<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-1281617565918058769</atom:id><lastBuildDate>Sun, 08 Sep 2024 12:12:28 +0000</lastBuildDate><category>Secuirty Software</category><category>Downloads</category><category>database</category><category>free software</category><category>free download</category><category>secure</category><category>Malicious Software</category><category>Operating System</category><category>control panel</category><category>webhosting</category><category>Antenna WiFi</category><category>Developer Tools</category><category>hacking</category><category>E-book</category><category>Encrypt/Decrypt Software</category><category>Proxy</category><category>Squid</category><category>Tips and Trik</category><category>google</category><category>hotspot</category><category>mikrotik</category><category>success story</category><category>yahoo</category><title>Software Code</title><description>this site provide free software and tutorial of computers</description><link>http://sitesoftwarecom.blogspot.com/</link><managingEditor>noreply@blogger.com (software)</managingEditor><generator>Blogger</generator><openSearch:totalResults>66</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1281617565918058769.post-1328933556175330818</guid><pubDate>Tue, 03 Jan 2023 08:04:00 +0000</pubDate><atom:updated>2023-01-03T00:04:49.427-08:00</atom:updated><title>Cara Mudah Membuat Database Dan Tabel MySQL</title><atom:summary type="text">Untuk membuat database msql ada beberapa cara yang dapat di lakukan, diantaranya melalui command promt dan melalui phpmyadmin. Artikel ini akan menjelaskan bagaimana Cara Mudah Membuat Database Dan Tabel MySQL, dimana langkah yang tepat dilakukan adalah dengan melalui Phpmyadmin. Untuk dapat melakukan pembuatan database dan tabel melalui phpmyadmin, Anda perlu menginstall terlebih dahulu software</atom:summary><link>http://sitesoftwarecom.blogspot.com/2023/01/cara-mudah-membuat-database-dan-tabel.html</link><author>noreply@blogger.com (software)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsBbZAX3ICAWu5OC__GyjUc3d-zpkdNB1CVLxOcrkAsw9mG0kM2c_PipmL_-5tFqqkEuGVlu7zclvmbvRhQC-OV5jlD4zIMkm_yWjMA6hlnX-H4A7XAa2g7NStCAd9tcU0cqupG9W2noSLLNo3zRe6QPD3-Or1iav-IAM_7smP7_f_HJvt5ZP_SqhYqA/s72-w437-h235-c/1%20MEMBUAT%20DATABASE%20DAN%20TABEL%20MYSQL.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1281617565918058769.post-3261094538569230696</guid><pubDate>Thu, 22 Nov 2012 02:57:00 +0000</pubDate><atom:updated>2012-11-21T18:57:57.637-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">success story</category><title>success stories of social entrepreneurs Indonesia</title><atom:summary type="text">n
 a 10-year work plan to come, Bina Governmental NGOs want to be great 
with employees 5,000 people in 2015 (the first book, page 46), while 
relying on the spirit and the spirit early, the grassroots empowerment. The
 term variety, which is formulated to finally exact figure Bambang 
Ismawan by Harry Tjan Silalahi, &quot;helping underprivileged because they 
felt a great man&quot; (the first book, page </atom:summary><link>http://sitesoftwarecom.blogspot.com/2012/11/success-stories-of-social-entrepreneurs.html</link><author>noreply@blogger.com (software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1281617565918058769.post-8463592878670732588</guid><pubDate>Thu, 01 Nov 2012 00:44:00 +0000</pubDate><atom:updated>2012-10-31T17:44:30.268-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tips and Trik</category><title>Convert Power Point into a Macromedia Flash MX</title><atom:summary type="text">To convert Power Point into a Macromedia Flash MX takes several steps, among others:• Open an existing PowerPoint slides on your computer harddisc.• Click File&amp;gt; Save As&amp;gt; Save as type to select windows metafile.





