Three questions about replication/security

Hello,
We are currently planning to build software for our sales persons using C#. Each sales person has a laptop and should be able to sync the client information when he/she has access to the internet/intranet. Sales person can update client information and the local database will be synced back to master server when the user is connected to the internet/intranet. My option was to go with Oracle lite (as client DB) and Oracle enterprise (Server DB). But after readying the posts in this forum, I believe Oracle XE can do the trick. Am I right?
Second question is about the security of the replication. Sales persons can connect using the internet to sync the information back and forth. Is there a built in mechanism to secure the connection between the two DBs ( Oracle XE and EE)?
Third question is about the recovery options. I read Mark’s post about the feature of Oracle XE. I understood that PIT recovery and achivelog mode are supported. But, the post also says that Tablespace PIT is not supported. Can some tell me the difference between PITR and TSPITR? If PITR is supported, can I restore the database to a specific date and time (i.e. Dec 2, 2005 2:00PM)?
Thanks a lot

Comments inline
Hello,
We are currently planning to build software for our sales persons using C#. Each sales person has a laptop and should be able to sync the client information when he/she has access to the internet/intranet. Sales person can update client information and the local database will be synced back to master server when the user is connected to the internet/intranet. My option was to go with Oracle lite (as client DB) and Oracle enterprise (Server DB). But after readying the posts in this forum, I believe Oracle XE can do the trick. Am I right?
Yes - except that Oracle Lite comes with the synchronization built in, and it's tested to handle all the weird corner cases you have to deal with. XE will give you basic replication, however, you will have to build the connect, replicate (refresh materialized views), disconnect logic yourself (and test it). Personally I would spend the $100 on the Oracle Lite option
Second question is about the security of the replication. Sales persons can connect using the internet to sync the information back and forth. Is there a built in mechanism to secure the connection between the two DBs ( Oracle XE and EE)?
It depends by what you mean secure. When you connect XE to Enterprise Edition, it will use a database link to refresh the materialized views (replicated tables). Userids/passwords across the database link will be sent in an encrypted form. The data will not. I'm guessing you could use Oracle's Advanced Security option to secure the database links from XE to EE, but I'm not 100% sure. Tom may be able to give us a clue on this one. Also, note that DBLinks by default use the TCP/IP transport, so thats a hole you would have to kick in the firewall if the EE database was behind it (as it should be). Although replication can use HTTP as a transport mechanism
(You can see all the issues you start to get into - the $100 dollars per Oracle Lite deployment is looking real goo to me right about now)
Third question is about the recovery options. I read Mark’s post about the feature of Oracle XE. I understood that PIT recovery and achivelog mode are supported. But, the post also says that Tablespace PIT is not supported. Can some tell me the difference between PITR and TSPITR? If PITR is supported, can I restore the database to a specific date and time (i.e. Dec 2, 2005 2:00PM)?
Yes - you can roll forward the entire database to a given point in time using RMAN (which will be in production). You cannot however roll forward just a subset of tablespaces (i.e a subset of the data) in XE. Tablespace PITR is an EE feature (and not for the faint hearted).
Thanks a lot

Similar Messages

  • I want to change my secret questions where I had forgotten the answers to three questions about safe

    I want to change my secret questions where I had forgotten the answers to three questions about safe

    The Best Alternatives for Security Questions and Rescue Mail
        a. Send Apple an email request at: Apple - Support - iTunes Store - Contact Us.
        b. Call Apple Support in your country: Customer Service: Contact Apple support.
        c. Rescue email address and how to reset Apple ID security questions.

  • I have three questions about managing my music library

    Hello,
    I have three questions about managing my music library, I hope you can help me with them:
    1) Is there a limit of how many entries, songs, albums, art work, can iTunes handle? I have a hunch iTunes is like a database program and am curious about its capacity. I have two 2-TB drives and am wondering what is going to happen when I fill these two drives up. Other than disk space, what are iTunes limitations?
    2) Talking about these two drives. How can I use both as a source for my iTunes library. Can I have two folders selected as the source of my library? I am not sure if I have enough disk space to hold all my music, but I do also have a 1TB almost empty drive is need be.
    3) OK now comes te real question. I am sure that I have duplicates in my library and I sure would love to clean my library up.Possiby if I do get to clean it up, I can save some disk space and that is always a good thing. Any good techniques, software, techniques to follow while ripping music to help keep my library organized. Please be as detailed as you can.
    Thanks and I can't wait to hear from you.
    Waseem

