Question about security issues regarding 'cp' and 'mv'

Ok, I wondered about how 'cp' and 'mv' are really working. I have some guesses but I need these things to be confirmed.
Here is what I have:
A partition with a unix file system, say ext2 or 3 (does this make a difference here?) containing *very* sensitive data. The filesystem is encrypted (whirlpool/serpent) but that shouldn't matter. As I do not want corpses of dead files lying around that could be recovered, I always use 'shred -zu' with 26 passes to overwrite and then delete the data.
And that's where I have my conceirns:
If I want to rename a file or move it to another folder on the same partition. Is it save to 'mv' it? Or should I 'cp' it and then 'shred' the original file. I assume that 'mv' will not touch the actual file and just tell the file system of it's new name or place in the folder-structure. Given that, shredding a 'mv'ed file should not leave a trace of it on the drive (except of the old filename before the 'mv' maybe, but that wouldn't be too critical). I assume that, because it's the only thing that would make sense to me, but have to know it for sure!
However, on moving the file to another drive I should probably 'cp' it, then 'shred' the original file. The question I have here is as follows:
How much information which could be recovered leaves 'cp'ing in my RAM? Will I have to find a way to somehow shred the information in the RAM or can I assume that my RAM get's rewritten often enough, that most traces will be gone, say, in a couple of days?
If you have links at hand to confirm your answer, please post them, too.

Okay, thanks for that, I will have a closer look on flushing the ram.
Sure, I care about security and privacy, but -- as you might expect -- the data I have are not really THAT sensitive/confidential/whatsoever. I've just gotten into it somehow and now I'm just curious/intrested in improving it for it's own sake more or less.

Similar Messages

  • Question about security issue when transferring files from PC

    I am in the process of looking at macs. I have always been a PC user and have been EXTREMELY impressed with the features of mac os x. Here's the question. I am probably sure that I have one or more viruses on my PC, what PC doesn't right? When I get my mac, I'm looking at the macbook, I see that I can transfer my files over from a PC to my new mac. The problem is. I want my files, but I'm leery about transferring a virus over also. I've heard about the security of macs and I am wondering if this is something I need to be worried about, or if it won't be a problem. Is there any steps I will need to take to ensure that I don't bring any viruses over with my files? Thanks for the help.
    Micah
    P.S. I am really starting to get sick and tired of Vista. I had to download VLC media player to play my Windows Media files because my Windows Media player on Vista WILL NOT play the files meant for that system. Arrrghhh Sorry for the vent.

    Be sure to scan all your files for viruses before moving them from the PC to the Mac. Although PC viruses should have no effect on a Mac, it's still possible to pass on a virus to a friend via email.
    Do You Need Anti-Virus Protection for Your Mac?
    According to Rich Mogull's article, Should Mac Users Run Antivirus Software?,
    "The reality is that today the Mac platform is relatively safe. There are hundreds of thousands of viruses and other malicious software programs floating around for Windows, but less than 200 are known to target the Mac, and many of those are aimed at versions of the Mac OS prior to Mac OS X (and thus have no effect on a modern Mac).
    It's not that Mac OS X is inherently more secure against viruses than current versions of Windows (although it was clearly more secure than Windows prior to XP SP2); the numerous vulnerabilities reported and patched in recent years are just as exploitable as their Windows equivalents. But most security experts agree that malicious software these days is driven by financial incentives, and it's far more profitable to target the most dominant platform."
    Mr. Mogull is a computer security expert. I recommend reading the entire article as it is quite informative.
    For additional information on viruses, trojans, and spyware visit The XLab FAQs and read the FAQs on viruses and spyware.

  • I have several times tried to stop following a thread in the PDF's forum about security issues and i still keep getting flooded with emails from this thread. I used the action within the thread that says stop following but appears to have no effect I stil

    I have several times tried to stop following a thread in the PDF's forum about security issues and i still keep getting flooded with  emails from this thread. I used the action within the thread that says stop following but appears to have no effect I still keep  getting from 5 to 20 emails daily. Please help!!!!!!!