• When asked if you want to save all the slides, then the answer is that each slide (every slide).• Open Macromedia Flash MX&amp;gt; File&amp;gt; Import&amp;gt; Import to Stage&amp;gt; select </atom:summary><link>http://sitesoftwarecom.blogspot.com/2012/10/convert-power-point-into-macromedia.html</link><author>noreply@blogger.com (software)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0V_xC4chpSh-1D5ScFQe35n7l64wejqyqsViVqjjVzxPogSg8l31kjEW2Nl2ZRQnf0qFOsdRZIqkS0wQ9rBD02q7pbHqairSbWiGidqvhTvJp5q736XdR4jdVSRfIxF0walNzqkyYfv_h/s72-c/presentasi+PP.JPG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1281617565918058769.post-1495115081346142911</guid><pubDate>Tue, 09 Oct 2012 14:00:00 +0000</pubDate><atom:updated>2012-10-09T07:00:29.988-07:00</atom:updated><title>Making USB Power Injector with Auto Power-ON</title><atom:summary type="text">Some time ago, in my post entitled Making USB or USB Power Injector Power injector there are some who asked about his USB Power injector that is not equipped with Automatic System PSU so the user must turn on / turn circuit manually after Jack USB plugged in USB connector CPU. For those following my posts the development of USB Power Injector before.
In this series are equipped with Automatic PSU</atom:summary><link>http://sitesoftwarecom.blogspot.com/2012/10/making-usb-power-injector-with-auto.html</link><author>noreply@blogger.com (software)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHQDs1O8tsSP0pf3KwhVlwZxb1jy9rwRBGag8XxVN0zurl6rA403I3JXQeWx54lo-4fPWsId6bZtJ0t4rVlLjaIkBlHugGrztICMzan_AaRdTDQ5fGjF_0uVwilpxfewQgRdC88EiibJLU/s72-c/injetor+power+1.JPG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1281617565918058769.post-542093789795263207</guid><pubDate>Tue, 09 Oct 2012 13:46:00 +0000</pubDate><atom:updated>2012-10-09T06:46:06.434-07:00</atom:updated><title></title><atom:summary type="text">How to make a USB extender. Ingredients:1. ordinary USB cable, standard aja yg 1 m or 0.5m.2. Wired LAN / UTP cabling for the network.Step 1: The USB cable is tested before use USB flash disk in the computer, it is still functioning or not. If it is OK, cut into 2 parts. There are usually red, black, and white, green. Red and black are usually for 5V supply voltages. Green white is usually a USB </atom:summary><link>http://sitesoftwarecom.blogspot.com/2012/10/how-to-make-usb-extender.html</link><author>noreply@blogger.com (software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1281617565918058769.post-9139032063054997401</guid><pubDate>Tue, 09 Oct 2012 13:43:00 +0000</pubDate><atom:updated>2012-10-09T06:43:37.712-07:00</atom:updated><title>Mikrotik Router Hotspot Billing Integration Setting </title><atom:summary type="text">Setting Mikrotik Router Hotspot Billing integration is straightforward that, through mikrotik installed correctly, run the application &quot;Winbox Loader&quot; so that you can configure Mikrotik Router from the Windows desktop to easily and quickly without having to memorize the command line Mikrotik. After double click the Winbox application will appear as follows:

After that Click ... it would appear </atom:summary><link>http://sitesoftwarecom.blogspot.com/2012/10/mikrotik-router-hotspot-billing.html</link><author>noreply@blogger.com (software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1281617565918058769.post-3750331367029274293</guid><pubDate>Tue, 11 Sep 2012 14:14:00 +0000</pubDate><atom:updated>2012-09-11T07:14:17.379-07:00</atom:updated><title>Configuration User Manager Hotspot In MikroTik</title><atom:summary type="text">Mikrotik User Manager is a web-shaped management system, which is integrated with mikrotik which can be used for user-user meminage both internal mikrotik mikrotik itself or from outside the base system mikrotik itself, or often in short UserManager also with this Userman most much in use to manage users as follows: • User Hotspot billing system • PPP or PPPoE Client • DHCP Server • Wereles users</atom:summary><link>http://sitesoftwarecom.blogspot.com/2012/09/configuration-user-manager-hotspot-in.html</link><author>noreply@blogger.com (software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1281617565918058769.post-6001354065274320027</guid><pubDate>Sun, 24 Jun 2012 13:21:00 +0000</pubDate><atom:updated>2012-06-24T06:21:29.336-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Antenna WiFi</category><category domain="http://www.blogger.com/atom/ns#">hotspot</category><category domain="http://www.blogger.com/atom/ns#">mikrotik</category><category domain="http://www.blogger.com/atom/ns#">Secuirty Software</category><title>Billing Setting Hotspot Mikrotik Router Integration</title><atom:summary type="text">Billing
