Ecommerce theory question...

I've been working on my first online store, and just have a
quick question that struck me whilst trying to think ahead, and how
people could potentially break the system.
I'm using web assist's ecart, and as it's my first, I'm not
sure how things are typically set up.
Basically this set up involves sending the customer to an
externam payment gateway, where card details are taken and
processed, before the customer is returned to the main site.
At the point where the customer is sent on to the gateway, a
record is created in an orders table, which includes a field 'Order
Status', which defaults to 'Pending'. Once the payment has been
approved, the customer is passed back to a 'return' page, which
contains a script to update the order status field from 'pending'
to 'accepted'.
It also seems like a logical place to generate a receipt to
be sent out to the customer.
My question is this tho' - what's to stop a savvy customer
getting to the payment gateway, but not entering any payment
details, and then just manually going to the return page, which
would trigger the update 'Order Status' field, and even worse,
generate a receipt for something which hadn't actually been paid
for?

I suppose the session variables set by the success/failure of
the
transaction between the cart and the payment gateway would be
the roadblock
for this scheme. Surely the return page would check for that
before
triggering the update....
Murray --- ICQ 71997575
Adobe Community Expert
(If you *MUST* email me, don't LAUGH when you do so!)
==================
http://www.dreamweavermx-templates.com
- Template Triage!
http://www.projectseven.com/go
- DW FAQs, Tutorials & Resources
http://www.dwfaq.com - DW FAQs,
Tutorials & Resources
http://www.macromedia.com/support/search/
- Macromedia (MM) Technotes
==================
"Iain71" <[email protected]> wrote in
message
news:[email protected]...
> I've been working on my first online store, and just
have a quick question
> that
> struck me whilst trying to think ahead, and how people
could potentially
> break
> the system.
>
> I'm using web assist's ecart, and as it's my first, I'm
not sure how
> things
> are typically set up.
>
> Basically this set up involves sending the customer to
an externam payment
> gateway, where card details are taken and processed,
before the customer
> is
> returned to the main site.
>
> At the point where the customer is sent on to the
gateway, a record is
> created
> in an orders table, which includes a field 'Order
Status', which defaults
> to
> 'Pending'. Once the payment has been approved, the
customer is passed back
> to a
> 'return' page, which contains a script to update the
order status field
> from
> 'pending' to 'accepted'.
>
> It also seems like a logical place to generate a receipt
to be sent out to
> the
> customer.
>
> My question is this tho' - what's to stop a savvy
customer getting to the
> payment gateway, but not entering any payment details,
and then just
> manually
> going to the return page, which would trigger the update
'Order Status'
> field,
> and even worse, generate a receipt for something which
hadn't actually
> been
> paid for?
>
>
>

Similar Messages

  • International ecommerce website questions

    I have two quick questions.
    1) Will google translate work with business catalyst ecommerce website?
    2) Has anyone here ever used International Checkout with business catalys? Does it work?
    Thanks again in advance!

    Hi there,
    1. Since Google translate is just a JS widget you embed on your site it will work with BC.
    2. I know that barcelonasouvenirs.com has different subdomains for different currencies and it's redirecting people automatically depending on where they're based.
    You can have a look at http://kb.worldsecuresystems.com/521/bc_521.html
    Cheers,
    -mario

  • Graph Theory question...

    My graph knowledge is still requiring maturing. ;) I was wondering if anyone could help me with this question:
    given a set of verticies in an undirected graph, (not all may be connected) I want to determine whether there exists a "walk" from Vi to Vj and if so, I want to work out the shortest "path" between the two.
    I can use a matrix to define my graph view no problems, but how to determine all this computationally is a bit challenging.
    Richie !

    shortest path, as in the "Traveling Sales Person" problem does not require all possible paths to be searched, but it does require setup as if all would be searched (British Museaum style of search using a depth first algorithm). Heuristic clipping of paths can be done once you have an inital path of length L. Any time you reach L length you need not follow that path, nor any of its children. If you reach the destination in shorter than L length, then take the new path as the optimal path length and continue until all paths are exhausted.

