d not have.
-- Tom
Thomas A. La Porte, DreamWorks SKG
<mailto:[EMAIL PROTECTED]>
On Sat, 20 Dec 2003, Yong Huang wrote:
>Hi,
>
>I think you're describing a real security hole. But I'm not sure how it's
>exploited exactly. Let's say John Doe sets up
t sessions,
so that I could perpetuate my mistake in order to convince myself
that something really mysterious was going on!
-- Tom
Thomas A. La Porte, DreamWorks SKG
<mailto:[EMAIL PROTECTED]>
On Mon, 1 Dec 2003, Mladen Gogala wrote:
>There are two possibilities:
>1)
n't believe that there is a file ownership or
permissions problem anywhere in the mix. Does anyone have any
thoughts on where my trace file is going, if it is going
anywhere? Or how to determine why I'm not generating a trace
file?
Any thoughts or pointers are greatly appreciated.
--
Hamid,
In that case, I think the suggestion made earlier to use the
Virtual Private Database functionality is the best solution.
http://download-west.oracle.com/docs/cd/B10501_01/appdev.920/a96590/adgsec02.htm#1009919
-- Tom
Thomas A. La Porte, DreamWorks SKG
<mailto:[EMAIL PROTEC