Whenever the database system and database tools are in operation, log files are written. To better locate errors, you can also make use of various traces, which log additional actions. Traces can contain, for example, extracts from inserted data.
You can read traces and log files using either a text editor or the database tool Database Manager.
· Unauthorized reading of data
An unprivileged operating system user reads a trace or log file and thereby gets information about the operation of the database and possibly data from the database instance.
· Use traces only to search for errors. Delete the trace files when you have finished evaluating them.
· Restricting Access to Log Files
See also: