Pete Finnigan's Oracle security weblog
/weblog/entries
PeteFinnigan.com's weblog is the only weblog dedicated to Oracle security.en-gbCopyright PeteFinnigan.com Ltd 2005, All rights reserved. All trademarks are the property of their respective owners and are hereby acknowledged2025-09-10T11:57:53ZPete Finnigan (mailto:webmaster\@petefinnigan.com)Pete Finnigan (mailto:pete\@petefinnigan.com)Pete Finnigan's Oracle security weblogPeteFinnigan.com's weblog is the only weblog dedicated to Oracle security.Pete Finnigan's Oracle security webloghttp://www.petefinnigan.com/images/company_logo_1.gif
/weblog/entries
Happy 21st Anniversary to my Oracle Security Blog
/weblog/archives/00001612.htm
The 21st anniversary of this blog is coming up on the 20th September 2025. I started this blog on the 20th of September 2004 and it has been doing well ever since. I write almost exclusively on the subject of....<a href="/weblog/archives/00001612.htm">[Read More]</a> <p>Posted by Pete On 10/09/25 At 11:55 AM</p>Can we Block EXECUTE ANY PROCEDURE for our API?
/weblog/archives/00001611.htm
I did a five part series on the security of AUDSYS.AUD$UNIFIED and showed how it works at a functional level and how it might be secured by Oracle and how we might design a similar system using standard database license....<a href="/weblog/archives/00001611.htm">[Read More]</a> <p>Posted by Pete On 09/09/25 At 08:56 AM</p>Testing a READONLY table and sometimes WRITE and DELETE
/weblog/archives/00001610.htm
This is the next part of the series looking at the AUDSYS schema and AUD$UNIFIED table that Oracle has created and protected. In the first part we explored what AUDSYS and AUD$UNIFIED looks like in terms of security; in part....<a href="/weblog/archives/00001610.htm">[Read More]</a> <p>Posted by Pete On 03/09/25 At 11:38 AM</p>Implement a Test System to Create a Readonly and Sometimes Insert / Delete Table
/weblog/archives/00001609.htm
This is the next part (4th part) of the series exploring the AUDSYS schema and AUD$UNIFIED table that is READONLY with a lot of INSERTING and sometimes deleting. In the first part we explored the AUDSYS schema and the AUD$UNIFIED....<a href="/weblog/archives/00001609.htm">[Read More]</a> <p>Posted by Pete On 26/08/25 At 08:54 AM</p>Build a readonly table like AUD$UNIFIED
/weblog/archives/00001608.htm
In the two parts of this series on the security of AUDSYS.AUD$UNIFIED we looked at the main security features of the AUDSYS user and the AUD$UNIFIED table so that we could imagine using these same features ourselves. I have taught....<a href="/weblog/archives/00001608.htm">[Read More]</a> <p>Posted by Pete On 19/08/25 At 12:03 PM</p>What is a Schema in Oracle?
/weblog/archives/00001607.htm
In Oracle a user is the same as a schema - well not 100% true - so lets explain a bit. Firstly at a logical high level in Oracle a user is an account used by a real person to....<a href="/weblog/archives/00001607.htm">[Read More]</a> <p>Posted by Pete On 14/08/25 At 08:38 AM</p>How does Oracle protect AUDSYS and AUD$UNIFIED
/weblog/archives/00001606.htm
In the recent blog first part of this series on the security of AUDSYS.AUD$UNIFIED we looked at the main features of the AUDSYS user and its ability or design to stop anyone from randomly deleting or updating or doing DDL....<a href="/weblog/archives/00001606.htm">[Read More]</a> <p>Posted by Pete On 12/08/25 At 12:52 PM</p>New PL/SQL Unwrapper Available
/weblog/archives/00001605.htm
I was emailed by Cameron overnight to tell me that he has written a new unwrapper for PL/SQL. There have been no public unwrappers for 9ir2 and lower available on the internet for a long time. There were a number....<a href="/weblog/archives/00001605.htm">[Read More]</a> <p>Posted by Pete On 07/08/25 At 10:00 AM</p>