 Setting Hotspot Mikrotik Router integration is easy, after the install 
mikrotik correctly, run the application &quot;Winbox Loader&quot; so that you can 
configure the Mikrotik Router from the Windows Desktop to easily and 
quickly without having to memorize the command line Mikrotik. After double-click the Winbox application will appear as follows:&amp;nbsp;After
 that click on the sign ... it will </atom:summary><link>http://sitesoftwarecom.blogspot.com/2012/06/billing-setting-hotspot-mikrotik-router.html</link><author>noreply@blogger.com (software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1281617565918058769.post-7070382604197392683</guid><pubDate>Wed, 06 Jun 2012 10:25:00 +0000</pubDate><atom:updated>2012-06-06T03:25:03.602-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">yahoo</category><title>Yahoo Webmaster Guidelines</title><atom:summary type="text">Bing is a machine that has a design inovatif.untuk poencari new users (new users interface) will be taken to find the information they want quickly based on what their needs with the various features, such as Quick Tabs.&amp;nbsp; Basic SEO Bing · SEO basically adalahtentanf bagaiamna create a good website. And d Bing, there are several ways you can do to achieve optimal rankings for websites that we</atom:summary><link>http://sitesoftwarecom.blogspot.com/2012/06/yahoo-webmaster-guidelines.html</link><author>noreply@blogger.com (software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1281617565918058769.post-1798208433352605638</guid><pubDate>Wed, 06 Jun 2012 10:23:00 +0000</pubDate><atom:updated>2012-06-06T03:23:55.048-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">google</category><title>Guidelines GOOGLE WEBMASTER</title><atom:summary type="text">If your site has been completed, then we have to input the site to http://www.google/submityour content /. Submit sitemap to Google Webmaster Tools. It is used Google to learn and know about the structure of the site that we have.In to design the site, would be better if we create a site that is clear and text links. Each page must be familiar, at least with a text link. It would be better if the</atom:summary><link>http://sitesoftwarecom.blogspot.com/2012/06/guidelines-google-webmaster.html</link><author>noreply@blogger.com (software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1281617565918058769.post-3466748733866478802</guid><pubDate>Wed, 06 Jun 2012 10:20:00 +0000</pubDate><atom:updated>2012-06-06T03:20:31.982-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">control panel</category><category domain="http://www.blogger.com/atom/ns#">webhosting</category><title>Facilities Control Panel</title><atom:summary type="text">E-MAIL:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;E-Mail Account pengelolahan (to add, delete, edit or change the password) 3 Webmail for each email address. Webmail is a free E-Mail that allows us to read an email where &amp;amp; anytime: at home, at work or anywhere.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;POP3 account to add, edit and delete POP3 e-mail we can use in Outlook Expres&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;E-Mail Forwarding to add, </atom:summary><link>http://sitesoftwarecom.blogspot.com/2012/06/facilities-control-panel.html</link><author>noreply@blogger.com (software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1281617565918058769.post-1286543022921874304</guid><pubDate>Wed, 06 Jun 2012 10:19:00 +0000</pubDate><atom:updated>2012-06-06T03:19:03.305-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">control panel</category><category domain="http://www.blogger.com/atom/ns#">webhosting</category><title>On how to use Cpanel Hosting</title><atom:summary type="text"> Control Panel or the Web Manager is the most popular tool to manage our