Thursday, December 10, 2009
Oracle Standby Datbase Manual Recovery
You can execute these command while running production database and no effect to live system.It will effect only if the DR server is configures to High Availability Mode.
Login to sqlplus in DR site as sysdba
SQL > alter database recover managed standby database cancel;
Then it will cancel the current standby database process and archive log shipping
SQl > recover standby database;
TYPE AUTO and enter
Check the out put if some archive logs are missing .
If it not manual recovery is successful.
Then make the standby database as it is.
SQL> alter database recover managed standby database disconnect from session;
Do these tasks periodically and ensure your DR server is uptodate
Saturday, October 10, 2009
How to shutdown your oracle DR Server
Open sqlplus and log in as sysdba
prompt > sqlplus / as sysdba
Stop the standby database
sqlplus > alter database recover managed standby database cancel;
Then shutdown the database
sqlplus > shutdown immediate;
sqlplus > exit
Then shut your DR node
www.hackers.lk
is it all ??..no there are some more white hacking things...
Latest Malware
This Trojan spy program is designed to steal confidential user data and remotely manage the victim machine. It is a Windows PE EXE file. It is 470 bytes in size. Installation When launched, the Trojan creates the following file: %AppData%\
Trojan-Dropper.Win32.Agent.albv
This Trojan has a malicious payload. It is a Windows PE EXE file. It is 23552 bytes in size. Installation The Trojan copies its executable file as follows: %WinDir%\system\svhost.exe In order to ensure that the Trojan is launched automatically when the system is rebooted, the Trojan adds a link...
Backdoor.Win32.Agent.abgg
This Trojan provides a remote malicious user with access to the victim machine. It is a Windows PE EXE file. It is 22528 bytes in size. Installation Once launched, the Trojan copies its body to the Windows system directory as "digeste.dll": %System%\digeste.dll In order to ensure that the Trojan...
Trojan-Dropper.Win32.Kido.a
This Trojan is designed to install and launch other programs on the victim machine without the knowledge or consent of the user. It is a Windows PE EXE file. It is 78848 bytes in size. It is written in C++.
Trojan-Downloader.Win32.Kido.a
This malicious program is a Windows DLL file. Installation The malware copies its executable file with random names to the following directories: %Program Files%\Internet Explorer\
Email-Worm.Win32.Merond.a
This worm spreads as an attachment to infected emails and also via file-sharing networks and removable media. The worm itself is a Windows PE EXE file. The worm’s executable file can vary between 150KB to 400KB in size. Installation The worm copies its executable file to the Windows system...
Trojan.Win32.Agent.azsy
This malicious program is a Trojan. It is a Windows PE EXE file. It is 417792 bytes in size. It is packed using UPX. The unpacked file is approximately 439KB in size. It is written in C++. Installation Once launched, the Trojan copies its body to the current user’s Windows startup...
Trojan.Win32.Agent2.dtb
This Trojan calls premium rate numbers without the knowledge or consent of the user. It is a Windows PE EXE file. It is 25131 bytes in size. It is written in Delphi.
Trojan-Downloader.Win32.Small.ydh
This Trojan downloads other files via the Internet and launches them for execution on the victim machine without the user’s knowledge or consent. It is a Windows PE EXE file. It is 34816 bytes in size. It is not packed in any way. It is written in C++. Installation Once launched, the Trojan...
This Trojan downloads another malicious program via the Internet and launches it on the victim machine without the user’s knowledge or consent. It is a Windows PE EXE file. It is 9216 bytes in size. It is packed using UPX. The unpacked file is approximately 38KB in size. It is written in...