Prevention of Labor Risks IS-EHS

Good morning. 
We have the vertical solution for the Prevention of Labor Risks IS-EHS and according to requirements of the client, we have been ourselves forced to modify the standard provided by you, to automate a series of processes, which we have obtained after several headaches.  On the other hand, we have created descriptions to size for the preventive measures, which are going to be contained in the evaluation of labor risks, that have been created as well in standard transaction SE61 like texts of the type documentation (DOKU). 
One of the automatizations that we have had to make, is that when an evaluation is created on a labor risk, automatically it loaded its preventive measures, in such a way that automatically the descriptions of these preventive measures are loaded, but one of those headaches before mentioned, is that when these preventive measures were loaded, when pressing on the position and showing the additional text, it showed not only the text of the first position of preventive measure but that also showed the text of the second position of preventive measure and that we have been able to separate it based on the noticeable position. 
Another requirement of the client, is to be able to modify for that position of preventive measure in the treatment of labor risks, for a risk in particular, the descriptive text, in such a way that it is not updated for all the risks that contain this preventive measure. When trying to modify it or simply to add additional lines, in the publisher of SAPscript appears this blocked text, for that reason we cannot unblock it and therefore we cannot modify it. What we do not know is to unblock it, we have the risk of which this text is modified for all the risks that contain this preventive measure and we wanted to know how to be able to do it or what measures to take for being able to carry out it, since in that point we are blocked. 
We have tried to create in the SAPscript for the description of that preventive measure, other formulas, but they have not been feasible. Between the used or taken measures we emphasized the following ones: 
- To make include of text, but at no moment shows that include to us of text when displaying it, printing it to treat it in later modifications. 
- To include clipboard of user for the text of the preventive measure, but when making it, they do not appear either unless we show them by menu and to make matters worse, that file of user is not unique for the treated preventive measure, but that appears for all the preventive measures and all the created risks and to create, due to we are limited five clipboards of user for all the application, unless there is a method to be able to separate them by evaluation or labor risk or preventive measure and that they always appear with the introduced text.
- To create other texts standard of another type (TEXT), but that doesn´t leave possibility any to the user to be able to modify it, reason due to we return again to the same position where we were and would be necessary to use include to be able to introduce it in the text loaded for the preventive measure.
- We don´t know if the object of authorization C_EHSI_DOC for the profiles of user authorization, will help in something, but in the existing documentation in the SPRO it indicates that single it is possible to assign these objects to the area of work and in the log of Accidents  
Best regards.
Guillermo P. Richter

Hello Geuillermo,
I am not the expert for solving your particular issues, but my employer Technidata AG is developing the EH&S solution as development partner of SAP. So if you need professional advice (consulting) or custom developments, this is the best shot.
I hope this does not come across as advertising.
Best regards,
Frank.

Similar Messages

  • "Get Risk" button not working inTaskList Safety Plan tab

    Hi Experts,
    I am implementing Worker Safety Management where I am trying to add Relevant Risks in Safety Plan using button Get Risks, but it does not show any risks to add. I have done required configuration in PM & Risk Management, also I am getting risks in PM order automatically (based on location).
    I am trying same thing for task list, Can you suggest what I am missing? Or any other configuration I need to Get the Risks in Task List's Safety Plan
    Thanks In Advance
    Amol

    Hello Amol
    for your requirement , you can use "job hazard Analysis" is a type of risk assessment , in which we will carried our risk analysis for each and every step of process , For example one technician is attending any job like assembling of pump , in this we will carried our Hazard analysis for each and every step involved in the pump assembly. based on the identified hazards we will determine the intial risk levels and determine the existing controlling methods , incase if any lapses are there we will implement new controls with respective worker safety.. and initiate the different notifications for implementing new controls (Maintenance task /Quality task).
    Refer below thread for getting overview on  Job hazard analysis
    Job Hazard Analysis - Risk Assessment (EHS-MGM-RAS) - SAP Library
    Balajee

  • Compliance Calibrator 5.1 Risk Categories

    Hello.
    Is there a difference in the way the systems reacts to a risk category i.e. if the risk is classified as High, does it stop a user from doing something? Is there any difference between medium and low or are the categories merely used in the risk analysis reports as a statistic?
    Thanks.

