Posts Tagged Software

SteveManorHow to Avert and Resolve Oracle Database Corruption

Friday, April 16th, 2010

A database administrator needs to perform various operations like performing incremental backups, identifying and resolving network issues, viewing archive log destination, error generation in alert log, etc. in order to ensure that the database always remains in a running state. However, the possibility of database corruption exists due to human mistakes, virus attacks, and hardware corruption.

Database remains unmountable in most cases after it is corrupted, further rendering to inaccessibility of all its records. In such situations, if the administrator wants to access the Oracle database records, then he/she will need to use a cold backup to restore the database. However, if the administrator has not created any backup or the backup is not sufficient to meet all his/her requirements, then he/she needs to use an advanced third-party Oracle Recovery utility to repair the database.

Let’s consider a practical case, where you, as a database administrator, perform below steps:

1.You copy your database file when your database is alive.
2. Then you update the table stored in the data file.
3. After this, you shutdown the database using ‘shutdown immediate’ command and change the datafile with its ‘alive’ copy.

After this, when you try to mount your Oracle database, it does not mount. The reason is-

The fundamental reason for unmountability of the database is corruption in datafile. To prevent the corruption of datafile, you should never follow the above steps sequentially.

Resolution:

It is advisable to restore the database from a standby database in order to resolve datafile corruption and to mount your Oracle database. However, if no such database exists, then you will need to repair the database. To effectively do so, you will need to search for a commercial dbf recovery application that can repair your corrupted database.

A repair tool to recover Oracle database and to bring it back to a reusable state can be easily downloaded from the Internet. Such tools can Recover Oracle Database after any logical corruption scenario using powerful recovery algorithms. Moreover, these tools do not make any change in the original database, making them completely non-destructive in nature.

For most of the Oracle database administrators, Oracle Recovery Software is a utility that they use to recover Oracle database after all kinds of logical crashes. The tool supports recovery of Oracle 9i databases. Designed for Windows XP and 2003, the read only software leaves the original database untouched and unmodified.

Tags: , , , , , ,
Posted in Editorial, Purely Technical

LolaTheriotUse JavaMail to Automate Email Distribution

Saturday, March 6th, 2010

Every action can possibly be automated with software, then why not automate the email distribution to end-users/customers. In this case, the JavaMail API, currently in version 1.4.3, can support this development in a protocol-independent manner and remain platform independent as always.

Here’s the JavaMail code for sending the email:

import javax.mail.*;
import javax.mail.internet.*;
import java.util.*;
import java.io.*;

class EmailClient
{
    final String emailInfo = "EmailInfo.properties";
    Properties properties = new Properties();

    public static void main(String args[])
    {
        EmailClient emailClient = new EmailClient ();
        emailClient.sendEmail();
    }

    private void sendEmail()
    {
       try{
            //This is required to load all the properties
           FileInputStream fileInputStream = new FileInputStream(emailInfo);
           properties.load(fileInputStream);
           fileInputStream.close();
        }catch(IOException ioe)
       {
            //throw IOException of your choice.
            //can end here
       }
        System.out.println("Email properties read successfully.");

       String smtpAddress = properties.getProperty("smtpAddress");
       String fromAddress = properties.getProperty("fromAddress");
       String toAddress = properties.getProperty("toAddress");
       String emailSubject = properties.getProperty("emailSubject");
       String emailBody = properties.getProperty("emailBody");

       Properties props = new Properties();
        props.put("mail.smtp.host", smtpAddress);
        props.put("mail.from", fromAddress);
       Session session = Session.getInstance(props, null);

       try
       {
           MimeMessage mimeMessage = new MimeMessage(session);
           mimeMessage.setRecipients(Message.RecipientType.TO,toAddress);
           mimeMessage.setSentDate(new Date());
           mimeMessage.setSubject(emailSubject);
           mimeMessage.setText(emailBody);
           System.out.println("Sending e-mail...");
           Transport.send(mimeMessage);
           System.out.println("e-mail sent.");
       }
        catch(MessagingException me)
       {
           System.out.println("e-mail send failed.");
           me.getMessage();
       }
    }
}

