This method removes the potential for an SQL injection attack.
这种方法消除了SQL注入攻击的可能性。
In an SQL injection attack, a program creates an SQL command and sends it to an SQL interpreter.
在SQL注入攻击中,程序会创建一个SQL命令,并将其发送给SQL解释器。
In an SQL injection attack, Mallory finds a Web site that Alice has created to sell electronics.
在SQL注入攻击中,Mallory找到Alice创建来售电的一个Web站点。
The SQL injection attack shown in Figure 3 resulted in the display of user names and passwords from the Users table.
图3所示的SQL Injection攻击导致显示users表中的用户名和密码。
Forever, many hackers attack means, such as phishing and SQL injection attacks, start from the identity authentication.
目前的很多黑客攻击手段,如钓鱼攻击、SQL注入攻击等各种网络攻击方式都是由身份认证开始的。
Like the SQL injection attack, you can often easily deal with the threat if you follow best practices to develop secure applications.
与SQL注入攻击类似,如果使用最佳实践开发安全的应用程序,通常可以轻松地处理该威胁。
The characteristics of SQL injection attacks is widespread, covert means, characteristics, methods and tools nonenumerative attack civilians.
而SQL注入攻击具有广泛存在、手段隐蔽、特征不可枚举、攻击手段及工具平民化的特征。
While it's easy to point to one or two key measures for the prevention of the SQL injection attack, it's best to take a layered approach to the problem.
尽管采取一两项关键措施预防SQL Injection攻击是很容易的,但最好是对问题采用分层方法。
Blind SQL injection attacks are a well know and recognized form of code injection attack, but there are many other forms, some not so well documented or understood.
SQL盲注攻击是一种为人熟知的代码注入攻击形式,但是也有很多其他形式,有些尚未得到很好的记载和了解。
The basic idea behind a SQL injection attack is this: you create a Web page that allows the user to enter text into a textbox that will be used to execute a query against a database.
SQL Injection攻击的基本原理如下:您创建一个网页,允许用户向文本框中输入文本,用于对数据库执行查询。
This attack functions almost exactly like the blind SQL injection attack but, unlike SQL injection attacks, few people know about XPath injection attacks or take precautions against them.
这种攻击的运作跟SQL盲注攻击几乎完全相似,与SQL注入攻击不同的是,几乎没什么人了解XPath盲注攻击或对其进行预防。
Parameterized commands guard against a SQL injection attack by guaranteeing that values received from an external source are passed as values only, and not part of the SQL statement.
参数化的命令会借由保证从外部来源接收的值只以数值传递,而不以SQL陈述式传递,以防范SQL投射攻击。
In this article, the author explains the principle and process of SQL Injection Attack, and introduces a serial interrelated solution to prevent SQL Injection Attack from the aspect of code in detail.
介绍了SQL注入攻击原理,SQL注入攻击的过程,并从功能代码本身方面详细介绍了SQL注入攻击的防范措施。
In addition to the overflow exploits, SQL injection is one other type of attack that relies on developer oversight by not testing incoming data.
除了溢出的利用以外,SQL注入是另一类依赖于开发人员没测试输入数据的疏漏的攻击。
In the malicious attack statement, two kinds of attacks, SQL injection and middleware channel multiplexing, are hard and heavy.
在恶意攻击语句中,SQL注入和中间件通道复用两种攻击是难中难,同时也是重中重。
The main way: password loophole attack, SQL Server extended stored procedure attack, SQL Injection (SQL Injection), steals backup, etc.
主要手法有:口令漏洞攻击、SQLServer扩展存储过程攻击、SQL注入(SQL Injection)、窃取备份等。
The main way: password loophole attack, SQL Server extended stored procedure attack, SQL Injection (SQL Injection), steals backup, etc.
主要手法有:口令漏洞攻击、SQLServer扩展存储过程攻击、SQL注入(SQL Injection)、窃取备份等。
应用推荐