integrity

How to salvage referential integrity with mutiple databases

I am in the middle of designing a system that will be used to feed several production sites around the country (all information is in one site) with the potential to add more. Initially I thought that I could get away with only using one database. I am now re-thinking my original design and leaning toward a more scalable solution. Kee...

How do I verify the integrity of a Sybase dump file, without trying to load it?

Here's the scenario - a client uploads a Sybase dump file to (gzipped) to our local FTP server. We have an automated process which picks these up and then moves them to different server within the network where the database server resides. Unfortunately, this transfer is over a WAN, which for large files takes a long time, and sometimes ...

On using Terracotta as a persistence solution.

Would it be a good idea to use Terracotta as a persistence solution (replacing a database)? I'm specifically wondering about data integrity issues and support for transactional systems. ...

How to ensure file integrity on file write failures?

Follow up to: How to safely update a file that has many readers and one writer? In my previous questions, I figured out that you can use FileChannel's lock to ensure an ordering on reads and writes. But how do you handle the case if the writer fails mid-write (say the JVM crashes)? This basic algorithm would look like, WRITER: lock...

X.509 v3 certificate with non-repudiation and/or digital signature? Where can I get one?

Hi, To get things working as they should with AS2 protocol signatures, I need a digital certificate with keyUsage extensions 0 and/or 1 (nonRepudiation and/or digitalSignature). It's not a problem to generate it and self-sign it, but since it will be used for some serious stuff like e-invoices, I need it to be issued by a trusted third...

Maintaining conceptual integrity of the system during Maintenance

While starting a new project, we kick start it based on what is "latest" and what is "known". This includes selection of programming languages, frameworks in those languages etc. Quite a lot of time is spent on architectural design and detailed level design in terms of using specific frameworks and design patterns etc. Things go on fi...

How can I encrypt a message in Perl to decrypt it in C#?

Hi all, I am needing to encrypt using Perl and decrypt on .Net (C#). i.e. Perl encrypts a file and my .Net code decrypts the file (and even maybe validates integrity). The problem is that I am not familiar with the encryption capabilities of Perl. Can anyone offer guidance on how best to approach this and what the possibilities are? T...

How to validate the clients database against my database schema?

Our clients use SQLServer/Oracle databases. Over the years, we've sent them many update scripts which they had to run manually. Most of the time, everything went smooth, but every now and then a script did not run completely to the end or had some errors in it (which weren't detected at the time of the upgrade). Also, sometimes even "sma...

How to check the integrity of the storedprocedures

Hi, We have a large database containing a lot of stored procedures. Now we are updating our database but some stored procedures still use the old structure. We've found most of them using 'sp_depends' but some sp's slipped through. I was wondering if there isn't a way to check all stored procedures. If they call for a column that doesn...

Does RandomAccessFile.close() internally call FileChannel.force()?

I am using RandomAccessFile to perform some writes to a file as part of a transaction. Before I commit my transaction, I want to be absolutely sure that the data is written to disk. Calling force(boolean) on the RAF's FileChannel appears to provide this guarantee, but is it called implicitly when I close the file, or do I have to call ...

continuous integration -- github -- integrity

Guys, I have setup integrity for CI. I was wondering is there any common file where I can add build script which can be common to all the projects, rather than adding script to each and every project. Documentation is not much of help. Can ya help me out in this? ...

Online checksum checker for client side application

My client side application works only when online. Could i check the integrity of a winforms client application on server side? I would like to make my application useless when it will be pached. I mean these guys http://www.webutils.pl/SFV%5FCalculator have something similar. Of course in my case i don't want to upload the file, but...

MD5 file processing

Good morning all, I'm working on an MD5 file integrity check tool in C#. How long should it take for a file to be given an MD5 checksum value? For example, if I try to get a 2gb .mpg file, it is taking around 5 mins+ each time. This seems overly long. Am I just being impatient? Below is the code I'm running public string getHash(Str...

Is it possible to make a sinatra application into a Rails engine?

I'm considering using Integrity as a continuous integration tool, but don't want to (or can't) set up a separate domain for the application. Is it possible to get a Sinatra app (like integrity), and make it a Rails Engine? How would one go about do it? EDIT: I realize that the "engines" normally require Rails code like controllers a...

Integrity and Authenticity

Hi!! Sorry to keep asking so many questions, but you guys always seem to be so nice and helpful... I need to do some application that imports data from a file. For instance, user selects one file and the application imports some data to database. But I've been thinking, and this kind of app leads to a problem of integrity and authenti...

MVC Entity Framework state behavior with multiple instances of an entityset

I'm trying to understand the relationship between entityset instances of an EF Entities model (the model was created by Entity Designer). Basically I end up with 1 logical transaction having 2 instances of an entity's Repository class. Data committed successfully (confirmed by direct SSMS query to SQLServer) in one instance does not be...

Java + MySQL integrity violation handling

Hello, I write Java program using JDBC (mysql database). When I violate mysql integrity (f.e. I try to insert same primary key value) I catch SQL exception. Should I write it in way it may never happen (f.e. at first boolean function checking whether primary key value isn't already in DB and then calling insert), or is it okay to handle ...

How to check modality/cardinality on a relationship in Oracle

I am attempting to reverse engineer a Database that is in Oracle. I have been able to find the main keys and the referential integrity rules that correspond to the Foreign Keys but cannot locate where the modality/cardinality rules are stored. Any help regarding to which table to look in or a sample query would be greatly appreciated. ...

Code Signing for Linux

Are there any providers offering code signing certificates for (Red Hat Enterprise) Linux? I see a lot of buzz for Microsoft-land, but not much for Linux. I know how to generate my own certificates and embed a public certificate into my executable. I'm specifically looking for ways to get the certificate signed by a trusted CA. The t...

Hacking DropDownList value

Hey, I've got a DropDownList and I'm trying to prevent it from being used as an attack vector. Can I assume that the user is unable to actually change the values of the DDL and postback to the server? At the moment, I get this ASP.NET error message thrown if I try and change the packet after submission: For security purposes, this fea...