Senthil Murugan's Blog

Personal Feedback for C.Senthil Murugan–celebrating 20 years

Dear Friends,

Good evening to all, In 15-Nov-1997, I have joined as Computer Programmer with Freight Systems LLC, Dubai.

Mr.C.Mani and Mr.Srinivasan came to Dubai airport and waited for long time to pick me up, as it is my first overseas trip, still i can remember the day. That time, there is no mobile phone. First project taken as Warehouse Management in Forms 4.5 with Oracle 8 (not 8i). Mr.Balaji was the in-charge who has given business requirement in Jebel Ali and Mr.Cyrus was the first user for my system. Mr.David has awarded one month salary as a bonus within 3 months of joining with FSL.

Mr.Mani has changed my life into IT environment in freight forwarding and shipping industry. Without his support and help, i could not be reach in this level.

Hope i have tried my best to provide the IT solutions and support in this freight forwarding industry.

If you feel that i have added some value to your life, please provide your valuable feedback and share your knowledge/experience with me. Hope, I have tried my best to implement your old suggestions and feedback, if not, please repeat the same.

Thanks for your time shared with me.

https://docs.google.com/forms/d/e/1FAIpQLSdh2a0rHTf0ilVhw69paBGc0I-8Oac3zoGODKZQGlzslQBWfQ/viewform?usp=sf_link

Advertisements

Jasperserver report supporting multiple language like Chinese

Create the report (jrmxl) with font name Arial Unicode MS and follow the below steps

1. Arial Unicode.jar (size 14829kb) file needs to be copied into jasper server folder (C:\Jaspersoft\jasperreports-server-cp-6.3.0\apache-tomcat\webapps\jasperserver\WEB-INF\lib)

2. Restart the jasper service

All the reports like below

replace: fontName=”Arial Unicode MS” pdfEncoding=”Identity-H”

upload the file and you can get the Chinese character on the report

Top 10 reason to upgrade oracle 12c from old version

While your database may be running “fine” and your DBAs could be understandably skittish about rocking the boat by upgrading, in truth there are many tangible benefits to gain from upgrading to Oracle Database 12c.

In this expert e-guide Brian Peasland, a DBA with over 20 years of experience, breaks down 10 reasons you should upgrade. Here are the first 3:

  1. Increased Oracle support
  2. Updated hardware and operating systems
  3. Security patches

Learn the remaining 7 inside now.

Thanks to TechTarget

http://www.bitpipe.com/data/demandEngage.action?resId=1486401659_132

CRITICAL ALERT – Wannacry/ WannaCrypt Ransomware

Dear Friends,

Many organizations around the world were victims of malicious “WannaCrypt” software last week. Seeing businesses and individuals affected by cyberattacks such as this is painful. Our teams have worked relentlessly over the last few days to take all possible actions to protect our customers.

Here are a few things for your reference:

  • If you are using Windows Vista, 7, 8.1 & 10: In March, we released a security update which addresses the vulnerability that these attacks are exploiting. Those who have Windows Security Update enabled are protected against attacks on this vulnerability.
    For those organizations who have not yet applied the security update, we suggest you immediately deploy Microsoft Security Bulletin MS17-010.
  • Activate Windows Defender: For customers using Windows Defender, we released an update earlier today which detects this threat as Ransom:Win32/WannaCrypt. As an additional “defense-in-depth” measure, keep up-to-date anti-malware software installed on your machines. Customers running anti-malware software from any number of security companies can confirm with their provider whether they are protected.
  • If using older version of Windows: Customers running versions of Windows that no longer receive mainstream support may not have received the above mentioned Security Update released in March. Given the potential impact to customers and their businesses, we have released a Security Update for platforms in custom support only. Windows XP, Windows 8 and Windows Server 2003 Security Updates are broadly available for download now (see links below).
  • Additional Steps to consider: This attack type may evolve over time, so any additional defense-in-depth strategies will provide additional protections. (For example, to further protect againstSMBv1 attacks, customers should consider blocking legacy protocols on their networks). Some of the observed attacks use common phishing tactics including malicious attachments. Customers should use vigilance when opening documents from untrusted or unknown sources.