    Wassimn wrote:
    Hello,
    I have three questions about managing my music library, I hope you can help me with them:
    1) Is there a limit of how many entries, songs, albums, art work, can iTunes handle? I have a hunch iTunes is like a database program and am curious about its capacity. I have two 2-TB drives and am wondering what is going to happen when I fill these two drives up. Other than disk space, what are iTunes limitations?
    As far as I know you're going to run out of disc space before you hit any limits. Each object in iTunes has a 64-bit key to access it. That said as your library grows it will get less responsive as bigger indexes take exponentially longer to process.
    2) Talking about these two drives. How can I use both as a source for my iTunes library. Can I have two folders selected as the source of my library? I am not sure if I have enough disk space to hold all my music, but I do also have a 1TB almost empty drive is need be.
    iTunes wants to manage everything inside one big folder. Some idiosyncrasies with the way it manages things if you have to move to a new drive means it is best if you can stick to that plan. If your library grows larger then you'll have to take manual control of where some or all of your content is stored. I use a variation of a script called ConsolidateByMoving which you could adapt for your needs.
    3) OK now comes te real question. I am sure that I have duplicates in my library and I sure would love to clean my library up.Possiby if I do get to clean it up, I can save some disk space and that is always a good thing. Any good techniques, software, techniques to follow while ripping music to help keep my library organized. Please be as detailed as you can.
    When it comes to deduping I've written another script for that called DeDuper, see this thread for background.
    And for some general tips on getting organized in iTunes see Grouping tracks into albums.
    tt2

  • Three questions about a single-folio publication

    We are finishing our first publication with DPS.
    We have a Adobe DPS Professional Edition, Annual version.
    1- I have been planning to launch the App in iPad and Android for free and in three days to put the price at $9,00. Is that possible?
    2 - How much time needs Apple to approve our appliction?
    3- I have read that you can't publish a single folio app in Android. Why?
    What is the option

    On android a .apk app is limited to 50 mb. Additional Content up to 4GB can
    be loaded by the app on its first start.
    This need a change in workflow for the android version on the viewer side.
    And it may be political, too.
    —Johannes
    (mobil gesendet)
    Am 17.01.2012 02:32 schrieb "Bob Bringhurst - Adobe" <[email protected]>:
       Re: Three questions about a single-folio publication  created by Bob
    Bringhurst - Adobe <http://forums.adobe.com/people/BobBringhurst-+Adobe>in
    Digital Publishing Suite - View the full discussion<http://forums.adobe.com/message/4145193#4145193>

  • Several questions about Application Security

    Hello,
    I have several questions about Application Security and perhaps I need a few tips...
    I have a lot of users in a few groups which have access to my application! And the different groups should have only access to their pages.
    In my application I use trees to navigate through the application.
    So my idea is that i display different trees for the different user groups and restrict the user to access the URL....so the user can only see and contact "their" pages.
    I know how to create the logic behind the trees, but how can I create the restricted URL access...
    The "No URL Access" in the Session State Protection can not be used, because I use a lot of links in reports and HTML regions.
    Is there another way to solve that?
    But I am unsure if that is a "good" solution for my problem!
    What do you think about that?
    Am I going to do that too complicated?
    Could that be done by authentication or authorization?
    (By the way, I do not understand the differences between authentication and authorization. Can anyone help?)
    I would be glad for any reply!
    Thank you,
    Tim

    Hey Arie and Scott,
    thank you for your quick reply!
    Now I understand the context around authorization and authentication...
    I try the Access Control List and I think that is a very nice feature! Really good!
    But now I am wondering, how I can create more privileges?
    So that I have a few "end-user-roles" and then I can choose who have access to a page and who not!
    Does anybody know how to do that?
    Thank you,
    Tim

  • HT201303 hi just got my new apple ipod touch i need to update my security information other wise it wont let me download apps it says to enter three questions about myself and i get to the third question and it wont let me enter the third question

    hi just got my new apple ipod touch and to download apps it wants to add questions about myself for more sercurity information. i get up to question 3 and it wont let me select a question but it will let me write an answer so i just pressed done and then it says i cant carry on because ive mised out information when it wont let me do a question!

