|
Several Oracle Security Services (Consulting, Audit,...) and Solutions provided by Red-Database-Security GmbH
http://www.red-database-security.com/
popularity:
oracle
security
database
hacking
hack
red-database-security
hardening
pentest
oracle-security
computer
|
|
Pete Finnigan - Oracle and Oracle security papers, tools, links and Information from the recognised Oracle security expert
similarity:
popularity:
oracle
security
database
dba
blog
hacking
db
infosec
sql
finnigan
|
|
Fact Sheet about Oracle database passwords / Oracle Password Algorithm ... 8-byte hash, encrypted with a DES encryption algorithm without real salt (just the username) ...
similarity:
popularity:
oracle
security
password
database
passwords
hack
dba
unix
10g
coding
|
|
No information avaiable
similarity:
popularity:
oracle
security
password
database
passwords
default
list
unix
reference
hack
|
|
ORACLE-BASE - Oracle DBA and development articles, scripts, HOWTOs and forums (8i, 9i, 10g, 11g)
similarity:
popularity:
oracle
database
reference
sql
dba
development
articles
howto
tutorial
scripts
|
|
No information avaiable
similarity:
popularity:
oracle
sql
security
database
asktom
sqlinjection
compare
hacking
sql_injection
sql-injection
|
|
Comprehensive CVE vulnerability database that integrates all U.S. Government publicly available vulnerability resources. ...
similarity:
popularity:
security
vulnerability
database
reference
government
hacking
vulnerabilities
computer
tools
internet
|
|
SecurityFocus is designed to facilitate discussion on computer security related topics, create computer security awareness, and to provide the Internet's largest and ...
similarity:
popularity:
security
news
hacking
technology
network
internet
tech
computer
linux
reference
|
|
Archive of hacking related materials. Everything from file archives to its very own zine.
similarity:
popularity:
security
hacking
news
computer
technology
hack
hacks
tools
forum
geek
|
![]() |
Zone-H - Unrestricted Information - A global view to the world with a stress on the ITsec
similarity:
popularity:
security
hacking
news
technology
internet
resources
computer
tech
hack
reference
|
|
Aims to standardize the names for all publicly known vulnerabilities and security exposures.
similarity:
popularity:
security
vulnerability
reference
vulnerabilities
exploits
hacking
networking
computer
cve
database
|