    This may be helpful: How do I disable email notifications?

  • I currently have Trend Micro...Does Firefox handle all the security issues like pfishing and viruses etc...I would like to cancel the other

    I cannot seem to get anyone to help me because I have asked this same question more than 6 or 7 times. Does Firefox handle all the security issues like pfishing and viruses, worms from attaching to my computer??????

    This question is a duplicate of https://support.mozilla.com/en-US/questions/884618

  • Here's a very basic question about 2 TB external drives and Time Machine.

    Here's a very basic question about 2 TB external drives and Time Machine.
    Ihave a Mac Pro with a .75 TB and 1 TB drive.  It also has a 1 TB 2ndinternal drive.  My current external drive is too small so I'll begetting a 1.5 TB or 2 TB drive.
    Obviouslythe new larger 2 TB drive will backup everything on the Mac Prointernal drive with Time Machine.  But there will be 1 TB of space leftover going to waste.
    ShouldI partition the external drive so that the TM portion will be 1 TB andthe use the remaining extra partition for additional file backups withCarbon Copy?
    Thanks for any insights.
    I tried searching around on the new Apple discussion forum, but I find it much harder to use than the old forum I used to use.

    The problem with terabyte drives is that that a 3 TB is about as big as you can get without going into RAID territory. Ideally, a Time Machine drive should be 3 times as large as all the drives you are backing up. So, if you have 2.75 TB of internal storage, you should have 8 TB of Time Machine space.
    Of course, that is "should". If your TB drives are mostly empty, then you can get away with something 3 times the size of your used disk space. Just remember that you are pushing it. Linc is right about Time Machine needing space to work.
    It is unlikely that you have regular churn on 2.75 TB of disk. I suggest identifying which drives and folders have the most activity and excluding those drives and directories that don't change much. It would be better to archive the data that doesn't change often and keep it out of Time Machine. Then you may be able to get away with a 2 TB Time Machine drive.

  • Question about 2 TB external drives and Time Machine.

    Here's a very basic question about 2 TB external drives and Time Machine.
    I have a Mac Pro with a .75 TB and 1 TB drive.  It also has a 1 TB 2nd internal drive.  My current external drive is too small so I'll be getting a 1.5 TB or 2 TB drive.
    Obviously the new larger 2 TB drive will backup everything on the Mac Pro internal drive with Time Machine.  But there will be 1 TB of space left over going to waste.
    Should I partition the external drive so that the TM portion will be 1 TB and the use the remaining extra partition for additional file backups with Carbon Copy?
    Thanks for any insights.
    I tried searching around on the new Apple discussion forum, but I find it much harder to use than the old forum I used to use.

    John,
    I'm not sure why you posted in the iMac forum so I'm going to attempt to get you to the correct spot. I would recommend reposting in the Time Machine Forum, this is part of the OS X forums (Leopard or Snow Leopard) because you are using Snow Leopard (your profile indicates you are) please click Apple Support Communities and type Snow Leopard. Then you can narrow the search down by clicking Refine this List.
    Roger

  • Security Issue - LDAP Authentication and supply of empty passwords

    Security Issue with OC4J and JAZN LDAP Realm
    Product Versions:
    OC4J 9.0.3
    Infrastructure 9.0.2.1
    When using form based authentication or basic authentication in a WebApp, OC4J authenticates any existing user that as a password defined with an empty password.
    Example: If you have a user with the username "user" and password "password". In the login of the WebApp if you supply only the username, OC4J authenticates the user.
    Notes:
    - If we supply a wrong password we are not authenticated
    - If we supply the correct password we are authenticated.
    To reproduce the problem, I have used Oracle callerInfo jazdemo, configured to used the JAZN LDAP Realm named sample_subrealm, that is installed with 9ias infrastructure
    Notes: If I use JAZN XML Realm everything works as expected.
    Bruno Antunes
    Java Software Engineer

    Jeremy - You'd have to use database authentication to achieve that. Create a DAD without specifying a username/password and change the app's current authentication scheme to DATABASE. Then users can login using their database account credentials. LDAP won't be used when you do this so you'll have to keep the database account passwords in sync with LDAP somehow if that's important.
    Scott

  • Question about TC setup, bridge mode and security...

