Install AntiVirus in Server - impact on database ?

HI all,
my environment
hp proliant dl 380 g5
windows 2003 server sp2
oracle 10g (10.1.0.2)
i have been requested to install antivirus software in this server (Mcafee 8.7) , my question here is , what the impact in oracle of doing this? i undestand that the virus scans every time a user tries to access a file .. this wil slow down my database ... I'd like to you from you .. you experiencies , configurations etc.
Thanks for you attention.
Best Regards
Rui Madaleno

Hi all,
i found a document on this subject in metalink
Subject: How To Configure Anti-Virus On Windows Server Running Oracle Database
Doc ID: 782354.1 Type: HOWTO
Modified Date: 17-FEB-2009 Status: MODERATED
I've implemented the configs suggested in this document, also i've disable the "stop email worm from send mass email" for java.exe and oracle.exe (Enterprise Manager)
Best Regards
Rui Madaleno
Edited by: ruival on Mar 11, 2009 10:26 AM

Similar Messages

  • Install Oracle HTTP Server to Oracle Database XE

    Successfully managed to install Oracle Database XE to Windows 2000 (after temporarily dropping TNSNAMES and TNS_ADMIN variables). I want to learn how to use Application Express (formerly HTML DB) and it would be a pain/take ages to get the enterprise DBA's to install it onto a supported networked instance. I have installed HTML DB into Oracle XE but the post installation instructions require that Oracle HTTP Server is installed. How do you get Oracle HTTP Server installed into Oracle XE? Oracle Universal Installer does not recognise Oracle XE as an Oracle Home. How do you use Oracle Universal Installer on Oracle XE? or how do you download Oracle HTTP Server with InstallShield? Seems strange that Oracle XE does not integrate with other toolset installations.
    Thanks

    ALTER SESSION SET CURRENT_SCHEMA = FLOWS_020000;
    exec FLOWS_020000.wwv_flow_upgrade.switch_schemas ('FLOWS_020000','FLOWS_020100');commit;I would give it a try, it's hard to make it worse ;).
    Oracle XE / Apex is almost the same.
    Some of the differences are:
    - SSO authentication is not supported out of the box (although there are workarounds)
    - You can assign only a single database schema to a workspace
    - There are no developer accounts in the workspaces
    Basically, both version are pretty much the same. You can export / import applications both ways.
    I cannot see what you mean by missing templates. They are all there (although not in the filesystem but stored in the database via XMLDB).
    You can reach the documentation from the homepage of XE and also from Start > Programs > Oracle Express Edition
    ~Dietmar.

  • Installed software in Server insert to Database tables

    Software table has a foreign key (compID) from the Computer table primary key (compID)
    Computer table columns
    compId    name   date .....
    Software table columns
    softID  compID  softwarename  vendor version .........
    For each computer name in Computer table, find all installed software then insert into software table all software info and only the compID. Also update the software table if it is already in the table or insert into software table if info is not there.
    here is my code so far:
    foreach($property in $soft){
    $cmd.CommandText = "INSERT INTO Software (idNumber, softwareName, vendor, version, auditDate) values (@idNumber, @softwareName, @vendor, @version, @auditDate)"
    $dt = Get-Date
    $cmd.Parameters.AddWithValue("@idNumber", $property.IdentifyingNumber) 
    #Traps null values
    if ([string]::IsNullOrEmpty($property.Name))
    $cmd.Parameters.AddWithValue("@softwareName", [DBNull]::Value) 
    else
    $cmd.Parameters.AddWithValue("@softwareName", $property.Name) 
    if ([string]::IsNullOrEmpty($property.Vendor))
    $cmd.Parameters.AddWithValue("@vendor", [DBNull]::Value) 
    else
    $cmd.Parameters.AddWithValue("@vendor", $property.Vendor) 
    if ([string]::IsNullOrEmpty($property.Version))
    $cmd.Parameters.AddWithValue("@version", [DBNull]::Value) 
    else
    $cmd.Parameters.AddWithValue("@version", $property.Version) 
    $cmd.Parameters.AddWithValue("@auditDate",$dt) 
    $cmd.executenonquery() 
    $cmd.Parameters.Clear();
    $dbConn.Close()