    It is still preventative in that you can perform a risk analysis simulation.  That is, you can test for risks <i>before</i> you grant the user access.  It is also preventative in that it is testing segregation of duties controls, which are a type of preventative control.
    Risk Terminator leverages from the Compliance Calibrator rule-sets and basically modifies the user maintenance and role maintenance tcodes to add a risk-analysis step in there.  So, for example, if you are maintaining a role, when you go to generate, it will perform a risk analysis and you will have to document the reasons for creating/changing a risky role.  Same when you assign roles to a user that combine to cause a risk.  So, yes, Risk Terminator is also preventative.  As is Access Enforcer.

  • Adding a parameter for Visual Composer

    i want to add a parameter called vc.bi.sqleditorenabled for Visual Composer
    i read that use this  parameter in visual Administrator.
    Pls tell me how can i do  it
    Message was edited by:
            Balaji Rajendran

    Hi Balaji
    SQL and MDX Editor functionality is available in Visual Composer in the following ways:
    &#9679; On the BI &#8594; SQL Editor and BI &#8594; MDX Editor menus.
    &#9679; In the workspace, from the context menu of a relational or OLAP query from a data
    service defined using one of the BI Java Connectors mentioned above.
    &#9679; In the MDX Statement and SQL Statement fields on the input ports of corresponding
    data services, which allow you to send query statements to the databases.
    For security purposes, the SQL and MDX Editor functionality is turned off by default in Visual
    Composer. Therefore, if you try to access it, the following message is displayed: You are not
    authorized to use this functionality.
    To enable SQL and MDX Editor functionality, use the following parameters in the Visual
    Administrator:
    &#9679; vc.bi.sqlEditorEnabled - SQL Editor and SQL Statement from input port are visible
    &#9679; vc.bi.mdxEditorEnabled - MDX Editor and MDX Statement from input port are visible
    Change document logging is not available with the SQL or MDX Editors; only
    database logging (SQL Editor) or OLAP server logging (MDX Editor) is
    available.
    Warning:
    Significant caution should be taken when using the SQL and MDX Editor
    functionality, to avoid the potential for corrupting data and to prevent users from
    viewing data that they are not authorized to see.
    To prevent potential security risks, we urge the database administrator to restrict
    user authorization on any data source defined on the portal using the BI JDBC
    Connector, BI ODBO Connector, or BI XMLA Connector. We recommend that
    you set the proper authorizations for your users on the database level, and that
    you use dialog users (individual database user names) for user mapping on the
    portal.
    Note that if you enable this functionality and save models that expose SQL and
    MDX statement fields on the input ports of data services, these fields, and hence
    the potential security risks, will persist in the models even if you later disable this
    functionality. In addition, the fields persist in models that you export and import
    into a Visual Composer system in which the functionality is disabled. We therefore
    recommend you carefully consider security risks before enabling this functionality.
    Cheers,
    Shaym

  • I bought CS5 on ebay

    I bought the entire CS5 program on ebay about 1 week ago.  I loaded it onto my brand new laptop with Windows 7.  Before I loaded the software I had to add a some necassary information onto my already existent host file on my computer.  I was told to do this by information contained on an extra cd I received with my purchase.  I did this.  My computer for some reason would not let me save this iformation so I created a new host file and saved it separately in the same location as the original.  I subsequently loaded all software with the programs on them.  Now when I try to use Illustrator or Photoshop or any of the the programs it asks me for a key.  I have the key but when I put it in, it says it is incorrect.  Then it says I can continue with my 30 day trial if I would like. This is NOT a trial. I bought the full program.  Has anyone had this issue before? Could it be a problem with the host file being incorrectly installed? I don't know. Please help.

