This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

 

Monday, September 3, 2007

Oracle Database 11g:The Top New Features for DBAs and Developers

Database Replay


Explore Database Replay, the new tool that captures SQL statements and lets you replay them at will.


Partitioning


Learn about Referential, Internal, and Virtual Column partitioning; new sub-partitioning options; and more.

Schema Management


Add columns with a default value easily and explore invisible indexes, virtual columns, and read only tables.


SQL Performance Analyzer


Accurately assess the impact of rewriting of SQL statements and get suggested improvements.


SQL Access Advisor


Get advice about optimal table design based on actual use of the table, not just data.


Transaction Management


Get an introduction to Flashback Data Archive and explore EM's Log Miner interface.

SQL Plan Management


Learn how to baseline and compare optimizer plans and then choose the best one.


SQL Repair Advisor


Explore how to use SQL Repair Advisor to identify problematic SQL statements and gather diagnostic information.


Manageability Features


Explore automatic memory management, multicolumn statistics, online patching, and more features.


PL/SQL: Coding


Avoid unneeded invalidation during changes, track null exceptions, interchange cursors, and more.

Security

Learn about Tablespace Encryption, case-sensitive passwords, data masking, and other features.


Result Cache

Don't go to the database if data has not changed. Use result cache instead, both in SQL and PL/SQL.


Resiliency


Explore Automatic Health Monitor, Automatic Diagnostic Repository, and other new resiliency features.


SQL Operations: Pivot and Unpivot
Make creating pivot operation on tables a breeze using new keywords.


ASM Improvements


Learn about variable AU sizing, rolling upgrades, and node affinity in RAC environments, among other things.


SecureFiles


Explore next-generation LOBs: LOB encryption, compression, de-duplication, and asynchronicity.

Data Guard Improvements


Query the physical standby database in real time without shutting down recovery, just for starters.


PL/SQL: Performance

Explore in-lining of code, native compilation without C compiler, PLS timer, use of simple integer, and more.

RMAN Improvements


Explore Data Recovery Advisor, Virtual Private Catalog, parallel backup of the same datafile, and other features.


Other...

COPY command, Export/Imports, Data Pump improvements, PHP Connection Pooling, and more.


more information click here

Tuesday, July 10, 2007

Proxy List

Here are the proxy server with it port ( Transparent proxy)
195.175.37.70:8080
201.245.28.74:8080
201.28.44.10:3128
201.72.179.3:3128
202.106.62.117:80
202.155.4.114:3128
202.63.233.8:8080
203.160.1.45:553
203.199.198.232:3128
209.149.181.5:80
209.202.137.35:80
210.212.95.99:8080
211.140.192.98:8080
222.124.11.218:3128
58.211.234.194:3128
58.22.97.55:8080
58.26.9.158:3128
59.145.72.6:8080
60.173.7.17:80
60.248.186.136:3128
60.52.117.19:3128
61.184.196.162:8080
61.220.150.2:3128
61.47.19.211:8080
71.230.108.90:3128
80.36.58.71:8080
81.10.57.186:3128
81.7.87.242:3128
83.238.44.49:8080
84.19.177.62:8080
85.199.0.2:3128
86.107.212.10:3128
87.118.106.214:3128
87.197.51.90:3128
84.19.176.62:8080
62.173.116.73:80
62.75.159.159:8080
72.29.108.81:80
64.34.199.36:80
82.225.163.158:3128
64.200.180.169:80
66.118.220.27:80
61.91.30.62:3128
200.211.233.131:3128 WORK
203.160.1.146:554
203.160.1.146:553
219.93.182.99:3128
75.63.143.140:3128
200.149.1.100:80
200.149.1.100:3128
200.211.233.132:3128
219.93.83.126:8080
222.124.142.89:6588
64.79.160.177:80
63.109.247.193:80
80.58.205.61:80
59.120.36.85:3128
201.34.32.44:3128
201.2.35.6:8080
200.175.156.173:3128
200.206.131.82:3128
200.171.124.197:3128
200.161.3.60:3128
69.60.127.20:80
210.212.95.100:8080
83.133.119.38:8080
85.185.16.126:8080
220.225.18.147:8080
212.122.243.2:3128
140.110.17.218:3128
200.254.105.131:3128
82.207.44.14:3128
201.23.203.233:3128
201.90.65.5:3128
200.193.144.138:80
193.220.51.5:8080
195.112.212.186:3128
218.7.48.22:8080
202.82.116.26:3128
193.255.143.6:8080
193.69.167.132:8080
195.8.178.100:8080
200.87.6.19:3128
61.135.153.116:8080
202.146.91.196:8080
195.175.37.71:8080
195.175.37.8:8080
195.175.37.6:8080
66.98.238.8:3128
195.175.37.71:80
65.243.68.184:80
62.150.76.250:80
195.175.37.8:80
64.56.191.191:80
64.56.191.222:80
64.56.191.221:80
60.173.7.17:3128
219.235.232.240:3128
164.58.221.238:3128
200.241.108.198:3128
200.141.141.193:8080




