Already a member? Log in

Sign up with your...

or

Sign Up with your email address

Add Tags

Duplicate Tags

Rename Tags

Share It With Others!

Save Link

Sign in

Sign Up with your email address

Sign up

By clicking the button, you agree to the Terms & Conditions.

Forgot Password?

Please enter your username below and press the send button.
A password reset link will be sent to you.

If you are unable to access the email address originally associated with your Delicious account, we recommend creating a new account.

ADVERTISEMENT
ADVERTISEMENT

Links 1 through 10 of 11 by Eddie Awad tagged injection

Share It With Others!

This article provides a set of simple techniques for preventing SQL Injection vulnerabilities. These techniques can be used with practically any kind of programming language with any type of database. There are other types of databases, like XML databases, which can have similar problems (e.g., XPath and XQuery injection) and these techniques can be used to protect them as well.

Share It With Others!

This paper explains a straightforward approach to writing database PL/SQL programs that provably guarantees their immunity to SQL injection.

Share It With Others!

Share It With Others!

SQL injection is one of the most common security vulnerabilities for web applications today. This article shows ways to solve the problem, including a new technique called "Disabling Literals", and lists new attacks.

Share It With Others!

SQL injection tecniques explained with examples.

Share It With Others!

Share It With Others!

SQL Injection attacks are really nasty security vulnerabilities, and something all web developers need to make sure they understand and protect themselves against.

Share It With Others!

This article will try to help beginners with grasping the problems facing them while trying to utilize SQL Injection techniques, to successfully utilize them, and to protect themselves from such attacks.

Share It With Others!

Review of several types of SQL injection attacks and how they occur and what web developers and end users can do to prevent them.

Share It With Others!

ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT