Break into a session!

Hi Guru's,
I have a problem where I can't find a solution for. How can I break into a session?
The issue is as follows:
In a session I have a open database link connection and I want to close it using dbms_session.close_database_link or alter session close database link. But it's not possible to execute those commands in the application (we can't change the code).
First I thought I create a trigger on a table and on delete/update/insert I execute the statement, but it turns out we can't always execute dml on the specific table from the application.
So are there other options?
I also thought of dbms_alert and dbms_pipe but they use different sessions.
regards, Hans

user497975 wrote:
We have a gateway to DB2. A certain application is using this gateway but doesn't close the database link after using it as it should be doing. On DB2 there is an idle timeout parameter set to 10 minutes. This means after 10 minutes an error is generated when the application is using the gateway again. This is unwanted behaviour.
There are 4 options:
1 the error is catched by an exception
2 the database link is closed in the session
3 the session is closed
4 every (let's say) 5 minutes a calll will be done to the gateway
But those 4 options can't be executed from the application as we cannot alter the code. This is a third party tool and the supplier doesn't change the code for this. So we have to find another solution.Actually, there are at least two other options, that you DO have control over
1 - change the idle timeout parameter at db2
2 - tell the user they can't just walk away from their app and go to lunch, but need to shut it down when they are through working.
And there is a third, which you have partial control over -- lean on the product vendor to fix their buggy application. You as a DBA may not be able to do this, but it sounds like something that should be done by those who can. If your company is paying more than a trivial amount of money, they DO have leverage if they just have the ..... to use it.

Similar Messages

  • How can I import a movie into iMovie 09 from a hard drive?  The movie will open and play in idvd but breaks into separate files that can't be downloaded when I try to import.  Can it be done?

    How can I import a movie into iMovie 09 from a hard drive?  The movie will open and play in idvd but breaks into separate files that can't be downloaded when I try to import.  Can it be done? I am trying to create a disc of player highlights for a collegiate coach, and I am using movie files downloaded to my hard drive from a DVD created on a PC. 

    No unfortunately it won't open in quicktime either.  It does the same thing that Imovie does, separates it into two file folders audio and video, and if i select video it opens to reveal 8 files that cannot be selected.  VIDEO_TS.BUP, VIDEO_TS.IFO, VIDEO_TS.VOB,VTS_01_0.BUP, VTS_01_0.IFO, VTS_01_1.VOB, VTS_01_2.VB, VTS_01_3.VOB.  All of which cannot be opened or selected.
    Opening it in Idvd and folllowing your suggestion works and I get a format code of NTSC.  Is that the same?  Thank you for your time and response.
    CaCanuck

  • Video uploading from DV camera no longer breaks into scenes

    When I first started using iMovie 4 my video uploaded as it was supposed to, breaking into distinct scenes on the clipboard. For about a year now iMove stopped uploading correctly and began uploading video only in large 9 minute blocks. This is obviously not very convenient when you want to quickly find a scene. I would like to understand why this might have happened and how I might restore the correct function.
    My preferences have "Automatically create new clip at scene break" checked. What could be wrong?
    Frustrated!
    Richard

    Have you actually checked the footage you are importing to see if there is data and time date stamped in the footage? This is to check to see if the date stamp is ok and a problem with iMovie or if there is no date stamp (or one long continuious one across all the footage) in which case iMovie is acting normal and you have an issue with your footage, video camera, etc.
    Patrick

  • Ksld not breaking into source file

    Hi guys,
    I installed ksld and started debugging my driver using a tip connection... all works fine.. i inserted a breakpoint on one of my functions in the driver.. and in the tip console once i have reached the breakpoint.. i use ::remote to enter remote mode and start the ksld with all those options on the host and it get connected to the ksld agent.. but the host is not able to show the source code of my driver... ie it always breaks into the asm dump of the driver code.. how do i switch to source display.. but at the same time i am able to edit the source file and all.. ie by using edit command.. but no idea why the asm code is dumped while a break point is reached..
    any idea how we can switch to source level code for debugging..
    thanks all

    The simple answer here is that machine specific files do not need to be checked in. This includes .PSS and .CPD files. The .HHP and .XPJ files are not machine specific, they are project specific and therefore must be checked in. The confusion over the HHP file may come down to whether CHM output is being produced. If you are not, you could safely say that this file need not be source controlled. However it doesn't cost anything to include it under source control so why make life more difficult by excluding it.
      The RoboColum(n)
      @robocolumn
      Colum McAndrew

  • IBook G3 Display breaks into four panes

    Our granddaughter's G3 iBook dual 12" has started acting strange. Every now and then the display will break into 4 separate identical green panes. This only lasts about one or two seconds then returns to the correct display. Any ideas would be appreciated. Thanks

    If it comes to need the shim fix, there are simpler instructions suggested by John Sawyer in the Apple Discussions iBook G3 (Dual USB) Displays Forum:
    [Y]ou can often fix this yourself by removing the iBook's bottom housing, and placing a shim of any sort, about 1mm to 1.5mm thick, onto the raised square on the bottom shield. I use a Scotch mounting square--you can get them in hardware stores and many grocery stores. When you reinstall the bottom case, it will press against this shim, which will press against the graphics chip, and may allow the chip to come into better contact with the logic board.
    John Sawyer
    CJS Macintosh Repair
    Instructions for removing the lower case:
    iFixit.com

  • Someone's trying to break into server

    Hello,
    According to my directory service log, someone is trying to break into our server by trying to log in as 'root' and 'admin'. DirectoryServices senses this and delays the failed authentication return.
    Okay, how do we backtrace this fellow's IP and where do I get a detailed log of this apparent hacker's attempts?
    Thanks!

    In my strongly felt opinion, using denyhosts is mostly a bandaid to a problem, rather than properly addressing it.
    The one and only time I have used it was when I was battling a situation not entirely under my control. No need to go into those specifics, but it was indeed a bandaid to a situation in which I could not properly secure the server. That has since changed.
    I can't state this with enough emphasis: the proper maintenance of server security should totally negate the need for DenyHosts.
    1) Shut off ssh access ("remote login") completely if that is an option
    1) Shut off root access via ssh entirely
    Said quickly: edit /etc/sshd_config and change the section to appear as follows:
    # Authentication:
    PermitRootLogin no
    AllowUsers myserveradmin
    where "myserveradmin" is the shortname of a desired user, and should categorically not be "admin" "administrator" "test" or anything else painfully obvious.
    Restart ssh.
    Furthermore !
    3) Shut off password access via ssh completely. Use access by ssh keys only.
    See the tutorial by Mike Bombich (of Apple) here:
    http://www.bombich.com/mactips/rsync.html
    starting with "Before you start: Security Briefing"
    Or this article at another excellent resource:
    http://www.afp548.com/article.php?story=20040816224717742
    note the further information about how to limit commands available via ssh.
    Having done this, edit /etc/sshd_config and add:
    # To disable tunneled clear text passwords, change to no here!
    PasswordAuthentication no
    PermitEmptyPasswords no
    and restart ssh.
    4) Set the shell ("login shell") for every and any account that does not need shell access to your server, to: None
    5) Limit ssh access at your firewall, to known-viable IP ranges or even specific static IPs.
    Better yet, (while still observing the other steps above) don't allow ssh traffic across your firewall, and setup VPN, and then use ssh access via VPN only.
    Do all of this at your own "risk" meaning understand the consequences, the first of which will be a server that is more secure in terms of ssh access. This does little to prevent problematic php (phpBB) or other mismanaged or poor 3rd-party packages and their impact on your server.

  • How to get into desktop screen at once when client come into RDP session?

    How to get into desktop screen at once when client come into RDP session?
    When users login into terminal server I would like they see own desktop and open web page of corp portal.
    How to do that?

    Hi
    Hope below links will help
    http://blog.cloud-client.info/2012/10/03/tip-configure-a-keyboard-shortcut-to-minimize-fullscreen-citrix-or-microsoft-rds-sessions-for-a-linux-based-igel-os/
    Also there are some Remote Desktop Services shortcut keys
    http://msdn.microsoft.com/en-us/library/aa383500%28v=vs.85%29.aspx
    Regards,
    Rajesh J S

  • How to store forms fields into the session ?

