Dec 182014
 Posted by on December 18, 2014 at 7:15 pm FAQ, Installation, Oracle/BEA WebLogic Tagged with: ,  No Responses »

JSpell is a spell checker software API. The Page Scholar implementation of JSpell enables spell checking in the user interfaces of software such as web pages (HTML, ASP, JSP, CGI, etc.), Java applets and applications. There are various JSpell components, some of which allow spell checking in HTML Form and Text Input Fields and some, which allow spell checking inside Java Applets and Applications. Most of our software is designed for developers and systems administrators of web sites.

To start with jspell deployment in weblogic you shall already have the spell checker wars like jspellhtml.war and jspelliframe.war files. If not please go to and download the war files according to your need.
Continue reading »

Nov 282014
Oracle Database

Here in this article we will discuss on how to grant access to all tables in a schema in oracle database as well as we will focus on schema owners and application users oracle concept. This is required when you need access to some table in another schema or while setting up enterprise applications we need multiple users setup to run the application where one user will be the schema owner/application owner for patching and upgrade activities and one user will be the application user/ runtime user with limited privileges to connect to DB and run the application. So for this kind of app owner, app user setup we have to grant access to required or all tables in the target schema.

We can achieve the same in below steps.


1. We will be using two users throughout the steps.
schemaowner1= The user who is owning the target schema and all tables having privileges to even drop tables.
appuser1= The user who needs access to the schemaowner1 user’s tables,views etc.
2. Here we are granting access to ‘FUNCTION’,’PACKAGE’,’PACKAGE BODY’,’PROCEDURE’,’SEQUENCE’,’TABLE’,’TYPE’,’TYPE BODY’,’VIEW’ object types you can reduce it by dropping the object type names from the queries.
Continue reading »

Nov 262014
 Posted by on November 26, 2014 at 7:35 am Automation, Database, Oracle Database Tagged with: , ,  No Responses »
Oracle Database

We had a requirement where the DB connections which are in INACTIVE state for atleast 4 hours shall be cleared from the session to free resources. here we will discuss how to automatically clean/ kill inactive session in oracle database using DBMS job.

Overall impact of an idle session on a server is usually negligible. However, that session could own shared and exclusive locks and cause lock contention for other sessions required shared or exclusive locks on the same resources/data.

First we need to update the profile to set IDLE_TIME to 4(240 mins) hours. You can change the time value according to your requirement and policy.

Step 1:

Login to the database as SYSDBA User and execute the below command


Continue reading »

Oct 232014
 Posted by on October 23, 2014 at 9:42 am Oracle HTTP Server Tagged with: ,  No Responses »
Oracle HTTP Server

We had a issue after a power failure in one of the server where the OHS use to fail to start and keep on throwing “failed to start a managed process after the maximum retry limit” all the time even after rebooting the OS.

The error looked like below:

[bin]# ./opmnctl startall
opmnctl startall: starting opmn and all managed processes...
Response: 0 of 1 processes started.

ias-instance id=instance1

--> Process (index=1,uid=1508762676,pid=3781)
failed to start a managed process after the maximum retry limit

OHS Error

And in webcache admin logs we use to see below error:
Continue reading »

Sep 262014
 Posted by on September 26, 2014 at 3:01 pm bash, FAQ, Linux, Must Know, Security Tagged with: , , ,  No Responses »
Must Know

Recently a Bash Code Injection Vulnerability or Bash remote command injection bug Shellshock bash was announced in the computer program ‘bash’ (ref CVE-2014-6271). This vulnerability enables unauthenticated users to run arbitrary commands, and in some configurations remote code execution is possible. This has been scored the highest possible threat ratings by independent security research bodies, including NIST, for both impact and exploitability. Bash is a standard program installed on most machines running non-Windows operating systems as standard including, but not limited to, Unix, Linux, MacOS and many embedded architecture devices. The affected versions go back to bash 1.14 which was first released in ~1995. Unlike the Heartbleed vulnerability which affected only openssl (an additional program that only certain users actually implemented), SHELLSHOCK is likely to affect a much wider community.
Continue reading »