<body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/plusone.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar.g?targetBlogID\x3d26473280\x26blogName\x3dHackers+News\x26publishMode\x3dPUBLISH_MODE_BLOGSPOT\x26navbarType\x3dBLACK\x26layoutType\x3dCLASSIC\x26searchRoot\x3dhttp://hackers-news.blogspot.com/search\x26blogLocale\x3den_US\x26v\x3d2\x26homepageUrl\x3dhttp://hackers-news.blogspot.com/\x26vt\x3d113306571398039483', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe" }); } }); </script>

Hackers News

Keeping Knowledge Free

Oracle releases password security tool

Oracle has released a tool designed to ferret out commonly used default passwords that theoretically could be misused by hackers. Called the Oracle Default Password Scanner, the software was released Tuesday as part of Oracle's quarterly Critical Patch Update. Earlier versions of the company's database software included well-known default passwords and user names, for example "scott / tiger". These accounts are also known to have been created by other software, such as application servers, that interact with the database, said Oracle Security Alerts Manager Darius Wiles. Although these accounts have been locked down in current versions of the database, they may present a problem to some users with older versions of the database or to those who have upgraded from an older version that included the default passwords, he added.

read more
« Home | Next »
| Next »
| Next »
| Next »
| Next »
| Next »
| Next »
| Next »
| Next »
| Next »

» Post a Comment