    Hello All
    I need some help...
    Have bought a 1 Tb TC to use with my existing ethernet/wireless all-Mac home network but have some specific queries.
    The system is set-up as follows:
    Cable modem > connected by ethernet cable to > 8-way Ethernet switch
    Connected via ethernet cable to the 8-way switch are: one MacBook (in another part of the house) and the TC (via its WAN socket).
    Elsewhere in the house, and _all connected wirelessly_ are:
    iMac G5
    Powerbook G4
    hi-fi (connected via an Airport Express)
    Airport Extreme basestation to which a HP Laserjet is connected via ethernet.
    Question:
    Before buying the TC, I used a spare Airport Express basestation in its place to act as the 'main' basestation and the IP addresses of each device on the network were 10.0.0.1, 2, 3, etc. I had the impression that my home network was not "seen" by the outside world as a consequence of this.
    Now, the TC seems only to work when in 'bridge' mode and it seems that the IP addresses are 196.xxx.x.100, 101, 102 etc. Does this mean that these devices are now visible to the outside world. Have I compromised my network security? I am worried that the outside world may have access to the contents of my TC, although my TC is password protected and the wireless network is 'closed'. What else should I be doing?
    Finally, should I have set up the network so that the cable modem feeds to TC directly, with the 8-way ethernet switch coming off one of the ethernet sockets on the TC?
    In all honestly, the instructions in the manual and the help guide are less than clear.
    Can anyone help?
    Thanks
    Daniel

    Section 4, here are my thoughts.
    1. Since you are currently seeing individual IP addresses like 196.xxx.xxx.100, etc., it sounds like your modem is also acting as a router. This also seems to be the case since the Time Capsule is only working in bridged mode (it wouldn't work in Share a Public IP address if another device is assigning private DHCP addresses). Now, you could still allow the Time Capsule to act as a DHCP server on your private network by enabling Connection Sharing as Distribute a range of IP addresses. This will create a private network within your private network where all the devices that are connected to your Time Capsule can see each other. If you leave it in bridged mode then you allow your cable modem to assign DHCP addresses and all devices that are connected to the Time Capsule or to your ethernet switch are on the same network.
    2. Assuming your cable modem is acting as a router you shouldn't have to worry about security, although you will have to access your modem's settings to make sure port forwarding isn't enabled and that the firewall is turned on (although I'm sure it is). I personally would plug the ethernet switch into the LAN port of the Time Capsule and allow the WAN port of the Time Capsule to be plugged into the cable modem. I also would just leave the Time Capsule in bridged mode as well, that's what I do for my own personal network.

  • Question about forum use regarding an error I am receiving

    I am looking for an answer to the proper process I should follow when running into issues with Azure Storage. As I don't want to annoy folks with tossing questions into this forum regarding errors I'm running into that are more usage related instead
    of technical in scope.
    For instance this morning I was attempting to view some details about a particular Storage item and was greeted with the following screen in the Azure Portal.
    I was able to accomplish what I needed to (downloading some files out of this particular storage account) within the Manage.WindowsAzure.com site without issue. So this seems to be connected to the portal itself and it's interactions with Storage
    (perhaps). I now have access to the above Storage item via the portal site, but for about 15 minutes I continually received the message above. Even after logging out, clearning cache, trying different browsers etc.
    So my question(s) are; Are these forums the proper place to be posting information about issues we run into? If not what is the preferred method for reporting items like those above and getting help with remediating them in a timely manner?
    I'm happy to put them here, just want to make sure there isn't a better place as I'm new to this.

