Tags » Access-Control
In the last issue I highlighted on how fire is a major risk to both households and business. In this issue I will look a bit deeper into building fire safety and the different systems you need to put in place in order to safely and effectively mitigate this risk. 288 more words
While Security against thievery and fraud is a major security concern in Zimbabwe, fire nevertheless is a major risk to both households and business. Due to constant power cuts and as seen with recent events, fire risk in Zimbabwe has increased. 208 more words
Some manufacturers provide SDKs (software development kits) that feel a lot like a visiting cousin who outstays his welcome after a few days. All the pleasantries are there, the special towels are out and the good sheets have been fitted on the bed. 481 more words
How are security settings enabled / controlled in OBIEE 10g and 11g?
In OBIEE 10g, security is controlled at the following points: permissions on the OBIEE Presentation catalog, via the repository (users and passwords) and optionally via an external LDAP, or external tables. 499 more words
File upload and file i/o is a common feature which most of the web applications allow. It’s a critical part of any web application which should be carefully crafted and implemented since a single mistake could cause lot of trouble to an application. 1,669 more words