Step Three: Defining Fields

Once you have created your table you will be prompted to tell the database what features that you want each field to have. This looks complicated, but it’s not if you select your data type from the information below. You basically have to decide between three common data types and select the best choice for storing your data. If you make a mistake you can go back and edit the field.

If the field is to be used to store numbers, here are some choices:

TINYINT – A very small integer. The signed range is -128 to 127.
SMALLINT - A small integer. The signed range is -32768 to 32767.
MEDIUMINT - A medium-size integer. The signed range is -8388608 to 8388607.
INT - A normal-size integer. The signed range is -2147483648 to 2147483647.
BIGINT – A very large integer.

Some other less common number options include:

FLOAT- A floating-point number.
DOUBLE – A double-precision floating-point number.
DECIMAL - A packed exact fixed-point number.

If the field is to be used to store text or both text and numbers combined, here are some choices:

VARCHAR is for varying characters and can be up to 255 characters in length.
TEXT is a column with a maximum length of 65,535 characters – easy to search.
BLOB is a column with a maximum length of 65,535 characters – case-sensitive.

If the field is to be used to store dates, here are some choices:

DATE - A date.
DATETIME - date and time combination.
TIMESTAMP - useful for recording the date and time of an INSERT or UPDATE operation.
TIME - A time.

Once you have selected the data type for your fileds you will need to let the system know how many characters that you will need to store in the field.

Example: if you are storing a username, you might want to select VARCHAR as your data type and allow up to 100 characters for that field. If you are creating a User Identification number you might want to select INT and allow up to six characters – that would allow you to have up to 999,999 users.

The last step to creating your data fields is to select any special attributes that you may find helpful. Some examples are:

Auto Increment: Auto-Increment fields are useful for assigning unique identification numbers for users, products, and customers, etc. By default, fields are incremented using number characters (like "1", "2").

Primary Key: The primary key is a data column that uniquely identifies a specific instance of that data. At least one of your fields must be a Primary Key. Username is an example of a good primary key. You do not want to have more than one individual having the same username.

Index Key: Allows you to speed up searches by designating a field as a preferred data source, especially when combining data from multiple tables.

Congratulations, once you have completed these steps you are ready to import data into your new database.

Don Beavers lives in Bryan/College Station, Texas and is an enterprise level PHP-MySQL programmer at both the Shopping Elf Shopping Guide and the Datavor Web Directory.

Article Source: http://EzineArticles.com/?expert=Don_Beavers

Apache, MySQL & PHP for Windows

By Sanjib Ahmad
Apache, MysQL and PHP for Windows could be a nice nice thing to have on your Windows workstation. You could try and experiment with all kinds of nice PHP and MySQL based applications right on your Windows desktop running Apache, instead of having to access a full-featured server.

Most people have Windows as their workstation and it can be sometimes difficult to switch to another operating system. So, you may have always wanted to run PHP applications on your Windows machine but wondered if it is too difficult to install or if the hassle will be worth it.

This article gives you the essential information to get started right away. Even if you are a seasoned PHP, MySQL and Apache guru, the checklist below will still be helpful in your installation process.

There are lots of 3rd party software that bundles Apache, MySQL & PHP in one package and installs them on our computer. We do not recommend this and suggest that you directly get Apache, MySQL & PHP from their official sites.

Apache

1. Get Apache 1.3.33 from here: http://httpd.apache.org/download.cgi.

2. Choose a mirror close to you and in the same page, look for the Win32 Binary (Self extracting) file: apache_1.3.33-win32-x86-no_src.exe.

3. Download the file and save it on your hard disk. Run the installer and the self- extracting wizard will guide you through the rest of the steps. Choose all the default settings and run Apache as a service.

4. Remember to put "localhost" when asked for a Server name/Domain name. Use "administrator@localhost" when asked for the administrative email account.

5. Now point your browser to: http://localhost and you should see an Apache Test Page.

6. You can change this page by creating an "index.html" page here "C:Program FilesApache GroupApachehtdocs".

7. You can manually start and stop the Apache server. In a Windows command prompt, type "net stop apache" or "net start apache".