    Hi Darren,
    You can post your issue with Azure Storage in here. Just make sure that you do not give out any PII data.
    Also, the above portal which you are viewing is still in preview. You may use "manage.windowsazure.com" portal to access your resource.
    Regards,
    Manu

  • Questions about CIN tax procedure choice and pricing schemas

    Hi all,
    I have to implement SAP on a Indian company and I'm verifying all particularity about this country (in particular tax procedures and the great number of differents tax conditions used).
    I have two questions about tax procedures and pricing schemas. Every feedback about thse points will be appreciated.
    a) To choose tax procedure TAXINN or TAXINJ which are the elements that I have to consider?
         I have read lot of documentation about CIN implementation and Iu2019m oriented to choose TAXINN schema, but If possible I  would  to understand better which are on behalf of one choice or another.
    b) To define pricing schemas for India, after check with local users and using examples of documents (in particular tax invoice) actually produced, I have understood that taxes have to be applied on amount defined starting from price list, minus discounts recognized to customer plus surcharges eventually to bill (packing, transport,  etc.).
    Itu2019s correct for any type of taxes that tax amount is calculated on u201Cnet valueu201D defined at item level or there are exceptions to this rule?
    Thanks in advance
    Gianpaolo

    hi,
    this is to inform you that,
    a) About point 1 I know the difference between the 2 tax procedures (conditions or formulas). I also have read in others post in the FORUM that TAXINN is preferable. So I would to understand which are the advantages to choose instead TAXINJ. There are particular reasons or it'a only an alternative customizing setting?
    a.a. for give for posting the link : plese give me the advantages of TAXINJ and TAXINN
    CIN - TAXINN and TAXINJ
    b) About point 2, to define which value has to be used as base amount to calculate taxes isn't a choice, but is defined depending by fiscal requirement of the country, in this case India fiscal requirement. I know that, as Lakshmipathi
    write as answer on my question, exception could be, but it was important for me to understand if I have understood correctly the sequence of the pricing condition in the schema in "normal" situation.
    b.b. you can create your own pricing procedure for this and go ahead.
    hope this clears your issue.
    balajia

  • A few question about iPhone OS in CS5 and CS5 in general.

    Hi,
    I'm an IT trainer and I am trying to introduce my students to programming for iPhone/iPod Touch. (They are Secondary 2 students. 14 years old) The school is using a windows computer and CS5 right now is the best for the class (Not a steep learning curve and a user-friendly program). I know about the problems over the iPhone OS in CS5 with Apple but I was told it is still available for use. Furthermore, we have no intention of bringing the apps created to the Apple Store. I've tried the trial version and before I make any purchase, I would actually like to ask a few questions.
    Is the iPhone OS in the trial version itself complete? Is there anything left out from the trial version because when I tried it, it seems fine however I did not try publishing to an iPhone due to the certificates. Is there a reason for the certificate? Is there any way around it because if there isn't do I need to get a certificate for every single student? (I'm looking at a class of 40 students.) Is the certificate available for windows platform?
    Lets say, I got myself a certificate, create a simple program and then publish it, can I immediately bring it over to iTunes and then sync? Will it work that way? I don't want it to be too tedious for the students to see the end result. I've done quite a few research and have come across people having problems bringing it into their devices. Those people mention about bringing it to Cydia and needing to jailbreak the device. The devices made available for the students are not jailbroken. Will iPhone OS with proper certification still need Cydia for use with their device? Will only jailbroken device allow a CS5 app? I hope you get what I'm trying to say. We as trainers do not support teaching students to jailbreak, so that's definitely a no-no.
    Another thing about CS5. Previously I have called customer support about the CS4 the school is using now and the problem with nested animation when publishing the animation as a video file, is this problem still in CS5? Does CS5 allow nested animation to be published as a video file? If it isn't, is there any way around it?
    Thank you for your time and patience in answering my questions.
    Regards,
    Shafuraa