The code is fairly simple to understand:

  • The properties have been loaded for the email to be sent from a properties file. This could come from any other source, such as hardcoded values, a database, a user interface, etc.
  • The processed information is updated to the MimeMessage object, which is the actual email object. (The MIME, or Multipurpose Internet Mail Extensions, is an Internet standard that specifies how messages must be formatted for interoperability.)
  • MimeMessage takes a session argument, which can either be created or refer to the default session.
  • The session—important in any context and used here for the email—is established using the properties mail.smtp.host and mail.from.
  • Other details such as the date, subject, and the body of the email, which will be used when the email is sent, are being set out.
  • Finally, the email is dispatched using the send() method of the Transport class.
  • The entire email information is made available in a properties file. Here are the contents of the properties file for this application:

smtpAddress=smtp.server.address
fromAddress=myself@me.com
toAddress=someone@you.com
emailSubject=First email
emailBody=My first email

It’s stated previously that the source of the required information can vary, so we can modify the entries at will without recompiling the code to experiment. By the way, holding configurable information in properties files is a standard programming practice.

It seems to be simple right, and now let’s add more advanced features to the application. Don’t you think, you need attachments with email? The following code creates that-

import javax.mail.*;
import javax.mail.internet.*;
import javax.activation.*;
import java.util.*;
import java.io.*;

class SendAdvancedEmail
{
    final String emailInfo = "EmailInfo.properties";
    Properties properties = new Properties();

    public static void main(String args[])
    {
        SendAdvancedEmail sendAdvancedEmail = new SendAdvancedEmail ();
        sendAdvancedEmail.sendEmail();
    }

    private void sendEmail()
    {
       try{
            //This is required to load all the properties
           FileInputStream fileInputStream = new FileInputStream(emailInfo);
           properties.load(fileInputStream);
           fileInputStream.close();
        }catch(IOException ioe)
       {
            //throw IOException of your choice.
            //can end here
       }
        System.out.println("Email properties read successfully.");

       String smtpAddress = properties.getProperty("smtpAddress");
       String fromAddress = properties.getProperty("fromAddress");
       String toAddress = properties.getProperty("toAddress");
       String emailSubject = properties.getProperty("emailSubject");
       String emailBody = properties.getProperty("emailBody");

       Properties props = new Properties();
        props.put("mail.smtp.host", smtpAddress);
        props.put("mail.from", fromAddress);
       Session session = Session.getInstance(props, null);

       try
       {
           MimeMessage mimeMessage = new MimeMessage(session);
           mimeMessage.setRecipients(Message.RecipientType.TO,toAddress);
           mimeMessage.setSentDate(new Date());
           mimeMessage.setSubject(emailSubject);
            //The following is required to add attachments
           MimeMultipart multipart = new MimeMultipart();
           //Creating the text part of the email message
           BodyPart bodyPart = new MimeBodyPart();
            //The type is set to "text/plain"
           bodyPart.setText(emailBody);
           //Creating the attachment part of the email message
           BodyPart attachment = new MimeBodyPart();
           DataSource source = new FileDataSource(emailInfo);
           attachment.setDataHandler(new DataHandler(source));
           attachment.setFileName(emailInfo);
           //attachment.setContent(properties, "text/html");
            //Now combining the email message and the attachment
           multipart.addBodyPart(bodyPart);
           multipart.addBodyPart(attachment);
           //Setting the message with the multipart just created
           mimeMessage.setContent(multipart);

           System.out.println("Sending e-mail...");
           Transport.send(mimeMessage);
           System.out.println("e-mail sent.");
       }
        catch(MessagingException me)
       {
           System.out.println("e-mail send failed."+me);
           me.getMessage();
       }
    }
}

The important difference between this code listing and the one for sending email in the previous section is the process of building the message body, which is now capable of adding a file as an attachment. The Multipart class is actually split into two sections, the message part and the attachment. The properties are actually the same as for the previous code listing.