website. With the Control Panel, we do not need to use more manual methods to manage our website. We also do not need to contact the hosting staff for making new email addresses, subdomains, backups, creating a new database, change passwords FTP / Control Panel and so on. Everything we can do yourself by logging into the </atom:summary><link>http://sitesoftwarecom.blogspot.com/2012/06/on-how-to-use-cpanel-hosting.html</link><author>noreply@blogger.com (software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1281617565918058769.post-6767767242452597169</guid><pubDate>Wed, 06 Jun 2012 10:14:00 +0000</pubDate><atom:updated>2012-06-06T03:14:45.743-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">control panel</category><category domain="http://www.blogger.com/atom/ns#">webhosting</category><title>Understanding Web Hosting</title><atom:summary type="text">Web Hosting is an internet hosting service that allows individuals and organizations to create Web sites that are accessible through the World Wide Web (www). Web hosts are companies that provide space on a server owned or leased for use by clients, as well as providing Internet connectivity, typically in a data center. Web hosts can also provide data center space and connectivity to the Internet</atom:summary><link>http://sitesoftwarecom.blogspot.com/2012/06/understanding-web-hosting.html</link><author>noreply@blogger.com (software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1281617565918058769.post-5745384055798618573</guid><pubDate>Sat, 21 Apr 2012 17:09:00 +0000</pubDate><atom:updated>2012-04-21T10:10:01.320-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Antenna WiFi</category><title>How to Create or Making USB Power Injector</title><atom:summary type="text">

How to Make, Making Power Injector USB Modem, Wi-Fi. USB Extender with a length of more than 8 feet is often an error when used to connect the USB Air Card Modem and Wireless LAN. Actually, this error does not always occur in any type of device that uses USB Extender with over 8 feet long. For
 example, a USB Extended through 12 meters, usually no error will occur 
during their use of Flash </atom:summary><link>http://sitesoftwarecom.blogspot.com/2012/04/how-to-create-or-making-usb-power.html</link><author>noreply@blogger.com (software)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhObrvFy5PWmObs_v3edrIki4otVFpvCjN4XQxfWyVzhms9a9r1dt98AGp9XEzk_wxhoFMvMhMRkv8XTi-gWnSZsgGznw1PxmSKSRJeSIBjIfZYQfh9PKHX27pYrT6WCdpBRAPfpzNauIfR/s72-c/1.JPG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1281617565918058769.post-7537269287865851819</guid><pubDate>Thu, 19 Apr 2012 02:58:00 +0000</pubDate><atom:updated>2012-04-18T20:02:52.776-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">free software</category><title>YAHOO! rise to new applications</title><atom:summary type="text">YAHOO! increase the quality of services to the user by presenting a new application on its web pages, which is Yahoo Mail, TV widget and Zimbra. The addition of these new applications is part of inistiatif Yahoo! To make its services more rich.As announced in December last year, Yahoo is now paving the way for outside developers and integrate with the features of social networking sites.Yahoo </atom:summary><link>http://sitesoftwarecom.blogspot.com/2012/04/yahoo-rise-to-new-applications.html</link><author>noreply@blogger.com (software)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIDcoAoQxnfl0w4KnAz8BzKGO_smMpCwAezpW0ISETqXdp3gwy-Vot-yqGilO2MbHhmJ6z67FkulvMKC8dlxs6EBFKaro5tdhHEgMBMoVIJSpIcYROq6c57U6O4j3BiqlGFBaKbggpzMeO/s72-c/zimbra_logo-jpg1.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1281617565918058769.post-7628356082257571820</guid><pubDate>Thu, 19 Apr 2012 02:42:00 +0000</pubDate><atom:updated>2012-04-18T19:43:36.291-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Malicious Software</category><category domain="http://www.blogger.com/atom/ns#">Secuirty Software</category><title>Anti malicious websites</title><atom:summary type="text">The Chinese government wants all personal computers sold in the country must have software that can block dangerous situ-site. Site blocking software is intended to cover the sites, especially pornography. This rule is an effort to protect