200.88.125.9:8008
72.29.108.81:80
213.16.20.140:3128
200.103.18.29:3128
64.34.199.36:80
84.19.177.62:8080
202.163.200.153:80
84.19.176.62:8080
66.54.171.210:80
202.155.4.114:3128
201.36.165.130:3128
201.17.147.71:3128
203.160.1.146:553
213.163.31.253:3128
203.198.69.125:3128
203.198.69.124:3128
203.198.69.123:3128
219.87.129.180:3128
64.200.180.169:80
203.26.206.131:553
81.8.231.130:3128
201.12.137.221:3128
69.244.185.39:8217
203.26.206.130:553
84.17.228.113:8080
69.88.144.163:80
81.7.87.242:3128
64.79.160.177:80
80.58.205.61:80
59.120.36.85:3128
219.87.129.186:3128
217.156.89.185:8080
213.4.106.85:8080
210.211.217.78:3128
203.185.44.56:8080
203.154.86.170:8080
200.206.131.82:3128
200.181.55.100:8080
200.171.124.197:3128
200.161.3.60:3128
200.101.52.50:8080
69.60.127.20:80
209.190.240.18:80
65.243.68.184:80
64.56.191.222:80
64.56.191.221:80
64.56.191.191:80
211.48.62.46:80
203.116.61.164:80
200.96.11.121:80
200.118.2.164:80
195.175.37.8:80
195.175.37.71:80
195.175.37.70:80
144.140.22.190:80
193.63.43.10:8080
61.47.19.215:8080
200.87.120.46:8080
220.227.171.147:8080
195.175.37.8:8080
202.146.91.196:8080
195.175.37.70:8080
195.175.37.71:8080
61.135.153.116:8080
202.52.242.69:8080
159.148.29.62:8080
222.124.206.43:8080
212.92.18.12:8080
203.116.61.164:8080
195.175.37.6:8080
63.118.235.195:8080
202.28.186.3:8080
202.69.140.10:8080
210.212.95.103:8080
61.81.185.103:8080
222.124.193.82:8080
222.255.69.42:8080
201.25.52.10:8080
61.19.25.163:3128
220.227.141.153:3128
221.226.124.123:3128
58.216.235.242:3128
200.216.119.138:3128
66.98.238.8:3128
200.210.115.100:3128
61.146.114.237:3128
200.253.116.3:3128
210.212.156.14:3128
61.19.23.226:3128
200.203.94.49:3128
201.57.66.2:3128
210.72.99.19:3128

Proxy List

195.175.37.70:8080
201.245.28.74:8080
201.28.44.10:3128
201.72.179.3:3128
202.106.62.117:80
202.155.4.114:3128
202.63.233.8:8080
203.160.1.45:553
203.199.198.232:3128
209.149.181.5:80
209.202.137.35:80
210.212.95.99:8080
211.140.192.98:8080
222.124.11.218:3128
58.211.234.194:3128
58.22.97.55:8080
58.26.9.158:3128
59.145.72.6:8080
60.173.7.17:80
60.248.186.136:3128
60.52.117.19:3128
61.184.196.162:8080
61.220.150.2:3128
61.47.19.211:8080
71.230.108.90:3128
80.36.58.71:8080
81.10.57.186:3128
81.7.87.242:3128
83.238.44.49:8080
84.19.177.62:8080
85.199.0.2:3128
86.107.212.10:3128
87.118.106.214:3128
87.197.51.90:3128
84.19.176.62:8080
62.173.116.73:80
62.75.159.159:8080
72.29.108.81:80
64.34.199.36:80
82.225.163.158:3128
64.200.180.169:80
66.118.220.27:80
61.91.30.62:3128
200.211.233.131:3128 WORK
203.160.1.146:554
203.160.1.146:553
219.93.182.99:3128
75.63.143.140:3128
200.149.1.100:80
200.149.1.100:3128
200.211.233.132:3128
219.93.83.126:8080
222.124.142.89:6588
64.79.160.177:80
63.109.247.193:80
80.58.205.61:80
59.120.36.85:3128
201.34.32.44:3128
201.2.35.6:8080
200.175.156.173:3128
200.206.131.82:3128
200.171.124.197:3128
200.161.3.60:3128
69.60.127.20:80
210.212.95.100:8080
83.133.119.38:8080
85.185.16.126:8080
220.225.18.147:8080
212.122.243.2:3128
140.110.17.218:3128
200.254.105.131:3128
82.207.44.14:3128
201.23.203.233:3128
201.90.65.5:3128
200.193.144.138:80
193.220.51.5:8080
195.112.212.186:3128
218.7.48.22:8080
202.82.116.26:3128
193.255.143.6:8080
193.69.167.132:8080
195.8.178.100:8080
200.87.6.19:3128
61.135.153.116:8080
202.146.91.196:8080
195.175.37.71:8080
195.175.37.8:8080
195.175.37.6:8080
66.98.238.8:3128
195.175.37.71:80
65.243.68.184:80
62.150.76.250:80
195.175.37.8:80
64.56.191.191:80
64.56.191.222:80
64.56.191.221:80
60.173.7.17:3128
219.235.232.240:3128
164.58.221.238:3128
200.241.108.198:3128
200.141.141.193:8080