You could use Multipart instead of MimeMultipart, but be aware that Multipart is an abstract class and hence requires you to create an instance of MimeMultipart. It’s a similar case with MimeMessage. You can use Message, which also is an abstract class. Understanding all the classes used here will help you familiarize yourself with the mail package.

The article has provided enough information for you to experiment with sending and receiving emails. But you need to know-

  • The details in the properties file must be accurate to achieve the desired results.
  • Ensure that you have mail.jar and activation.jar in your classpath.

http://www.all1martpro.com
http://www.all1sourcetech.com

Tags: , , , , , , ,
Posted in Editorial, Purely Technical

BobbyeM71hxwNew Release- MySQL 5.1.44 / 5.5.2 Milestone 2

Wednesday, March 3rd, 2010

MySQL is the World’s Most Popular Open Source Database. It is a widely used and fast SQL database server.

MySQL is a client and server implementation, which consists of a server daemon (mysqld) and many different client programs/libraries. It is a type of SQL database management featured in Thelix hosting plans. A database is an organized collection of information that a computer uses to select and display data.

Databases can help organize and enhance your site content. Sites with dynamic pages and/or shopping cart software often need an underlying database structure.

It is to be pronounced as “my ess cue el” (each letter separately) and not “my SEE kwill.” MySQL is an open source RDBMS that relies on SQL for processing the data in the database. MySQL provides APIs for the languages C, C++, Eiffel, Java, Perl, PHP and Python. In addition, OLE DB and ODBC providers exist for MySQL data connection in the Microsoft environment. A MySQL

NET Native Provider, which allows native MySQL to .NET access without the need for OLE DB, is also available. MySQL is most commonly used for Web applications and for embedded applications and has become a popular alternative to proprietary database systems because of its speed and reliability. MySQL can run on UNIX, Windows and Mac OS.

MySQL is a relational database management system, which means it stores data in separate tables rather than putting all the data in one big area. This adds flexibility, as well as speed.

The SQL part of MySQL stands for “Structured Query Language,” which is the most common language used to access databases. The MySQL database server is the most popular open source database in the world. It is extremely fast and easy to customize, due to its architecture.

Extensive reuse of code within the software, along with a minimalist approach to producing features with lots of functionality, gives MySQL unmatched speed, compactness, stability, and ease of deployment.

Their unique separation of the core server from the storage engine makes it possible to run with very strict control, or with ultra fast disk access, whichever is more appropriate for the situation.

http://get-a-designer.com

http://www.all1sourcetech.com

Tags: , , , , , , ,
Posted in Microsoft Technology, New Product Release

BobbyeM71hxwMicrosoft Releases 3 New BlueTrack Mice

Friday, February 26th, 2010

Microsoft has released three new mice featuring its BlueTrack technology, indicating that the products featuring the innovation developed in-house are available at their lowest price ever. In fact, the Wireless Mobile Mouse 3500, Wireless Mouse 2000 and Comfort Mouse 4500 all come with price tags of under $30, and are already up for grabs for customers.

When it launched the first BlueTrack products, the Redmond Company was confident enough in the technology it had developed that it encouraged users to start saying goodbye to their old laser mouse forever.

In response to people’s increasingly mobile lifestyles, BlueTrack Technology was created, letting them ditch their mouse pad and use their BlueTrack mouse virtually anywhere — from the granite kitchen counter and the wood table at the coffee shop to the armrest at the airport.

As the BlueTrack Technology debuted in September 2008, but finally it’s now available in eight Microsoft mice so consumers can choose the best design, color and price to fit their need, explained the software giant.

Users will be able to buy the Wireless Mobile Mouse 3500 in two colors, Loch Ness Gray and Dragon Fruit Pink, while the Wireless Mouse 2000 will only be offered in a gray version. Microsoft underlined that while the Wireless Mobile Mouse 3500 was smaller than the normal mouse average size; the Wireless Mouse 2000 is a bit bigger, giving end users the chance to choose the product that best suits their hands.