the younger generation of content that is considered harmfulSoftware called &quot;Green Dam Youth Escort&quot; will block access to sites banned by the government by </atom:summary><link>http://sitesoftwarecom.blogspot.com/2012/04/anti-malicious-websites.html</link><author>noreply@blogger.com (software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1281617565918058769.post-5133316391732978225</guid><pubDate>Wed, 18 Apr 2012 17:01:00 +0000</pubDate><atom:updated>2012-04-18T10:02:40.537-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">free software</category><category domain="http://www.blogger.com/atom/ns#">Proxy</category><category domain="http://www.blogger.com/atom/ns#">Squid</category><title>Proxy Server on Squid</title><atom:summary type="text">Is it transparent cache?Explanation  of terms transparent and transparent proxy cache depends on the  instance, but we assume here that the context of HTTP Proxy / cache with  transparent hijacking of port 80 which is an HTTP path that failed in  the internet. The  difference is that the cache include cache, but the proxy only proxies  without caching. Transparent Overload has different meanings </atom:summary><link>http://sitesoftwarecom.blogspot.com/2012/04/proxy-server-on-squid.html</link><author>noreply@blogger.com (software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1281617565918058769.post-6071774411688587888</guid><pubDate>Tue, 12 Oct 2010 04:26:00 +0000</pubDate><atom:updated>2010-10-11T21:30:01.835-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hacking</category><category domain="http://www.blogger.com/atom/ns#">Secuirty Software</category><title>7 Tips for Keeping Passwords</title><atom:summary type="text">Passwords are secret codes that must be protected. Many negative things can happen when your password leak into the hands of others. Learn 7 tips to keep it brief.1. Not Using Default PasswordThe default password is the password that we can be the first time. This default password should indeed be quickly replaced because of very vulnerable. The reason, the default password can be easily searched</atom:summary><link>http://sitesoftwarecom.blogspot.com/2010/10/7-tips-for-keeping-passwords.html</link><author>noreply@blogger.com (software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1281617565918058769.post-978042882382639437</guid><pubDate>Tue, 20 Jul 2010 05:40:00 +0000</pubDate><atom:updated>2010-07-19T22:41:35.744-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">database</category><title>Attacking Oracle</title><atom:summary type="text">chapter 3Scanning for Oracle  Servers Finding  an Oracle database server on the network is best achieved by doing a TCP port  scan, unless of course you already know where it is. Oracle and its peripheral  processes listen on so many different ports, chances are that one of them will  be on the default port even if most of them aren&#39;t. The following list details  some common Oracle processes and </atom:summary><link>http://sitesoftwarecom.blogspot.com/2010/07/attacking-oracle.html</link><author>noreply@blogger.com (software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1281617565918058769.post-6126632384418737249</guid><pubDate>Tue, 20 Jul 2010 05:38:00 +0000</pubDate><atom:updated>2010-07-19T22:39:05.042-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">database</category><title>Database Authentication</title><atom:summary type="text">When a client authenticates to the server, rather than  sending a password across the wire in clear text like most other RDBMSes Oracle  chooses to encrypt it. Here&#39;s how the authentication process works. First, the  client connects to the TNS Listener and requests access to the RDBMS, specifying  its SID. Provided the SID is valid the Listener responds with a TCP port and  redirects the client </atom:summary><link>http://sitesoftwarecom.blogspot.com/2010/07/database-authentication.html</link><author>noreply@blogger.com (software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1281617565918058769.post-5157203552852709091</guid><pubDate>Tue, 20 Jul 2010 05:34:00 +0000</pubDate><atom:updated>2010-07-19T22:37:31.291-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">database</category><title>Oracle Authentication and Authorization</title><atom:summary type="text">Oracle  supports two kinds of accounts: database accounts and operating system accounts.  