  • Virtual Desktops theory questions

    Hello!
    Help me please clarify several questions on Windows Server 2012 R2 virtual remote desktop  infrastructure.
    Having read the following artcile http://windowsitpro.com/virtualization/virtual-desktop-infrastructure-part-2-finally-vdi
    "The Remote Desktop Connection Broker role service is really the brains of the VDI environment. It communicates with and controls the other components, working particularly closely with the Remote Desktop Session Host in redirection mode, which
    is why the Remote Desktop Connection Broker and Remote Desktop Session Host
    in redirection mode are frequently placed on the same OS instance. However, when you start having more than 250 simultaneous connections, you might need to consider breaking the roles onto separate servers.
    Remote Desktop Session Host in Redirection Mode
    The concept of using a Remote Desktop Session Host in redirection mode isn’t new.
    Remote Desktop Virtualization Host
    The Remote Desktop Virtualization Host role service is installed on any Hyper-V host that will be participating in a VDI pool. This role service lets the Remote Desktop Connection Broker
    role service communicate with the Hyper-V hosts, start and stop VMs, and gather internal information to enable client connections."
    ...I've concluded that RDSH and RDVH are the two separate roles that can be (and should be - according to the Figure1 !) installed onto the two separate OS instances (RDCB + RDSH in Redirection mode on one server and the RDVH on the other).
    But when it comes to deploying VDI in practice I don't see how it's possible to separate RDSH in Redirection mode and RDVH services. Moreover, if we look at the following  screenshots...
    http://blogs.technet.com/b/canitpro/archive/2013/04/25/step-by-step-deploying-virtual-desktops-with-windows-server-2012.aspx
    ...we'll see that on step 1 Add the Roles and features wizard "wants" to deploy the
    RDSH service while on step 3 the RDSH service transforms to the
    RDHV service.
    Q1) What does this service transformation means?
    Q2) Is it possible to have RDSH in Redirection mode and
    RDVH services on separate servers in Win2012?
    Q3) Is it possible when using pooled virtual desktop collection to set, for example, 2 cores per virtual desktops wich based on Template1 and 1 core per virtual desktops based on Template2?
    Thank you in advance,
    Michael

    "With RDSH, you will get RemoteApp, the "terminal sessions". Have you been around during Windows
    Server 2003 Tarminal Server? That´s it, but with additional RDWeb. RDSH is pretty much the same as Citrix XenApp overall." -
    yes, I understand.
    "You can setup VDI infra with only one server, you will need
    RDVH, RDWeb and RDConnector roles, that´s all. You don´t need RDSH role for running VDI.  -
    I'm agree... but if I have VDI up and running without RDSH why its item is present on Deployment Overview diagram???  Can't find corresponding documentation anywhere... :(
    Regards,
    Michael