    Dear Marco,
    Thanks for th links, its quite handy. One more help required from you as its related to Idsktune. I was just reruning the idsktune on Soalris 10 box where zfs file system used, and able to see the below warning
    WARNING: largefiles option is not present on mount of /, files may be limited to 2GB in size.
    Could you tell me this alert specific to zfs file system, I was searching the mount parameter options specific to file size, but not able to get anything. Below are the system parameters.
    bash-3.00$ ulimit -a
    core file size (blocks, -c) unlimited
    data seg size (kbytes, -d) unlimited
    file size (blocks, -f) unlimited
    open files (-n) 256
    pipe size (512 bytes, -p) 10
    stack size (kbytes, -s) 8192
    cpu time (seconds, -t) unlimited
    max user processes (-u) 29995
    virtual memory (kbytes, -v) unlimited
    In UFS file system I have noted, for such largefile option we are adding the "largefile" parameter in mount, below is such an example.
    /var/crash on /dev/md/dsk/d40 read/write/setuid/devices/intr/largefiles/logging/xattr/onerror=panic/dev=1540028 on Thu Aug 19 14:54:11 2010
    Could you guide me on this file size warning specific to zfs file system.
    Many thanks in advance for your support,

  • Some questions about javacard 2.1.1 and smartcardio

    Hello i have some question about java card 2.1.1 and the smartcardio package.
    1.) I want to sign a message with the Signature.ALG_RSA_SHA_PKCS1 algorithm. I use the following code in the applet to sign the message:
    final static byte P1_CREATION_MODE = (byte) 0x01;
    final static byte INS_SIGN_MODE = (byte) 0x60;
    final static byte SmartCard_CLA = (byte) 0xB0;
    private void signMessage(APDU apdu) {
            byte[] buffer = apdu.getBuffer();
            byte byteRead = (byte) (apdu.setIncomingAndReceive());
            signature.init(privateKey, Signature.MODE_SIGN);
            short length = signature.sign(buffer, ISO7816.OFFSET_CDATA, byteRead, buffer, (short) 0);
            apdu.setOutgoingLength((short) length);
            apdu.sendBytesLong(buffer, (short) ISO7816.OFFSET_CDATA, (short) length);
            apdu.setOutgoing();
        }On the host side I use the following code to connect to the card and to send the sign apdu:
    if (TerminalFactory.getDefault().terminals().list().size() == 0) {
                LOGGER.log(Level.SEVERE, "No reader present");
                throw new NoSuchCardReader();
            /* Select the first terminal*/
            CardTerminal terminal = TerminalFactory.getDefault().terminals().list().get(0);
            /* Is a card present? */
            if (!terminal.isCardPresent()) {
                LOGGER.log(Level.SEVERE, "No Card present!");
                throw new NoSuchCard();
            /* Set the card protocol */
         Card card = terminal.connect("*");
            ATR atr = card.getATR();
            LOGGER.fine(getHexString(atr.getBytes()));
            LOGGER.fine(getHexString(atr.getHistoricalBytes()));
            CardChannel channel = card.getBasicChannel();
            CommandAPDU cmd = new CommandAPDU((byte) 0xb0, (byte) 0x60, (byte) 0x01, (byte) 0x00, new String("datadatdatadata").getBytes(), (byte) 0x40);
         ResponseAPDU response = channel.transmit(cmd);
            card.disconnect(false);But this does not work and i got the following error
    javax.smartcardio.CardException: sun.security.smartcardio.PCSCException: Unknown error 0x8010002f
            at sun.security.smartcardio.ChannelImpl.doTransmit(ChannelImpl.java:202)
            at sun.security.smartcardio.ChannelImpl.transmit(ChannelImpl.java:73)
            at de.upb.client.smartmeter.SmartMeter.initSmartCardApplet(SmartMeter.java:114)
            at de.upb.client.smartmeter.SmartMeterApplikation.main(SmartMeterApplikation.java:39)
    Caused by: sun.security.smartcardio.PCSCException: Unknown error 0x8010002f
            at sun.security.smartcardio.PCSC.SCardTransmit(Native Method)
            at sun.security.smartcardio.ChannelImpl.doTransmit(ChannelImpl.java:171)
            ... 3 more2.) 3Des encryption
    I want to use the 3Des algorithm to encrypt my data. I use
    keyDES = (DESKey) KeyBuilder.buildKey(KeyBuilder.TYPE_DES,
                        KeyBuilder.LENGTH_DES3_2KEY, false);
    cipherDES = Cipher.getInstance(Cipher.ALG_DES_CBC_ISO9797_M2, false);But i do not know what is the aquivalent on the host side??
    3.) Another problem is that i am not able to send the modulus of a public key from the host applikation to the smard card
    new CommandAPDU((byte) 0xb0, (byte) 0x20, (byte) 0x01, (byte) 0x00, modulus.toByteArray()); // create the apdu
    // the method in the applet
    private void setServerKeyMod(APDU apdu) {
            byte[] buffer = apdu.getBuffer();
            try {
                byte byteRead = (byte) (apdu.setIncomingAndReceive());
                short off = ISO7816.OFFSET_CDATA;
                // strip of any integer padding
                if (buffer[off] == 0) {
                    off++;
                    byteRead--;
                publicKeyServer.setModulus(buffer, off, byteRead);
            } catch (APDUException ex) {
                ISOException.throwIt((short) (SW_APDU_EXCEPTION + ex.getReason()));
        }The error code is 6700
    4.) My last problem ist, that i am not able to use a value bigger than 0x7F as the ne field in the apducommand, because i get the following error
    CommandAPDU((byte) 0xb0, (byte) 0x60, (byte) 0x01, (byte) 0x00, data, (byte) 0xff);
    java.lang.IllegalArgumentException: ne must not be negative
            at javax.smartcardio.CommandAPDU.<init>(CommandAPDU.java:371)
            at javax.smartcardio.CommandAPDU.<init>(CommandAPDU.java:252)I thought that it this should be possible in order to use all the bytes of the response apdu.
    If you need more code to help please let me know.
    Cheers
    Edited by: 858145 on 06.07.2011 08:23