Mobility is, of course, the key aspect of both the Wireless Mobile Mouse 3500, which comes with a Nano transceiver less than a centimeter long when connected to a USB port, but also for the Wireless Mouse 2000, that allows customers to stick a mini-transceiver into the bottom of the mouse.

The Comfort Mouse 4500 is the first wired mouse featuring BlueTrack Technology, making it a great choice for people who never want to deal with changing batteries. Like its wireless counterparts, the Comfort Mouse 4500 will track on virtually any surface2 and will be available in black as well as three fresh special-edition colors: Sea Blue, Poppy Red and Strawberry Pink.

All the new mice can already be purchased via Amazon.com. The Wireless Mouse 2000 and Comfort Mouse 4500 cost $29.95 and $24.95, and are scheduled to hit store shelves in March. The Wireless Mobile Mouse 3500 will be just $29.95 and general availability is planned for April.

`
http://www.all1press.com

http://www.all1tunes.com

Tags: , , , , ,
Posted in Microsoft Technology, New Product Release

BobbyeM71hxwPapugLinux 10.1 Has Arrived

Friday, February 26th, 2010

PapugLinux is a lightweight, Gentoo-based distro using the Fluxbox window manager and a number of other applications with an equally small footprint.

For the year 2010, the PapugLinux 10.1 is the major release in a little over a year and likely the only one for 2010 based on previous release schedules. PapugLinux 10.1 is mostly aimed at bringing the various software components up-to-date, though version numbers aren’t, for the most part, the newest ones.

In terms of package update and hardware support, Version 10.1 is a major release of PapugLinux. The latest version of X server will allow you to enjoy PapugLinux at the best capacity of your hardware.

PapugLinux 10.1 comes with a very short list of default applications installed with just the bare-bone functionality covered. The latest version updates the X-Window server to X.Org-7.4 (the latest stable release is 7.5). Mozilla Firefox 3.5.6 is included as the default web browser; email is handled by Sylpheed 2.6.0. and instant messaging by Pidgin 2.6.3.

For simple office tasks, the AbiWord 2.6.4 word processor and the Gnumeric 1.8.4 spreadsheet editor are also included. On the server side, PapugLinux 10.1 comes with the Apache 2.2.14 web server, the latest version, the Cups 1.3.11 print server and the ProFTP 1.3.2b FTP server.

PapugLinux 10.1 uses the Rox 2.9 file manager/desktop environment with a few customizations for better integration. The distro is designed as a Live CD that should run on even the oldest x86 hardware, but it can also be used as a stand-alone hard drive install.

No password is required, as the user ‘papuglinux’ is the default operating user. System user ‘root’ can be used by advanced users, the password has been set to ‘papuglinux.’ If you have 512 MB of RAM, try ‘linux copy2ram’ as boot option.”

http://www.all1martpro.com

http://get-a-designer.com

Tags: , , , , , , ,
Posted in Linux Technology, Technical News

BobbyeM71hxwKaspersky Patents Hardware-Based Antivirus

Wednesday, February 17th, 2010

Kaspersky Lab has made an announcement that they have received a US patent for a hardware-based antivirus solution. The announcement emphasizes that the hardware operates below the level of rootkits and therefore can’t be bypassed by them.

The patent, #7,657,941, is entitled “Hardware-based anti-virus system,” is awarded to inventor Oleg V. Zaitsev (Technology Expert at Kaspersky Lab) and assigned to Kaspersky. The abstract reads:

An anti-virus (AV) system based on a hardware-implemented AV module for curing infected computer systems and a method for updating AV databases for effective curing of the computer system. The hardware-based AV system is located between a PC and a disk device. The hardware-based AV system can be implemented as a separate device or it can be integrated into a disk controller. An update method of the AV databases uses a two-phase approach. First, the updates are transferred to from a trusted utility to an update sector of the AV system. Then, the updates are verified within the AV system and the AV databases are updated. The AV system has its own CPU and memory and can be used in combination with AV application.