MySQL

1. Get MySQL 4.1.7 from here: http://dev.mysql.com/downloads/mysql/4.1.html

2. Under the Windows downloads section, choose Windows Essentials (x86) and click on the Pick a Mirror link.

3. Download the file mysql-4.1.7-essential-win.msi and save it on your hard disk. Run the installer and the self-extracting wizard will guide you through the rest of the steps. Remember the root password when prompted for it in the installation process.

4. Once the installation is done, on your Windows toolbar, go to "Start->Programs- >MySQL->MySQL Server 4.1->MySQL Command Line Client".

5. Type the root password and you should be logged in to the MySQL shell.

6. Type "show databases;" to see the list of databases. Type "quit" when you are done.

PHP

1. Get PHP 4.3.10 from here: http://www.php.net/downloads.php

2. Under the Windows Binaries section, choose the file: PHP 4.3.10 zip package size 7,405Kb dated 15 Dec 2004.

3. Download the file and save it on your hard disk. Unzip the file and rename the extracted folder to "php". Now move this folder "php" and place it under "C: Program Files".

4. Move all the files under "C:Program Filesphpdlls" and "C:Program Filesphpsapi" to here: "C:Program Filesphp".

5. Copy the file php.ini-recommended to "C:WINDOWS" and rename it to php.ini

6. Edit your Apache "httpd.conf" configuration file located here: "C:Program FilesApache GroupApacheconf".

7. Add the following lines in httpd.conf:

LoadModule php4_module "C:/Program Files/php/php4apache.dll"
AddModule mod_php4.c
AddType application/x-httpd-php .php

8. Now stop your server by issuing the following command in Windows command prompt: "net stop apache". Then type "net start apache" to start your server. We are now going to test the PHP installation.

9. Go to "C:Program FilesApache GroupApachehtdocs" and create a file test.php

10. Edit test.php and add the following code:

<? php phpinfo(); ?>

11. Point your browser to http://localhost/test.php and you should see a lot of PHP configuration information.

Congratulations! You now have Apache, MySQL and PHP installed in your computer. Now you can install your favorite script right on your Windows workstation.

Sanjib Ahmad, Freelance Writer and Product Consultant for Business.Marc8.com - Business Best Sellers.

You are free to use this article in its entirety as long as you leave all links in place, do not modify the content, and include the resource box listed above.

Article Source: http://EzineArticles.com/?expert=Sanjib_Ahmad

Oracle Introduction

By Sharon White
Oracle Corporation is the number two software company in the world. It was founded in 1986 in USA and now has representatives in about 70 countries all over the world. Its main competitors are Microsoft and IBM. Oracle consists of two businesses: software development and services. Corporation aims to provide its customers with business applications and secure database programs.

This report is prepared with interest of the shareholders as the primary stakeholders in mind. The analysis will try to cover the areas of maximization of the shareholders values.

Investors are mainly interested in liquidity and profitability of a company, what the risk factors are and what key issues the company is facing. How the management plans to handle these issues and what steps they are taking in relation to that. How they use their resources and what is their efficiency in maintaining the resources in the future for their competitive advantage.

On June 9, 2003, Oracle commenced an unsolicited tender offer of approximately $5.1 billion for all the outstanding shares of common stock of PeopleSoft Inc. which is now revised to approximately 7.7 billion. In connection to the tender offer the US dept of justice filed a civil antitrust lawsuit.

Strengths- They have sufficient cash on hand including internally available cash and investments, $1.5 billion revolving credit facility or issuance of securities to pay offer price for all shares in offer.

Weaknesses- There are doubts about the sincerity of the bid and some consider it to be a publicity stunt. PeopleSoft’s CEO Craig Conway is an ex-Oracle employee. He believes that the bid is a plan to wreck PeopleSoft’s business.