200.88.125.9:8008
72.29.108.81:80
213.16.20.140:3128
200.103.18.29:3128
64.34.199.36:80
84.19.177.62:8080
202.163.200.153:80
84.19.176.62:8080
66.54.171.210:80
202.155.4.114:3128
201.36.165.130:3128
201.17.147.71:3128
203.160.1.146:553
213.163.31.253:3128
203.198.69.125:3128
203.198.69.124:3128
203.198.69.123:3128
219.87.129.180:3128
64.200.180.169:80
203.26.206.131:553
81.8.231.130:3128
201.12.137.221:3128
69.244.185.39:8217
203.26.206.130:553
84.17.228.113:8080
69.88.144.163:80
81.7.87.242:3128
64.79.160.177:80
80.58.205.61:80
59.120.36.85:3128
219.87.129.186:3128
217.156.89.185:8080
213.4.106.85:8080
210.211.217.78:3128
203.185.44.56:8080
203.154.86.170:8080
200.206.131.82:3128
200.181.55.100:8080
200.171.124.197:3128
200.161.3.60:3128
200.101.52.50:8080
69.60.127.20:80
209.190.240.18:80
65.243.68.184:80
64.56.191.222:80
64.56.191.221:80
64.56.191.191:80
211.48.62.46:80
203.116.61.164:80
200.96.11.121:80
200.118.2.164:80
195.175.37.8:80
195.175.37.71:80
195.175.37.70:80
144.140.22.190:80
193.63.43.10:8080
61.47.19.215:8080
200.87.120.46:8080
220.227.171.147:8080
195.175.37.8:8080
202.146.91.196:8080
195.175.37.70:8080
195.175.37.71:8080
61.135.153.116:8080
202.52.242.69:8080
159.148.29.62:8080
222.124.206.43:8080
212.92.18.12:8080
203.116.61.164:8080
195.175.37.6:8080
63.118.235.195:8080
202.28.186.3:8080
202.69.140.10:8080
210.212.95.103:8080
61.81.185.103:8080
222.124.193.82:8080
222.255.69.42:8080
201.25.52.10:8080
61.19.25.163:3128
220.227.141.153:3128
221.226.124.123:3128
58.216.235.242:3128
200.216.119.138:3128
66.98.238.8:3128
200.210.115.100:3128
61.146.114.237:3128
200.253.116.3:3128
210.212.156.14:3128
61.19.23.226:3128
200.203.94.49:3128
201.57.66.2:3128
210.72.99.19:3128

Tuesday, July 3, 2007

Oracle Default Port

When you first installed oracle, if you haven't changed the port number, the default listening port is 1521. But for the security issue, if you are serious about it, this should be changed to something else. There would be one more step for client setup, you need to specify what port number to connect to your oracle dba server. Which maybe a bit annoying, so most people would leave it as a default option.

Trojan port list

This summary is not available. Please click here to view the post.

Tuesday, May 15, 2007

Simple Oracle Auditing

Oracle's RDBMS is a functionally rich product and there are a number of auditing alternatives available to the reader. Because auditing Oracle is such a huge subject, doing all of it justice would take an entire book, so this paper will cover the basics of why, when and how to conduct an audit. It will also use a couple of good example cases to illustrate how useful Oracle audit can be to an organization.....
read more here http://www.securityfocus.com/infocus/1689

Sunday, April 15, 2007

Oracle 11g security & auditing new features

  • Enhanced Password - Pete Finnigan notes some new Oracle 11g security features "[Oracle 11g] will have case sensitive passwords and also the password algorithm has changed to SHA-1 instead of the old DES based hashing used."


  • Oracle SecureFiles - replacement for LOBs that are faster than Unix files to read/write. Lots of potential benefit for OLAP analytic workspaces, as the LOBs used to hold AWs have historically been slower to write to than the old Express .db files. Mark Rittman Securefiles are a huge improvement to BLOB data types. Faster, with compression, encryption. Source: Laurent Schneider


  • Oracle 11g audit vault - Oracle Audit Vault is a new feature that will provide a solution to help customers address the most difficult security problems remaining today, protecting against insider threat and meeting regulatory compliance requirements.


