SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
Encrypt and Decrypt file in Solaris System.
Problem Scenario:
You need to run .sh file in every time in your system. In so many cases you run this .sh file in crontab
scheduler system, where .sh file exists in your system. Everytime you need to put credential on this file,
like you ftp a file from source to target you need to put target ftp information in this .sh file.
Another case you need to take rman backup in every midnight or delete archive log in a specific period,
where you need to put db credential on this .sh file. You don’t know who access your system, but they
can easily get your confidential information by reading this .sh file.
To overcome this issue you can encrypt this .sh file with keyfile , at the time scheduler it will decrypt this
.sh file, after executing this .sh file it’s automatically delete in system.
Real example:
I want delete archive log in oracle database in (11.33 PM) using .sh file in crontab, also want no one can
access my .sh file.
Step 1: I create a flat file named archive_delete.sh which code is below
ORACLE_BASE=/u01/app/oracle
ORACLE_HOME=/u01/app/oracle/product/11.2.0/db_1
ORACLE_SID=SOURCEDB
LD_LIBRARY_PATH=$ORACLE_HOME/lib
PATH=$PATH:/usr/local/bin:/usr/sbin:/usr/bin:/usr/openwin/bin:/usr/ucb:$ORACLE_HOME/bin
export ORACLE_BASE ORACLE_HOME ORACLE_SID LD_LIBRARY_PATH PATH
rman target sys/sys123@sourcedb log
/export/home/oracle/ARCHIVE_PURGE/log/DR_archive_del_`date +%d%m%y-%H%M `.log<< EOF
run
{
delete noprompt archivelog all completed before 'sysdate-2';
}
EXIT;
EOF
Step 2: Now I generate a keyfile for this encryption this flat archive_delete.sh
dd if=/dev/urandom of=123.txt bs=16 count=1
Keyfile 123.txt generated.
If you want to read this file you found that
Step 3: Now I generate encrypted .sh file from archive_delete.sh using 123.txt keyfile
encrypt -a aes -k /export/home/oracle/script/123.txt -i /export/home/oracle/script/archive_delete.sh -o
/export/home/oracle/script/en_archive_delete.sh
Successfully generated en_archive_delete.sh.
If you want to read this en_archive_delete.sh file you found that
File is totally encrypted 
Step 4 : Now delete this flat archive_delete.sh file , where you provide your valuable in system
password in your database.
Step 5: Now I create a .sh file which decrypt en_archive_delete.sh file , after executing this decrypt .sh
file automatically deleted form Solaris system.
decrypt -a aes -k /export/home/oracle/script/123.txt -i
/export/home/oracle/script/en_archive_delete.sh -o /export/home/oracle/script/de_archive_delete.sh
sh /export/home/oracle/script/de_archive_delete.sh
rm /export/home/oracle/script/de_archive_delete.sh
Step 6: Now execute this run.sh file
Check the rman log file
It’s running fine , on the other hand decrypted file .sh file which is generated also deleted from system .
Now attached this run.sh file crontab and check any issue arise or not.
Check the rman log file
Wow !! No one can your DB system password , who enter your system. Enjoy 

Mais conteúdo relacionado

Destaque

FDEI VLE3 Beyond Mandated Reporting
FDEI VLE3 Beyond Mandated ReportingFDEI VLE3 Beyond Mandated Reporting
FDEI VLE3 Beyond Mandated Reportingmilfamln
 
Aplicaciones de la Web 2.0 en educacion
Aplicaciones de la Web 2.0 en educacionAplicaciones de la Web 2.0 en educacion
Aplicaciones de la Web 2.0 en educacionmegmarile
 
Emi encina examen_final
Emi encina examen_finalEmi encina examen_final
Emi encina examen_finalEmi Encina
 
Ventajas del uso de la web 2.0 en la educacion
Ventajas del uso de la web 2.0 en la educacion Ventajas del uso de la web 2.0 en la educacion
Ventajas del uso de la web 2.0 en la educacion violeta04
 
Tecnología educativa
Tecnología educativaTecnología educativa
Tecnología educativaacaballero1
 