    Hi Morphius1,
    I’m writing to just check in
    to see if the suggestions were helpful. If you need further help, please feel free to reply this post directly so we will be notified to follow it up.
    If
    you have any feedback on our support, please click here.
    Best
    Regards,
    Anna
    Wang
    TechNet
    Community Support

  • Log on to remote server and start database -error while installing CI in HA

    Hello All,
    We are installing ECC 6.0 with High Availability using HP-UX. We have completed installation in ASCS and Database Instance. Now when were trying to install in Central Instance, we encountered an error at Start Instance which informed us to Log on to remote server and start database. However the database is already running in DB node.  Please find the log below.
    TRACE      2011-06-10 16:31:45.825 [syuxctask.cpp:1382]
               CSyTaskImpl::start(bool)
    A child process has been started. Pid = 25742
    INFO       2011-06-10 16:31:45.835
               CJSlibModule::writeInfo_impl()
    Output of /usr/sap/PE2/SYS/exe/run/startsap all DVEBMGS01 DBMCI001 is written to the logfile start_PE2_DVEBMGS01.log.
    WARNING    2011-06-10 16:31:46.345
               CJSlibModule::writeWarning_impl()
    Execution of the command "/usr/sap/PE2/SYS/exe/run/startsap all DVEBMGS01 DBMCI001" finished with return code 6. Output:
    Database PE2 must be started on remote server
    Log on to remote server and start database
    WARNING[E] 2011-06-10 16:31:46.355
               CJSlibModule::writeError_impl()
    CJS-20022  Could not start instance 'DVEBMGS01' of SAP system PE2.
    TRACE      2011-06-10 16:31:46.355 [iaxxejsbas.hpp:408]
               handleException<ESAPinstJSError>()
    Converting exception into JS Exception EJSException.
    TRACE      2011-06-10 16:31:46.355
    Function setMessageIdOfExceptionMessage: ind-rel.ind-os.ind-db.webas.startInstanceFailed
    WARNING[E] 2011-06-10 16:31:46.355
               CJSlibModule::writeError_impl()
    CJS-20022  Could not start instance 'DVEBMGS01' of SAP system PE2.
    TRACE      2011-06-10 16:31:46.355 [iaxxejsbas.hpp:483]
               EJS_Base::dispatchFunctionCall()
    JS Callback has thrown unknown exception. Rethrowing.
    TRACE      2011-06-10 16:31:46.405 [syuxctask.cpp:1382]
               CSyTaskImpl::start(bool)
    A child process has been started. Pid = 25793
    ERROR      2011-06-10 16:31:46.525 [sixxcstepexecute.cpp:950]
    FCO-00011  The step start with step key |NW_ABAP_CI|ind|ind|ind|ind|0|0|NW_CI_Instance|ind|ind|ind|ind|10|0|NW_CI_Instance_Start|ind|ind|ind|ind|2|0|start was executed with status ERROR .
    TRACE      2011-06-10 16:31:46.555 [iaxxgenimp.cpp:752]
                CGuiEngineImp::showMessageBox
    <html> <head> </head> <body> <p> An error occurred while processing option SAP ERP 6.0 EHP4 Ready - Support Release 1 > SAP Application Server ABAP > Oracle > High-Availability System > Central Instance . You can now: </p> <ul> <li> Choose <i>Retry</i> to repeat the current step. </li> <li> Choose <i>View Log</i> to get more information about the error. </li> <li> Stop the option and continue with it later. </li> </ul> <p> Log files are written to /tmp/sapinst_instdir/ERPEhP4/AS-ABAP/ORA/HA/CI. </p> </body></html>
    TRACE      2011-06-10 16:31:46.555 [iaxxgenimp.cpp:1255]
               CGuiEngineImp::acceptAnswerForBlockingRequest
    Waiting for an answer from GUI
    Kindly let us know how to rectify the error and prroceed further with the instalaltion.
    Thanks
    Rishi