More information on the malware is available from the Microsoft Malware Protection Center though the Windows Security blog. We are working with our customers to provide additional assistance as the situation evolves, and will update this blog with details as appropriate.https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/

You may also want to read though the blog posted by Brad Smith, President and Chief Legal Officer, Microsoft, looking at the broader implications of the malicious “WannaCrypt” software attack.

If you have any questions or concerns:

· Webinar: You may want to join the Webinar on Wannacry Attack Q&A, 22nd May, 11am. Join here.

· Email: Please write to us atindiasms@microsoft.com. Our team will respond to you on priority.

Thanks and regards,

Microsoft India Team

———————————————————————————–

Further resources:

Download English language security updates: Windows Server 2003 SP2 x64,Windows Server 2003 SP2 x86,Windows XP SP2 x64,Windows XP SP3 x86,Windows XP Embedded SP3 x86,Windows 8 x86,Windows 8 x64
Download localized versions for the security update for Windows XP, Windows 8 or Windows Server:
http://www.catalog.update.microsoft.com/Search.aspx?q=KB4012598
Read general information on ransomware:
https://www.microsoft.com/en-us/security/portal/mmpc/shared/ransomware.aspx
Download MS17-010 Security Update:
https://technet.microsoft.com/en-us/library/security/ms17-010.aspx

FAQs:

Where can I find the official guidance from Microsoft?

https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/

Is the update available for Windows 2003 & Windows XP as well?

Yes. The link for download of the update is available at the end of this article

https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/

Will the update run on unlicensed Windows?

It is recommended that the update is run on a licensed version.

What about Windows 2003 R2?

The Windows 2003 update should get applied on Windows 2003 R2 as well.

Will the installation of the patch, prevent the occurrence of ransomware?

No. Applying MS17-010  is just preventing the malware from spreading, not giving protection against the infection itself. Based on reports, this malware is using Social Engineering to target companies.Please warn your users to not open, click or enable macros on email reception.

  • The priority is that your anti-virus can detect the malware.
  • Verify that you have up-to-date signatures, along with patching the Windows systems
  • Make sure that users have the level of knowledge required to never click on suspicious attachments even if they are displayed with a familiar icon (office or PDF document). Where an attachment opening offers the execution of an application, users must under no circumstances should accept the execution and in doubt, users should you consult and/or consult the administrator.
  • Implementation of strong filtering in O365:

http://blogs.msdn.com/b/tzink/archive/2014/04/08/blocking-executable-content-in-Office-365-for-more-aggressive-anti-malware-protection.aspx

  • Exchange Online Protection

http://TechNet.Microsoft.com/en-us/library/jj723164(v=Exchg.150).aspx

http://TechNet.Microsoft.com/en-us/library/jj200684(v=Exchg.150).aspx

http://TechNet.Microsoft.com/en-us/library/jj723119%28V=Exchg.150%29.aspx

Security tips to Protect against Ransomware

https://social.technet.microsoft.com/wiki/contents/articles/29787.microsoft-protection-center-security-tips-to-protect-against-ransomware.aspx

Is the ransomware effective only if the user has administrative rights on the client machine?

No. This piece of ransomware, like most of others, once executed, encrypts all files it can reach in the context of a user, if the user is an admin on the box the outcome is more devastating. In addition this ransomware also tries to disable shadow copies and make some registry changes in HKLM hive which require administrative privileges.

When it tries to spread it uses a vulnerability, which once exploited gives the malware SYSTEM level access on the target system. All this means that this attack maybe very successful and destructive even if the users don’t have admin privileges on their unpatched workstations/servers.

Is only disabling SMB v1 Server (LanmanServer) on all our machines helps us to protect from this vulnerability?

Patch installation would be the first option. To answer the question, Yes. SMBV1 should be removed, but in a planned way. Please refer the below link

https://blogs.technet.microsoft.com/filecab/2016/09/16/stop-using-smb1/

Do we need to disable SMB v1 client (Lanmanworkstation) as well on all our machines?

No. It is only the SMBv1 server component (which means Lanmanserver), on the client machine and not Lanmanworkstation on the client machine.

What is the impact of removing SMBv1?