    Bill,
    Thanks for the reply (after posting I had noticed the date of the thread and thought my comments would go un-read)
    I really am only trying to clarify one point.  The Windows host files plays no part with "in-coming" connections nor does it open any type of hole in your network.  The worst thing that could happen is for an entry to be added that would re-direct your URLs to another IP address.  A scary enough event but easily identified within the HOST file.  As far as it being compromised by simply commenting out every entry you have repaired the file itself.
    I guess my point was for the unlucky buyer was to inspect the new host file entries (perhaps even post them on this Forum) and save himself the panic of shutting down bank access, reformatting hard drives and the like.
    The reason I have stumbled upon this was I had been asked by a client to look into reasons why HOST file entries are changed.  During my research I found that the number #1 reason this is done with Adobe is to block the URL for the activation.  The host file is changed so that whatever.adobe.com is redirected to the loopback address of 127.0.0.1 which prevents absolutely no risk to the system at all, other than having trouble accessing sites etc in the xxxx.adobe.com domain.  I also have no idea whether these changes even work in getting around the activation procedure.
    Again to I reiterate I have no clue what was installed or changed in the "victims" system and it may very well be crawling with Viruses and Trojans, I simply wanted to weigh in on the HOSTS file situation.
    Fascinating topic !
    Mark

  • How do I prevent my iphone from downloading my entire email address book from my computer when I do my "updates" .  My contact list is transfered to my iphone and then I have the laborous task of manuely deleting the unwanted unnecessary "contacts" now.

    How do I prevent my iphone from downloading my entire computer email address book when I "update" my phone by plugging it into my computer and do the update procedure.  I am having my phone "contacts" swamped with the entire contacts in my email on my computer and then I am having to manually delete them each time I update my phone...? thanks for any assistance on this...mm

    Thank you for your rapid...excellent answer!!  I feel abit foolish...but I am in a learning process and you are a wise teacher! thanks...mm

  • What can I do to prevent the control key from not working in the future?

    Background:
    I bough an macbook pro about 1 year and 3 months ago and after 9 months of usage my control key stopped working for about an hour or two.This happened every time I turned on or awoke my mac from sleep (lid down).I sent it to an authorized apple service center and they replaced the keyboard.Everything was fine for about 4-5 months when the same thing happened again, ctrl key stopped working but this time not when turning on my mac but at random times and for random intervals.I sent it again to the service center but they told me that this time it won't be for free because my 1 year warranty has expired.I should mention that in European Union and Romania (the country where I am from and from which the mac was purchased) the law is that any electronics device sold has to come with at least 2 years of warranty.Apple seems to ingore this law.
    Anyway, after long conversations with apple uk on the phone they agreed to pay for the keyboard but not for the labor which was 70 eur ($100).It's not much but my 2 year warranty should have covered it.The sad part is that I have no guarantee that it's indeed a keyboard error and not something else, this might happen again in 4 months and I doubt this time apple would agree paying for the keyboard (which is 150eur) ($215).
    I should also mention that before calling apple uk I tried apple's romanian number (listed on their site) and it didn't work on the 3 phone networks that I've tried (2 fixed and one mobile) which led me to believe that apple support is in fact a big joke.
    Suffice to say that I will no longer purchase any apple devices or software, I regret purchasing mac os x lion just a week ago, when I will no longer use it because I intend to sell all my apple gear (timecapsule, iphone4, macbook pro) and buy stuff from companies that value their customers and respect their contracts.
    My questions are this:
    1) why does apple ignore EU and Romanian law?
    2) what can I do to prevent this from happening in the future
    3) can I request that my macbook be more thoroughly inspected? I suspect the keyboard is not the main problem and it will soon happen again as it happened two times already.
    4) can I do something for the repair labor charge to be waved? It is illegal in my country to ask for one in this scenario...

    Everyone reading your posts here is just another MacBook Pro user. We're all volunteers, not Apple employees. No one here can speak for Apple.
    In my personal opinion, buying Apple products in a country where Apple has no stores and no corporate presence is a risk that the buyer takes knowingly. I don't think it's a wise risk, and I don't recommend that anyone take it. A small percentage of the products sold anywhere are going to have problems, and it makes more sense to buy an inferior product that can at least be serviced locally than to buy a superior product that may have to be sent thousands of miles for repair if anything ever goes wrong with it.