大学の確率・統計教育における LMS と数学オンラインテストの利用
大学の確率・統計教育における LMS と数学オンラインテストの利用大学の確率・統計教育における LMS と数学オンラインテストの利用
大学の確率・統計教育における LMS と数学オンラインテストの利用Ryukoku University
 
Las nuevas-tecnologias-de-la-educacion
Las nuevas-tecnologias-de-la-educacion Las nuevas-tecnologias-de-la-educacion
Las nuevas-tecnologias-de-la-educacion Aylin Gonzalez
 
Undetstanding the Petroleum Industry
Undetstanding the Petroleum IndustryUndetstanding the Petroleum Industry
Undetstanding the Petroleum IndustryCarlton B Dallas
 
EMC Networker installation Document
EMC Networker installation DocumentEMC Networker installation Document
EMC Networker installation Documentuzzal basak
 
Oracle Audit vault
Oracle Audit vaultOracle Audit vault
Oracle Audit vaultuzzal basak
 
Schema replication using oracle golden gate 12c
Schema replication using oracle golden gate 12cSchema replication using oracle golden gate 12c
Schema replication using oracle golden gate 12cuzzal basak
 

Destaque (17)

FDEI VLE3 Beyond Mandated Reporting
FDEI VLE3 Beyond Mandated ReportingFDEI VLE3 Beyond Mandated Reporting
FDEI VLE3 Beyond Mandated Reporting
 
Aplicaciones de la Web 2.0 en educacion
Aplicaciones de la Web 2.0 en educacionAplicaciones de la Web 2.0 en educacion
Aplicaciones de la Web 2.0 en educacion
 
Emi encina examen_final
Emi encina examen_finalEmi encina examen_final
Emi encina examen_final
 
Ventajas del uso de la web 2.0 en la educacion
Ventajas del uso de la web 2.0 en la educacion Ventajas del uso de la web 2.0 en la educacion
Ventajas del uso de la web 2.0 en la educacion
 
Tecnología educativa
Tecnología educativaTecnología educativa
Tecnología educativa
 
Have you outgrown your tax preparer
Have you outgrown your tax preparerHave you outgrown your tax preparer
Have you outgrown your tax preparer
 
大学の確率・統計教育における LMS と数学オンラインテストの利用
大学の確率・統計教育における LMS と数学オンラインテストの利用大学の確率・統計教育における LMS と数学オンラインテストの利用
大学の確率・統計教育における LMS と数学オンラインテストの利用
 
1216
12161216
1216
 
Las nuevas-tecnologias-de-la-educacion
Las nuevas-tecnologias-de-la-educacion Las nuevas-tecnologias-de-la-educacion
Las nuevas-tecnologias-de-la-educacion
 
Ciclo celular
Ciclo celularCiclo celular
Ciclo celular
 
Henry Stanley
Henry StanleyHenry Stanley
Henry Stanley
 
Undetstanding the Petroleum Industry
Undetstanding the Petroleum IndustryUndetstanding the Petroleum Industry
Undetstanding the Petroleum Industry
 
GIS, Data Access, and the Wisconsin Register of Deeds Offices
GIS, Data Access, and the Wisconsin Register of Deeds OfficesGIS, Data Access, and the Wisconsin Register of Deeds Offices
GIS, Data Access, and the Wisconsin Register of Deeds Offices
 
Gure gorputza 2 urte
Gure gorputza 2 urteGure gorputza 2 urte
Gure gorputza 2 urte
 
EMC Networker installation Document
EMC Networker installation DocumentEMC Networker installation Document
EMC Networker installation Document
 
Oracle Audit vault
Oracle Audit vaultOracle Audit vault
Oracle Audit vault
 
Schema replication using oracle golden gate 12c
Schema replication using oracle golden gate 12cSchema replication using oracle golden gate 12c
Schema replication using oracle golden gate 12c
 

Semelhante a Encrypt and decrypt in solaris system

Death matchtournament del2014
Death matchtournament del2014Death matchtournament del2014
Death matchtournament del2014Nabil Munawar
 