  • Theory Question on reusing an object

    Hi,
    I am building a test question program. I have an object called TestQuestion that I would like to reuse by changing the text of the labels for every different question.
    I know that I can send arguments when I call or instantiate this object in my Interface class. But is there another way? What I mean is there a way to have all of the text for the questions located in separate methods within the TestQuestion class and then have the Interface send one command to pick and choose what question?
    public class Interface extends JFrame {     // 300
         static JPanel frameForCardPane;
         static CardLayout cardPane;
         private static JTextArea msgout;
         Interface () {     // 100
              super("This is a JFrame");
            setSize(800, 400);  // width, height
            setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);
              TestQuestionOne cardOne = new TestQuestionOne(msgout);
    public class TestQuestion extends JPanel {
        JLabel answerTextA;
        void buildConstraints(GridBagConstraints gbc, int gx, int gy,
            int gw, int gh, int wx, int wy) {
            gbc.gridx = gx;
            gbc.gridy = gy;
            gbc.gridwidth = gw;
            gbc.gridheight = gh;
            gbc.weightx = wx;
            gbc.weighty = wy;
        public TestQuestion(JTextArea msgout) {
          // set up layout
          GridBagLayout gridBag = new GridBagLayout();
          GridBagConstraints constraints = new GridBagConstraints();
          setLayout(gridBag);
           // answer A
          buildConstraints(constraints, 1, 0, 1, 1, 30, 5); // gx, gy, gw, gh, weightx, weighty
          answerTextA = new JLabel("This is where I want to change the text!");
           constraints.fill = GridBagConstraints.NONE;
           constraints.anchor = GridBagConstraints.WEST;
           gridBag.setConstraints(answerTextA, constraints);
          add(answerTextA);
          // answer B
          buildConstraints(constraints, 1, 1, 1, 1, 30, 5); // gx, gy, gw, gh, weightx, weighty
          JButton answerTextB = new JButton("Answer B");
           constraints.fill = GridBagConstraints.NONE;
           constraints.anchor = GridBagConstraints.WEST;
          gridBag.setConstraints(answerTextB, constraints);
          add(answerTextB);
          // answer C
          buildConstraints(constraints, 1, 2, 1, 1, 30, 5); // gx, gy, gw, gh, weightx, weighty
          JButton answerTextC = new JButton("Answer C");
           constraints.fill = GridBagConstraints.NONE;
           constraints.anchor = GridBagConstraints.WEST;
          gridBag.setConstraints(answerTextC, constraints);
          add(answerTextC);
          setVisible(true);
    }

    Mixing the data question data in with the question display class would generally be poor design.
    It would mean that anytime anyone wanted to add another question they would have to have access to the source code of your TestQuestion class and would need to recompile it.
    I'd also suggest that passing in a whole JTextArea just to describe the question text is overkill. Wouldn't a String do just as well?

  • Main function theory question

    Hello,
    Java is said to be pure object oriented.
    In order to make an executable program, one must provide a main function in the class of execution.
    This behavior is not pure object oriented.
    why couldnt a program start running by executing the constractor of the main class?
    if you think this question is posted in the wrong forum, plz notify me where should i post it.

    The main method also exists for practical reasons. How else would the JVM pass command-line parameters to your program? Either you require that a class has a static main, or you require that it has a constructor that accepts an array of Strings. But what if your class requires a constructor with an array of Strings as it's only parameter? How does Java know that this isn't an entry point to the program? The static main therefore acts as a clear entry point, whereas constructors do not.
    I've never used Eiffel, but I have a tough time imagining how you could start a program from anything but a static context. Even if you started from a Constructor, it just means that the RT is creating a static context for you under the hood from which it is calling your constructor. This way, you at least have control over the context you are using.

  • Theory question

    I have a doubt on this question:-
    purchase order for 25 pcs at 4 Rs / pc. tax = 5%. cash discount = 10 %. What will be the accounting document during invoice verification?
    a Input tax will be 4.5+ in net Posting
    b Stock account will be 10- in Gross posting
    c Stock account will be 10- in Net posting
    d Non operating result account will be 10- in Gross posting.
    my answer is 'd',because discount is posted as Non operating result
    will the gurus correct me
    thank you

    This may help:
    Programmatically Constraining a List In a Popup 
    At least it will demonstrate how LightSwitch works in regards to creating and consuming a query.
    Unleash the Power - Get the LightSwitch 2013 HTML Client / SharePoint 2013 book
    http://LightSwitchHelpWebsite.com

  • VMM theory question

    Hello!
    Please excuse me if this forum is not the appropriate one for my question but I failed to find a VMM specific forum here...
    "Building a Virtualized Network Solution" ebook, page 21:
    "When a logical switch is applied to a network adapter in a Hyper-V host, VMM uses the information contained in the logical switch and the selected uplink port profile to create a Hyper-V virtual switch on the host and..."
    Usually any Hyper-V host already has at least one virtual switch after the installation of the Hyper-V role. Does it mean that VMM would create the second virtual switch for the same host?
    Thank you in advance,
    Michael