Opportunities- It can be a biggest step towards expansion by acquiring PeopleSoft with its large customer base and one of the best application software. It will also remove one of their biggest competitors in the application software business and give them a competitive advantage to other application software competitors.

Threats- If they are not successful in the lawsuit, they won’t be able to acquire PeopleSoft and department’s analysis may impact on their acquiring other companies. This lawsuit could result in substantial cost and divert the attention of the management. Even if they are successful, difficulty in integrating with the core company is a main threat.

4.2 Competition

In their core database business Oracle was having a tough competition with IBM and Microsoft which increased much more due to reduced price and improved quality offerings from competitors and decline in database software market. Oracle is planning to expand in the highly competitive market of application software.

Strengths- They have a high customer base of their database and most of the application providers depend on their database area to base their applications on. Huge cash reserves and plans to invest highly in Research & Development to have competitive advantage.

Weaknesses- Their core business of database software is already past its peak and there has been decline in this business. They don’t have much experience in other areas of software business and the market perception is of a database and tools providing company.

Opportunities- With acquisition of PeopleSoft, Oracle will become No. 2 in the application software business and will have a huge customer base.

Threats- Rapid technology changes and changing customer demands and reduced price offerings of the competitors are major threats facing the company.

The article was produced by the member of masterpapers.com. Sharon White is a senior writer and writers consultant at term papers. Get some useful tips for thesis and term paper writing .

Article Source: http://EzineArticles.com/?expert=Sharon_White

Data Recovery Tips And Tricks

Data loss is a plague that can hit anyone and anytime, regardless of technical prowess, handling care, operating system or hardware configuration. In many cases, data loss is caused by factors that are out of our reach and unfortunately, in some of these cases data recovery is impossible. A burnt out hard disk is the clearest example that comes to mind. It’s often not your fault that it breaks down and data recovery is impossible. This is a rare case still and most data loss problems can be fixed with the help of data recovery tools, professional software, some technical knowledge and a bit of common sense. Let’s go through a few data recovery tips and tricks that might help you recover those accidentally deleted files and keep you from deleting them again.

Backup, backup and more backup!

Constant and organized backup is the only way you can save some data that would be otherwise impossible to recover, due to a physical problem like the one described above. But backing up data is not as easy as it seems at first glance. First of all, you need to organize a backup system, like copying your essential data from your hard disk to CDs, flash disks, DVDs or another external destination.

One thing that will prove very useful is keeping all your data on a small number of different external destinations. If you burn each document or excel file you create on a different disk as backup and you’ll need it later on, there’s two things that can go wrong: A. You won’t find the specific disk within the sea of disks where you keep your backup and B. The disk may get physically damaged itself after a while. Try keeping everything on a single DVD (you can burn data on a disk and leave it open for future burning), assuming 4.7 GB are enough for what most people consider essential data on their computers. Also make a backup for the backup, just in case something bad happens to it, like a spilt can of coffee on the DVD drawer (way more common than you might think!)

Using data recovery software vs. using the services of a professional data recovery company

The decision is yours to make, but unless you absolutely know what you’re doing and know how to use the data recovery software by yourself, it’s best if you employ a professional company to do it for you. Don’t build a technical ego just because you managed to install Windows by yourself, with data recovery, you’ll be dealing with much more sensitive matters. If you fumble up your Windows installation process, you can simply start over. If you accidentally remove every chance of recovering a bunch of files, there’s no turning back.

Use your operating system’s data recovery options

Both Mac and PC operating systems such as OS/X or Windows have built-in data recovery tools that can be helpful in case of logical or human error-related data loss. Sometimes you’ll find them easier to use than professional data recovery software, mainly because they’re built under the same structure as the operating system, so you’re already familiar with the interface. However, in what regards recovery options and efficiency, you can’t compare the standard operating system tools with a professional data recovery program so if your data loss issue is more complex, you’re probably better off using the latter.

Fraser Wheaton is a data recovery expert and owner of the http://www.RecoverMyFile.net website.