    Hi All,
    I have to store forms fields into the session.
    I have four forms (htm forms) in four jsps and there are total 25 fields.
    I am inserting all the fields into the database at once while user submit the last form.
    I want to use session to store forms fields.
    So please anybody tell me how to do that.
    Is the following code correct to store the forms fields into
    the sesstion........
    // creating a session
    HttpSession session=request.getSession(true);
    // retrieving form fields
    String name=request.getParameter("customer_name");
    String business=request.getParameter("business");
    String address=request.getParameter("address");
    and so on....
    // store form fields into the session
    session.setAttribute("name",name);
    session.setAttribute("business",business);
    session.setAttribute("address",address);
    and so on....
    and later on get the value as:
    session.getAttribute("name");
    session.getAttribute("business");
    session.getAttribute("address");
    and so on....
    OR
    is there another way to store form fields into the session.
    Please guide and reply with coding.....
    Please answer and help.
    Thanks
    Amitindia

    I don't mean to be an *** but I have no desire to help someone so unwilling to think >>and do. Go through some of these tutorial, do the examples in each and you will be far >>better equipped to ask questions:
    http://www.google.co.za/search?hl=en&q=%2Bjsp+%2Bjavabean+%2Btutorial&b >>tnG=Google+Search&meta=
    I was just asking that if I use the following
    <jsp:useBean id="cart" scope="session" class="session.Carts" />
    <jsp:setProperty name="cart" property="address" value="myaddress" />
    </jsp:useBean>then will I be able to acheive my aim as I have to store form fields into the session and later retreive while user submit the last form.
    Please read my question that I have posted.
    Am I using the right way................or which is the best way to store form fields into the session and later retrieve them.
    please reply
    Thanks
    Amitindia

  • How to break into Sol7 with remote console.

    Greetings fellow Solaris on Intel users,
    We originally started driver development on Sol8. We set up a remote console (eeprom input-device=ttya, output-device=ttya), modified /etc/default/kbd by specifying KEYBOARD_ABORT=alternate (due to serial connection to WinNT), and then issued kbd -a alternate. To break into Sol8 via the remote console, the break-in key sequence is <CarriageReturn>~<cntrl-b> To get the <CarriageReturn>, one must hold the ALT key whilst entering 013. This works fine.
    However, we need to do some verification of our driver under Sol7 (11/99). The problem we are having is that Sol7 does not have the /etc/default/kbd file, nor the kbd utility. Remote console works fine.
    The question is how can we setup Sol7 in order to break into kabd via the remote console.
    Thanks in advance for any help rendered.

    ImMansor wrote:
    Isnt there a program to try every possible combo?
    Tell me. Is this really what you want?
    New in OS X 10.10 "Napa" - FileVault 3 NeverLost  ®. FileVault 3 features much less secure passwords so that if you should ever lose your password or your machine is stolen, the disk can be unlocked in minutes. Never lose valuable information again!

  • Someone is breaking into my email account.

    Can anything be done to catch a person who breaks into an email account?
    == This happened ==
    Not sure how often

    Firefox is not an email program, so your problem depends on what site you are using for email. What site are you using?

  • Can host hacker break into guest that uses full disk encryption?

    I know it is unlikely but let us say host has got owned, ie a hacker has managed to break into the host.
    How would they go about breaking into a linux VM that uses full disk encryption?
    They can't mess with the .vmdk without damaging it - it is encrypted by the guest.
    They can't use vmrun because they do not know the guest passwords.
    They can't attach to processes in the guest with debugging tools because they cannot see individual guest processes.
    What can they do?  And crucially, what can I do as a countermeasure?

