Tagged articles
7 articles
Page 1 of 1
ITPUB
ITPUB
Jun 8, 2020 · Databases

How to Simulate and Recover Various Oracle File Corruptions

This guide walks through simulating corruption of Oracle password, parameter, control, data, and log files, demonstrates the resulting errors, and provides step‑by‑step RMAN and SQL commands to restore each file type while emphasizing backup best practices.

Control FileDatabase RecoveryFile Corruption
0 likes · 16 min read
How to Simulate and Recover Various Oracle File Corruptions
ITPUB
ITPUB
Feb 29, 2020 · Information Security

What the Weimeng Database Deletion Reveals About Backup and Permission Strategies

The article analyzes the recent Weimeng data‑loss incident, explains why recovery took 36 hours, highlights insider abuse, and offers a practical guide for small and large teams covering reliable backups, minimal‑privilege management, and cloud‑based disaster‑recovery solutions.

Database SecurityPrivilege Managementbackup strategy
0 likes · 9 min read
What the Weimeng Database Deletion Reveals About Backup and Permission Strategies
Programmer DD
Programmer DD
Feb 26, 2020 · Information Security

Inside the Weimob Data Deletion: Lessons on Permissions and Backup

A malicious insider deleted Weimob's primary and backup databases, prompting a slow recovery effort and highlighting the critical need for stricter permission controls and reliable backup mechanisms to prevent similar incidents.

Data lossInformation Securitybackup strategy
0 likes · 5 min read
Inside the Weimob Data Deletion: Lessons on Permissions and Backup
Efficient Ops
Efficient Ops
Feb 25, 2020 · Information Security

What Went Wrong? Lessons from the 2020 Weimeng DevOps Disaster

The 2020 Weimeng incident, caused by a malicious VPN‑based intrusion that deleted production databases, exposed massive financial loss, damaged corporate reputation, and highlighted critical gaps in permission control, backup strategies, legal compliance, and security awareness for modern operations teams.

Legal Compliancebackup strategypermission control
0 likes · 14 min read
What Went Wrong? Lessons from the 2020 Weimeng DevOps Disaster
ITPUB
ITPUB
Mar 9, 2017 · Operations

How the Four‑Eyes Principle Saves IT Ops from Costly Mistakes

The article shares frontline IT operations experiences, emphasizing careful command execution, mandatory operation logs, two‑person verification, and backup strategies to prevent disastrous errors, illustrated by real incidents like a massive Deutsche Bank loss caused by a simple input mistake.

IT best practicesOperationsbackup strategy
0 likes · 4 min read
How the Four‑Eyes Principle Saves IT Ops from Costly Mistakes
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
Jan 10, 2017 · Information Security

8 Proven Strategies to Secure MongoDB and Prevent Ransomware

This article outlines eight practical measures—including changing the default port, blocking public access, running MongoDB under non‑root users, enabling authentication, tightening permissions, implementing robust backup and recovery plans, and encrypting sensitive data—to dramatically improve MongoDB security and keep ransomware at bay.

Database SecurityMongoDBRansomware Prevention
0 likes · 9 min read
8 Proven Strategies to Secure MongoDB and Prevent Ransomware