    Dear Guys,
    we didnt change the date and time but i m very sure it is same trans.log file.
    for your kind information please note SID and Nodes details
    Sid (PE2)
    DB Node : DBMDB001
    CI Node :   DBMCI001
    also i am attaching starting part of the file.
    4 ETW000 R3trans version 6.14 (release 701 - 26.01.09 - 12:46:00).
    4 ETW000 unicode enabled version
    4 ETW000 ===============================================
    4 ETW000
    4 ETW000 date&time   : 07.11.2010 - 03:44:06
    4 ETW000 control file: <no ctrlfile>
    4 ETW000 R3trans was called as follows: R3trans -d
    4 ETW000  trace at level 2 opened for a given file pointer
    4 ETW000  [dev trc     ,00000]  Sun Nov  7 03:44:06 2010                             295  0.000295
    4 ETW000  [dev trc     ,00000]  db_con_init called                                    22  0.000317
    4 ETW000  [dev trc     ,00000]  create_con (con_name=R/3)                            116  0.000433
    4 ETW000  [dev trc     ,00000]  Loading DB library '/usr/sap/PC1/SYS/exe/run/dboraslib.so' ...
    4 ETW000                                                                              64  0.000497
    4 ETW000  [dev trc     ,00000]  load shared library (/usr/sap/PC1/SYS/exe/run/dboraslib.so), hdl 0
    4 ETW000                                                                           32161  0.032658
    4 ETW000  [dev trc     ,00000]  Library '/usr/sap/PC1/SYS/exe/run/dboraslib.so' loaded
    4 ETW000                                                                              39  0.032697
    4 ETW000  [dev trc     ,00000]  function DbSlExpFuns loaded from library
    /usr/sap/PC1/SYS/exe/run/dboraslib.so
    4 ETW000                                                                             111  0.032808
    4 ETW000  [dev trc     ,00000]  Version of '/usr/sap/PC1/SYS/exe/run/dboraslib.so' is "700.08",
    patchlevel (0.25)
    4 ETW000                                                                             265  0.033073
    4 ETW000  [dev trc     ,00000]  function dsql_db_init loaded from library
    /usr/sap/PC1/SYS/exe/run/dboraslib.so
    4 ETW000                                                                              41  0.033114
    4 ETW000  [dev trc     ,00000]  function dbdd_exp_funs loaded from library
    /usr/sap/PC1/SYS/exe/run/dboraslib.so
    4 ETW000                                                                              82  0.033196
    4 ETW000  [dev trc     ,00000]  New connection 0 created                              52  0.033248
    4 ETW000  [dev trc     ,00000]  0: name = R/3, con_id = -000000001 state = DISCONNECTED, perm = YES,
    reco = NO , timeout = 000, con_max = 255, con_opt = 255, occ = NO
    4 ETW000                                                                              41  0.033289
    4 ETW000  [dev trc     ,00000]  db_con_connect (con_name=R/3)                         84  0.033373
    4 ETW000  [dev trc     ,00000]  find_con_by_name found the following connection for reuse:
    4 ETW000                                                                              31  0.033404
    4 ETW000  [dev trc     ,00000]  0: name = R/3, con_id = 000000000 state = DISCONNECTED, perm = YES,
    reco = NO , timeout = 000, con_max = 255, con_opt = 255, occ = NO
    4 ETW000                                                                              37  0.033441
    4 ETW000  [dev trc     ,00000]  Oracle Client Version: '10.2.0.4.0'                  601  0.034042
    4 ETW000  [dev trc     ,00000]  -->oci_initialize (con_hdl=0)                         25  0.034067
    4 ETW000  [dev trc     ,00000]  Client character set UTF16 -> UTF8                 35674  0.069741
    4 ETW000  [dev trc     ,00000]  Client NLS setting (OCINlsGetInfo): 'AMERICAN_AMERICA.UTF8'
    4 ETW000                                                                              57  0.069798
    4 ETW000  [dev trc     ,00000]  Logon as OPS$-user to get SAPSR3's password           55  0.069853
    4 ETW000  [dev trc     ,00000]  Connecting as /@PC1 on connection 0 (nls_hdl 0) ... (dbsl 700
    151208)
    4 ETW000                                                                              34  0.069887
    4 ETW000  [dev trc     ,00000]  Nls CharacterSet                 NationalCharSet              C     
    EnvHp      ErrHp ErrHpBatch
    4 ETW000                                                                              52  0.069939
    4 ETW000  [dev trc     ,00000]    0 UTF8                                                      0
    0x6000000001052910 0x600000000105a3c0 0x600000000106ab38
    4 ETW000                                                                              58  0.069997
    4 ETW000  [dev trc     ,00000]  Allocating service context handle for con_hdl=0       40  0.070037