    Hi,
    >Usually any Hyper-V host already has at least one virtual switch after the installation of the Hyper-V role.
    That's wrong. If you installed the role and didn't configured anything after that - you have no vSwitches. IF you nave any vSwitch bound to the NIC you plan to use for a Logical Switch - you'll have to delete a switch first.
    http://OpsMgr.ru/

  • VMM theory question 2

    Hello!
    One more question regarding VMM ("Building a Virtualized Network Solution" ebook (http://blogs.technet.com/b/scvmm/archive/2014/02/19/free-ebook-microsoft-system-center-building-a-virtualized-network-solution.aspx) :
    Q: What's the purpose of enabling SR-IOV for a switch if "When a Hyper-V virtual NIC is enabled for SR-IOV it is no longer connected to the virtual switch."?
    Thank you in advance,
    Michael

    To add to Alexey's statement - what you underlined in read is technically not correct.  It is a gross over-generalization of what is actually happening.
    There is always a virtual switch.  And that virtual switch must be enabled for SR-IOV thus validating that the physical NIC supports it.
    Now, when you get into packet flow, the Virtual Switch is actually still involved but very little - as it is the 'virtual network function' within the physical NIC that is handling most of the processing instead of the processor thread of the virtual switch
    - but it is still involved - there are still rules that can be set on that virtual port that the virtual switch may have to apply.
    And, as the failback - if the VM is live migrated the SR-IOV fails back to a regular vNIC until the Live Migration is complete.  And only goes back to being SR-IOV if the destination also supports it.
    And, John Howards blog talks about Hyper-V Manager, not SCVMM (which is where you are posting).  So be aware that SCVMM has its own rule set that it imposes beyond what you may be able to do with Hyper-V alone.
    Brian Ehlert
    http://ITProctology.blogspot.com
    Learn. Apply. Repeat.

  • VMQ theory question

    Hello!
    This blog "VMQ Deep Dive 1 of 3" (http://blogs.technet.com/b/networking/archive/2013/09/10/vmq-deep-dive-1-of-3.aspx) states:
    "Many people have reported that with the creation of a vSwitch they experience a drop in networking traffic drop from line rate on a 10Gbps card to ~3.5Gbps. This is by design. With RSS you have the benefit of using multiple queues for a single host
    so you can interrupt multiple processors. The downside of VMQ is that the host and every guest on that system is now limited to a single queue and therefore one CPU to do their network processing in the host. On server-grade systems
    today, about 3.5Gbps is amount of traffic a single core can handle.
    Now the question remains, why would I want to use VMQ if I’m capped at a single core for network processing? VMQ is the mechanism we use to spread networking traffic to multiple cores.
    Without VMQ, all of the networking traffic is done on a single core so your overall throughput is capped at ~3.5Gbps."
    I don't understand the following: if WITHOUT VMQ ALL traffic is done on a single core and the overall throughput is ~3.5Gbps why people report that they "experience a drop in networking traffic ... from 10Gbps to ~3.5Gbps" WITH VMQ???
    With VMQ enabled a single queue is affinitized to a single core and the total throughput should be
    "throughput" of queue1/cpu1 + "throughput" of queue2/cpu2  ... Otherwise, what's the benefit of enabling VMQ?
    Thank you in advance,
    Michael

    P.S. Regarding "Many people have reported that with the creation of a vSwitch they experience a drop in networking traffic ":
    http://blog.osmicro.org/hyper-v-virtual-machine-very-slow-network-vmq/
    "OMG Thank you so much! I was very close to pulling the pin on Hyper-V Server 2012 and booting up the old hardware. Instant results with no reboot.
    Thank you thank you thank you!
    Can’t believe this isn’t on any TechNet articles."
    ...that's why I'am asking this question: I wouldn't like to deploy some
    new technology (having invested extra money in the hardware) and then know that "a drop in networking traffic"
    is by design...
    Regards,
    Michael