    Welcome to the Apple community.
    You might try to see if you can change your security questions. Start here, change your country if necessary and go to manage your account > Password and Security.
    I'm able to do this, others say they need to input answers to their current security questions in order to make changes, I'm inclined to think its worth a try, you don't have anything to lose.
    If that doesn't help you might try contacting Apple through Express Lane (select your country, navigate to iCloud help and enter the serial number of one of your devices)

  • HT5312 a question about the  security-related emails

    Excuse me.ive forgot my security questions and answers.and what was worse my yahoo e-mail(which is the security-related emails ) has been closed few days ago.could u help me?

    The Three Best Alternatives for Security Questions and Rescue Mail
         1.  Send Apple an email request at: Apple - Support - iTunes Store - Contact Us.
         2.  Call Apple Support in your country: Customer Service: Contact Apple support.
         3.  Rescue email address and how to reset Apple ID security questions.
    A substitute for using the security questions is to use 2-step verification:
    Two-step verification FAQ Get answers to frequently asked questions about two-step verification for Apple ID.

  • Question about internet security...please help!

    Hi everyone,
    I have a question about the macbook's internet security.
    A few days ago I became aware that my sibling was using a laptop for internet use at my house which he got from a person that I do not trust. He is very computer-savy and we're worried that he may have installed some form of spy ware on that laptop and in turn, may have tried (or succeeded) in accessing my Macbook through some form of spyware. My house is hooked up with a D-Link wireless router, and at the time, it had no internet/access-password.
    So my question is, could this person have accessed my computer and personal information remotely by and through the laptop that my sibling got from him. I was under the impression that Mac's have very strong firewalls, but I have also heard that as long as he knew what he was doing, he could have accessed my computer. I don't have a wireless "network" set up at my house, I just simply use the router for internet. But my sibling told me that this guy was his "network administrator" which leads me to believe that he must have had remote access to the laptop.
    Can anyone with knowledge on this problem please weigh in and let me know what I need to do to confirm that no one has accessed anything from my macbook.
    Thanks!

    One option if you want to be extra safe is turning on FileVault (System Preferences -> Security), which will encrypt everything on your computer so that if somehow someone does gain access to your computer they will have a next to zero chance of being able to read anything they get from your computer. You have to have a lot of extra hard drive space on your computer to turn it on though.
    Also, a "network" is just a connection between computers, regardless of the internet is involved or not. So when you connect your computer to the router which gives you the internet, you are putting your computer on a network. Now I believe that in order for this person whom you don't trust to gain remote access to your computer, they would have to have more information such as an IP address for your computer, through the router in order to get to it.
    One thing I think is very important to consider that isn't on the technical side of things is something called "Social Engineering" which is a form of cracking, or hacking. You can do your own research, but in a nutshell Social Engineering is getting people that have access to something I'm trying to hack to give me information. For instance, this person you don't trust could be giving your brother the computer in the hopes that he will download something through your router to that laptop which could give him IP addresses and other information. And then when he gets that laptop back he could scan it for useful information and your brother wouldn't know he did anything wrong at all. The best way to avoid this is purely education and communication. Even if your brother doesn't share the same suspicions about this person, surely he will understand the need to be careful and smart when it comes to sharing personal information in the digital world.

  • Three questions about the developer tools

    At my company we have evaluated this very handy tool, and we have only three questions...
    * Will the autocomplete feature be more intelligent. For example pl/sql developer recognize partially written table names and suggest a full name.
    * How to debug and step through the procedures?? This is a MUST!!!!
    * Is it possible to add source control integration (source safe) for the packages/procedures?
    With these features, it will be super!!
    /henrik