    4 ETW000  [dev trc     ,00000]  Allocating server context handle                      27  0.070064
    4 ETW000  [dev trc     ,00000]  Attaching to DB Server PC1
    (con_hdl=0,svchp=0x600000000106aa68,srvhp=0x600000000106de78)
    4 ETW000                                                                              63  0.070127
    4 ETW000  [dev trc     ,00000]  Assigning server context 0x600000000106de78 to service context
    0x600000000106aa68
    4 ETW000                                                                           60612  0.130739
    4 ETW000  [dev trc     ,00000]  Allocating user session handle                        97  0.130836
    4 ETW000  [dev trc     ,00000]  Starting user session: OCISessionBegin(con_hdl=0,
    usr='/',svchp=0x600000000106aa68, srvhp=0x600000000106de78, usrhp=0x60000000010fc940)
    4 ETW000                                                                              64  0.130900
    4 ETW000  [dev trc     ,00000]  Assigning user session 0x60000000010fc940 to service context
    0x600000000106aa68
    4 ETW000                                                                            9302  0.140202
    4 ETW000  [dev trc     ,00000]  -->oci_prepare_stmt(con_hdl=0, len=53, stmth_p=0x6000000001077608)
    4 ETW000                                                                             198  0.140400
    4 ETW000  [dev trc     ,00000]         BEGIN DBMS_APPLICATION_INFO.SET_MODULE(:A0,:A1); END;        
    4 ETW000                                                                              38  0.140438
    4 ETW000  [dev trc     ,00000]  CbApplInfoGet() failed! Ignore, but uninstall callback to avoid more
    erroneous calls
    4 ETW000                                                                             291  0.140729
    4 ETW000  [dev trc     ,00000]  -->oci_prepare_stmt(con_hdl=0, len=54, stmth_p=0x6000000001078660)
    4 ETW000                                                                              33  0.140762
    4 ETW000  [dev trc     ,00000]         BEGIN DBMS_APPLICATION_INFO.SET_CLIENT_INFO(:A0); END;       
    4 ETW000                                                                              35  0.140797
    4 ETW000  [dev trc     ,00000]  -->oci_prepare_stmt(con_hdl=0, len=0, stmth_p=0x6000000001078660)
    4 ETW000                                                                             937  0.141734
    4 ETW000  [dev trc     ,00000]         SELECT SID FROM V$MYSTAT WHERE ROWNUM<2                                                                               
    4 ETW000                                                                              36  0.141770
    4 ETW000  [dev trc     ,00000]  Connected to session 297.                            639  0.142409
    4 ETW000  [dev trc     ,00000]  Now '/@PC1' is connected: con_hdl=0, nls_hdl=0, session_id=297.
    4 ETW000                                                                              38  0.142447
    4 ETW000  [dev trc     ,00000]  -->oci_prepare_stmt(con_hdl=0, len=0, stmth_p=0x6000000001078660)
    4 ETW000                                                                              37  0.142484
    4 ETW000  [dev trc     ,00000]         ALTER SESSION SET NLS_SORT = BINARY                                                                               
    4 ETW000                                                                              36  0.142520
    4 ETW000  [dev trc     ,00000]  -->oci_prepare_stmt(con_hdl=0, len=0, stmth_p=0x6000000001078660)
    4 ETW000                                                                             327  0.142847
    4 ETW000  [dev trc     ,00000]         SELECT USERID, PASSWD FROM SAPUSER WHERE USERID IN (:A0, :A1)
    4 ETW000                                                                              36  0.142883
    4 ETW000  [dev trc     ,00000]  Got SAPSR3's password from OPS$-user                 728  0.143611
    4 ETW000  [dev trc     ,00000]  Disconnecting from connection 0 ...                   38  0.143649
    4 ETW000  [dev trc     ,00000]  Rolling back transaction ...                          31  0.143680
    4 ETW000  [dev trc     ,00000]  Closing user session
    (con_hdl=0,svchp=0x600000000106aa68,usrhp=0x60000000010fc940)
    4 ETW000                                                                             210  0.143890
    4 ETW000  [dev trc     ,00000]  Now I'm disconnected from ORACLE                     721  0.144611
    4 ETW000  [dev trc     ,00000]  Connecting as SAPSR3/<pwd>@PC1 on connection 0 (nls_hdl 0) ... (dbsl
    700 151208)
    4 ETW000                                                                              40  0.144651
    4 ETW000  [dev trc     ,00000]  Nls CharacterSet                 NationalCharSet              C     
    EnvHp      ErrHp ErrHpBatch
    4 ETW000                                                                              37  0.144688
    4 ETW000  [dev trc     ,00000]    0 UTF8                                                      0
    0x6000000001052910 0x600000000105a3c0 0x600000000106ab38
    4 ETW000                                                                              37  0.144725
    4 ETW000  [dev trc     ,00000]  Assigning username to user session: con_hdl=0,
    usrhp=0x60000000010fc940
    4 ETW000                                                                              35  0.144760
    4 ETW000  [dev trc     ,00000]  Assigning password to user session: con_hdl=0,
    usrhp=0x60000000010fc940
    4 ETW000                                                                              40  0.144800
    4 ETW000  [dev trc     ,00000]  Starting user session: OCISessionBegin(con_hdl=0, usr=SAPSR3/<pwd>,
    svchp=0x600000000106aa68, srvhp=0x600000000106de78, usrhp=0x60000000010fc940)
    4 ETW000                                                                             337  0.145137
    4 ETW000  [dev trc     ,00000]  Assigning user session 0x60000000010fc940 to service context
    0x600000000106aa68
    4 ETW000                                                                            4085  0.149222
    4 ETW000  [dev trc     ,00000]  -->oci_prepare_stmt(con_hdl=0, len=54, stmth_p=0x6000000001077608)
    4 ETW000                                                                              63  0.149285
    4 ETW000  [dev trc     ,00000]         BEGIN DBMS_APPLICATION_INFO.SET_CLIENT_INFO(:A0); END;       
    4 ETW000                                                                              37  0.149322
    4 ETW000  [dev trc     ,00000]  -->oci_prepare_stmt(con_hdl=0, len=0, stmth_p=0x6000000001077608)
    4 ETW000                                                                             585  0.149907
    4 ETW000  [dev trc     ,00000]         SELECT SID FROM V$MYSTAT WHERE ROWNUM<2                                                                               
    4 ETW000                                                                              36  0.149943
    4 ETW000  [dev trc     ,00000]  Connected to session 297.                            350  0.150293
    4 ETW000  [dev trc     ,00000]  Now 'SAPSR3/<pwd>@PC1' is connected: con_hdl=0, nls_hdl=0,
    session_id=297.
    4 ETW000                                                                              38  0.150331
    4 ETW000  [dev trc     ,00000]  -->oci_prepare_stmt(con_hdl=0, len=0, stmth_p=0x6000000001077608)
    4 ETW000                                                                              38  0.150369
    4 ETW000  [dev trc     ,00000]         ALTER SESSION SET NLS_SORT = BINARY                                                                               
    4 ETW000                                                                              34  0.150403
    4 ETW000  [dev trc     ,00000]  -->oci_prepare_stmt(con_hdl=0, len=0, stmth_p=0x6000000001077608)
    4 ETW000                                                                             294  0.150697
    4 ETW000  [dev trc     ,00000]         SELECT VALUE FROM V$NLS_PARAMETERS WHERE PARAMETER IN
    ('NLS_LANGUAGE', 'NLS_TERRITORY', 'NLS_CHARACTERSET') ORDER BY PARAM
    4 ETW000                                                                              66  0.150763
    4 ETW000  [dev trc     ,00000]         ETER                                                                               
    4 ETW000                                                                              34  0.150797
    4 ETW000  [dev trc     ,00000]  Database NLS settings: AMERICAN_AMERICA.UTF8         329  0.151126
    4 ETW000  [dev trc     ,00000]  -->oci_prepare_stmt(con_hdl=0, len=0, stmth_p=0x6000000001077608)
    4 ETW000                                                                             856  0.151982
    4 ETW000  [dev trc     ,00000]         SELECT UPPER(INSTANCE_NAME),HOST_NAME,VERSION,TO_CHAR
    (STARTUP_TIME,'MON DD, YYYY, HH24:MI:SS') FROM V$INSTANCE           
    4 ETW000                                                                              36  0.152018
    4 ETW000  [dev trc     ,00000]  DB instance PC1 is running on scmdb001 with ORACLE version
    10.2.0.4.0 since NOV 07, 2010, 03:23:10
    4 ETW000                                                                             349  0.152367
    4 ETW000  [dev trc     ,00000]  -->oci_prepare_stmt(con_hdl=0, len=0, stmth_p=0x6000000001077608)
    4 ETW000                                                                              38  0.152405
    4 ETW000  [dev trc     ,00000]         SELECT SUBSTR(NAME,1,3), TO_CHAR(CREATED,'YYYYMMDDHHMMSS')
    FROM V$DATABASE

