Tags » Security Hardening

Transparent Data Encryption in Oracle 12c

1. Set the ENCRYPTION_WALLET_LOCATION in $ORACLE_HOME/network/admin/sqlnet.ora


oracle@seclindbs /u01/app/oracle/product/ $ cat /u01/app/oracle/product/


2. Create the keystore (wallet):

SQL> select * from v$encryption_wallet; 611 more words


SharePoint Server Hardening, Port 5725

When hardening SharePoint servers by blocking unnecessary ports, you will need to deal with the port 5725 which is used by user profile synchronization. Two questions emerge: 261 more words


How to Restrict User from Connecting to Database Through Specific Ip Address

The example below explains how to restrict user shy from accessing database
from IP address
Step 1:-

Create the following trigger :-

Create or replace trigger logontrig… 103 more words


AIX Hardening using aixpert - CIS for AIX 6.1

From root account,
# aixpert -f aixpert_aix6.1.xml

Content of aixpert_aix6.1.xml

<?xml version=”1.0″ encoding=”UTF-8″?>
<!– CIS AIX 6.1 Benchmark aixpert custom XML file –>
<AIXPertEntry name=”prereqbinaudit” function=”prereqbinaudit”> 10,619 more words


Linux Foundation Issues Security Checklist for Sys Admins

The Linux Foundation recently made available a set of best security practices specifically aimed at Linux system administrators to assist them with protecting the systems they are responsible for from compromise. 74 more words

Security Advice

Security Guides on VMware.com Have A New Home

VMware has just announced that all their security hardening guides now have a new home. A single page that customers and partners can visit for all the latest hardening guides for vSphere and other VMware products. 56 more words


An Unbroken Chain of Trust is of Paramount Importance

There has been a lot of coverage over the past week about Anonymous’ Hardcore Charlie releasing some old 2003/2004 code of the VMware ESX Hypervisor on the Internet. 893 more words