  • Recently when I download photos from my Canon G11 I get one or two "unsupported image format"  This seems to happen when I have taken a photo of the same subject but have zoomed in on it.  Why does this happen and what can I do to prevent this?

    What can I do to prevent this from happening?  I would like to have all my images downloaded from camera to computer and then make my choice as to which one to keep and which to deleted.

    1. You did not get an error message telling you that your iPhoto library was getting full. You got a message telling you that your HD was getting full, right?
    OS X needs about 10 gigs of hard drive space for normal OS operations - things like virtual memory, temporary files and so on.
    Without this space your Mac will slow down as the OS hunts for space on the disk, files will be fragmented, also slowing things down, apps will crash and the risk of data corruption - that is damage to your files, photos, music - increases exponentially.
    Your first priority is to make more space on that HD. Nothing else can be done until you do.
    Purchase an external HD and move your Photos and Music to it. Both iPhoto and iTunes can run perfectly well with the Library on an external disk.
    Your Library has been damaged from being run on an overfull disk.
    How much free space on it now?

  • How to Block a Quote on Credit check and prevent suseqquent functions

    Hi,
    The client wants to prevent the Quotations which are blocked due to credit check to be turned in to sales order.
    We are maintaining credit group 40 , assigned it to quote, and maintained records in Fd32 and ova8.
    The item categories have been checked for credit check.
    After all these, when a quote is blocked, we can see it in vkm1 for release.
    But, it allows to create the sales order with reference to the blocked quote.
    Can anyone please help me in resolving this?
    P.S. The client wants to do this at Quote level because they are using Assembly processing. Since it is not possible to prevent creating a production order even though the credit check has been set for sales order (Client uses 90% of KMAT's (Item cat-TAC)  and Assembly processing (Strategy group 82) with VC.)
    Any suggestion to achieve either one of the above will be appreciated and Rewarded.
    Thank You,
    Manoj.

    Hi
    Please try this way...this is a guess and let's see if it works.,
    Define a new Credit Group (say 04) for Quotes.
    Assign the new Credit Group for the QT document type
    In the Define Automatic Credit Control - make the necessary assignment for the combination of
    CCA - Risk Category - Credit Group
    Check the functionality by creating the Quote for an amount exceeding the credit limit and referring it for creating the sales order, which shouldn't be allowed.
    Thanks,
    Ravi

  • How to prevent user password being reset to the same password?

    Hi,
    As you all know, domain admin has the power to reset user password.  Let's think of the following scenario:
    if an admin lets a user reset his password to use the same string, this action means he could nullify company policy on password which requires user's last N passwords being recorded in the history.
    We could very well imagine that the admin reset his own personal password in order to bypass company policy.
    I have asked partner forum to see if there's a way to prevent such thing, but the reply I got is "No".
    I wanted to know if anyone of you have any idea to prevent such thing from happening?
    Or if it's possible to get the hash value of users past N password to see if he's always using the same password?
    Thanks in advance for your ideas.

