SnipIT No 4: Run an Oracle SQL script from DOS prompt

SnipIT is a series of short blogs containing useful information in an easily digestible format. To run an Oracle SQL script file from a DOS prompt (Command Line) you execute sqlplus passing credentials and the database name along with the script to run. @sqlplus.exe <username>/<password>@<database name> @<script filename> @sqlplus.exe scott/tiger@testdb Continue Reading

ORA-19502: write error on file

Description: Adding a new tablespace threw the following Oracle error, the sql file contained the following statement: PROMPT Creating Tablespace TS_SCHMASK2 create tablespace TS_SCHMASK2 datafile ‘/data/oradata/FTEST2/TS_SCHMASK201.DBF’ SIZE 32000M REUSE autoextend on next 1000M, ‘/data/oradata/FTEST2/TS_SCHMASK202.DBF’ SIZE 32000M REUSE autoextend on next 1000M, ‘/data/oradata/FTEST2/TS_SCHMASK203.DBF’ SIZE 32000M REUSE autoextend on next 1000M, ‘/data/oradata/FTEST2/TS_SCHMASK204.DBF’ SIZE Continue Reading

Introduction to computer forensics and investigations

This post was republished to Triathlon John at 17:51:12 17/12/2014 Introduction to computer forensics and investigations These are my notes from the course provided by OpenLearn, they are not intended to provide guidance in a work environment and I accept no responsibility for how these are used – they are Continue Reading

Introduction to cyber security – Week 8, Managing security risks

Information as an asset Information is valuable but can be lost or stolen. Considering information as an asset allows creation of strategies for protecting info and minimising consequences of disaster. Information assets vary by organisations/individuals: Doctors surgery Medical records Contact lists Emails Employee records Manufacturer Order books Staff records Bank Continue Reading

Introduction to cyber security – Week 7, When your defences fail

Identity theft Preventing identity theft – ensure AV software is up to date, do not respond to phising emails. Detecting identity theft Unexplained bank withdrawals or credit card charges Bills & other expected official letters don’t arrive Cards/cheques decline Notified that their information has been breached/compromised Connected by bank/credit card Continue Reading

Introduction to cyber security – Week 6, Network Security

Firewall basics Blocks dangerous communications from spreading across network, either from outside into a network or within the network. Can be dedicated hardware, part of router or integrated with OS. Compares addressing and protocol information of datagram to rules setup in firewall’s software. If datagram comes from a hacker and Continue Reading

Introduction to cyber security – Week 5, Cryptography

Specialised area of mathematics concerned with protecting information. Anything that can be represented as 0s and 1s can be encrypted. Applications for cryptography include: Secure banking and payment systems Protecting conversations over mobile telephones Safeguarding wireless networks Securing files on hard disks and memory keys Authenticating electronic documents Electronic voting Continue Reading

Introduction to cyber security – Week 4, Networking and Communications

What is the internet? Hierarchy of individual networks – from LANs to telephone networks. A network of networks. Two key design factors: No central controlling computer. All machines would have the same authority. Information should be deliverable along any route thereby being able to bypass machines which are unavailable. No Continue Reading