>Maximising Sub Regions in Internet Explorer

Maximising Sub Regions in Internet Explorer There have been a few small issues running APEX 5 applications in Internet Explorer since the initial release last year, but most of these have been ironed out in subsequent patches. The issues usually come from Internet Explorer handling CSS in a different way to the other main browsers. […]

>> Read More

APEX 5.0, Blog, How to, Uncategorized / APEX 5.0, CSS, Vulnerabilities / July 27, 2016

>APEX Authentication and Authorisation for Forms Developers

APEX Authentication and Authorisation for Forms Developers In this video I explain the many Authentication schemes of Oracle APEX as compared to the few available in Oracle Forms. APEX includes all the Authentication Schemes which Oracle Forms has including a flexible scheme which provides the ability for the developer to create their own custom scheme. […]

>> Read More

Blog, Security, Uncategorized / authorisation, Vulnerabilities / April 19, 2016

>Securing Vulnerability Exploits with Apex – Part 3

Securing Vulnerability Exploits with Apex – Part 3 For my final security blog I will be looking at SQL injection and cross site scripting, both of which should always be considered when developing a web based application. Apex has in-built functionality to prevent these attacks and the following best practices will allow you to fully […]

>> Read More

How to, Security, Uncategorized / APEX 5.0, Security, Vulnerabilities / December 22, 2014

>Securing Vulnerability Exploits with Apex – Part 2

Securing Vulnerability Exploits with Apex – Part 2 Following on from my last blog, which focused on configuring access control within Apex, the focus of this blog is protecting the session state within an application. We will look at the common issues faced by developers and the tools available within Apex to protect your application. […]

>> Read More

How to, Security, Uncategorized / APEX 5.0, Security, Vulnerabilities / December 8, 2014