    Good rules is better alternative to complex policy.
    Combine password history with time interval between changes.
    Regards
    Milos
    You don't understand what I mean.
    He knows exactly what you mean. 
    check out this link below:
    http://technet.microsoft.com/en-us/library/cc757692%28v=ws.10%29.aspx
    Enforce password history
    The Enforce password history policy setting determines the number of unique new passwords that must be associated with  a
    user account before an old password can be reused .
    The possible values for this Group Policy setting are:
    A user-defined number from 0 through 24.
    Not defined.
    Discussion
    Password reuse is an important concern in any organization. Many users want to reuse the same password for their account over a long period of time. The longer the same password is used for
    a particular account, the greater the chance that an attacker will be able to determine the password through brute force attacks. If users are required to change their password, but nothing prevents them from using the old password or continually reusing a
    small number of passwords, the effectiveness of a good password policy is greatly reduced.
    Specifying a low number for Enforce password history allows users to continually use the same small number of passwords repeatedly. If you do not also set Minimum
    password age, users can change their password as many times in a row as necessary in order to reuse their original password.
    If you set Enforce password history to a number greater than zero, users must come up with a new password every time they are required to change their old one. This
    improves security, but it can increase the risk that users will write down their passwords so they do not forget them.
    If you set the value to the maximum of 24, it helps to ensure that vulnerabilities caused by password reuse are kept to a minimum.
    For this policy setting to be effective in your organization, configure Minimum password age so that you do not allow passwords to be changed immediately. Enforce
    password history should be set at the level that combines a reasonable maximum password age with a reasonable password change interval requirement for users.
    Location
    GPO_name\Computer Configuration\Windows Settings\Security Settings\Account Policies\Password Policy\
    Every second counts..make use of it. Disclaimer: This posting is provided AS IS with no warranties or guarantees and confers no rights.
    IT Stuff Quick Bytes

  • I have been getting messages from Safari when I am on commercial sites where I am sure that I have typed in the address correctly.  Messages say that the website was signed by an unknown certifying authority and my personal information may be at risk.  Th

    Am getting daily messages from Safari warning me that I am on a website with an unknow certifying authority and my personal information may be at risk.
    Happens when in Cox webmail and when I am visitying a legitimate site, and I have typed in address correctly such as Citibank rewards site.
    Have 3 choices, "Show Certficate" "Cancel" or "Continue". Screen is frozen and cannot exit Safari without acknowledging the message or clicking escape. I had been clicking continue, but after a month or more of many such messages decided to ask Cox.  They say it is a virus.  Was I careless in clicking continue?  What do many messages like this mean?  they can't all be unknown certifying authorities can they?

    Take each of the following steps that you haven't already tried. Stop when the problem is resolved.
    1. Are the current date (including the year) and time shown on your system clock? If not, correct them and test.
    2. Check that the following files exist:
    /System/Library/Keychains/SystemCACertificates.keychain
    /System/Library/Keychains/SystemRootCertificates.keychain
    If they don't, restore them from a backup or reinstall OS X after backing up all data.
    3. Disable any third-party firewall, "security" software, or network filter. Test.
    4. In some versions of OS X, Parental Controls has a bug that prevents loading of secure websites. Turn it off.
    5. The process by which OS X checks the validity of root SSL certificates doesn't work behind the authenticating SOCKS proxies used on some enterprise networks. If applicable, contact your network administrator. The proxy server may need to have its settings changed.
    6. Launch the Activity Monitor application in any of the following ways:
    ☞ Enter the first few letters of its name into a Spotlight search. Select it in the results (it should be at the top.)
    ☞ In the Finder, select Go ▹ Utilities from the menu bar, or press the key combination shift-command-U. The application is in the folder that opens.
    ☞ Open LaunchPad. Click Utilities, then Activity Monitor in the icon grid.
    Select All Processes from the menu in the toolbar of the Activity Monitor window, if not already selected. Enter "ocspd" (without the quotes) in the "Filter" text field. Is a process with that name listed?
    If not, back up all data, then select
    Go ▹ Go to Folder
    from the Finder menu bar. Into the text box that opens, copy the following line of text:
    /var/db/crls
    From the folder that opens, move these two files to the Trash:
    crlcache.db
    ocspcache.db
    You’ll be prompted for your administrator password. Reboot, empty the Trash, and test.