  • Proxy connect for SQL*Plus - New with 10r2 proxy identification in SQL*Plus, the "connect" command has been enhanced to allow for a "proxy", to aid applications that always connect with the same user ID:

    connect sapr3[scott]/tiger


  • FGAC for UTL_SMTP, UTL_TCP and UTL_HTTP. You can define security on ports and URLs. Source: Lewis Cunningham


  • Fine Grained Dependency Tracking (FGDT). This means that when you add a column to a table, or a cursor to a package spec, you don't invalidate objects that are dependant on them. Sweet! Source: Lewis Cunningham


  • Database Workload Replay - Oracle "Replay" allows the total database workload to be captured, transferred to a test database created from a backup or standby database, then replayed to test the affects of an upgrade or system change. Currently, they are working to a capture performance overhead of 5%, so you could conceivably capture real production workloads. Source: Dr. Tim Hall


  • Source: http://www.dba-oracle.com/oracle11g/oracle_11g_new_features.htm#security

    Sunday, April 8, 2007

    Database Administrator Jobs

    Database Administrator Jobs

    As the new database dependent systems have been increasing in the recent years, the necessity of appointing a Database Administrator has become evident in the corporate field. The database administrator is the one who is responsible for the integrity and security of the database systems that are used in the corporate offices.

    The major responsibilities if a database administrator are Recoverability, Integrity, Security, Availability, Performance, Development and Testing Support of the database system.

    A database administrator is responsible for the following aspects of Data base: He will be responsible for creating and testing backups and verifying the integrity of the data. A database administrator needs to provide maximum performance with the available budget. He should know to use the budget in an economic way and at the same time he should also extract maximum benefits from it.

    The administrator needs to help the program engineers in utilizing the database fully. Administrator needs to ensure the security of the system with the implementation of access control to the data.

    Database administrator will be involved in the works of database designing, implementation and monitoring, tuning and troubleshooting assignments. Different types of companies will hire or appoint the candidates according to their knowledge on different databases which the company is working with.

    The companies which appoint the database administrator need him to work for the development of new database systems, along with providing security for the existing database systems. The new database he develops should meet the quality standards of the company. Organizations seek the applicant who applies for the post of database administrator to have an experience of 3 to 5 years in the field in a corporate environment.

    The candidate should know to work with the technologies like: Oracle (8i to 9i release 2) Oracle Forms (4.5) Oracle Reports (2.5) SQL Server (7, 2000).

    Though development and testing support are commonly done works by a database administrator, he should not think it as his or her least important duty. Because, managers, with a result-oriented mindset, consider the development and testing support, that includes the collection of sample production data to test the changed and new program, as the most important duty to be performed by the database administrators.

    This job is very challenging as there are opportunities like working in different systems like corporate business, geographic information systems, internet and intranet. The corporate business includes human resource, finance and others. KoreOne is taking part of recruitment of database administrative positions for reputed IT firms.
    By: Shakir A
    Source: http://www.goarticles.com/cgi-bin/showa.cgi?C=442886

    Saturday, April 7, 2007

    Oracle Database Administration

    Oracle Database Administration

    Oracle Database Administrators are responsible for administering Oracle Database servers and the phenomenon is called Oracle Database Administration. Each oracle database requires at least one Database Administrator (DBA) to administer it as an Oracle database can be large and can have many users. The types of Oracle users and their roles and responsibilities vary from site to site. A small site can have one database administrator who administers the database for application developers and users. A very large site can find it necessary to divide the duties of a database administrator among several people, and among several areas of specialization.

    A database administrator is held responsible for installing and upgrading the Oracle server and application tools. The DBA allocates the system storage and plans the future storage requirements for the database system. The responsibility of a DBA is to create primary database storage structure after designing an application and create primary objects once the application is designed. The DBA modifies the database structure according to the information given by the developers and enrolls users and maintain system security. The administrator ensures the compliance with the Oracle License Agreement and control and maintains user access to the database. The performance of the database is then monitored and optimized. The DBA plans for backup and recovery of database information, maintain archive data on tape, and take regular backups and restore the database. For troubleshooting, the DBA should contact the Oracle Corporation.

    The fundamental task of Oracle Database Administrator is to evaluate the database server hardware. The evaluation should reveal the information about the number of disk drives available to Oracle and its databases, to ensure if any dedicated tape drives are available to Oracle and its databases, and inspect the memory available for running Oracle. The database administrator should install the Oracle database server software and other front-end tools and database applications that access the database. The database administrator plans the database for logical storage structure of the database, overall database design, and a backup strategy for the database. After the designing the database, the administrator should open and create the database for normal use. The database can be created at the installation time, using the Database Configuration Assistant. The DBA should take a backup of the database structure and carry out the backup strategy planned for the database. After the backup of the database structure, the administrator should enroll the system users of the database according to the Oracle license agreement. The other tasks of a DBA are to implement the database design, backup the fully functional database and tune database performance.