Unix Security
Unix SecurityUnix Security
Unix Securityreplay21
 
Primer on password security
Primer on password securityPrimer on password security
Primer on password securitysecurityxploded
 
From hybernation file to malware analysis with volatility
From hybernation file to malware analysis with volatilityFrom hybernation file to malware analysis with volatility
From hybernation file to malware analysis with volatilityChristiaan Beek
 
Exploiting Directory Permissions on macOS
Exploiting Directory Permissions on macOSExploiting Directory Permissions on macOS
Exploiting Directory Permissions on macOSCsaba Fitzl
 
How to Secure Containers
How to Secure ContainersHow to Secure Containers
How to Secure ContainersSysdig
 
For the accompanying inquiries enter the answer and give complete expl.docx
For the accompanying inquiries enter the answer and give complete expl.docxFor the accompanying inquiries enter the answer and give complete expl.docx
For the accompanying inquiries enter the answer and give complete expl.docxedmundp8cgllams
 
Lab3Lab3steps.docxScenario    The university has caught a .docx
Lab3Lab3steps.docxScenario    The university has caught a .docxLab3Lab3steps.docxScenario    The university has caught a .docx
Lab3Lab3steps.docxScenario    The university has caught a .docxsmile790243
 
Data hiding and finding on Linux
Data hiding and finding on LinuxData hiding and finding on Linux
Data hiding and finding on LinuxAnton Chuvakin
 
55 best linux tips, tricks and command lines
55 best linux tips, tricks and command lines55 best linux tips, tricks and command lines
55 best linux tips, tricks and command linesArif Wahyudi
 
4.1. Path traversal post_exploitation
4.1. Path traversal post_exploitation4.1. Path traversal post_exploitation
4.1. Path traversal post_exploitationdefconmoscow
 
Encrypted Mounting.pptx
Encrypted Mounting.pptxEncrypted Mounting.pptx
Encrypted Mounting.pptxHarry Kodden
 
Best Practices For Direct Admin Security
Best Practices For Direct Admin SecurityBest Practices For Direct Admin Security
Best Practices For Direct Admin Securitylisa Dsouza
 
Chroot Protection and Breaking
Chroot Protection and BreakingChroot Protection and Breaking
Chroot Protection and BreakingAnton Chuvakin
 

Semelhante a Encrypt and decrypt in solaris system (20)

Death matchtournament del2014
Death matchtournament del2014Death matchtournament del2014
Death matchtournament del2014
 
Unix Security
Unix SecurityUnix Security
Unix Security
 
Primer on password security
Primer on password securityPrimer on password security
Primer on password security
 
From hybernation file to malware analysis with volatility
From hybernation file to malware analysis with volatilityFrom hybernation file to malware analysis with volatility
From hybernation file to malware analysis with volatility
 
Exploiting Directory Permissions on macOS
Exploiting Directory Permissions on macOSExploiting Directory Permissions on macOS
Exploiting Directory Permissions on macOS
 
Linux privesc.pptx
Linux privesc.pptxLinux privesc.pptx
Linux privesc.pptx
 
How to Secure Containers
How to Secure ContainersHow to Secure Containers
How to Secure Containers
 
Chapter4.pptx
Chapter4.pptxChapter4.pptx
Chapter4.pptx
 
For the accompanying inquiries enter the answer and give complete expl.docx
For the accompanying inquiries enter the answer and give complete expl.docxFor the accompanying inquiries enter the answer and give complete expl.docx
For the accompanying inquiries enter the answer and give complete expl.docx
 
Lab3Lab3steps.docxScenario    The university has caught a .docx
Lab3Lab3steps.docxScenario    The university has caught a .docxLab3Lab3steps.docxScenario    The university has caught a .docx
Lab3Lab3steps.docxScenario    The university has caught a .docx
 
Windows forensic
Windows forensicWindows forensic
Windows forensic
 
Mem forensic
Mem forensicMem forensic
Mem forensic
 
Data hiding and finding on Linux
Data hiding and finding on LinuxData hiding and finding on Linux
Data hiding and finding on Linux
 