  • Taking the Labor out of Labor Day: HP Support Assistant

    Did you know that temporary files should be removed from your computer and that the hard disk should be defragmented regularly? Just like any appliance that used on daily basis, computers need regular maintenance to perform well. In honor of Labor Day, we’re highlighting our HP Support Assistance tool to help you take some of the labor out of personal computer maintenance.
    HP Support Assistant makes it easier than ever to own and use your personal computer. Part of HP Total Care services and support, this simple, free software application comes pre-installed on your Microsoft® Windows® 7 PC.  If  you have an old HP or Compaq computer running Windows® Vista, check first if HP Support Assistant is already installed on your computer. If not, consider upgrading to Windows 7 and then downloading HP Support Assistant.
    HP Support Assistant is an HP application that helps you maintain the performance of your computer and resolve problems through automated updates and tune-ups, built-in diagnostics, and guided assistance.
    By allowing you to select and organize tasks, HP Support Assistant schedules your automated tune-up for a time that is convenient for you. With your permission, HP Support Assistant does the rest.  You can also receive preventative updates from HP and install them automatically. Additionally, HP Support Assistant provides suggested actions and fixes to keep your PC in tip-top shape.
    There is no training is required to us HP Support Assistant. For a quick start, take a look at the links on the HP Support Assistant home page under Save Time! and Stay up to date! They describe some commonly used features in HP Support Assistant.
    HP Support Assistant also provides the support you need to save valuable time and quickly find product specifications and answers to common questions.  With HP Support Assistant you can access online learning resources, access online learning resources, run automated diagnostics, and find your local HP support contact options.
    So this Labor Day, sit back, relax, and let HP Support Assistant do the work for you!
    HP Product Expert for the Officejet Pro X Series.
    Was your question answered? Mark it as an Accepted Solution!
    See a great post? Give it a Kudos!

    No. It has nothing to do with warranty status. It will work even if the warranty has expired. The only thing that must be available is updates for your notebook.
    Uninstall the current verfsion of HP Support Assistant that is on your notebook.
    You can download the operating system appropriate version for your notebook at the following web document.
    http://www8.hp.com/us/en/campaigns/hpsupportassistant/hpsupport.html?jumpid=va_r602_us/en/any/psg/pl...
    ****Please click on Accept As Solution if a suggestion solves your problem. It helps others facing the same problem to find a solution easily****
    2015 Microsoft MVP - Windows Experience Consumer

  • Fix for "your computer's system firewall settings will prevent you...?"

    I finally did the dreaded feat and performed an update - had all kinds of problems afterwards (repeating Network settings message error, unknown error -3256 error, etc.) that I have (I think) successfully fixed thanks to these fabulous forums. After getting the -3256 error I updated the firmware and software for my AE and applied the Apple support fix for -3256. Then I started getting a new issue - being the following message after opening my new i-tunes version 8.0.2 "your computer's system firewall settings will prevent you from using Airtunes". After going into the firewall settings and trying to modify the port number (which I found suggested here) that i-tunes would use to stream to my airport express in the edit pane for 'i-tunes music sharing'. I ended up creating a new port specification, which I called i-tunes 1 with ports 5000 - 6000 specified. Tried opening i-tunes again - but no luck, same error. Thinking that I'd done nothing to improve the situation, I deleted my new port specification in the allow pane under firewall - I noticed that the original spec was gone (because I had edited it?). Anyway, as soon as I deleted the spec that I had edited, airtunes started working beautifully! To check things - I closed i-tunes and re-started, then, got the same message ""your computer's system firewall settings will prevent you from using Airtunes" with the option to check my firewall settings - which I did. This time, I noticed that 'i-tunes music streaming' was again listed as an option under allow in my firewall. I selected and deleted it - then again, my Airtunes works perfectly.
    I really have no idea what exactly occurs 'behind the scenes' so to speak when you delete this from the list - but - it seems to have fixed my problem. I'm guessing that I'll have to do that each time I open i-tunes. At least I got my airtunes back. I guess I'm a little worried that deleting this item presents some sort of risk or could lead to another problem and so if anyone can comment on this I would really appreciate it. Alternatively, if anyone has a solution that won't require me deleting this item each time I open i-tunes, I'd be glad to hear it.
    Thanks!
    Leigh-Ann

    Leigh-Ann, you didn't say that Airtunes didn't work, only that you got that error. I, too, am getting the "Your computer's system firewall settings will prevent you from using Airtunes" message, but when I click "Ignore" I find that Airtunes works just fine.