We can help get back any file you have deleted or lost.

http://www.RecoverMyFile.net

Article Source: http://EzineArticles.com/?expert=Fraser_Wheaton

Wednesday, March 28, 2007

Error: 'ORA-28547: connection to server failed, probable Net8 admin error'

Error: 'ORA-28547: connection to server failed, probable Net8 admin error'
Any other error indicates that the tnsnames.ora, listener.ora, or both are not correct.

Cause: A failure occurred during initialization of a network connection from a client process to the Oracle server:
The connection was completed but a disconnect occurred while trying to perform protocol-specific initialization, usually due to use of different network protocols by opposite sides of the connection.
This usually is caused by incorrect Oracle Net administrative setup for database links or external procedure calls.
The most frequent specific causes are:

* The connection uses a connect string which refers to a Heterogeneous Services agent instead of an Oracle server.
* The connection uses a connect string which includes an (HS=) specification.


Check Oracle Net administration in the following ways:

* When using TNSNAMES.ORA or an Oracle Names server, make sure that the client connection to the ORACLE server uses the correct service name or SID.
* Check LISTENER.ORA on the connection end point's host machine to assure that this service name or SID refers to the correct server.
* Confirm in TNSNAMES.ORA or the equivalent service definition that the connect string does NOT contain (HS=).

Ref: http://www.dbmotive.com/

Tuesday, March 27, 2007

Using Online Data Storage

By Steven Cancel

Most people don't realize how convenient online data storage really is in these days using email storage services. The benefits for storing excess data online and freeing up space on your own hard drive is becoming a popular trend. Backing up information that could be lost if something is to go wrong on the current storage media is another very common use of online data storage.

Instead of going through a process of sending data from one computer to the next, online data storage makes files easier to access from all around the world. You can backup those pictures and important documents online for free by opening an account with a free online storage provider and access them from any internet connection.

Online data storage is an excellent way to back up files in a place that can always be counted on to find your what you backed up. Internal and external hard drives can't always be counted on for your back up needs. An internal hard drive can simply crash and you will lose all your information you thought was safe forever. An external hard drive can be stolen, or misplaced. This is why online storage sites are becoming more common for the home user and businesses.

Accessibility is everything nowadays. You don't have to go out and buy a huge pack of cds to back up all your material. Online data storage is quick and simple way for the home user or business person to quickly store information and access it at another time with out having to go through the loops of searching for everything on a computer or back up disks. Most websites will allow you to login with a secure password and access your data from anywhere in the world. Have you ever been at work and needed to access a document that would normally be stored on your home computer? This is no longer a problem when taking advantage of the advice provided by this article.

There are many different websites that promise many things when it comes to online data storage. A good way to makes sure the site that you pick is safe and reliable is to read up on the website's history and check reviews by other users that happen to frequent the site for their back up needs. Make sure the usual online subjects are present on the storage website. Also, review the terms and privacy policies to ensure you know where you understand how your data is held.

Protecting your data by backing it up online has never been so easy and free. Be a smart user and keep your important files online for the sake of the data and ease of access.

This article was written for our friends at 30Gigs.com to inform people about online data storage solutions. Article written and distributed by Steve Cancel, IT Manager of Secure Link.

Article Source: http://EzineArticles.com/?expert=Steven_Cancel

Monday, March 26, 2007

The Oracle Hacker's Handbook: Hacking and Defending

by Kalpesh Sharma

Passion or Madness: Now days, it has become a passion to learn about hacking and information security. Sometimes I do not understand that whether it is a passion or a kind of madness. This passion has resulted due to several news articles, media stories and the excitement showing hacking related thrills in films. But, on the other hand there is a fact also that very few peoples know anything in-depth about the topic of hacking and information security. So, I would suggest that without adequate knowledge please do not get mad behind passion. Sometimes this passion may become dangerous from the legal point of view. There is nothing wrong to gain expertise, but there is need to realize a fact about incorrect issues behind hacking. I will come to this topic in depth, later in the same chapter.