  • You’re still running XP or WS2003 under a custom support agreement
  • Windows XP will not be able to access shares on a Windows 2003 Server or any other Operating System
  • Windows Vista and above Operating System will not be able to access shares on a Windows 2003 Member Server or Domain Controller (if you still have them in the environment)
  • You have some decrepit management software that demands admins browse via the ‘network neighborhood’ master browser list
  • You run old multi-function printers with antique firmware in order to “scan to share”

Please refer the below article for more details

https://blogs.technet.microsoft.com/filecab/2016/09/16/stop-using-smb1/

If we have to disable smb v1 Server service, what are the registry values to disable it?

When using operating systems older than Windows 8.1 and Windows Server 2012 R2, you can’t remove SMB1 – but you can disable it: KB 2696547- How to enable and disable SMBv1, SMBv2, and SMBv3 in Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8, and Windows Server 2012

Please refer to the below link for more details

https://blogs.technet.microsoft.com/filecab/2016/09/16/stop-using-smb1/

How do we know SMB v1 is active in our environment.  Can we proactively check it?

Yes. Please test this, before using in the production environment.

https://blogs.technet.microsoft.com/ralphkyttle/2017/04/07/discover-smb1-in-your-environment-with-dscea/

Windows 2016 and Windows 10 provides a way to audit usage of SMBv1, which can be found here

https://blogs.technet.microsoft.com/filecab/2016/09/16/stop-using-smb1/

Is Windows 10 affected as of now?

https://blogs.technet.microsoft.com/mmpc/2017/05/12/wannacrypt-ransomware-worm-targets-out-of-date-systems/
The exploit code used by WannaCrypt was designed to work only against unpatched Windows 7 and Windows Server 2008 (or earlier OS) systems, so Windows 10 PCs are not affected by this attack as of now.

https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/
Customers running Windows 10 were not targeted by the attack today.

That being said, Windows 10 systems also need to be patched, because the variants can be developed. In addition to this, it would be recommended to remove SMBv1 from the clients and Windows servers, after doing a complete review of the below mentioned article.

https://blogs.technet.microsoft.com/filecab/2016/09/16/stop-using-smb1/

 

Best Practices to prevent randsomware attacks

  • Perform regular backups of all critical information to limit the impact of data or system loss and to help expedite the recovery process. Ideally, this data should be kept on a separate device, and backups should be stored offline.
  • Establish a Sender Policy Framework (SPF), Domain Message Authentication Reporting and Conformance (DMARC), and DomainKeys Identified Mail (DKIM) for your domain, which is an email validation system designed to prevent spam by detecting email spoofing by which most of the ransomware samples successfully reaches the corporate email boxes.
  • Don’t open attachments in unsolicited e-mails, even if they come from people in your contact list, and never click on a URL contained in an unsolicited e-mail, even if the link seems benign. In cases of genuine URLs close out the e-mail and go to the organization’s website directly through browser
  • Restrict execution of powershell /WSCRIPT in enterprise environment Ensure installation and use of the latest version (currently v5.0) of PowerShell, with enhanced logging enabled. script block logging, and transcription enabled. Send the associated logs to a centralized log repository for monitoring and analysis.
  • Application whitelisting/Strict implementation of Software Restriction Policies (SRP) to block binaries running from %APPDATA%, %PROGRAMDATA% and %TEMP% paths. Ransomware sample drops and executes generally from these locations. Enforce application whitelisting on all endpoint workstations.
  • Deploy web and email filters on the network. Configure these devices to scan for known bad domains, sources, and addresses; block these before receiving and downloading messages. Scan all emails, attachments, and downloads both on the host and at the mail gateway with a reputable antivirus solution.
  • Disable macros in Microsoft Office products. Some Office products allow for the disabling of macros that originate from outside of an organization and can provide a hybrid approach when the organization depends on the legitimate use of macros. For Windows, specific settings can block macros originating from the Internet from running.
  • Configure access controls including file, directory, and network share permissions with least privilege in mind. If a user only needs to read specific files, they should not have write access to those files, directories, or shares.
  • Maintain updated Antivirus software on all systems
  • Consider installing Enhanced Mitigation Experience Toolkit, or similar host-level anti-exploitation tools.
  • Block the attachments of file types, exe|pif|tmp|url|vb|vbe|scr|reg|cer|pst|cmd|com|bat|dll|dat|hlp|hta|js|wsf
  • Regularly check the contents of backup files of databases for any unauthorized encrypted contents of data records or external elements, (backdoors /malicious scripts.)
  • Keep the operating system third party applications (MS office, browsers, browser Plugins) up-to-date with the latest patches.
  • Follow safe practices when browsing the web. Ensure the web browsers are secured enough with appropriate content controls.
  • Network segmentation and segregation into security zones – help protect sensitive information and critical services. Separate administrative network from business processes with physical controls and Virtual Local Area Networks.
  • Disable remote Desktop Connections, employ least-privileged accounts.
  • Ensure integrity of the codes /scripts being used in database, authentication and sensitive systems, Check regularly for the integrity of the information stored in the databases.
  • Restrict users’ abilities (permissions) to install and run unwanted software applications.
  • Enable personal firewalls on workstations.
  • Implement strict External Device (USB drive) usage policy.
  • Employ data-at-rest and data-in-transit encryption.
  • Carry out vulnerability Assessment and Penetration Testing (VAPT) and information security audit of critical networks/systems, especially database servers from CERT-IN empaneled auditors. Repeat audits at regular intervals.
  • Individuals or organizations are not encouraged to pay the ransom, as this does not guarantee files will be released. Report such instances of fraud to CERT-In and Law Enforcement agencies

