MySQL security best practices often assume restricted access to the physical server and restrictive file system privileges. However, OEM’s and ISV’s who bundle and distribute their application with MySQL have no control over where the application is installed. In fact, the application is often deployed on workstations with unrestricted access to the underlying data files.
Common security vulnerabilities: This session will address two common security vulnerabilities that assume unrestricted access to the underlying MySQL grant and data files.
Deployment options: I’ll address silent install options using the Windows Installer and the MySQL Instance Configuration utility. Launching the MySQL executable from a command-line and common methods of initializing an empty database will be discussed. I’ll talk about when it’s appropriate to use MySQL’s deeply embedded library (libmysqld) and when to use the Connector/MXJ Java utility package.
Attendees will use sample command-line parameters and silent install instructions to speed up their development and deployment with MySQL
Lee Stigile is a Sales Engineer for MySQL. His expertise is focused on helping IT organizations to design and deploy database applications using MySQL. Besides application development and database administration, Lee has experience working with a wide range of technology products including mobile device management software and embedded database servers
John David Duncan (“J.D.”) works for MySQL AB as a Consulting Engineer and lives in the San Francisco bay area.
For information on exhibition and sponsorship opportunities at the conference, contact Sharon Cordesse at email@example.com
Download the MySQL Sponsor/Exhibitor Prospectus
For media-related inquiries, contact Maureen Jennings at firstname.lastname@example.org
To stay abreast of conference news and to receive email notification when registration opens, please sign up for the MySQL Conference newsletter.
View a complete list of MySQL contacts.