Be Alert and Aware: Do you think that hacking is an expert level work? Do you think that information security and hacking are one and same things? If yes! Then you are absolutely wrong. Many children in the age group of 14-16 years are having sufficient knowledge to hack any website or collect important data facts from the internet. So, internet being the big source of information it's a child game to perform hacking related activities. Many hackers whose aim is to just earn money from you, they give seminars and workshops along with misguide you that, "learn hacking in an ethical way for a brilliant career". But, I am not going to explain in this way, to any of you. Instead, I would like to explain the fact in a positive way with a positive attitude. A teacher's task is to show right path to students and not misguide them for gaining their personal benefits. So I would suggest that instead of going for the knowledge of hacking, gain the knowledge by learning something, which is said to be an expert level job. And this expert level job is known as information security expertise in technical terms. Hope you might have understood the difference between hacking (not expert level job) and information security (expert level job) from this topic. So, be alert from such misguidance.

Other then passion, one more side of coin also exists. Many institutes and independent peoples call themselves hacker and/or information security experts. But the reality behind their expertise and skills gets displayed in front of non-technical peoples and the victims who undergo for training, courses, certifications, seminars and workshop with such types of self-claimed hackers or institutes, when such victims and non-technical peoples realize that they are not satisfied for which they have spent time and money. The actual reality behind fooling is that the peoples who undergo for such seminars, workshops, courses, etc. most probably undergo through a psychology that, "the person or institute from which we will receive knowledge during the training sessions is an expert or is providing quality education as he was published by media agencies or that it's a branded name in market for related subject talent or that he is an author of any book". I believe in practical, official and those tasks or actions for which evidence lies in front of my eyes. Thus, I am trying to explain to everyone that always be alert and aware, so that your hardly earned income does not get spend in such unnecessary waste of time.

I will give you my own example here! I have several articles about me in various newspapers and media agencies, but this doesn't mean that I am showing you the right path or that I am an expert. For example may be possible that I am a hacker, but this does not prove that I am an expert. So, expert level job is a totally different matter. The explanation about difference between hacking and expertise will come in next chapters So, first check out the level of my knowledge, how much practically I am able to prove my expertise, whether I am official & legal while undergoing for such tasks and finally the evidence part that whatever actions I undertake are proved right in front of eyes, instead of just talking theoretically. Always confirm yourself first, that you are learning with right person or institute or just wasting your time and money. May be possible that peoples might be receiving fees from you and in turn give you the knowledge of something(any other subject or topic about information technology field), which is not even single percent part of hacking or information security related topics. This happens most probably with non-technical peoples or fresher in information technology field.

False Publicity: Secondly, confirm that you are at least gaining the knowledge up to a level for which you have paid a particular amount. Don't just go behind false publicities before you confirm yourself and your inner feelings say that you are moving on right path. As concerns to book publishers, media agencies and films, I would like to confirm that none of them might be having full and fledge technical knowledge about information security field as concerns to my knowledge. It's similar to following examples on me:

A person comes and tells me that you are an expert please suggest me some medicines which can eradicate my serious disease of cancer. I am a technical professional and not a biological professional who is going to solve this problem. A person comes and tells me that suggest a good lawyer who can defend my case in court. Now tell me how do I give suggestion as to which lawyer can prove this person innocent in court of law. Thus, I can't do anything or have any knowledge about any field which is not my subject or area of work. Similarly, even media peoples, book publishers and film makers does not have adequate or complete knowledge and they believe the statement to be true which is explained to them by many misguiding self-claimed hackers and/or reputed institutes. So, these peoples are also not responsible for some of these kinds of activities published by them on any medium.

