SAP technological consulting
How does a blockchain build consensus? Once you decide to send a payment to someone, you must use the Private Key to "sign" it (in German: signature). This means nothing other than that you specify another public address to which you want to send the money and confirm this transaction with your own private key. You don't have a central authority to send the information to, you're going to spread the information to all the other Miners around you. The miners then forward this information to other miners, who in turn do the same. This exponential wave of information reaches the entire network of the distributed community within a few milliseconds. Every time a miner receives a transaction, it checks that the transaction is actually correct. It checks which private key has signed, which public address the transaction should go to and whether the sender has enough "coins" for this transaction. What are consensus mechanisms? Any miner that solves a transaction through complex mathematical calculations is rewarded by the sender with a "fee" (transaction fee). How will it be decided which miner will receive the transaction fee? Because only one can get this reward. Also, what happens when you try a double spending by sending one transaction to one miner and then another transaction with the same money to another one millisecond later? These two could not yet exchange and thus information would be different in the network.
Remove weak password hashes from the system: Only updating the profile parameter does not provide you with the necessary security. There are still many weak hash values in your database that can be used to attack your system. These must be completely removed from the database. To do this, use the report CLEANUP_PASSWORD_HASH_VALUES. To do this, call the transaction SA38 and enter the name of the report in the input field. Run or F8 executes the programme and cleans your database Report CLEANUP_PASSWORD_HASH_VALUES This programme removes the outdated hash values across all clients. Have you already experienced this attack method or any other comments on this topic? Share your experiences with us in the form of a comment under this article.
SAP Basis in the Cloud
SAP Basis Administration Batch Control Job Control A large proportion of batch jobs run at night, while IT systems are available for dialog and online applications during the day. Meanwhile, web applications demand computer capacity around the clock. Even dialog systems are no longer in operation only from 8 a.m. to 6 p.m., but between 7 a.m. and 10 p.m. or longer. The time window for administration tasks is increasingly shifting toward transaction processing. This leaves less and less time for mission-critical batches, which can lead to disruptions and terminations. Whereas batch processing used to be a mainframe domain, companies today usually have to control background processing in heterogeneous operating system environments and client-server applications. For this reason, cross-platform, integration-capable job schedulers that can respond to unplanned events are in demand.
SAP's client concept enables a SAP system to be split into several logical sub-systems - clients. These subsystems can be used independently and in isolation as separate systems. But how should non-client transactions be treated? How can you prevent one client from accessing the other and why should you want to prevent that? In this blog post, I will answer these questions and discuss some negative examples. Why is it important to consider independent transactions separately? Imagine that every one of your employees is allowed to create or change a client in the production system, or worse, both. Creating and modifying a client in the production system is authorised and documented - you wonder what could possibly go wrong? The risk in this case is a loss of integrity of system and data, loss of confidentiality: With each new client, Superuser SAP* lives up to its comprehensive, cross-client rights and the assigned standard password.
Some missing SAP basic functions in the standard are supplied by the PC application "Shortcut for SAP Systems".
It's hard to imagine that all SAP customers will have completely replaced their Oracle and Microsoft databases in just ten years.
Both in older versions such as R/3 and the current S/4HANA.