  • Visibility Theory Question

    Let's say a reference to an object is visible using final, volatile, synchronized access, whatever. My understanding is that as a result, that reference will now be visible. If someone assigns it a new object, it will point to that object and immediate become visible. However, my question is: will the referred object's data be visible?
    This came across my mind when I was reading an example from Java Concurrency In Practice. So I'll post the example:
    @Immutable
    public final class ThreeStooges {
    private final Set<String> stooges = new HashSet<String>();
    public ThreeStooges() {
    stooges.add("Moe");
    stooges.add("Larry");
    stooges.add("Curly");
    public boolean isStooge(String name) {
    return stooges.contains(name);
    }(Sorry for not indenting! I'm not sure how exactly.)
    Anywayz. So the anyone who looks at the reference stooges will find the latest object (the only object since this is final i guess) assigned to it because of final's properties. However, when another thread calls the isStooge method, our implementation calls stoogest.contains(). However, the contains() method is not necessarily thread-safe. The state, the data, of HashSet is not implemented so that they are always visible.
    Therefore, my understanding is that isStooges will not return the truth. Well, in this case it might, because data is only added when constructing the object, but lets say there was another method called addStooge(String name). Would it still hold true?
    Lets say one thread calls addStooge("wijjit");. But since HashMap's state isn't designed to be visible in concurrent enviroments, the new "wijjit" stooge isn't visible to other threads ("wijjit" gets cached in local memory not yet flushed to global memory or whatnot). So isStooge("wijjit"); called from another thread could potentially return false could it not?
    Sorry if this is a bad way to ask from the example. My question is the same as it is on the top of the thread. ;) Even though the reference to the object is visible, would it be true that the state of the object itself might not necessarily be visible to all threads looking at it?
    Thanks in advance!
    Edited by: wijjit on Apr 21, 2010 7:08 PM

    wijjit wrote:
    No need to be condescending. I was not being condescending.
    Yes I am.Yes you are what? Talking about visibility of writes of shared variables across threads?
    You'll find you'll get better answers if you state your question clearly and precisely. This is not particular to Java or Computer Science.
    Tx writes "wijjit" into the stooges HashSet. Ty then calls isStooges("wijjit"); (a read). My question is: Wouldn't it be possible that the isStooges called by Ty returns false even though Tx wrote something into it because the internals of HashSet does not guarantee happens-before order, proper synchronization, visibility (however, you want to properly phrase it)?If we call stooges.add(), and there's no syncing or volatile variables, then it's entirely possible that other threads will see an inconsistent or invalid state of the Set, or just see the Set as is was before the add(), or see the Set as it was after the add().
    If stooges is volatile, that doesn't help at all for this case. It only means that any value that we assign to stooges will be immediately visible to all other threads. It does not affect the visibility of any internal changes to the object stooges points to.
    If, however, we synchronize all access to the map pointed to by stooges--all on the same lock, of course--then the Set will never be seen in an inconsistent state.
    T1                               T2
    synchronized (stooges) {       synchronized (stooges) {
      stooges.add(x);                for (Stooge stooge : stooges) {
      stooges.remove(y);               stooge.doStuff();
                                   }T2 will either see the Set as it exists before any of the above T1 actions, or after all of the above T1 actions. Anything that T1 does inside that sync block--regardless of whether it relates to the Set pointed to by stooges--will be visible to T2 (if T2 gets the lock after T1, rather than before).
    Edited by: jverd on Apr 21, 2010 8:03 PM