    2) What is PKCS? what is the difference between
    PKCS#11 and PKCS#15??PKCS is the abbreviation of "Public-Key Cryptography Standards"
    PKCS #11: Cryptographic Token Interface Standard
    See http://www.rsasecurity.com/rsalabs/node.asp?id=2133
    PKCS #15: Cryptographic Token Information Format Standard
    http://www.rsasecurity.com/rsalabs/node.asp?id=2141
    If you want to use yor smartcard as secure token it doesn't have to be a JavaCard.
    BTW: I don't remember a way to access PKCS#15 tokens on a JavaCard from within an oncard JavaCard program. If you want to use keys in your oncard program, you have to transfer it onto the card or generate it oncard and export the public key by your own oncard/offcard code.
    Jan

  • SSRS (Security) issues in Firefox and Chrome

    in both browsers the layout is a mess to start with.
    Biggest problem in both cases is: The detailView button is vissible even if your not admin.
    So when ppl click this they are able to see/modify datacources and see hidden directories and stuff. I havent checked if they can really change stuff but it seems to me that its not what we want. If you are not admin you shouldnt see the DetailView button
    at all.
    1 other thing that doesnt work in Chrome. The report itself. you can fill in parameters but the report itself wont show up. but thats a minor problem.
    the security issue with the DetailView option available for everyone would be a major problem id say

    Which version of Reporting Services are you running?
    Check this article on MSDN about browser compatibility of SSRS: Planning for Reporting Services and Power View Browser Support
    SSRS works best on Internet Explorer. If you use other browsers, something may not be displayed correctly.

