Auditing an Oracle database for security issues is very important. PeteFinnigan.com provides all of the information and tools that you will need Click here for details of PeteFinnigan.com Limited's detailed Oracle database security audit service Click here for details of PeteFinnigan.com Limited's Oracle Security Training Courses
There are 84 visitors online    
Cookie Policy:We only use essential cookies on small sections of this website. For details see here.

Pete Finnigan's Oracle security weblog


Home » Archives » October 2005 » Some more posts on bugtraq about David Litchfields open letter to Oracle

[Previous entry: "Slight correction to the HTMLDB advisories"] [Next entry: "A new paper on SQL Injection"]

Some more posts on bugtraq about David Litchfields open letter to Oracle

October 8th, 2005 by Pete


I had a quick look this evening on bugtraq and found a couple of threads that are related to David Litchfield’s open letter to Oracle post the other day. The first is a post by Gadi, who posts some objections to David’s letter. The link on bugtraq I have chosen to link to here is David’s reply to Gadi where he justifies various points and statements and counters Gadi's points.

The second thread of interest is a reply by Alex who agrees with David and Cesar where he gives three examples of dealing with Oracle's security department. These three points are very interesting and worth reading for insight into his dealings with Oracle and also his opinions on the situation.

October 2005
SMTWTFS
      1
2345678
9101112131415
16171819202122
23242526272829
3031     

This is the weblog for Pete Finnigan. Pete works in the area of Oracle security and he specialises in auditing Oracle databases for security issues. This weblog is aimed squarely at those interested in the security of their Oracle databases.

Weblog Home
Weblog Archives


Home
Oracle Security Tools page
Oracle security papers
Oracle Security alerts

Web Development
SQL Server Security

RSS 1.0 FEED
RSS 2.0 FEED
Atom 0.3 FEED
Powered by gm-rss 2.0.0


Valid XHTML 1.0!