As with any computing system, there are ways to hack it, and Oracle is no exception. This series discusses some of the ways that you can get at data you're not supposed to, and how to defend against those attacks.

This story continues at http://www.databasejournal.com/featu...le.php/3708891