Operating system accounts are authenticated externally by the operating system  and are generally preceded with OP$, whereas database accounts are authenticated  against the database server. A number of users are created by default when the  database is installed; some of these are integral to the correct </atom:summary><link>http://sitesoftwarecom.blogspot.com/2010/07/oracle-authentication-and-authorization.html</link><author>noreply@blogger.com (software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1281617565918058769.post-5908978052047876392</guid><pubDate>Tue, 20 Jul 2010 05:30:00 +0000</pubDate><atom:updated>2010-07-19T22:34:05.816-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">database</category><title>The Oracle Intelligent Agent</title><atom:summary type="text">This component is peripheral to the actual RDBMS but is integral to its management. The Intelligent Agent performs a number of roles, but probably its most significant function is to gather management and performance data, which can be queried through SNMP or Oracle&#39;s own proprietary protocols. The Agent listens on TCP port 1748, 1808, and 1809. As far as SNMP is concerned the port is </atom:summary><link>http://sitesoftwarecom.blogspot.com/2010/07/oracle-intelligent-agent.html</link><author>noreply@blogger.com (software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1281617565918058769.post-8833267476367859477</guid><pubDate>Tue, 29 Jun 2010 06:46:00 +0000</pubDate><atom:updated>2010-06-28T23:48:46.640-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">database</category><category domain="http://www.blogger.com/atom/ns#">Secuirty Software</category><title>The Oracle RDBMS</title><atom:summary type="text">Because  we&#39;ll be talking about the Oracle RDBMS in depth in later sections, we&#39;ll simply  cover a few of the more important details here. One of the major differences  between Oracle running on Windows and Oracle running on UNIX-based platforms is  the number of processes that combine to create the actual RDBMS. On Windows  there is simply the oracle.exe process, but on UNIX platforms there are </atom:summary><link>http://sitesoftwarecom.blogspot.com/2010/06/oracle-rdbms.html</link><author>noreply@blogger.com (software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1281617565918058769.post-2068123151166475181</guid><pubDate>Tue, 29 Jun 2010 06:38:00 +0000</pubDate><atom:updated>2010-06-28T23:45:07.708-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">database</category><category domain="http://www.blogger.com/atom/ns#">Secuirty Software</category><title>Examining the Oracle Architecture</title><atom:summary type="text"> Chapter 2 (1)We begin this chapter by examining the physical layout of  the database, such as the Oracle processes and how they interact with the  network. We move on to examining authentication and authorization and then move  to the logical layout of the database.  Oracle Processes  and Oracle on the Network This section describes the major components of Oracle and  their interaction with the </atom:summary><link>http://sitesoftwarecom.blogspot.com/2010/06/examining-oracle-architecture.html</link><author>noreply@blogger.com (software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1281617565918058769.post-6225181523307964922</guid><pubDate>Sat, 19 Jun 2010 07:00:00 +0000</pubDate><atom:updated>2010-06-19T00:01:12.046-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">database</category><title>Conclusion</title><atom:summary type="text"> We believe that the best way to secure a system is to  understand how to attack it. This concept, while controversial at first sight,  has a long history in the field of cryptography and in the broader network  security field. Cryptographic systems are generally not considered &quot;secure&quot;  until they have been subjected to some degree of public scrutiny over an  extended period of time. We see no </atom:summary><link>http://sitesoftwarecom.blogspot.com/2010/06/conclusion.html</link><author>noreply@blogger.com (software)</author><thr:total>0</thr:total></item></channel></rss>