  • Oracle 8 security risks

    ISS Security Advisory
    May 6, 1999
    Multiple File System Vulnerabilities in Oracle 8
    Synopsis:
    Internet Security Systems (ISS) X-Force has discovered that
    multiple vulnerabilities exist in Oracle 8 that may allow local
    attackers to exploit weaknesses in Oracle administrative tools.
    Oracle is the market leader in enterprise database solutions.
    Attackers may use these vulnerabilities to amplify their
    privilege to that of the foracleF user. By default, the oracle
    user controls the entire Oracle database system. Attackers may
    launch local denial of service attacks against the database as
    well as alter or manipulate data.
    Affected Versions:
    ISS X-Force has determined that most current versions of Oracle
    8 for Unix are vulnerable. These versions include 8.03, 8.04,
    8.05, and 8.15. Oracle 8 for Windows NT is not affected by
    these vulnerabilities.
    Description:
    The Oracle 8 distribution is shipped with many administrative
    utilities that are owned by the oracle user with the setuid bit
    enabled. Several of these utilities implement insecure file
    creation and manipulation. These utilities also trust Oracle-
    related environment variables. The combined effect of these
    vulnerabilities may allow local attackers to create, append to,
    or overwrite privileged oracle files. Certain vulnerabilities
    exist that may allow local attackers to execute arbitrary
    commands as the oracle user. Attackers may also be able to
    permanently elevate their privilege to that of the oracle user.
    Temporary files that follow symbolic links are a common source
    of vulnerabilities in setuid executables. Administrators should
    remove or restrict access to setuid executables if possible.
    Developers of setuid programs need to take special precautions
    to prevent
    the introduction of vulnerabilities of this nature. ISS X-Force
    recommends
    that all Unix developers become familiar with Matt BishopFs
    secure
    programming guide, available at
    http://olympus.cs.ucdavis.edu/~bishop/secprog.html
    Fix Information:
    ISS X-Force has worked with Oracle to provide a patch for the
    vulnerabilities described in this advisory. Oracle has provided
    the following FAQ to answer any questions concerning these
    vulnerabilities.
    Q: IFve heard about a setuid security issue with the Oracle
    database? What is this all about?
    A: On Unix platforms, some executable files have the setuid bit
    on. It may be possible for a very knowledgeable user to use
    these executables to bypass your system security by elevating
    their operating system privileges to that of the Oracle user.
    Q: Which releases are affected by this problem?
    A: This problem affects Oracle data server releases 8.03, 8.0.4,
    8.0.5, and 8.1.5 on Unix platforms only.
    Q: Can I correct this problem or do I need a patch?
    A: This problem can easily be corrected. The customer can
    download the patch from the Oracle MetaLink webpages at
    http://www.oracle.com/support/elec_sup. The patch is a Unix
    shell script. This shell script should be run immediately, and
    also run after each relink of Oracle.
    Q: What is Oracle doing to fix this problem?
    A: Effective immediately, Oracle will provide the patch on
    OracleFs Worldwide Support Web pages. Oracle will ensure the
    patches are incorporated into future releases of Oracle8i
    (8.1.6) and Oracle8.0 (8.0.6)
    Q: What is Oracle doing to notify users about this problem now?
    A: Oracle is notifying all supported customers, via the Oracle
    Worldwide Support Web pages, of this issue so they can address
    it as required.
    ISS X-Force also recommends that all administrators complete a
    proactive survey on the use or potential misuse of setuid bits
    on privileged executables on their systems.
    Credits:
    These vulnerabilities were primarily researched by Dan
    Ingevaldson of the ISS X-Force.
    Copyright ( 1999 by Internet Security Systems, Inc. Permission
    is hereby granted for the electronic redistribution of this
    Security Alert. It is not to be edited in any way without
    express consent of the X-Force. If you wish to reprint the
    whole or any part of this Alert Summary in any other medium
    excluding electronic medium, please e-mail [email protected] for
    permission.
    About ISS
    ISS is the pioneer and leading provider of adaptive network
    security software delivering enterprise-wide information
    protection solutions. ISSF award-winning SAFEsuite family of
    products enables information risk management within intranet,
    extranet and electronic commerce environments. By combining
    proactive vulnerability detection with real-time intrusion
    detection and response, ISSF adaptive security approach creates
    a flexible cycle of continuous security improvement, including
    security policy implementation and enforcement. ISS SAFEsuite
    solutions strengthen the security of existing systems and have
    dramatically improved the security posture for organizations
    worldwide, making ISS a trusted security advisor for firms in
    the Global 2000, 21 of the 25 largest U.S. commercial banks and
    over 35 governmental agencies. For more information, call ISS at
    678-443-6000 or 800-776-2362 or visit the ISS Web site at
    www.iss.net.
    Disclaimer
    The information within this paper may change without notice. Use
    of this information constitutes acceptance for use in an AS IS
    condition. There are NO warranties with regard to this
    information. In no event shall the author be liable for any
    damages whatsoever arising out of or in connection with the use
    or spread of this information. Any use of this information is at
    the userFs own risk.
    X-Force PGP Key available at:
    http://www.iss.net/xforce/sensitive.html as well as on MITFs PGP
    key server and PGP.comFs key server.
    Please send suggestions, updates, and comments to:
    X-Force <[email protected] <mailto:[email protected]>> of Internet
    Security Systems, Inc.
    null