இந்த 5 பழக்கங்கள் இருந்தால் நீங்கள் வெற்றிகரமானவர்!

Thanks to வரவனை செந்தில் & Vikatan.com

வாழ்க்கையில் குறை என்பது நாம் பார்க்கும் பார்வையில்தான் உள்ளது. நமக்குப் பிடித்தமான எந்த ஒரு செயலையும் அளவோடு வைத்துக்கொண்டால் நாம் போகும் பாதையை அது எப்போதுமே பாதிக்காது. டிவி பார்ப்பதில் ஆரம்பித்து மொபைல் கேம்ஸ், வீக் எண்ட் பார்ட்டி என உங்களின் லைஃப் ஸ்டைலைப் பாதிக்காத எதுவுமே சரிதான். ஆனால், அதை நீங்கள் கைக்குள் வைக்காமல் போனால் நிச்சயமாக உங்களின் முன்னேற்றத்தைப் பாதிக்கும்.

வெற்றிகரமானவர்களிடம் இருக்கும் குணங்கள் குறித்து செய்யப்பட்ட மிகப்பெரிய ஆய்வு ஒன்றில், கீழ்க்காணும் ஐந்து குணங்களைப் பட்டியலிடுகிறார்கள். இதன்படி உங்கள் வாழ்க்கையை அமைத்துக்கொண்டால் நிச்சயமாக வெற்றிகரமான மனிதராகத் திகழ்வீர்கள்.

அடுத்த நாளுக்கான திட்டமிடல் – ஒவ்வோர் ஆண்டும் புது வருடம் பிறக்கும்போது நாம் சில உறுதிமொழிகளை எடுப்போம். அது அடுத்த நாள் வரை தாங்குகிறதா அல்லது சில வாரங்கள் செல்கிறதா என்பது நமது மனத்திடத்தைப் பொறுத்துத்தான் சொல்லமுடியும். ஆயிரத்தில் ஒரு சிலர்தான் இதுபோன்ற புத்தாண்டு உறுதிமொழியைக் காப்பாற்றுகிறார்கள். நாம் அவ்வளவு மெனக்கெட வேண்டாம். ஒவ்வொரு நாளும் படுக்கப்போகும் முன்பு, அடுத்த நாள் செய்யவேண்டிய வேலைகளை நினைவில்வைத்துக்கொள்வோம். முன்னேற்றத்துக்கு மிகப்பெரிய பாலபாடம் இதுதான்.

நேர மேலாண்மை –  திட்டமிட்ட வேலையை ஒழுங்காகவும் கவனம் சிதறாமலும் செய்து முடிக்க இது மிகவும் முக்கியம். உங்கள் வேலைகளில் உடனே செய்யவேண்டியது எது, அதிக நேரம் தேவைப்படும் வேலை எது எனக் கணக்குப்போட்டு அதற்குத் தகுந்தாற்போல் வேலையைத் தொடங்க வேண்டும். 