  • I want to use the SQL Toolkit of NI and SQL Server as my databasis on a server. Do I need to install a client in each computer I want to handle the data into SQL tables or I need only a ODBC driver?

    I want to use the SQL Toolkit of NI and SQL Server as my databasis on a server. Do I need to install a client in each computer I want to handle the data into SQL tables or I need only a ODBC driver?

    You only need the ODBC driver on each computer. If you are distributing the SQL Toolkit app as an executable and do not install the whole toolkit on each computer, you'll need the SQL Toolkit support files. This is about a dozen files. You can get the list at http://digital.ni.com/public.nsf/websearch/b814be005f9da9258625658700550c75?OpenDocument.

  • Symantec antivirus Best practice for oracle database on windows server 2003

    Hi all,
    I have an oracle database server on windows server 2003 platform of version 10.2.0.4. what would be best practice of running symantec antivirus on that server as well as database file exclusions from scanning them.
    My server had rebooted unexpectedly for many times. in event log i have id as 6008. what may be cause of it..?

    Normally, you don't run a virus scanner on a database server because your database server isn't vulnerable to viruses. It's behind firewalls, people aren't reading mail on it, people aren't plugging thumb drives into it, etc. If you do decide that you need to run a virus scanner on a database server, at least exclude the Oracle data files from the scan. Oracle gets very unhappy if someone else tries to open its data files (or, worse, if someone opens a data file before it gets the chance to acquire exclusive access).
    Justin

  • Install swing application on server/desktop with database

    Hi,
    I developped a swing application which I need to install soon. It's the first time I install an application on my own, so any help would be welcome.
    I use maven for build, hibernate for the database access.
    Is there anything I need to take into consideration about the following things (are there good sites for reference?):
    - the build process
    - I use an external database (mysql), the configuration files are part of the program (they are not put somewhere external) --> any advice on good practices?
    - if the database is put on a server, as well as the jar file of the program, will there be any problem when trying to open the program from another computer, having access to the server?
    - if the database is put on a server, and the jar file of the program on a computer having access to the server (for the database), beside the normal hibernate configuration for the database (ip adres, port, ...), are there important things that might cause problems for the communication between the program and the database?
    thanks for any advice

    user8276126 wrote:
    Is there anything I need to take into consideration about the following things (are there good sites for reference?):
    - the build process
    - I use an external database (mysql), the configuration files are part of the program (they are not put somewhere external) --> any advice on good practices?Put the configuration files into the jar with the compiled classes.
    - if the database is put on a server, as well as the jar file of the program, will there be any problem when trying to open the program from another computer, having access to the server?"Will there be any problem" is rather a naive question. There are always problems when trying to communicate between two machines. Have you set up your MySQL server so that your database accepts connections from all other machines, for example? Or does it just accept connections from "localhost" because that's where you were testing?
    - if the database is put on a server, and the jar file of the program on a computer having access to the server (for the database), beside the normal hibernate configuration for the database (ip adres, port, ...), are there important things that might cause problems for the communication between the program and the database?Yes. The names of some of those things are "firewall" and "router".