Language Troubling: There is one more part of cheating called use of useless and complicated language in order to misguide students and especially technically sound professionals. This is a very intelligent part of stunt used by many self claimed security peoples to misguide others. Usually when any self claimed hacker or institute doesn't know anything about complicated or expert level topic, and in such situation they want to include expert level topics in their study material without having any expert level knowledge; such peoples use very complicated words of English and prepare the contents in such a manner that it becomes very difficult to understand even for the persons who are fluent in English. A very complicated coding and useless technical terms are used in their study material, so that the victims cannot understand or claim against such self claimed hackers and so called specialized institutes, in a legal way. When any victim (user of such material) goes through such study materials and courses as well as certifications, they become helpless to understand such complicated and misguiding language, filled up of useless and non-understandable technical terms. Now, when they don't understand anything the common psychology of such victims understands that, "it's a part of expert level work and that's why they are unable to understand the matter or that he won't be able to complete this job successfully as he is not talented" and so on. In this way, the victims think themselves responsible for not understanding the expert level work. But they do not know that they have never been taught anything, which can be called an expert level education or job. This is what I am trying to explain you that it is not your fault, instead it is a stunt used by such self claimed hackers and institutes who tries to sell their services and materials by misguiding others with the help of language troubling. So here also there is a need to be aware and alert of any services or material offered by any self claimed hacker and specialized institutions. They just have an intention of earning a huge amount from you and do not have any feelings for the information security field, students or the nation in any way. This is the reason they use difficult word, complicated terms and technical coding in order misguide others so that no one knows about their level of their knowledge.

Finally: Thus, finally the topics should be very clear that

Don't get mad behind passion and be serious about legal activities. Be alert that you are receiving right knowledge for which you have paid. Be aware of what you are undergoing for is the right one for which you have paid and that too join after checking out. Be practical, official and believe only that which happens only in front of your eyes. You should have the guts to demand for evidence. Check the simplification of language used in the study material whether you can go through it and understand it or not, before purchasing any services or materials from self claimed hackers or so called expert level institutes which claims to be specialized in information security area. Try to understand the difference between a truth and a false, correct and incorrect, etc. by going in depth about every fact related to services, products or materials you are offered by any self claimed hacker or so called specialized institutes. Even if this is in my case, first check out with my study material, then get into the depth of my work background and then only purchase any services, products or material offered by me or on behalf of me. Don't get misguided behind media hype or false publicity of any person or institute without checking through it.

Kalpesh M. Sharma 6, Shri Ram Park Society, On Chandola Canal, Near Jawahar Chowk, Maninagar, Ahmedabad-380 008 (Gujarat) Tel. (Res.) +91-79-25351208 Email: shrishanidev@yahoo.co.in Security Site - www.kalpeshsharma.page.tl

Saturday, March 24, 2007

Oracle’s History

1977
Relational Software Inc. (RSI - currently Oracle Corporation) established
1978
Oracle V1 ran on PDP-11 under RSX, 128 KB max memory. Written in assembly language. Implementation separated Oracle code and user code. Oracle V1 was never officially released.
1980
Oracle V2 released - the first commercially available relational database to use SQL. Oracle runs on on DEC PDP-11 machines. Coide is still written in PDP-11 assembly language, but now ran under Vax/VMS.
1982
Oracle V3 released, Oracle became the first DBMS to run on mainframes, minicomputers, and PC’s (portable codebase).First release to employ transactional processing.Oracle V3’s server code was written in C.
1983
Relational Software Inc. changed its name to Oracle Corporation.
1984
Oracle V4 released, introduced read consistency, was ported to multiple platforms, first interoperability between PC and server.
1986
Oracle V5 released. Featured true client/server, VAX-cluster support, and distributed queries. (first DBMS with distributed capabilities).
1987
CASE and 4GL toolset
1988
Oracle V6 released - PL/SQL introduced.Oracle Financial Applications built on relational database.
1989
Released Oracle 6.2 with Symmetric cluster access using the Oracle Parallel Server
1991
Reached power of 1,000 TPS on a parallel computing machine.First database to run on a massively parallel computer (Oracle Parallel Server).
1992
Released Oracle7 for Unix
1993
Rollout of Oracle’s Cooperative Development Environment (CDE).Introduction of Oracle Industries and the Oracle Media Server.
1994
Oracle’s headquarters moved to present location.Released Oracle 7.1 and Oracle7 for the PC.
1995
Reported gross revenues of almost $3 billion.
1995
OraFAQ.com website launched.
1997
Oracle8 released (supports more users, more data, higher availability, and object-relational features)
1998
Oracle announces support for the Intel Linux operating system
1999
Oracle8i (the “i” is for internet) or Oracle 8.1.5 with Java integration (JVM in the database)
2000
Oracle8i Release 2 releasedOracle now not only the number one in Databases but also in ERP ApplicationsOracle9i Application Server generally available: Oracle tools integrated in middle tier
2001
Oracle9i Release 1 (with RAC and Advanced Analytic Service)
2002
Oracle9i Release 2
2004
Oracle10g Release 1 (10.1.0) available (”g” is for grid, the latest buzzword)
2005
The Oracle FAQ (this site) is 10 years old!Oracle10g Release 2 (10.2.0) available
Oracle release a free version of their database, Oracle XE (Express Edition)

