not have.
-- Tom
Thomas A. La Porte, DreamWorks SKG
mailto:[EMAIL PROTECTED]
On Sat, 20 Dec 2003, Yong Huang wrote:
Hi,
I think you're describing a real security hole. But I'm not sure how it's
exploited exactly. Let's say John Doe sets up his database on his desktop,
which is part
or
permissions problem anywhere in the mix. Does anyone have any
thoughts on where my trace file is going, if it is going
anywhere? Or how to determine why I'm not generating a trace
file?
Any thoughts or pointers are greatly appreciated.
-- Tom
Thomas A. La Porte, DreamWorks SKG
mailto:[EMAIL
that I could perpetuate my mistake in order to convince myself
that something really mysterious was going on!
-- Tom
Thomas A. La Porte, DreamWorks SKG
mailto:[EMAIL PROTECTED]
On Mon, 1 Dec 2003, Mladen Gogala wrote:
There are two possibilities:
1) You are hitting a well known bug which
Hamid,
In that case, I think the suggestion made earlier to use the
Virtual Private Database functionality is the best solution.
http://download-west.oracle.com/docs/cd/B10501_01/appdev.920/a96590/adgsec02.htm#1009919
-- Tom
Thomas A. La Porte, DreamWorks SKG
mailto:[EMAIL PROTECTED