    When I was at the VSLive in San Francisco back in February, I spent some time at the Oracle booth and I asked for Source Control also.
    I was told to my happy suprise that lots of other developers had been asking for that also but I was shocked when the Oracle reps told me that they didn't understand why people would want this feature or how they would use it. They tried to convince me that "Generate Create Script" was what I wanted.
    Btw, "Generate Create Script" ticks me off. It always sticks the package owner in the create script and when I check it back in VSS I have to go in and edit it back out!!!
    It seems to me that the mindset behind many Oracle tools is to work "on the database". I will admit that I don't use many Oracle tools. I used Procedure builder a few times but thats about it. To me it seemed pretty clunky, but it was nice to be able to debug a stored procedure. Or it was until you crashed the SP and it became locked in the database and un-updatable without a bounce ;)
    Most developers that I know, prefer to work "on their hard-drives" and publish to the database or some variation on that.
    I would love to see a tool for editing SPs and Packages where I could check out my code, make a change, compile it on the DB, and check my changes back into the source control. One more catch, we use VSS's ability to update the version number in a source code file on check-in so the version that ends up in the DB should have the "new" version number in the comment header.
    Also, the "Auto Code Generation" tool is not geared towards the type of code I write. I thought we were supposed to get away from writing data access code in our forms? Yet, this tool throws all kinds of stuff in for doing just that and no tools to make it easier (that I could find) to create a data acces layer for wrapping my stored procedures and packages. Where are these tools, Oracle? Help us write better code, not worse.
    The autocomplete is nice, but I have trouble with it. For example, if I type a table name and "." it will bring up all the columns in the table. If I type "R" it scrolls to the first column that starts with "R". But if I type "S" next, instead of scrolling to the first column that starts with "RS" it spits out the currently selected column and sticks an "S" on the end. Other times it doesn't work at all.
    The "Query" window is next to useless. It should work more like a SQL Plus (DOS) window. Or at the very least more like a SQL Server Query Analyzer Query window. I'll keep my SQL Plus until this is way better.
    Hopefully the next version (or 2 or 3) will be better. I hope Oracle is listening. They did acknowledge that other developers were asking for some of the same improvements.

  • Three questions about Droplets

    My first question is about a comparison between using Image Processor from Bridge to run Actions in Photoshop versus using Droplets in Post Processing from Lightroom's Export.
    As I understand it, using Image Processor will run my Sharpening Action on the Camera Raw file before it converts it to a JPEG. Using Lightroom's Export with the same Action as a Droplet will convert the Raw image to a JPEG first, then run the Action. How much of a quality impact will this have? And should I care?
    My second question is regarding using the Droplet itself. When I set up my Action to include the "Save" and "Close" steps, it will run properly when I am Exporting a single file from Lightroom. It will first Export the file, then Photoshop loads, the image opens, has the action applied, and then the image closes, and all is complete. I have even run this successfully when I start with two files simultaneously selected. Both images get Exported, and then the Droplets are applied.
    My problem is when I try to start with a full folder (approximately fifty images) selected. The Export completes correctly, but Photoshop never seems to apply the Droplets. Photoshop just sits there. Any ideas what is happening?
    My third question is about where I might be able to find a detailed tutorial about all of the considerations in setting up and using Droplets. The Photoshop help files are very abbreviated for my liking.
    Thanks for your help in these three questions.
    Nick

    i >"As I understand it, using Image Processor will run my Sharpening Action on the Camera Raw file before it converts it to a JPEG"
    Wrong I'm afraid. The RAW file is/cannot be affected. The sharpening only takes place after conversion to the editable format.
    Sharpening (and I'm assuming here that we are talking about
    i output
    sharpening) should always be carried out as a final part of the editing process
    b after
    resizing an image for it's final destination. the same image destined for a 20x16" print would require a different amount of sharpening to a version for placing on a web page.
    The amount of sharpening required by an image is also dictated by content so you can see how a fixed amount of sharpening applied via an action/batch/droplet will rarely give the optimum result.
    Capture Sharpening, on the other hand, is intended to compensate for the softening of image detail inherent in virtually all image sensors. This is best carried out by Lightroom and can be applied at the time of import via a preset.

  • Three questions about XFCE4

    I love XFCE.  I have three questions though:
    1st)  I am trying to add some launchers to the bottom and was wondering if people knew any good ways to find icons?  Some (gaim and xscreensaver) put there icons in /usr/share/pixmaps which is nice.  Others like, firefox, bluefish, xmms ect I can't find anywhere?  Were they somewhere else or do I have to go online and try to find them?
    2nd)  Does anyone know of it's possible to get a program to not show up on the taskbar?  I am using a really small monitor so things like XMMS take up space.
    3nd)  How do you change defaults?  If I try to open a url it tries to load mozilla.
    Thanks!

    1) I remember seeing Icons also listed in the share folder of gnome.  I think it's something like /opt/gnome/share/icons/48x48? or something like that.  you could always download icon packs from art.gnome.org and put them in your  ~/.icons directory and tell xfce to load them directly from there.
    2) don't really know.   I've always used the iconbox and liked it.  but don't how effective it is on a small screen.  also, you could open things in a different workspace and tell the taskbar to show things only from that particular workspace.  this way you can put the things you don't want to interact with constantly in a different workspace and have them going in the background while you work.