55 best linux tips, tricks and command lines
55 best linux tips, tricks and command lines55 best linux tips, tricks and command lines
55 best linux tips, tricks and command lines
 
4.1. Path traversal post_exploitation
4.1. Path traversal post_exploitation4.1. Path traversal post_exploitation
4.1. Path traversal post_exploitation
 
Encrypted Mounting.pptx
Encrypted Mounting.pptxEncrypted Mounting.pptx
Encrypted Mounting.pptx
 
Iwatch tech 1
Iwatch tech 1Iwatch tech 1
Iwatch tech 1
 
Linux filesystemhierarchy
Linux filesystemhierarchyLinux filesystemhierarchy
Linux filesystemhierarchy
 
Best Practices For Direct Admin Security
Best Practices For Direct Admin SecurityBest Practices For Direct Admin Security
Best Practices For Direct Admin Security
 
Chroot Protection and Breaking
Chroot Protection and BreakingChroot Protection and Breaking
Chroot Protection and Breaking
 

Último

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Último (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Encrypt and decrypt in solaris system

  • 1. Encrypt and Decrypt file in Solaris System. Problem Scenario: You need to run .sh file in every time in your system. In so many cases you run this .sh file in crontab scheduler system, where .sh file exists in your system. Everytime you need to put credential on this file, like you ftp a file from source to target you need to put target ftp information in this .sh file. Another case you need to take rman backup in every midnight or delete archive log in a specific period, where you need to put db credential on this .sh file. You don’t know who access your system, but they can easily get your confidential information by reading this .sh file. To overcome this issue you can encrypt this .sh file with keyfile , at the time scheduler it will decrypt this .sh file, after executing this .sh file it’s automatically delete in system. Real example: I want delete archive log in oracle database in (11.33 PM) using .sh file in crontab, also want no one can access my .sh file. Step 1: I create a flat file named archive_delete.sh which code is below ORACLE_BASE=/u01/app/oracle ORACLE_HOME=/u01/app/oracle/product/11.2.0/db_1 ORACLE_SID=SOURCEDB LD_LIBRARY_PATH=$ORACLE_HOME/lib PATH=$PATH:/usr/local/bin:/usr/sbin:/usr/bin:/usr/openwin/bin:/usr/ucb:$ORACLE_HOME/bin export ORACLE_BASE ORACLE_HOME ORACLE_SID LD_LIBRARY_PATH PATH rman target sys/sys123@sourcedb log /export/home/oracle/ARCHIVE_PURGE/log/DR_archive_del_`date +%d%m%y-%H%M `.log<< EOF run { delete noprompt archivelog all completed before 'sysdate-2'; } EXIT; EOF
  • 2. Step 2: Now I generate a keyfile for this encryption this flat archive_delete.sh dd if=/dev/urandom of=123.txt bs=16 count=1 Keyfile 123.txt generated. If you want to read this file you found that Step 3: Now I generate encrypted .sh file from archive_delete.sh using 123.txt keyfile encrypt -a aes -k /export/home/oracle/script/123.txt -i /export/home/oracle/script/archive_delete.sh -o /export/home/oracle/script/en_archive_delete.sh Successfully generated en_archive_delete.sh. If you want to read this en_archive_delete.sh file you found that File is totally encrypted 
  • 3. Step 4 : Now delete this flat archive_delete.sh file , where you provide your valuable in system password in your database. Step 5: Now I create a .sh file which decrypt en_archive_delete.sh file , after executing this decrypt .sh file automatically deleted form Solaris system. decrypt -a aes -k /export/home/oracle/script/123.txt -i /export/home/oracle/script/en_archive_delete.sh -o /export/home/oracle/script/de_archive_delete.sh sh /export/home/oracle/script/de_archive_delete.sh rm /export/home/oracle/script/de_archive_delete.sh Step 6: Now execute this run.sh file Check the rman log file
  • 4. It’s running fine , on the other hand decrypted file .sh file which is generated also deleted from system . Now attached this run.sh file crontab and check any issue arise or not. Check the rman log file Wow !! No one can your DB system password , who enter your system. Enjoy 