SQL injection attacks are a vulnerability that tend to hurt high-value sites.
SQL注入攻击是一个可能会损害高价值站点的漏洞。
SQL injection attacks can also be used to change data or damage the database.
SQL Injection攻击还可用于更改数据或损坏数据库。
Automatically escapes data saved to the database (to prevent SQL injection attacks).
避免数据自动存入数据库(阻止SQL注入式攻击)。
Doing so makes the SQL easier to maintain and secures your application from SQL injection attacks.
这样做可使SQL更加易于维护,且可使您的应用程序免受SQL注入攻击。
There simply is nothing to subvert, so the application is be largely immune to SQL injection attacks.
将无法被破坏,系统应用将免疫于SQL注射攻击。
Editable Data Validation - HDIV analyzes all editable fields to remove cross-site scripting and SQL injection attacks.
可编辑数据验证——为了去除跨站点脚本和SQL注入攻击,HDIV分析所有的可编辑数据域。
Forever, many hackers attack means, such as phishing and SQL injection attacks, start from the identity authentication.
目前的很多黑客攻击手段,如钓鱼攻击、SQL注入攻击等各种网络攻击方式都是由身份认证开始的。
Like the last example, the page is ripe for SQL injection attacks because the executed SQL is constructed dynamically from a user-entered value.
与上一示例一样,此页也会受到SQL Injection攻击,因为执行的SQL是通过用户输入的值动态构造的。
The characteristics of SQL injection attacks is widespread, covert means, characteristics, methods and tools nonenumerative attack civilians.
而SQL注入攻击具有广泛存在、手段隐蔽、特征不可枚举、攻击手段及工具平民化的特征。
While not directly related to SQL injection attacks, BestLogin.aspx demonstrates another security best practice: the encryption of connection strings.
虽然不与SQL Injection攻击直接相关,但是 BestLogin.aspx演示了另一种安全最佳做法:对连接字符串进行加密。
Blind SQL injection attacks are a well know and recognized form of code injection attack, but there are many other forms, some not so well documented or understood.
SQL盲注攻击是一种为人熟知的代码注入攻击形式,但是也有很多其他形式,有些尚未得到很好的记载和了解。
If a less-than-careful developer entered the text from Listing 5 (in the hopes of embedding the values directly), the call would be exposed to SQL injection attacks.
如果一位粗心大意的开发人员输入了清单5中的文本(以便直接嵌入值),这个调用将面临SQL注入攻击的风险。
SQL injection attacks are a serious concern for application developers as they can be used to break into supposedly secure systems and steal, alter, or destroy data.
SQL Injection攻击与应用程序开发人员紧密相关,因为它们可用于侵入据推测是安全的系统并窃取、更改或销毁数据。
Using parameterized commands helps guard against SQL injection attacks, in which an attacker "injects" a command into a SQL statement that compromises security on the server.
使用参数化命令有助于防范SQL投射攻击,在此类攻击中,攻击者会「投射」命令到 SQL陈述式中,对伺服器的安全性造成危害。
Most developers have heard of a good example of an anti-pattern: The improper use of Structured Query Language (SQL) libraries that result in SQL injection attacks on Web sites.
大多数开发人员听说过关于反模式的一个很好的例子:结构化查询语言(Structured Query Language,SQL)的错误使用导致Web 站点受到 SQL注入攻击。
This attack functions almost exactly like the blind SQL injection attack but, unlike SQL injection attacks, few people know about XPath injection attacks or take precautions against them.
这种攻击的运作跟SQL盲注攻击几乎完全相似,与SQL注入攻击不同的是,几乎没什么人了解XPath盲注攻击或对其进行预防。
This new edition of DB2 on Rails adds an extra layer of security, thanks to the fact that these "safe" calls are translated into parameterized queries, which are immune to SQL Injection attacks.
DB 2on Rails的这个新版本添加了一层额外的安全性,这要归功于这样一个事实:这些“安全”调用将转换为参数化查询,而参数化查询对SQL注入攻击免疫。
Protection against more elaborate attacks such as SQL injection and Dictionary attacks require more customized configuration, such as user-defined dictionaries containing allowable syntax.
保护免受更复杂的攻击(如SQL注入和字典攻击)需要更多自定义的配置,如用户自定义字典所允许的语法。
The code in Figure 5 employs parameterized SQL to stop injection attacks.
图5中的代码使用参数化s QL阻止Injection攻击。
In the malicious attack statement, two kinds of attacks, SQL injection and middleware channel multiplexing, are hard and heavy.
在恶意攻击语句中,SQL注入和中间件通道复用两种攻击是难中难,同时也是重中重。
There are hidden dangers of information security in the process of network communication in smart cities, such as Trojans, denial of service attacks, spoofing attacks, SQL injection and worms.
智慧城市网络通信过程中存在信息安全隐患,主要有木马程序、拒绝服务攻击、欺骗攻击、SQL注入和蠕虫病毒等。
It includes all the currently known information about these attacks and significant insight from its contributing team of SQL injection experts.
它包括所有目前已知的对这些攻击和SQL注入其有贡献的专家团队重大洞察力的信息。
It includes all the currently known information about these attacks and significant insight from its contributing team of SQL injection experts.
它包括所有目前已知的对这些攻击和SQL注入其有贡献的专家团队重大洞察力的信息。
应用推荐