    What really matters is WHERE you do the encryption. If the encryption is too low, data in the guest appears unencrypted. If it is in the guest, then the keys live in the guest and since SGX is not around at the moment, keys are somewhere in guest memory even for a little bit of time.
    So the real question is what are you trying to achieve?
    If you are trying to meet encryption at rest requirements then it makes no difference where you encrypt as the data on the disk will be encrypted and without the key no one can decrypt it. Now if you have keys generated within a VM without using DRNGD or some other high quatlity randomness source, then your keys could be predictable and you need to guard against making it easy for a brute force attack.
    If you need to encrypt data in motion?
    Then you need to consider how the VM is protected itself, how an application interacts with data to determine during 'motion' if someone should not be accessing the data even though they are already supposedly allowed to do so. Keys are in memory, so therefore you need to guard memory access for those keys to only the application in question. This is the hard part, and requires you to think seriously about logging, key management, etc.
    So really what are you trying to achieve?
    Best regards,
    Edward L. Haletky
    VMware Communities User Moderator, VMware vExpert 2009-2015
    Author of the books 'VMWare ESX and ESXi in the Enterprise: Planning Deployment Virtualization Servers', Copyright 2011 Pearson Education. 'VMware vSphere and Virtual Infrastructure Security: Securing the Virtual Environment', Copyright 2009 Pearson Education.
    Virtualization and Cloud Security Analyst: The Virtualization Practice, LLC -- vSphere Upgrade Saga -- Virtualization Security Round Table Podcast

  • Breaking into the market

    Hi Guys,
    I am keen to land a job in Java Programming and would appreciate any advice...
    I have a good Physics Degree rather than a computing one but I am currently studying for a HND in Software Development and the SCJP exam. What do people feel is more important to have the HND or the SCJP?
    Also it can be tough to break into the market without experience - the old catch 22 situation. How did those of you that work in programming get your first job ? And what level were you at - i.e. could you already write programs or did you learn to program on the job?
    Your feedback and experience would be welcome.

    The catch 22 is always there in the job market, regardless of the field. The trick is to find a way in using what or who you know. For me it was a co-op program at the university I attended many years ago. And I know several people where I currently work that broke in using the same technique quite recently. And don't turn down opportunities to work in related fields, eg. a financial industry job will provide you with a lot of domain knowledge that can come in handy later.

  • People can break into my computer by restating it

    i logged out of my mac and at the bottom of the login screen it says sleep, restart, and shut down. i accedentaly selected restart. the computer restarted like normal except when it was done it opened up my user! it didnt ask for my password or anything.This makes it too easy to break into a computer. i was wondering if this happens on all computers and if there is a way to make the login screen come up after a restart or ask for a password.
    any help is appreciated!

    Open the Security & Privacy or Users & Groups pane of System Preferences and turn off automatic login.
    (72672)

  • Is there any way to break into an ipod after it has been disabled

    i need help is there any way to break into an ipod touch after it has been disabled

    Maybe the CIA could get data from an disabled iPod.
    It is easy for anybody to erase the iPod and regain use of the iPod for their own use.  Just place in recovery mode and retore.

  • A voice breaks into all my songs announcing the name and the play list. I have no apps on the device. Is this a setting? Or do I have a virus/app installed I dont know about?

    A voice breaks into all songs played on my jpod announcing the song and playlist. Is this a setting I cant find? Very frustrating.

    The same thing happens to me
    Whether I am listening to the music in my car. .or working out
    Very annoying

Maybe you are looking for

  • SQL error while activating DSO and loading Mater Data

    Hello Experts, we are having process chains which include process activating DSO and loading to Master data, while executing achai, we are getting error: An error occurred during confirmation of process 000008. See long text Message no. RSODSO_PROCES

  • Microphone HELP

    Hello, I am wanting to by a Microphone for my Canon GL2 but there is so much slelection and i cant find a microphone that will work wirelessly on my Canon GL2. My budget is $200 CAD and I want the microphone to be wireless and be able to work with my

  • Apex Custom Application Behaviour

    I've got a Apex custom application that utilizes AJAX. In essence its a custom drop down list within a search bar. If i login to my workspace and run application the drop down list works. If i try to just login to the application(no workspace login)

  • By selecting the dropdown list a new empty browser tab is getting opened

    Hi, When i try to pass the parameters in Bi report, by selecting the dropdown list a popup(new empty browser tab) is getting opened why is this so. Can anyone help me to sort it out. Edited by: user9093700 on Jul 6, 2012 8:57 AM Edited by: user909370

  • My iPhone5 lock screen stops working sometimes

    My iPhone5 lock screen stops working sometimes.I have to restart the phone every time I encounter this problem. Sometime even when phone is locked and there's incoming call I couldn't answer simply because the touch stops working. This frequency of o