Welcome to the Beyond Blog

Beyond Blog

As you'd expect from the winners of the Specialized Partner of the Year: Business Analytics at the Oracle UKI Specialized Partner Awards 2014, Beyond work with leading edge BI Applications primarily within the UK Public Sector. We intend to share some of our ideas and discoveries via our blog and hopefully enrich the wider discussion surrounding Oracle Business Intelligence and driving improved insight for customers

Oracle APEX Application Exploits - Part 3

Oracle APEX Exploitation - Part 3 This is the third in my series of short posts about methods thatc an be used to exploit your Oracle APEX applications. The first two posts concentrated on URL Injection which is relatively easy to protect against, however this third post is going to focus on something that is a bit more difficult to stop, and not q...
Continue reading
  1791 Hits
  0 Comments
1791 Hits
0 Comments

Oracle Data Visualization v4 - Sentiment Analysis

Oracle Data Visualizer has been out for a couple of years now and is already on version 4. I'm a big fan and have been digging deep into the latest release which has brought in a substantial amount of changes. They are all available here , but I think that the most exciting inclusions are around the Explain capability and new algorithms that have b...
Continue reading
  289 Hits
  0 Comments
289 Hits
0 Comments

Oracle HRMS - Which View Should I Use?

Enter your custom HTML codes in this section ... Taking a break out of the APEX Exploits series for this as it's something I keep coming across at different client sites. select p.full_name, su.supervisor from per_people_x p, per_assignments_x a, per_people_x s where a.person_id = p.person_id and a.person_id (+) = a.supervisor_id; With me (or the r...
Continue reading
  1091 Hits
  0 Comments
1091 Hits
0 Comments

Oracle APEX Application Exploits - Part 2

Oracle APEX Exploitation - Part 2 Following on from my previous post in a series on common exploits in Oracle Application Express, in this post I am going to continue the theme of URL modification, however this time to allow us to execute procedures where we shouldn't be able to. This issue arises from the fact that we can use the construct BRANCH_...
Continue reading
  1074 Hits
  0 Comments
1074 Hits
0 Comments

Oracle Apex Application Exploits - Part 1

Oracle APEX Exploitation - Part 1 I decided to write a short series of posts detailing some different mechanisms that a malicious user may use to "attack" an application written in Oracle Application Express (Apex) - note - "Attack" is used loosely here in that it is more of "making the application perform in a way it was not intended". These posts...
Continue reading
  1354 Hits
  0 Comments
1354 Hits
0 Comments

Demonstration

Request a demo of our products here

REQUEST DEMO

Contact

Beyond Systems Limited

Barnett House, 53 Fountain Street,

Manchester M2 2AN United Kingdom

 

 

Tel:    +44(0)8450 940 998

Email:  contact@wegobeyond.co.uk