  • Just a question about security

    Hi All.
    Just a simple question really, I read on one of the forums here a question about running windows and apples mac os at the same time.
    My question is: would they not cause conflict, as with apple you don't need to install security but windows is riddled with bugs and virus's surely one would infect the other?
    Sorry to sound so silly,  I'm not very computer savvy , but it strikes me as wrong somehow.
    Thanks Tricia

    You will have whatever threats assail Windows and must protect against those, but none of them will cross over to the Mac side. Note: there is cross platform Windows/Mac malware, i.e. malware written for both. But to be infected you need to be infected directly on the Mac side.
    http://www.zdnet.com/blog/bott/the-slow-and-steady-evolution-of-cross-platform-m alware/4930

  • Some questions about the integration between BIEE and EBS

    Hi, dear,
    I'm a new bie of BIEE. In these days, have a look about BIEE architecture and the BIEE components. In the next project, there are some work about BIEE development based on EBS application. I have some questions about the integration :
    1) generally, is the BIEE database and application server decentralized with EBS database and application? Both BIEE 10g and 11g version can be integrated with EBS R12?
    2) In BIEE administrator tool, the first step is to create physical tables. if the source appliation is EBS, is it still needed to create the physical tables?
    3) if the physical tables creation is needed, how to complete the data transfer from the EBS source tables to BIEE physical tables? which ETL tool is prefer for most developers? warehouse builder or Oracle Data Integration?
    4) During data transfer phase, if there are many many large volume data needs to transfer, how to keep the completeness? for example, it needs to transfer 1 million rows from source database to BIEE physical tables, when 50%is completed, the users try to open the BIEE report, can they see the new 50% data on the reports? is there some transaction control in ETL phase?
    could anyone give some guide for me? I'm very appreciated if you can also give any other information.
    Thanks in advance.

    1) generally, is the BIEE database and application server decentralized with EBS database and application? Both BIEE 10g and 11g version can be integrated with EBS R12?You, shud consider OBI Application here which uses OBIEE as a reporting tool with different pre-built modules. Both 10g & 11g comes with different versions of BI apps which supports sources like Siebel CRM, EBS, Peoplesoft, JD Edwards etc..
    2) In BIEE administrator tool, the first step is to create physical tables. if the source appliation is EBS, is it still needed to create the physical tables?Its independent of any soure. This is OBIEE modeling to create RPD with all the layers. If you build it from scratch then you will require to create all the layers else if BI Apps is used then you will get pre-built RPD along with other pre-built components.
    3) if the physical tables creation is needed, how to complete the data transfer from the EBS source tables to BIEE physical tables? which ETL tool is prefer for most developers? warehouse builder or Oracle Data Integration?BI apps comes with pre-built ETL mapping to use with the tools majorly with Informatica. Only BI Apps 7.9.5.2 comes with ODI but oracle has plans to have only ODI for any further releases.
    4) During data transfer phase, if there are many many large volume data needs to transfer, how to keep the completeness? for example, it needs to transfer 1 million rows from source database to BIEE physical tables, when 50%is completed, the users try to open the BIEE report, can they see the new 50% data on the reports? is there some transaction control in ETL phase?User will still see old data because its good to turn on Cache and purge it after every load.
    Refer..http://www.oracle.com/us/solutions/ent-performance-bi/bi-applications-066544.html
    and many more docs on google
    Hope this helps

Maybe you are looking for

  • Sharing iTunes library between different user accounts

    I recently purchased my imac and made the leap from the PC world. I set up another user account aside from the general administrator and followed the steps of having itunes folder go to the users/shared folder in an effort to be able to share files b

  • Can not do JPA/Hibernate ... Reverse Engineering with MySQL

    Hello, I'm using MyEclipse 7.1.1 and MySQL 5.1.34. The MySQL connector with java is mysql-connector-java-5.1.7-bin. I tried so many time to generate Hibernate/JPA class by MyEcipse but it still did not work. Here below are my error log (which i copie

  • How to use https inside flex with 2-way authentication

    I've got a Flex app which provides a front-end for doing  basic CRUD db operations. The app is served up from a Tomcat/Blaze server using 2-way authentication and uses Java objects to do the server-side db work. Serving the app works fine. The proble

  • SO delivery and billing..

    Hi any one tell me how to relate SO to billing or delivery to billing.    I tried lips-vbeln = vbrk-xblnr but its not matching, please any one guid me.

  • 1300 Series at 100 mW

    Kindly advise what part number of 1300 Series bridge should I order to have maximum 100 mW power output in .11b mode. I intend to use external antennas.