Pete Finnigan's Oracle security weblog /weblog/entries PeteFinnigan.com's weblog is the only weblog dedicated to Oracle security. en-gb Copyright PeteFinnigan.com Ltd 2005, All rights reserved. All trademarks are the property of their respective owners and are hereby acknowledged 2025-10-15T12:52:01Z Pete Finnigan (mailto:webmaster\@petefinnigan.com) Pete Finnigan (mailto:pete\@petefinnigan.com) PeteFinnigan.com's weblog is the only weblog dedicated to Oracle security. Pete Finnigan's Oracle security weblog Pete Finnigan's Oracle security weblog http://www.petefinnigan.com/images/company_logo_1.gif /weblog/entries AI for Oracle Security /weblog/archives/00001615.htm I spoke about AI and Oracle security back in February in this blog - AI and Oracle Security . I asked the question can we use AI (LLM / Generative AI) in Oracle Security and if so how? The two....<a href="/weblog/archives/00001615.htm">[Read More]</a> <p>Posted by Pete On 15/10/25 At 12:42 PM</p> Can we Detect Disable Trigger in the Oracle Database /weblog/archives/00001614.htm If i want to create layered security in a database around something such as specific data or to protect access to a resource or perhaps control access to a privilege then we can create a security layer using standard features....<a href="/weblog/archives/00001614.htm">[Read More]</a> <p>Posted by Pete On 24/09/25 At 08:37 AM</p> Fuzzing PL/SQL and Secure Design Patterns for PL/SQL and Oracle /weblog/archives/00001613.htm I have just been notified that I have had two sessions accepted for the UKOUG conference from 30th November to 2nd December 2025 at the East Side Rooms in Birmingham. My first session is called Fuzzing PL/SQL and is overviewed....<a href="/weblog/archives/00001613.htm">[Read More]</a> <p>Posted by Pete On 22/09/25 At 04:41 PM</p> Happy 21st Anniversary to my Oracle Security Blog /weblog/archives/00001612.htm The 21st anniversary of this blog is coming up on the 20th September 2025. I started this blog on the 20th of September 2004 and it has been doing well ever since. I write almost exclusively on the subject of....<a href="/weblog/archives/00001612.htm">[Read More]</a> <p>Posted by Pete On 10/09/25 At 11:55 AM</p> Can we Block EXECUTE ANY PROCEDURE for our API? /weblog/archives/00001611.htm I did a five part series on the security of AUDSYS.AUD$UNIFIED and showed how it works at a functional level and how it might be secured by Oracle and how we might design a similar system using standard database license....<a href="/weblog/archives/00001611.htm">[Read More]</a> <p>Posted by Pete On 09/09/25 At 08:56 AM</p> Testing a READONLY table and sometimes WRITE and DELETE /weblog/archives/00001610.htm This is the next part of the series looking at the AUDSYS schema and AUD$UNIFIED table that Oracle has created and protected. In the first part we explored what AUDSYS and AUD$UNIFIED looks like in terms of security; in part....<a href="/weblog/archives/00001610.htm">[Read More]</a> <p>Posted by Pete On 03/09/25 At 11:38 AM</p> Implement a Test System to Create a Readonly and Sometimes Insert / Delete Table /weblog/archives/00001609.htm This is the next part (4th part) of the series exploring the AUDSYS schema and AUD$UNIFIED table that is READONLY with a lot of INSERTING and sometimes deleting. In the first part we explored the AUDSYS schema and the AUD$UNIFIED....<a href="/weblog/archives/00001609.htm">[Read More]</a> <p>Posted by Pete On 26/08/25 At 08:54 AM</p> Build a readonly table like AUD$UNIFIED /weblog/archives/00001608.htm In the two parts of this series on the security of AUDSYS.AUD$UNIFIED we looked at the main security features of the AUDSYS user and the AUD$UNIFIED table so that we could imagine using these same features ourselves. I have taught....<a href="/weblog/archives/00001608.htm">[Read More]</a> <p>Posted by Pete On 19/08/25 At 12:03 PM</p>