    KoreOne is a leading job provider for skilled Oracle Database Administrators capable enough to handle large databases of various companies.
    Written By: Shakir A
    Ref: http://www.goarticles.com/cgi-bin/showa.cgi?C=445132

    Monday, April 2, 2007

    Microsoft OLE DB Provider for ODBC Drivers error '80004005' Specified driver could not be loaded due to system error 5 (Oracle in OraHome92).

    Solution Description
    --------------------

    Oracle 9.2 Client software requires that you give the Authenticated User
    privilege to the Oracle Home by following these steps:

    1. Log on to Windows as a user with Administrator privileges.

    2. Launch Windows Explorer from the Start Menu and and navigate to the
    ORACLE_HOME folder. This is typically the "Ora92" folder under the
    "Oracle" folder (i.e. D:\Oracle\Ora92).

    3. Right-click on the ORACLE_HOME folder and choose the "Properties" option
    from the drop down list. A "Properties" window should appear.

    4. Click on the "Security" tab of the "Properties" window.

    5. Click on "Authenticated Users" item in the "Name" list (on Windows XP
    the "Name" list is called "Group or user names").

    6. Uncheck the "Read and Execute" box in the "Permissions" list under the
    "Allow" column (on Windows XP the "Permissions" list is called
    "Permissions for Authenticated Users").

    7. Re-check the "Read and Execute" box under the "Allow" column (this is
    the box you just unchecked).

    8. Click the "Advanced" button and in the "Permission Entries" list make
    sure you see the "Authenticated Users" listed there with:

    Permission = Read & Execute
    Apply To = This folder, subfolders and files

    If this is NOT the case, edit that line and make sure the "Apply onto"
    drop-down box is set to "This folder, subfolders and files". This
    should already be set properly but it is important that you verify this.

    9. Click the "Ok" button until you close out all of the security properties
    windows. The cursor may present the hour glass for a few seconds as it
    applies the permissions you just changed to all subfolders and files.

    10. Reboot your computer to assure that these changes have taken effect.


    Re-execute the application and it should now work.

    ref: http://www.ureader.com/message/451160.aspx

    Thursday, March 29, 2007

    Introduction to Database Driven Development, PHP and MySQL

    By Adam Knife
    PHP is one of the “scripting languages” of the Web. It is an interpreted language, interpreted by the official PHP interpreter, developed specifically for web programming. Being quite similar to ASP in many ways, chances are a change from ASP to PHP would not be all that difficult for a seasoned developer who was experienced in a C-style language.

    PHP, combined with Apache, or another web server handles all the “standard” web serving side of development; it watches for requests, it hands them off to the appropriate handlers, it sends the required headers, and it finalizes the job.

    On it’s own, PHP is a language capable of many simple things: date functions, file manipulation, mathematics, logic, all the traditional programming language stuff (including some very feature-filled mechanics for topics such as string manipulation and date manipulation) - but it doesn’t expand in to the power given by database driven web applications. Luckily, there are standard libraries such as the MySQL library, which allow you to easily integrate databases in to your project.

    A database is simply that, a collection of data. MySQL is both a relational database server, and query language. It allows users to easily create tables of information, which are sortable by a number of columns, and capable of handling millions of rows of information. Rather impressive when you look at it’s simplicity.

    MySQL (pronounced My Sequel) is an implementation of the popular SQL - “structured query language” - don’t worry if you’ve never heard of SQL before - we’ll get there in a later lesson. Information can be stored in a SQL database, and accessed in a range of different ways, manipulated, modified, and stored rapidly.

    But wait, why the heck do we want to store our content in a database? Why not just store it in flat files? That’s an easy question. If by flat files, you mean storing it in plain text files and loading it in to a PHP-powered templating system - the database is faster. If by flat files, you mean storing it in HTML files and linking them around, you’ve probably already answered your own question. HTML-only websites are messy, frequently ending up with hundreds of files, each with their own copy of the template, among other things. A simple change for an HTML-only site could take days to implement, where in a PHP-MySQL-powered site it would take minutes.

    On top of that, by integrating PHP + MySQL in to your project you open a range of new uses. In the future you could set up a web-service for a software application to contact your database server and get the content, you could sell your database of content, or you could further manipulate the way the content is stored.

    The advantages to a database driven, scripting language powered site are numerous, and you shall realize them more and more as you get deeper in to web development.

    Adam X. Knife is a professional web developer and author of the new Code Hippo programming "blog"-style site. When he's not writing articles on programming, or developing code himself, he's reviewing laptops or MP3 Players.

    Article Source: http://EzineArticles.com/?expert=Adam_Knife

    MySQL for Beginners - How to Create a MySQL Database

    By Don Beavers
    Whether you are an experienced web programmer or a complete novice attempting to provide data interactivity with your web site, MyQSL is an easy to use and free database solution that can allow you to store and configure data to be displayed on your web site.

    The best way to create and manage a MySQL database is to download an open source (free) program called PhpMyAdmin. PHPMyAdmin allows you to manage all aspects of both your database structure and data from one easy to use interface. This tool is intended to handle the administration of MySQL over the Web.

