until now I create a daily Logical backup backup of my Oracle 11gR2 Database at midnight while the database is running but the client application is in an idle state so that no queries are executed on the database.
Now I also want to implement a second Backup during the Day while the Database and the Client application are both up and running and queries (select/update/insert/delete) are executed.
Because I have already well tested Backup and Restore Scripts I want to continue using expdp and impdp.
This second "during the day" backup would not be directly imported in the production system after a potential data loss. I would import it on a mirrored test system and then manually use OracleSqlExplorer to query the lost data.
This leads to the following questions:
- If I use expdp to perform a backup during the database runtime is it guaranteed that the database where I take the backup from and SQL statements are executed during the backup process does contain its integrity and consistency ?
- Do I need to add certain Parameters to the expdp command to guarantee consistency ? I found this:
"expdp options for creating a consistent export dump: FLASHBACK_SCN, FLASHBACK_TIME, CONSISTENT=Y"
So far I use this linux shell script:
$ ORACLE_HOME/bin/expdp \"$ USERNAME/$ PASSWORD as sysdba\" SCHEMAS=<csv list of schemas> REUSE_DUMPFILES=Yes DIRECTORY=backup DUMPFILE=$ BACKUP_NAME.dmp
- Can I use a backup create with expdp during the database runtime as a valid source for a impdp without having to worry about integrity and consistency ? For question number 2 I found a thread that says NO
I’m using Maria DB, version 10.2.22, where one database column uses FULLTEXT for a broad document searching. However, I’ve ran into a "Table handler out of memory" on some searches. The table itself is only 4.4 GB. I’ve read on stackoverflow, that changing some of the InnoDB variables such as:
from their default value to say 4 GB could potential solve to the memory issue. My question is three parts, I suppose.
- Are there any other variables I should consider changing.
Because this DB is fairly critical to run, after running the command lines to change the variables would I need to stop and start the MariaDB service to fetch these changes?
If, restarting MariaDB services is needed, can anyone point me to a guide as far as how to safely change these variables?
We have domain.com and want to test a new site template on beta.domain.com.
What is the correct way to run a beta test without affecting SEO of the main domain.com?
In the topic SEO safe way to run beta of new site on seperate domain I found 2 recommendations:
- Putting a robots.txt with noindex to our beta.domain.com
- Canonicalizing beta.domain.com to domain.com – Why? In any case we already have the noindex flag…
Does it still actual in 2020? Do you have any other recommendations?
By the way, do we need to register beta.domain.com in Google Webmasters Tools?
One of tor’s stated goals is to help individuals such as journalists, activists and whistleblowers protect against surveillance, and in many countries people in those lines of work or activities are usually subject to surveillance, especially targeted surveillance.
Given a scenario in which a journalist working in an environment where he is subject to active targeted surveillance, how would he safely download tor? Assume that the journalist in question is using a new computer with a freshly installed Linux distribution. In what ways could an adversary with man-in-the-middle capabilities affect or compromise the download?
Does using https to download TAILS or the distribution package manager to download tor provide enough security to protect from malicious third-parties? How can someone in this scenario safely download tor or TAILS?
A hypothetical 1GB USB stick is full of sensitive documents/images/etc. and it is not encrypted.
The owner wishes to discard it and is aware of having to safely erase it first.
There are several tools and utilities to do this. Some can be configured to do it “faster yet less safely”, others do it “slower but more safely”.
As opposed to have it erased using all the different ways known to do this, the owner chooses to simply drag all the current items to the recycle bin and then paste one 1GB (~2-hour) black screen movie file to the USB stick.
Again, no fancy erase utilities are used. The USB stick is then discarded.
If it falls into the wrong hands, can any of the sensitive files (that filled the stick before the movie file was pasted) be retrieved?
(1) If no, why do complex hard drive erase utilities exist? Some of them feature “safe” erase procedures that take houuurs, when simply filling a soon to be discarded HD with meaningless files, can do the job?