  • Backing up virtual machines in Hyper-V: theory question

    Hello!
    This article http://msdn.microsoft.com/en-us/library/dd405549%28v=vs.85%29.aspx says:
    "Hyper-V uses the Volume Shadow Copy Service (VSS) to backup and restore virtual machines (VMs).
    If the backup (volume snapshot) integration services are installed in the guest operating system, a VSS requester is installed that will allow VSS writers in the guest operating system to participate in the backup of the VM. "
    Backing Up the Virtual Machines
    Hyper-V uses one of two mechanisms to back up each VM. The default backup mechanism is called the "Saved State" method, where the VM is put into a saved state during the processing of the PrepareForSnapshot event,snapshots
    are taken of the appropriate volumes, and the VM is returned to the previous state during the processing of the PostSnapshot event."
    The other backup mechanism is called the "Child VM Snapshot" method, which uses VSS inside the child VM to participate in the backup....
    Backup (volume snapshot) Integration Service is installed and running in the child VM.
    The child VM must be in the running state."
    Putting it all together: the backup integration services are installed in the guest operating systems by default (at least in Win2008-2012R2), but "The default backup mechanism is called the "Saved State" method,...",
    wich does NOT use child vm snapshot creation. It means that checking the "Backup (volume checkpoint)" checkbox changes nothing (at least with running VMs) because the default method is "Saved state":
    Q1: if the default method is "Saved state" and my VMs are running what should I do to take a backup by using
    "Child VM Snapshot" method?
    Q2: is there any difference between a backup created by method 1 and method 2?
    Thank you in advance,
    Michael

    Hi,
    The two backup mechanisms used in the different backup scenario:
    Short to say is:
    Perform a backup from the server running Hyper-V
    (host).
    Perform a backup from
    within the guest operating system of a virtual machine.
    The detail explain is:
    There are two basic methods you can use to perform a backup. You can:
    Perform a backup from the server running Hyper-V. We recommend that you use this method to perform a full server backup because it captures more data than the other method. If the backup application is compatible with Hyper-V and the Hyper-V
    VSS writer, you can perform a full server backup that helps protect all of the data required to fully restore the server, except the virtual networks. The data included in such a backup includes the configuration of virtual machines, snapshots associated with
    the virtual machines, and virtual hard disks used by the virtual machines. As a result, using this method can make it easier to recover the server if you need to, because you do not have to recreate virtual machines or reinstall Hyper-V. However, virtual networks
    are not included in a full server backup. You will need to reconfigure the virtual networking by recreating the virtual networks and then reattaching the virtual network adapters in each virtual machine to the appropriate virtual network. As part of your backup
    planning, make sure you document the configuration and all relevant settings of your virtual network if you want to be able to recreate it.
    • Perform a backup from within the guest operating system of a virtual machine.
    Use this method when you need to back up data from storage that is not supported by the Hyper-V VSS writer. When you use this method, you run a backup application from the guest operating system of the virtual machine. If you need to use this
    method, you should use it in addition to a full server backup and not as an alternative to a full server backup. Perform a backup from within the guest operating system before you perform a full backup of the server running Hyper-V. For more information about
    storage considerations, see the following section.
    The related KB:
    Planning for Backup
    http://technet.microsoft.com/en-us/library/dd252619(v=ws.10).aspx
    Hope this helps.
    We
    are trying to better understand customer views on social support experience, so your participation in this
    interview project would be greatly appreciated if you have time.
    Thanks for helping make community forums a great place.

  • Java theory question

    Hi,
    Why is it possible that we can declare a variable to be of an interface type and yet at the same time assign to it an object?
    For example, I have an interface class (Interface), 1 class (FirstClass) that implements the interface and another 1 class (SecondClass) which not only implements the interface but also declares an instance variable to incorporate an interface object. (Concept of re-use by composition).
    Subsequently, I have another class that declares a variable to be the interface type (Interface) and yet assign to it a (SecondClass) object. The code goes something like this:
    Interface var = new SecondClass(new FirstClass());
    How is it possible that I can access all the methods found in FirstClass?
    Thanks in advance.

    You can't use the non-interface methods in FirstClass. The only thing that's important when you writeList list = new LinkedList ();is that you're interested in the methods (and fields) that are defined in the interface. You can't use removeFirst (which is in LinkedList), but you're not interested in it.