    This tool provides an interface that allows you to create and drop databases, create, drop, or alter tables, delete, edit, or add fields, execute any SQL statement, manage keys on fields, manage privileges, and import and export data into various formats. That sounds like a complicated set of activities, but the easy to use graphical tools make things quite simple and easy to understand. If you make a mistake, the software even provides instructions on where you made your error.

    For a complete demo see: http://www.phpmyadmin.net/phpMyAdmin/
    For documentation visit: http://www.phpmyadmin.net/home_page/docs.php

    Most Linux based web hosting companies provide PhpMyAdmin as a standard feature with their packages. It is also available in a “Windows” IIS version. If your hosting provider does not already have this product installed they will often install it for you, or even allow you to install it yourself. Setup is quick and easy if you follow the step-by-step installation documentation.

    Step One: Creating your new database

    When you log in to your PhpMyAdmin welcome page, the first step is to enter a name for your new database in a text box provided. You can name your database anything that you wish, however if you are creating the database to use with a script or software package that you purchased somewhere, the script provider will often suggest a “preferred” database name. You should always create your database using the following format:

    username_ databasename
    Example: myusername_mydatabase

    Your complete database name should always begin with your username followed by an underscore, then followed by the database name. This allows the server to know which user is in control of the new database, and it will also provide permission to access the database to only specific users. This also allows different users on the same server to use the same name for their own database, as you did, without interfering with your data – that is helpful if more than one user on your server bought similar software for their own site. They can then also use the software providers “preferred” database name.

    Step Two: Creating a table for your new database

    After you have created a database, the next step is to create a table, or even multiple tables, for you to store data. A table is the part of your new database that actually stores data.

    You create a table by selecting the database that you created from the drop box list of databases. Once a database is selected a new form appears and asks for you to create a new table.

    You must decide what you want to name your table and enter that name into the name box. Try to choose a name that reflects the type of data that will be stored in the table, such as orders, users, or inventory.

    You then must decide how many “fields” or columns of data that you want to store for each record. If you need for the table to store five (5) different items, such as username, users email address, users telephone number, users account number, and the users age, than you would need five (5) fields. Simply enter the number 5 in the appropriate box. Once you hit create, the system will create a table and will add those fields into the table for you. Don’t worry about the number of fields you might need right now, as you can always add or delete fields later.

    Step Three: Defining Fields

    Once you have created your table you will be prompted to tell the database what features that you want each field to have. This looks complicated, but it’s not if you select your data type from the information below. You basically have to decide between three common data types and select the best choice for storing your data. If you make a mistake you can go back and edit the field.

    If the field is to be used to store numbers, here are some choices:

    TINYINT – A very small integer. The signed range is -128 to 127.
    SMALLINT - A small integer. The signed range is -32768 to 32767.
    MEDIUMINT - A medium-size integer. The signed range is -8388608 to 8388607.
    INT - A normal-size integer. The signed range is -2147483648 to 2147483647.
    BIGINT – A very large integer.

    Some other less common number options include:

    FLOAT- A floating-point number.
    DOUBLE – A double-precision floating-point number.
    DECIMAL - A packed exact fixed-point number.

    If the field is to be used to store text or both text and numbers combined, here are some choices:

    VARCHAR is for varying characters and can be up to 255 characters in length.
    TEXT is a column with a maximum length of 65,535 characters – easy to search.
    BLOB is a column with a maximum length of 65,535 characters – case-sensitive.

    If the field is to be used to store dates, here are some choices:

    DATE - A date.
    DATETIME - date and time combination.
    TIMESTAMP - useful for recording the date and time of an INSERT or UPDATE operation.
    TIME - A time.

    Once you have selected the data type for your fileds you will need to let the system know how many characters that you will need to store in the field.

    Example: if you are storing a username, you might want to select VARCHAR as your data type and allow up to 100 characters for that field. If you are creating a User Identification number you might want to select INT and allow up to six characters – that would allow you to have up to 999,999 users.

    The last step to creating your data fields is to select any special attributes that you may find helpful. Some examples are:

    Auto Increment: Auto-Increment fields are useful for assigning unique identification numbers for users, products, and customers, etc. By default, fields are incremented using number characters (like "1", "2").

    Primary Key: The primary key is a data column that uniquely identifies a specific instance of that data. At least one of your fields must be a Primary Key. Username is an example of a good primary key. You do not want to have more than one individual having the same username.

    Index Key: Allows you to speed up searches by designating a field as a preferred data source, especially when combining data from multiple tables.

    Congratulations, once you have completed these steps you are ready to import data into your new database.

    Don Beavers lives in Bryan/College Station, Texas and is an enterprise level PHP-MySQL programmer at both the Shopping Elf Shopping Guide and the Datavor Web Directory.