  • Three questions about visual composer?

    Hi all,
    1. what is the relationship between "visual composer and "visual composer BI kit"? what else elements do we need to add on top of visual composer in order to make visual composer BI kit?
    2. If we only do visual composer, the only thing we can't accomplish is the BI query wizard in visual compuser menu, right?
    3. After creating backend SAP BW system connection via BI JAVA CONNECTOR, why do we still need to create backend SAP BW system connection via SAP BI CONNECTOR?
    I went through Scott Cairncross' PDF file "Know how network call SAP Visual Composer & BI kit" and have the three questions above.
    George

    ad 1) BI Kit is a kind of plugin to VC (like the plugins in Eclipse). Today VC and BI Kit are shipped together. Once you have VC, you also have the BI Kit.
    ad 2) BI Kit offers:
    - connectivity to JDBC, ODBO, XMLA, SAP Query and SAP BI directly
    - BI Integration Wizard (to create models in a wizard style)
    - MDX, SQL Editors
    ad 3) The "direct" BI connection uses RFC-calls to BI and offers you more features, like Variables, Queries, query-views, infoobjects, favourites, history, URL port, etc. You can also connect to a SAP BI system via the XMLA-connector. A relational connector (like it is done in the portal) would only give you access to masterdata (infoobjects), but not infocube data.
    Mario

  • Three questions about Java and Ftp

    Hello, i've the following questions about Java and Ftp:
    1- .netrc file is in $HOME directory but i can't access to this directory from java code. The following line producesan Exception (directory doesn't exists)
    FileWriter file = new FileWriter ("$HOME/.netrc");
    2- .netrc file must have the following permissions: -rw- --- --- but when i create the .netrc file the following permissions are on default: -rw- r-- r--, how can i change this permissions? (In java code, i can't use chmod.....)
    3- Are there any way to pass parameters to a .netrc file? If i get to do this i needn't change the permissions because i can't modify or create/destroy this file.
    Thanks in advanced!!!
    Kike

    1- .netrc file is in $HOME directory but i can't
    access to this directory from java code. The
    following line producesan Exception (directory
    doesn't exists)
    FileWriter file = new FileWriter ("$HOME/.netrc");$HOME would have to be replaced by a shell, I don't
    think you can use it as part of a legal path.
    Instead, use System.getProperty("user.home");
    Ok, thanks
    2- .netrc file must have the followingpermissions:
    -rw- --- --- but when i create the .netrc file the
    following permissions are on default: -rw- r--r--,
    how can i change this permissions? (In java code,i
    can't use chmod.....)Yes, you can: Runtime.exec("chmod ...");
    I need to use estrictly the .netrc with -rw- --- --- permissions
    Yes, i can use Runtime.exec ("chmod ..."); but i don't like very much this solution because is a slow solution, am i right?
    3- Are there any way to pass parameters to a.netrc
    file? If i get to do this i needn't change the
    permissions because i can't modify orcreate/destroy
    this file.I don't think so. Why do you need the .netrc file in
    Java at all? Writing a GUI frontend?I want to use automatic ftp in a java program and FTP server, the files and path are not always the same, so i can:
    - modify .netrc (for me is the complex option)
    - destroy and create a new .netrc (is easier but i have permissions problem)
    - use .netrc with parameters but i haven't found any help about it
    Thanks for your prompt reply!!!!
    Kike

  • Three questions about the MBA...

    Hiya,
    Here's my first question: What is the resolution on the iSight camera that's built into the MBA? Is it the same as the ones on the other MacBooks, or is it different? I was reading AppleInsider's review of the MBA and they say that the MBA uses "a similarly lower end video camera" that seems to have a lower resolution than the 1.3 megapixel iSight cameras on the other MacBooks and MacBook Pros. Also, Apple's own specs for the MBA doesn't say specifically what the resolution is for it. But AppleInsider is claiming that pictures taken with the MBA's iSight camera are "visibly softer" and don't work in Photo Booth for some reason. :S (If you'd like to see the AppleInsider review I was looking at, here it is: http://www.appleinsider.com/articles/08/02/04/macbookair_hdd_model_an_in_depthreview.html. Please go to page 5 of this review to see what AppleInsider is talking about with the iSight camera--it's pretty much the first thing they address on that page.)
    Also: Is it true that it's not possible to turn off the wi-fi on the MBA? I was doing some window shopping at a Micro Center in my neighborhood and happened to talk about the MBA with some salespeople in the (Windows) laptop department, and they claimed that the wi-fi on it couldn't be turned off. Or, rather, they said that there was no visible, physical wi-fi button on the MBA, so they took that to mean that there was no way to turn the wi-fi off at all. Personally, I find this really hard to believe--surely there's some internal system preference that allows someone to turn off the wi-fi because it's obviously not going to be needed all the time?--but I want to hear from MBA owners here and see what you guys have to say about this.
    And finally...assuming the wi-fi can be turned off, how many hours the MBA run? I haven't seen anyone answer this question yet, and I'd really like to know because I don't think I'll be using an MBA with the wi-fi always on.