அளவான செலவுகள் –   நடை,உடை போன்றவற்றில் உங்களுக்கெனத்  தனிப்பட்ட ஸ்டைல் வைத்திருப்பது போல, செலவழிப்பதிலும் உங்களுக்கெனக் குறிப்பிட்ட ஸ்டைல் இருக்கட்டும். வாழ்க்கையில் தாழ்வுகளும் உயர்வுகளும் அனைவருக்கும் இருப்பதுதான். பொருளாதாரச் சூழல் எப்படி இருந்தாலும் அளவான செலவுகள் செய்வதை வழக்கமாக்கிக்கொள்ளுங்கள். கையில் பணம் இருக்கிறதென அள்ளி வீசவும் வேண்டாம்,இல்லையென்று சோர்ந்துபோகவும் வேண்டாம். உடைகளில் ஆரம்பித்து உணவு,கேளிக்கை என அளவான செலவுகள் செய்யும் வாழ்க்கை முறைக்கு மாறினால், நீங்களே எதிர்பாராத வகையில் பணம் சேமிப்பாகும். 

உடல்நலம் – இந்த உலகில் உங்களைத்தவிர வேறு யாராலும் உங்கள் நலத்தைப் பற்றி அக்கறை கொள்ளமுடியாது. உங்கள் உடல்நலம் என்பது மிகப்பெரிய முதலீடு. உலகையே வெற்றிகொண்டு இந்தியா வரை வந்த மாவீரன் அலெக்ஸாண்டர் 33 வயதிலேயே காய்ச்சலில் இறந்துபோனார். அதிகாலை எழுவது,உடற்பயிற்சி, ஓட்டம், சைக்கிளிங் என உற்சாகமாய் ஒவ்வொரு நாளையும் தொடங்குங்கள்.

சரிபார்ப்பு – ஒவ்வொரு நாளின்போதும் அன்றைக்கு உங்களின் எதிர்கால லட்சியத்துக்காக என்ன செய்தீர்கள் என சிந்தித்துப் பாருங்கள். ஒரு ஐந்து நிமிடம் ஒதுக்கி ,அன்றைக்குச் செய்த வேலைகள்,அவற்றின் பலன்கள், அடுத்து செய்யப்போகும் வேலை எந்த அளவுக்கு உங்களின் வளர்ச்சிக்கு உதவப்போகிறது போன்றவற்றைக் கணக்கிட்டுப் பாருங்கள். இது ஒரு முக்கியமான யுக்தி. தவறான வழிமுறைகளோடு தங்கள் கனவை நோக்கிய பயணத்திலிருந்த பல வெற்றியாளர்களைக் காப்பாற்றிய பழக்கம் இது.

மேற்குறிப்பிட்ட ஐந்து குணங்கள் உங்களிடம் இருந்தால், நிச்சயமாக வெற்றியாளராகும் பயணத்தில் இருப்பீர்கள். இல்லையெனில், இவற்றை இன்றே உங்கள் வாழ்க்கையில் நடைமுறைக்குக் கொண்டுவாருங்கள். வாழ்த்துகள்! 

APEX up and running in few steps!

Thanks to Joel (https://www.blogger.com/profile/01915290758512999160)

January 2017, I had a meeting with Dr. Sriram Birudavolu from Hyderabad.  He got my attention when he said he would love to start a 1000-person APEX Meetup group in Hyderabad (gotta love aggressive goals!).  However, he spent much of December and January just trying to figure out how to get APEX installed, configured and running.  He won’t profess to be an expert, but he’s exactly the type of person we want to enable.  He was correct in saying that if a potential customer struggles to get APEX installed, we’ve already lost.

Recently, Gerald Venzl asked for some assistance in creating a Docker image for APEX.  His goal was to create an APEX Docker image on top of the base Oracle Database Docker image.  He knows a lot about Docker, but he won’t claim to be an expert in APEX.  He wanted something that is scriptable and can result in APEX being installed, configured and up and running, along with ORDS, in as few steps as possible.  A “silent install”, if you please. This was the final bit of motivation I needed for this blog post and video.
While the installation documentation is complete and detailed, it’s also lengthy and sometimes confusing – especially for the new person.  Thus, I wanted to provide the simplest set of instructions with as few steps as possible to get APEX installed, configured and up and running, along with ORDS configured and up and running.  It can be done in two steps.  That’s right, two.  While I explain the individual steps executed from SQL*Plus in detail below, you can combine all of these SQL commands into a single SQL script.  I prefer the name “hookmeup.sql”.

