473,399 Members | 3,919 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,399 software developers and data experts.

So you think your database is secure? Think again.

So you think your database is secure? Think again.

Scuba by Imperva Database Vulnerability Scanner is a FREE, lightweight
Java utility that safely scans Oracle, DB2, MS-SQL, and Sybase
databases for known vulnerabilities and configuration flaws. Scuba by
Imperva finds hundreds of flaws like unpatched software, unsafe
processes and weak passwords: the high risk vulnerabilities that
expose your databases to attack.

Based on its assessment results, Scuba by Imperva creates clear,
informative reports with detailed test descriptions. Summary reports
illustrate overall risk level while detailed reports point out
specific holes in your database infrastructure. With Scuba by Imperva,
you are quickly on your way to meeting industry-leading best practices
for database configuration, security and management.

Scuba by Imperva has been developed by the Application Defense Center
(ADC), one of the most authoritative groups in the Database Security
space. While comparable products cost anywhere from a few hundred to
several thousand dollars, Scuba by Imperva is fully functional and
completely free.

You can download Scuba by Imperva from http://www.imperva.com/go/scubaugl

May 14 '07 #1
0 973

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

6
by: Sarah Tanembaum | last post by:
I was wondering if it is possible to create a secure database system using RDBMS(MySQL, Oracle, SQL*Server, PostgreSQL etc) and web scripting/programming language(Perl, PHP, Ruby, Java, ASP, etc)...
3
by: Dariusz | last post by:
I have been reading a little that you should secure your PHP code to prevent SQL injection into a database (MySQL in my instance), mainly by checking the type of data to be put into a database, and...
3
by: Annette Massie | last post by:
I have a database that contains complaint information in regards to Law Enforcement. They need to have this database secure and out of reach for all but two users. (including me, they say). In...
5
by: Paul .V. | last post by:
I have read many long articles in this group about securing my database for distribution. This is the advise I have taken: 1. Hardcoded the purchasing company's name into the program. The...
7
by: Alan Silver | last post by:
Hello, I am writing a page where sensitive data is collected (over SSL) and stored in a database. I have been looking at the .NET encryption classes, but am a bit confused as to which is best...
2
by: Jeff Davis | last post by:
I have virtual hosted users on a server and some of them have a postgresql database. I'm concerned about the outside possibility that a user could create an infinite loop and fill up the partition...
17
by: Flic | last post by:
Is this possible? I know about a bit about ODBC and found how to import an ODBC database stored on the computer, however I am after accessing an SQL database stored on a webserver. I'd like to...
0
by: system.audit | last post by:
So you think your database is secure? Think again. Scuba by Imperva Database Vulnerability Scanner is a FREE, lightweight Java utility that safely scans Oracle, DB2, MS-SQL, and Sybase databases...
8
by: aklein | last post by:
I was given a database to update and am running into the following problem: The database appears to have been secured using Access security (it is an MDB, not MDE). Every form etc that I try to...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.