    LOL! I figured as much. I figured that the MBA's like my iPod touch and the wi-fi controls are in the system preferences somewhere. But yeah...those salesmen at MicroCenter were really digging into the MBA as they struggled to turn off some security controls that they'd tripped in their own department and had to talk loudly over their security alarms. To be fair, some of what they said is true:
    --for the kind of money you'll have to pony up for even the cheaper MBA model, you can easily get a lot more laptop for the money. Of course, these (Windows) laptop salesmen weren't going to name any MacBooks that were in a different department in the store, but they started naming Sony Vaio's and such.
    --there's no built-in optical drive. (Well, DUH. I thought this was understood? And to be fair, a lot of ultraportables don't have optical drives either, right? So this is nothing new.)
    --the MBA is underpowered. And...yeah, I suppose that's true if you want to compare the MBA to other MacBooks or some other laptops in general. But if we compare the MBA to ultraportables or other slim/light notebooks, the MBA is still more powerful than them, isn't it? And speaking in terms of what I already have (a 5-year-old HP laptop running Windows XP), I'm sure that the MBA is more powerful and it's gonna run faster than this computer that I'm already using.
    And then those salesmen just had to throw in the wi-fi comment. I went "Uh-huh" and walked out and let them keep talking and figure out how to turn off their security alarms. I'm not sure what these salesmen actually know about computers, but one thing was clear to me as I walked out of their department--they're willing to say just about anything to get a sale. I'd hate to think what they would tell me if I was honestly shopping around for one of their Windows laptops--I'd hate to hear the kind of trash they might tell me to make me buy a laptop and/or other products for it. :S

  • Three questions about signed jar file and applet

    I use three signed jar file. Each of them signed by different certificate. First of JARs contain applet class. When I start applet from html page I see message &#8220;This applet was signed by&#8230;&#8230; but Java cannot verify it&#8230; Do you trust&#8230;?&#8221;. All times I press &#8220;Yes I trust&#8221; and after this questions applet stop to work end exit. If I use only one certificate for signing of three JARs then applet continue to work after question. 1) What should I do to fix this bug? 2) Is it any method to check from applet that user press Trust button? Is it any method to emulate work of SecurityManager to check that Certificate object is trusted (I want do call some method check(Certificate) and if certificate is not trusted I want to see message with question: &#8220;Do you want to trust this certificate&#8221; and so on)?

    Hello Jarman,
    1. If I have a signed jar file, then as long as the
    certificate is recognised as trusted that applet can
    run as a fully trusted application on the client
    machine. So I should not have to add lines such as
    permission java.lang.RuntimePermission
    "readFileDescriptor", "read" ;
    permission java.lang.RuntimePermission
    "writeFileDescriptor", "write" ;
    to my java.policy file. true/false ?true
    2. If I am running a signed jar file in the Java
    plugin then I do not need to have a verisign or thawte
    certificate (however to allow my certificate to be
    accepted I do have to import it into the cacerts file
    on the client machine). True/false?true
    3. Following on from question 2, if I want to be able
    to run an applet on a client machine, without messing
    around with ANY files on those machines, I need a
    verisign or thawte certificate. True/false?true
    4. (And finally) Apart from a security exception
    saying that I need to add one of the lines like those
    of question 1, is there any way I can get other debug
    information as to why the signed jar file is not being
    recognised as signed?No. This could be a problem of importing your certifcate into the wrong place.
    The information on the following link is a little bit dated but it helped me to successfully install a testcertificate and sign an applet with it.
    http://www.suitable.com/Doc_CodeSigning.shtml

Maybe you are looking for