    Article Source: http://EzineArticles.com/?expert=Don_Beavers

    Apache, MySQL & PHP for Windows

    By Sanjib Ahmad
    Apache, MysQL and PHP for Windows could be a nice nice thing to have on your Windows workstation. You could try and experiment with all kinds of nice PHP and MySQL based applications right on your Windows desktop running Apache, instead of having to access a full-featured server.

    Most people have Windows as their workstation and it can be sometimes difficult to switch to another operating system. So, you may have always wanted to run PHP applications on your Windows machine but wondered if it is too difficult to install or if the hassle will be worth it.

    This article gives you the essential information to get started right away. Even if you are a seasoned PHP, MySQL and Apache guru, the checklist below will still be helpful in your installation process.

    There are lots of 3rd party software that bundles Apache, MySQL & PHP in one package and installs them on our computer. We do not recommend this and suggest that you directly get Apache, MySQL & PHP from their official sites.

    Apache

    1. Get Apache 1.3.33 from here: http://httpd.apache.org/download.cgi.

    2. Choose a mirror close to you and in the same page, look for the Win32 Binary (Self extracting) file: apache_1.3.33-win32-x86-no_src.exe.

    3. Download the file and save it on your hard disk. Run the installer and the self- extracting wizard will guide you through the rest of the steps. Choose all the default settings and run Apache as a service.

    4. Remember to put "localhost" when asked for a Server name/Domain name. Use "administrator@localhost" when asked for the administrative email account.

    5. Now point your browser to: http://localhost and you should see an Apache Test Page.

    6. You can change this page by creating an "index.html" page here "C:Program FilesApache GroupApachehtdocs".

    7. You can manually start and stop the Apache server. In a Windows command prompt, type "net stop apache" or "net start apache".

    MySQL

    1. Get MySQL 4.1.7 from here: http://dev.mysql.com/downloads/mysql/4.1.html

    2. Under the Windows downloads section, choose Windows Essentials (x86) and click on the Pick a Mirror link.

    3. Download the file mysql-4.1.7-essential-win.msi and save it on your hard disk. Run the installer and the self-extracting wizard will guide you through the rest of the steps. Remember the root password when prompted for it in the installation process.

    4. Once the installation is done, on your Windows toolbar, go to "Start->Programs- >MySQL->MySQL Server 4.1->MySQL Command Line Client".

    5. Type the root password and you should be logged in to the MySQL shell.

    6. Type "show databases;" to see the list of databases. Type "quit" when you are done.

    PHP

    1. Get PHP 4.3.10 from here: http://www.php.net/downloads.php

    2. Under the Windows Binaries section, choose the file: PHP 4.3.10 zip package size 7,405Kb dated 15 Dec 2004.

    3. Download the file and save it on your hard disk. Unzip the file and rename the extracted folder to "php". Now move this folder "php" and place it under "C: Program Files".

    4. Move all the files under "C:Program Filesphpdlls" and "C:Program Filesphpsapi" to here: "C:Program Filesphp".

    5. Copy the file php.ini-recommended to "C:WINDOWS" and rename it to php.ini

    6. Edit your Apache "httpd.conf" configuration file located here: "C:Program FilesApache GroupApacheconf".

    7. Add the following lines in httpd.conf:

    LoadModule php4_module "C:/Program Files/php/php4apache.dll"
    AddModule mod_php4.c
    AddType application/x-httpd-php .php

    8. Now stop your server by issuing the following command in Windows command prompt: "net stop apache". Then type "net start apache" to start your server. We are now going to test the PHP installation.

    9. Go to "C:Program FilesApache GroupApachehtdocs" and create a file test.php

    10. Edit test.php and add the following code:

    <? php phpinfo(); ?>

    11. Point your browser to http://localhost/test.php and you should see a lot of PHP configuration information.

    Congratulations! You now have Apache, MySQL and PHP installed in your computer. Now you can install your favorite script right on your Windows workstation.

    Sanjib Ahmad, Freelance Writer and Product Consultant for Business.Marc8.com - Business Best Sellers.

    You are free to use this article in its entirety as long as you leave all links in place, do not modify the content, and include the resource box listed above.

    Article Source: http://EzineArticles.com/?expert=Sanjib_Ahmad

    Oracle Introduction

    By Sharon White
    Oracle Corporation is the number two software company in the world. It was founded in 1986 in USA and now has representatives in about 70 countries all over the world. Its main competitors are Microsoft and IBM. Oracle consists of two businesses: software development and services. Corporation aims to provide its customers with business applications and secure database programs.

    This report is prepared with interest of the shareholders as the primary stakeholders in mind. The analysis will try to cover the areas of maximization of the shareholders values.

    Investors are mainly interested in liquidity and profitability of a company, what the risk factors are and what key issues the company is facing. How the management plans to handle these issues and what steps they are taking in relation to that. How they use their resources and what is their efficiency in maintaining the resources in the future for their competitive advantage.