  • Some general theory question, pls help !!!

    1. How does Java support connection-based communications between two processes ?
    2 Why is use-case or scenario-based testing important in testing object-oriented programs.
    3. Explain the role of PAM (Pluggable Authentication Modules) in creating secure applications.
    4. What is a midlet and when should it be used?
    5 Explain how the following conventional testing strategies relate to testing object-oriented software: unit testing and integration testing
    6. Explain how designing java programs using UML design techniques can improve a Java program
    7. Explain how Servlets can be used in the server side of an application ?
    8. When should JSP be used in preference to servlets.
    9. Explain what standard actions are and the function of <jsp: forward> standard action.
    10. Explain the purpose of a URLConnection object?
    11. Explain how Java technology can access remote objects
    12. What role does the SecurityManager object play securing java applications and provide an example
    13. What is the Java Authentication and Authorization Service and how can it be used to develop secure java applications

    1. How does Java support connection-based
    communications between two processes ? It does this by using what is called the Windows Communication Foundation (WCF).
    2 Why is use-case or scenario-based testing important
    in testing object-oriented programs.This is so the Project manager will be able to determine scope in future releases.
    3. Explain the role of PAM (Pluggable Authentication
    Modules) in creating secure applications. PAM helps secure browser cookies from being stuck to the TRAY (Turnable Remote Activation Yearner) after BAKE (Billing Accounts Kernel Energizer)
    4. What is a midlet and when should it be used?Within the presentation tier.
    5 Explain how the following conventional testing
    strategies relate to testing object-oriented
    software: unit testing and integration testingUnit testing should be done on the production environment while integration testing should be to verify software needs.
    6. Explain how designing java programs using UML
    design techniques can improve a Java program UML design techniques improve a code's readability.
    7. Explain how Servlets can be used in the server
    side of an application ?They can be used for automatically generating dynamic GUI applications.
    8. When should JSP be used in preference to servlets.When one wants to display their presentation layer within the database tier.
    9. Explain what standard actions are and the function
    of <jsp: forward> standard action. This action moves the JSP to the next line of execution.
    10. Explain the purpose of a URLConnection object?This object is to maintain a browser instance within a GUI application.
    11. Explain how Java technology can access remote
    objectsThey do this by creating a contract with which SOA components can communicate.
    12. What role does the SecurityManager object play
    securing java applications and provide an exampleThe SecurityManager object provides an encryption key for preventing DDOS attacks from remote locations.
    n and Authorization Service and how can it be used to
    develop secure java applicationsThe Authorization Service is used to authenticate users based on applet certificates.

  • Log chain theory question

    Hello!
    As per BOL:
    http://msdn.microsoft.com/en-us/library/ms186299(v=sql.105).aspx
    begins_log_chain bit 1 - This is the first in a continuous chain of log backups.
    A log chain begins with the first
    log backup taken after the database is created or when it is switched from the simple to the full or bulk-logged recovery model.
    As per http://msdn.microsoft.com/en-us/library/ms190440%28v=sql.105%29.aspx
    The Log Chain
    A continuous sequence of log backups is called a log chain.
    A log chain starts with a full backup of the database. Usually, a new log chain is only started when the database
    is backed up for the first time or after the recovery model is switched from simple recovery to full or bulk-logged recovery.
    So what really starts a log chain - a DB or a LOG
    backup???
    Thank you in advance,
    Michael

    Michael,
         The confusion falls in the fact that once a database has been changed from Simple to full or bulk logged recovery model then the transaction log will continue to truncate itself upon a checkpoint.  The reason is that SQL is
    smart enough to know that a database backup has not yet been taken so there is no possibility to recover the database to a point in time.  This is sometimes referred to as pseudo simple recovery.  After a database backup is taken then the transaction
    log will only be truncated after a transaction log backup.
    Hope this helps
    David Dye My Blog

Maybe you are looking for