So it seems this device is an actual separate computer running an embedded AV application. While the press release and abstract emphasize that the AV functionality doesn’t strictly need a software counterpart running in the host system, it does need host software in order to update itself, because the AV hardware won’t have network access. This update application will need to be trusted and hardened against attack.

The difficulty of detecting rootkits once they have installed does call for unconventional measures. Whether a hardware approach is truly more effective remains to be seen. If the device is just an AV system running below the level of the rootkit then the improvement will be small, as it will still only operate as well as the signature process allows. If the fact that the device is running below rootkits allows it to run heuristic tests which are better capable of detecting rootkit behavior then the difference could be substantial.

There is another advantage to hardware-based AV: Because the device has its own CPU and memory and minimal software running on the host PC, the performance impact on the PC will be lessened. But in fact, this device can not be a complete security solution, since it can only monitor disk operations. Modern security suites also monitor network connections.

Tags: , , , , , , , ,
Posted in Expert's Opinions, Technical News

BobbyeM71hxwBalesio FileMinimizer Suite 6.0

Tuesday, February 16th, 2010

If your hard disk is clogged with massive photos and Microsoft Office documents, or if you’re looking for a better way to share those large files, consider FileMinimizer Suite 6.0. This simple-to-use software reduces photo sizes by approximately 90 percent with little noticeable degradation of on-screen quality, and typically it shrinks Office files by at least 25 percent, with no quality loss.

FileMinimizer does not create .zip archives containing your data; the files it creates retain their original format and are usable just as the originals are, so .jpg files remain .jpg files, .ppt files remain .ppt files, and so on. It handles Excel, PowerPoint, and Word files, as well as an assortment of image file formats (such as .jpg, .png, .gif, .tif, .bmp, and .emf).

The basic operation couldn’t be simpler. Choose the files that you want to compress and select the compression strength (low, standard, or strong), and FileMinimizer quickly goes about its work, taking only a few seconds to compress each individual file.

By default it keeps your original file and creates a new one, appending the text ‘(FILEminimizer)’ to the name. However, you can tell the program to overwrite your original file, and you can also have the utility apply a different name rather than appending the ‘(FILEminimizer)’ label.

http://get-a-designer.com

http://www.all1sourcetech.com

Tags: , , , , ,
Posted in Microsoft Technology, New Product Release, Purely Technical, Technical News

BobbyeM71hxwZero-day hack of Oracle 11g database revealed

Tuesday, February 9th, 2010

On Tuesday, a well-known security researcher showed how to subvert security in the Oracle 11g database by exploding zero-day vulnerabilities that would let a savvy user gain full and complete control.

David Litchfield, a researcher at NGS Consulting, demonstrated how a user can subvert security to elevate his privileges to take complete control over Oracle 11g. Altogether Litchfield announced this was his final day at NGS, saying he was considering changing his focus to computer forensics.

Researcher claims hack of processor used to secure Xbox 360, other products

Currently reported, Litchfield’s discovery shows that due to the way Java has been implemented in Oracle 11g Release 2, there’s an overly permissive default grant that makes it possible for a low privileged user to grant him arbitrary permissions. In a demo of Oracle 11g Enterprise Edition, he showed how to execute commands that led to the user granting himself system privileges to have “complete control over the database.” Litchfield also showed how it’s possible to bypass Oracle Label Security used for managing mandatory access to information at different security levels.

Until Oracle remedies the zero-day flaws he exposed, Litchfield advised Oracle 11g administrators to revoke public execute access to certain Java-based functions. He said he expects Oracle to soon release patches for the problems he identified and he intends to publish a white paper on the topic.

According to Litchfield, he thinks Oracle probably deserves a “B+” for security in the current version of its database, which he characterized as an improvement over the previous version, but criticized Oracle for not finding these problems in the requirements and design phases of the product. He added Oracle appears to be relying too much on security tools to catch problems after its product is shipped.

Tags: , , , , , , ,
Posted in New Product Release, Technical News