(2) If yes, how can 2GB (movie file + sensitive files) co-exist in a 1GB stick? Seems to me like the only logical explanation is (a) the movie file was in fact less than 1GB, (b) the USB stick was secretly larger than 1GB as stated, or (c) the movie file was copy-pasted only partially and the owner did not notice.
If I download a file (PDF,doc,image,video etc) with a tails/tor setup, how can I ensure the file doesn’t "call home" or isnt imbedded with malware (other than looking at the hash)? Will a simple malware scan work? And if I use tails to open the files and disconnect from the network I’m using can I still have my anonymity compromised?
Do you know where anyone can buy high-quality backlinks with safety? Because there are a lot of fraud companies who build backlinks through black hat methods. I want to add more sites that are providing spam-free and white hat backlinks. Also, I have already added some great sites for buying backlinks on my site. But I want more for helping my audiences. Can You recommend something?
Casting Demiplane allows the caster (warlock or wizard… or sorcerer using Wish… &/or sneaky bard) to have:
This spell has amazing uses yet serious limits which others have questioned:
Question: “How much one can customize the interior of this spell?”
Answer: “If / as / so much as the DM says / so!”
Question: “What the nature of this demiplane for location & tracking purposes?”
Answer: “They must describe it a bit &/or use a ‘tuning fork‘!”
Information on Demiplane is amazingly light, especially for a game system that prides itself on doing the absolute minimum possible for a spell’s casting. This spell is neither useful for combat mechanics nor very clear for role-play purposes.
My concerns with this spell description & use:
Does this shadowy connection door between Demiplanes vanish within the hour? The spell description does not specify, so this may be a way to build up a massive interconnected demi-mansion. Can this door stay ‘open’? Can it be a ‘window’ instead? Can the connection between planes let larger creatures through if you double it up multiple shadow doors in one spot?
What happens if one adds plane-space expanding magic to this Demiplane? Say you cast a Mordenkainen’s Magnificent Mansion in there – does the whole plane become a bit bigger? Or does this simply not fit? Or does this spell trigger a collapse-explosion similar to sticking a Bag of Holding into a Portable Hole? Can one change the time-passage of the original Demiplane so as to make these space-holder-builder spells permanent?
The 5e spell specifies the new parts must be cast OUTSIDE of the original. Is there ANY way to add or expand to the space-size of this 30′ x 30′ plane? Possibly the repeated use of the (non-exhausting) Wish spell? ‘You need not meet any of the requirements’… does that allow one to add bonus space to this walk in closet? Or even make this silly vanishing smoke-door a bit more durable.. or big enough to fit a donkey through?
Base question: Demiplane feels small / simple / specific / stuck. How does an Arch-mage add bits / expand / give it more space for activities?
Answers may include: any of the guides (Volo’s Mordenkainen’s, etc.), tweets from Lord Crawford, Sage Advice, any 5e Unearthed Arcana… or whatever one can find that is RAW, quasi-legal or even slightly more tested than outright home-brew.
Alice needs to get non public information from Bob, validate it (let’s say check that birth day is between 1900 and now) and forward it to Charlie. There’s an end to end encryption between Alice and Bob and Alice and Charlie.
If the computer Alice uses is some remote machine, can Alice avoid leaking the non public information she is handling to whoever has access to the machine she uses?
My undestanding is that the moment the data is decrypted in the machine’s memory it’s at the mercy of whoever has physical access to that machine. Is that correct? If so. Does that mean that for handling non public information I should never use cloud solutions and rely only on physical machines that I own?
I see there’s “Homomorphic encryption”. But I understand that if, as in my example, I have to validate that a number is btween x and y it’s equivalent to the number being known?
There’s a somewhat similar question here: encrypting data while in memory
But it does not focus on these questions and is implementation specific.
I want to test some untrusted software to check them, for this reason, I researched for a good sandbox software and I found Sandboxie I tested few safe application, but I am not sure if I can run untrusted application also?