ref: http://orafaq.com/faq/what_is_oracles_history

Friday, March 23, 2007

Oracle 11g PL/SQL New Features

  • PL/SQL "continue" keyword - This will allow a C-Like continue in a loop, to bypass any "else" Boolean conditions. A nasty PL/SQL GOTO is no longer required to exit a Boolean within a loop.

  • Disabled state for PL/SQL - Another 11g new feature is a "disabled" state for PL/SQL (as opposed to "enabled" and "invalid" in dba_objects).

  • Easy PL/SQL compiling - Native Compilation no longer requires a C compiler to compile your PL/SQL. Your code goes directly to a shared library. Source: Lewis Cunningham

  • Improved PL/SQL stored procedure invalidation mechanism - A new 11g features will be fine grained dependency tracking, reducing the number of objects which become invalid as a result of DDL.

  • Scalable PL/SQL - The next scalable execution feature is automatic creation of "native" PL/SQL (and Java code), with just one parameter for each type with an "on/off" value. This apparently provides a 100% performance boost for pure PL/SQL code, and a 10%-30% performance boost for code containing SQL. Mark Rittman

  • Enhanced PL/SQL warnings - The 11g PL/SQL compiler will issue a warning for a "when others" with no raise.

  • Stored Procedure named notation - Named notation is now supported when calling a stored procedure from SQL.

  • Source : http://www.dba-oracle.com/oracle11g/oracle_11g_new_features.htm
  • By : Burleson Consulting

Thursday, March 22, 2007

Oracle Development: JDeveloper 10G – Java, J2EE, EJB, MVC, XML - overview for programmer

by: Boris Makushkin

In 2004 Oracle, Inc. made its new step toward J2EE application development simplification, releasing new RAD Oracle JDeveloper 10G. First of all JDeveloper 10G is targeted to rapid web application building, utilizing all the achievements of J2EE World: web service, EJB, MVC frameworks, XML, etc. Oracle JDeveloper 10G allows you to conduct all full development cycle for complex system – from UML diagram-based concept to debugging, profiling and deployment.

Let’s look at the product main features а:

1. Cross-platform (works under main Unix/Linux platforms and in Microsoft Windows environment) friendly development environment with high level of integration and third party plug-ins switching on. Syntax highlighting, re-factoring, transparent work with RDBMS, bi-directional code generation between UML models, EJB models, required J2EE patterns generation with one click of the button, visual web application builders and other capabilities open the doors for developer, who had never before being dreaming to create industrial-strength J2EE application!

2. PL/SQL stored procedures development and testing, plus integration with major database platforms – Oracle, Sybase, MS SQL Server etc. via JDBC mechanism.

3. Deployment capability for all major application servers – Oracle Application Server, IBM WebSphere, BEA WebLogic, JBoss. OC4J – J2EE container comes with this environment, which perfectly fits for application development and testing.