  • Install 11.2.0.3.0 database on Red Hat Enterprise Linux Server v.5.7

    1. if I need to install 11.2.0.3.0 database on Red Hat Enterprise Linux Server v.5.7,
    Here I see 11.2.0.1.0 for Linux x86-64 on the following website._
    http://www.oracle.com/technetwork/database/enterprise-edition/downloads/112010-linx8664soft-100572.html
    Do I download the following and then apply the 11.2.0.3 patch?_
    Oracle Database 11g Release 2 (11.2.0.1.0) for Linux x86-64 Linux.x64_11gR2_database_1of2.zip (1,239,269,270 bytes) (cksum - 3152418844) linux.x64_11gR2_database_2of2.zip (1,111,416,131 bytes) (cksum - 3669256139)
    2. I need to install 11g and 10g in a same server, I am also looking for a good document.
    Thanks.
    Jack

    user3023234 wrote:
    thanks. I will look into it.
    how do you install 10.2.0.4 and 11.2.0.3 on the same server?You can install multiple homes in a server.
    Every Software dump consists of installer(runInstaller).
    Even you can install same Oracle version & release in same server by differentiating Folder names.

  • Installing Oracle Application Server 10.2 for Oracle Database Lite

    Can anybody please tell me how to install oracle application server 10.2 for oracle database lite (i use oracle database lite for my final project). I use wi-fi connection to synchronize between pda and my laptop as server. Should i install oracle internet directory before installing oracle application server? I have difficulties in installing application server, what are the options should i take in every page of installation? Thanks before.

    Install with the base, do not select any other options. Only choose webcache if you require the use of a software load balancer.

  • Is there any impact on database if we change the time of server?

    Hi,
    Our DB server time is 45 minutes ahead of our application server. We have planned to reset the time of database server. Is there any impact on database if we change the timing of the server?
    Platform: Solaris
    DB version: 10.2.0.2.0
    $ bash
    bash-3.00$ date
    Thu Apr 23 20:26:19 IST 2009
    bash-3.00$ sqlplus /nolog
    SQL*Plus: Release 10.2.0.2.0 - Production on Thu Apr 23 20:27:15 2009
    Copyright (c) 1982, 2005, Oracle. All Rights Reserved.
    SQL> conn /as sysdba
    Connected.
    SQL> select sysdate from dual;
    SYSDATE
    23-APR-09
    SQL> select systimestamp from dual;
    SYSTIMESTAMP
    23-APR-09 08.27.53.250947 PM +05:30

    That's an application question, not an Oracle question.
    Oracle doesn't care what time it is or when the time changes. Your application(s), however, may care. If you use SYSDATE to populate a row and rely on the date later to be unique or to indicate the actual order rows were inserted, changing the date on the server, particular moving it backwards, might cause problems for your application. Does your application have problems running during daylight savings time changes?
    Justin

  • Install Oracle Application Server on the same machine with Oracle Database

    Hello!
    I have already have installed on my laptop the oracle Database 10g, and i want to install on the same machine Oracle Application Server; can I do that? After i look on some threads on this forum I understand that all I have to do is to change the default port 1521 of the database to antoher ..let's say 1523...how can I change the port? what files do i have to modify? Oracle Application server can work in good conditions with Oracle XE or I will have the same problem?
    My SO is Windows XP Professional SP II, all updates, 512RAM, 2Ghz-CPU
    Thanks!

    Well, you'll have some problems to run simultaneously Database and AS with 512 Mb...
    Apart from that, you don't need to start two listeners, you can use just one (the highest version) for both DBs.
    If, for any reason, you want to use two, you can change the port within LISTENER.ORA file, normally in ORACLE_HOME\network\admin.