1. Download and unzip APEX http://www.oracle.com/technetwork/developer-tools/apex/downloads/index.html

2. cd to apex directory

3. Start SQL*Plus and ensure you are connecting to your PDB and not to the “root” of the container database (APEX should not be installed at all):

1

sqlplus sys/your_password@localhost/your_pdb as sysdba @apexins sysaux sysaux temp /i/

4. Unlock the APEX_PUBLIC_USER account and set the password:

1

alter user apex_public_user identified by oracle account unlock;

5. Create the APEX Instance Administration user and set the password:

1

2

3

4

5

6

7

8

9

10

11

begin

    apex_util.set_security_group_id( 10 );

    apex_util.create_user(

        p_user_name => ‘ADMIN’,

        p_email_address => ‘your@emailaddress.com’,

        p_web_password => ‘oracle’,

        p_developer_privs => ‘ADMIN’ );

    apex_util.set_security_group_id( null );

    commit;

end;

/

6. Run APEX REST configuration, and set the passwords of APEX_REST_PUBLIC_USER and APEX_LISTENER:

1

@apex_rest_config_core.sql oracle oracle

7. Create a network ACE for APEX (this is used when consuming Web services or sending outbound mail):

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

declare

    l_acl_path varchar2(4000);

    l_apex_schema varchar2(100);

begin

    for c1 in (select schema

                 from sys.dba_registry

                where comp_id = ‘APEX’) loop

        l_apex_schema := c1.schema;

    end loop;

    sys.dbms_network_acl_admin.append_host_ace(

        host => ‘*’,

        ace => xs$ace_type(privilege_list => xs$name_list(‘connect’),

        principal_name => l_apex_schema,

        principal_type => xs_acl.ptype_db));

    commit;

end;

/

8. Exit SQL*Plus.  Download and unzip ORDS http://www.oracle.com/technetwork/developer-tools/rest-data-services/downloads/index.html

9. cd to the directory where you unzipped ORDS (ensure that ords.war is in your current directory)

10. Copy the following into the file params/ords_params.properties and replace the contents with the text below (Note:  this is the file ords_params.properties in the “params” subdirectory – a subdirectory of your current working directory):

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

db.hostname=localhost

db.port=1521

# CUSTOMIZE db.servicename

db.servicename=your_pdb

db.username=APEX_PUBLIC_USER

db.password=oracle

migrate.apex.rest=false

plsql.gateway.add=true

rest.services.apex.add=true

rest.services.ords.add=true

schema.tablespace.default=SYSAUX

schema.tablespace.temp=TEMP

standalone.mode=TRUE

standalone.http.port=8080

standalone.use.https=false

# CUSTOMIZE standalone.static.images to point to the directory

# containing the images directory of your APEX distribution

standalone.static.images=/home/oracle/apex/images

user.apex.listener.password=oracle

user.apex.restpublic.password=oracle

user.public.password=oracle

user.tablespace.default=SYSAUX

user.tablespace.temp=TEMP

11. Configure and start ORDS in stand-alone mode.  You’ll be prompted for the SYS username and SYS password:

1

java -Dconfig.dir=/your_ords_configuration_directory -jar ords.war install simple –preserveParamFile

That’s it!!  You should now be able to go to http://localhost:8080/ords/, and login with:

Workspace: internal

Username:  admin

Password:  oracle
IMPORTANT, PLEASE READ:
By no means is this a recommended or secure installation.  These are minimal instructions to get someone from zero to up and running easily and quickly.  In a production instance, I would create different tablespaces for APEX and ORDS, I would use far more complex and distinct passwords, I would use HTTPS and not HTTP, I would deploy ORDS on a physically distinct server, and more.
The above steps were tested with Oracle Application Express 5.1.1.00.08, Oracle REST Data Services 3.0.9, and Oracle Database 12.2.0.1 running on Oracle Linux.

 

https://www.youtube.com/watch?v=amF01SpNLUo

whitelist ip with microsoft–hotmail and yahoo mail service

Please use the below link to submit your mail server information, so that microsoft will whitelist your ip address after validating your information

 

https://support.microsoft.com/en-us/getsupport?oaspworkflow=start_1.0.0.0&wfname=capsub&productkey=edfsmsbl3&locale=en-us