4. Oracle JDeveloper 10G provides possibility to realize persistent layer for applications on the ADF component base, EJB components or O/R Mapper – TopLink, which is also included.

5. Team Development feature with interoperability with major VCS systems – CVS, Rational ClearCase, Oracle SCM

6. Oracle JDeveloper 10G unique feature is utilization of Oracle ADF (Application Developer Framework) – MVC realization, enabling rapid J2EE application development. View Layer makes it possible to build applications for data exposure as for thin clients, based on web browser viewing, as well as for rich client and even wireless. Controller Layer is built on Jakarta Apache project platform – popular Open Source framework Struts. Business Components Layer may be realized with various technologies - Java POJO, Oracle ADF Components, WebServices, EJB or Oracle TopLink Objects

7. At this moment (December 2004) Oracle is testing new version - Oracle JDeveloper 10g (10.1.3) Developer Preview. The new features of this new version will be completely redesigned user interface, additional re-factoring capabilities, advanced UML diagrams features, web services simplified creation, support for the web application building on Java Server Faces base, complete support for J2EE 1.4 specification, ADF Faces – JSF components and others.

8. You can get production and developer preview for Oracle JDeveloper 10G here http://www.oracle.com/technology/products/jdev/index.html

Wednesday, March 21, 2007

Oracle E-Business Suite Customization & Integration: New Directions

by: Riccardo Lanzuolo

ou probably have heard about the new directions of Oracle concern on Java and J2EE Technology. Oracle has announced the commitment with Java and also kept the “traditional development tools” community happy, promising they will continue to invest on them. But at the same time, Oracle recommends to their E-Business customers the following strategies (have a look at the Oracle Statement of Direction at http://www.oracle.com/technology/products/forms/pdf/10g/ToolsSOD.pdf):

• Move from client-server to the Web

• Upgrade to the latest versions

• Interoperate with Java/J2EE

• Develop new modules using JDeveloper

It’s clear that Oracle is aligning everything to Java and also recommending its customers to do just the same. So, it becomes very important to the customers to also adhere to the same technology. This will guarantee its investments at the long run. If you consider that Java Technology is the choice of many IT companies, like IBM, Sun, and Oracle itself, and also that the market is recognizing (maketshare, downloads, highest growth) its benefits, this will be a good movement.

It does not mean you need to change everything to Java: it is just a recommendation that the new modules could be done using Java. Oracle E-Business will run Forms for a long time. Oracle itself has not converted the entire E-Business itself to Java, and this will probably take a long time. Remember, they still have PeopleSoft, JDEdwards, Retek and now Siebel, a recent agreement on acquisition. They will “fuse” all in one architecture call “Fusion”.

Well, if your company has not written any application in Java yet, it is time to start. The next articles will focus on this technology, its principles and, mainly, the strategy the E-Business customers should take.


Wednesday, March 14, 2007

Welcome to my blog

Hi there, welcome aboard to my blog and also the database world. Let warm up with the definition of blog (web log) here what I found on my dictionary : “A shared on-line journal where people can post daily entries about their personal experiences and hobbies.” (ref: wordweb dictionary) . Ok let get back to database.

Oracle is one of the best database used globally, that is one of the reason why I choose to write about oracle. The official site of oracle for some oracle newbie is http://www.oracle.com. The latest version of oracle is 10g but 11g is coming out soon, here is a brief history of oracle

“Way back in June 1970, Dr E F Codd published a paper entitled A Relational Model of Data for Large Shared Data Banks. This relational model, sponsored by IBM, then came to be accepted as the definitive model for relational database management systems – RDBMS. The language developed by IBM to manipulate the data stored within Codd’s model was originally called Structured English Query Language, or SEQUEL, with the word ‘English’ later being dropped in favor Structured Query Language – SQL.

In 1979 a company called Relational Software, Inc. released the first commercially available implementation of SQL. Relational Software later came to be known as Oracle Corporation.” (ref: http://www.vbip.com/books/1861003927/chapter_3927_02.asp.)

to be continue….