    http://metalink.oracle.com has all the Oracle documentation online. If you search for Security, you'll get plenty of documents. The Oracle Administrator's Guide has a Security Checklist that it probably a good starting point.
    This is a huge topic, though.
    Justin

  • How do I prevent sharing a text file by different users

    Hello,
    I am using LV8.6.1 and writing this application that read and write to a text file. The application is being used by many users at different sites and I want to prevent writing to the text file when other user is already using it (reading or writing to it). The other user should only be able to use it when it's not being read or getting written.
    Any suggestions? I know LV file function 'Set Permissions' won't work. I need a file attribute that tells that the file is open, so don't use it.

    I think the only real obtion is one I've seen some other programs use.
    Create a lock file in the same directory.
    1.  You want to open myfile.txt.
    2.  Your program looks to see if myfile.lck is present.  (Same filename, just the extension is different)
    3.  If it is present, you don't open the file or you give a warning.
    4.  If it is not present, you create a myfile.lck file.  It could be a small text file.  Perhaps you place in it the user name of the person who is opening the file.
    5.  When your VI is done with the file and "closes" it, your VI deletes the myfile.lck file.
    So the presence of the myfile.lck file indicates the file is being used.
    The absence of the myfile.lck indicates the file is available to be used.
    The only risk is if somehow the person who "takes out" the file somehow ends their application unexpectedly and the .lck file doesn't get deleted even though they are done.  You would need to manually go in and delete the .lck file.  But username data in the .lck could help determine who had the file last and you could confirm if they are really using it or not.  Putting the filedate in the warning information would help determine if it was a recent lock, or an old lock that is likely stale.

Maybe you are looking for

  • External Cinema Display looks fuzzy when connected to 24" iMac...

    Hey I have a new iMac (aluminum with black rim screen) and a new 23" Cinema Display. I have connected them both together and am using the Cinema Display in extended desktop mode as the main screen. The resolution is set to the maximum but all the ico

  • Two wism module in vss mode

    i have two switches 6509 connected by vss technology i add two wism module ( one in each switch 6509 ) i need to know if  two wism are operate active - active in vss or active - standby ?

  • I forgot the answers to my security questions and do not posses the option to send answers to a rescue email

    I forgot the answers to my security questions. I have gone in circles reading over the instructions on how to retrieve them via rescue email, but I do not have that option. I cannot buy music on three out of four of my devices because of my lack of a

  • Calling function from PHP

    How do you call a function plsql from PHP 5.0 and Oracle 10g XE? Thank you

  • PO custom workflow

    Hi all, I made a new workflow by copy WS20000075. I made a ZBUS2012 using BUS2012 as super to add some methods that i need. Now i'm having a problem with task TS20000166. The task runs without any problem and i'm able to release the PO document, but