  • Installing APEX on separate server from production database

    I have a security request to install APEX on a separate server from the application content. I have searched terms I know and have only found vague references, but not meaningful assistance. Rather than try to talk me into installing on the same server, can someone point me to some documentation for achieving this without the use of database links which is another security risk? The APEX Listener and APEX instance can be installed on one server but the application content needs to be installed on a separate server.
    Edited by: user4552785 on Apr 16, 2012 12:18 PM

    You can easily set up an Oracle HTTP Server elsewhere to connect to your APEX instance (along with images directory and other static files). However, the application schema is tightly embedded in the same instance as the APEX schema, so that will have to stay there.
    What security concerns are you trying to alleviate? By default, APEX applications run as the user APEX_PUBLIC_USER and then this user masquerades as your application schema (and occasionally a little bit of APEX_0XXXXX). Even if you could manage to move your application schema to another instance, you haven't achieved a whole lot from a security standpoint.

  • What kind of Antivirus should be installed in SAP Server?

    Hi all,
    My customer wants to install antivirus in their sap server. but i don't know what kind of antivirus should be installed.
    Currently in customer sap server, it has the high performance (high memory) for sap b1.
    So I have 2 concerns.
    1. Why sap b1 and sap supporting software use high memory while in my pc use less memory?
    2. What kind of antivirus should be installed on SAP Server?
    Noted:
         1.SAP B1 version: 9.0
         2.No add on running.
    Thanks
    TONY

    Hi
    Check the below thread it may helps you
    Anti-virus / SAP B1 Settings
    With Regards
    Balaji Sampath

  • Install Oracle Application Server on same as database server

    How to Install Oracle Application Server.
    Can I install on the same server as database server
    Can some body provide a simple tutorial for Windows Installation.
    Ss

    If there is no licensing issues - then I could advice SOA Suite installation - there should be AS as well and many other features (BPEL e.g.). Personally I cann't see any need for installation manual as all the installation and configuration assistance poceeds automatically. Documentation can be found http://www.oracle.com/technology/documentation/appserver.html - usually zip contains large library of pdf, installation manual including.
    Well - my problem is that I have installed partially SOA Suite (configuration assistants failed at web services) on machine without DB server, then I installed DB server and now I am trying to deinstall SOA Suite - but now for some days machine shows 100% CPU consumption and no any visible actions (no new errors as well)... What should I do? Kill the process and try to manually remove SOA? I plan after make another SOA installation after removal of this one.
    Thanks in someone can help me!

  • Is it advisable to install antivirus software (such as kaspersky) into a mac pro book?

    Is it advisable to install antivirus software - such as Kaspersky - into a pro book?

    Mac users often ask whether they should install "anti-virus" software. The answer usually given on ASC is "no." The answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There  is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to take control of it remotely. That threat is in a different category, and there's no easy way to defend against it.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has taken far too long to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. Those lapses don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, not machine behavior, and no technological fix alone is going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're better informed than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software. A genuine alert that Flash is outdated and blocked is shown on this support page. Follow the instructions on the support page in that case. Otherwise, assume that the alert is fake and someone is trying to scam you into installing malware. If you see such alerts on more than one website, ask for instructions.
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Rogue websites such as Softonic, Soft32, and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission. All "YouTube downloaders" are in this category, though not all are necessarily malicious.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a padlock icon in the address bar when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It can be as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

Maybe you are looking for

  • How to open a pdf package in browser when multiple files are bound together.

    Hi, I have to open a pdf package in browser that contains multiple pdf files any suggestions will help me a lot. Thanks.

  • Consistant Poor Quality Prints

    I'm afraid this is the same old complaint. Having had printed an album of Digital photos I was very disappointed with the quality. Apple kindly re-printed the album but the result was the same. Saving the album as a pdf and printing on an elderly col

  • Why is my imessenger not working

    My imessenger is not working and converting eveything to text ... why?

  • Also getting ERROR -9813

    I've had my PowerBook for 2 years now, and ever since i got it i've had the same problem with the iTunes store. Every time i try to sign in, or buy a anything, or even listen to podcasts, it gives me an 'unknown error' message. It says: We could not

  • Problems with my BB Curve 8310

    Can anyone help me out? Recently I've been having problems with my curve. I don't always receive my mms messages, the alarms will go off like i have a picture/video message and nothing's there. my texts get automatically deleted, I don't get all my c