    On June 9, 2003, Oracle commenced an unsolicited tender offer of approximately $5.1 billion for all the outstanding shares of common stock of PeopleSoft Inc. which is now revised to approximately 7.7 billion. In connection to the tender offer the US dept of justice filed a civil antitrust lawsuit.

    Strengths- They have sufficient cash on hand including internally available cash and investments, $1.5 billion revolving credit facility or issuance of securities to pay offer price for all shares in offer.

    Weaknesses- There are doubts about the sincerity of the bid and some consider it to be a publicity stunt. PeopleSoft’s CEO Craig Conway is an ex-Oracle employee. He believes that the bid is a plan to wreck PeopleSoft’s business.

    Opportunities- It can be a biggest step towards expansion by acquiring PeopleSoft with its large customer base and one of the best application software. It will also remove one of their biggest competitors in the application software business and give them a competitive advantage to other application software competitors.

    Threats- If they are not successful in the lawsuit, they won’t be able to acquire PeopleSoft and department’s analysis may impact on their acquiring other companies. This lawsuit could result in substantial cost and divert the attention of the management. Even if they are successful, difficulty in integrating with the core company is a main threat.

    4.2 Competition

    In their core database business Oracle was having a tough competition with IBM and Microsoft which increased much more due to reduced price and improved quality offerings from competitors and decline in database software market. Oracle is planning to expand in the highly competitive market of application software.

    Strengths- They have a high customer base of their database and most of the application providers depend on their database area to base their applications on. Huge cash reserves and plans to invest highly in Research & Development to have competitive advantage.

    Weaknesses- Their core business of database software is already past its peak and there has been decline in this business. They don’t have much experience in other areas of software business and the market perception is of a database and tools providing company.

    Opportunities- With acquisition of PeopleSoft, Oracle will become No. 2 in the application software business and will have a huge customer base.

    Threats- Rapid technology changes and changing customer demands and reduced price offerings of the competitors are major threats facing the company.

    The article was produced by the member of masterpapers.com. Sharon White is a senior writer and writers consultant at term papers. Get some useful tips for thesis and term paper writing .

    Article Source: http://EzineArticles.com/?expert=Sharon_White

    Data Recovery Tips And Tricks

    Data loss is a plague that can hit anyone and anytime, regardless of technical prowess, handling care, operating system or hardware configuration. In many cases, data loss is caused by factors that are out of our reach and unfortunately, in some of these cases data recovery is impossible. A burnt out hard disk is the clearest example that comes to mind. It’s often not your fault that it breaks down and data recovery is impossible. This is a rare case still and most data loss problems can be fixed with the help of data recovery tools, professional software, some technical knowledge and a bit of common sense. Let’s go through a few data recovery tips and tricks that might help you recover those accidentally deleted files and keep you from deleting them again.

    Backup, backup and more backup!

    Constant and organized backup is the only way you can save some data that would be otherwise impossible to recover, due to a physical problem like the one described above. But backing up data is not as easy as it seems at first glance. First of all, you need to organize a backup system, like copying your essential data from your hard disk to CDs, flash disks, DVDs or another external destination.

    One thing that will prove very useful is keeping all your data on a small number of different external destinations. If you burn each document or excel file you create on a different disk as backup and you’ll need it later on, there’s two things that can go wrong: A. You won’t find the specific disk within the sea of disks where you keep your backup and B. The disk may get physically damaged itself after a while. Try keeping everything on a single DVD (you can burn data on a disk and leave it open for future burning), assuming 4.7 GB are enough for what most people consider essential data on their computers. Also make a backup for the backup, just in case something bad happens to it, like a spilt can of coffee on the DVD drawer (way more common than you might think!)

    Using data recovery software vs. using the services of a professional data recovery company

    The decision is yours to make, but unless you absolutely know what you’re doing and know how to use the data recovery software by yourself, it’s best if you employ a professional company to do it for you. Don’t build a technical ego just because you managed to install Windows by yourself, with data recovery, you’ll be dealing with much more sensitive matters. If you fumble up your Windows installation process, you can simply start over. If you accidentally remove every chance of recovering a bunch of files, there’s no turning back.

    Use your operating system’s data recovery options

    Both Mac and PC operating systems such as OS/X or Windows have built-in data recovery tools that can be helpful in case of logical or human error-related data loss. Sometimes you’ll find them easier to use than professional data recovery software, mainly because they’re built under the same structure as the operating system, so you’re already familiar with the interface. However, in what regards recovery options and efficiency, you can’t compare the standard operating system tools with a professional data recovery program so if your data loss issue is more complex, you’re probably better off using the latter.

    Fraser Wheaton is a data recovery expert and owner of the http://www.RecoverMyFile.net website.

    We can help get back any file you have deleted or lost.

    http://www.RecoverMyFile.net

    Article Source: http://EzineArticles.com/?expert=Fraser_Wheaton