473,387 Members | 1,890 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,387 software developers and data experts.

How to prevent SQL injections

Hi everybody,

any one knows this strings,

plz let me know


'sqlvuln
'+sqlvuln
sqlvuln;
(sqlvuln)


Regards
anji
Jul 2 '07 #1
7 1227
pbmods
5,821 Expert 4TB
Heya anji.

Are you looking for this?
Jul 2 '07 #2
Yes I want to know about the 1st 4 strings

1) 'sqlvuln
2) '+sqlvuln
3) sqlvuln;
4) (sqlvuln


if i enter in these strings in username password that strings

what will happen and what is the strings activities.

Thanking you,
Anji..
Jul 3 '07 #3
dafodil
392 256MB
Yes I want to know about the 1st 4 strings

1) 'sqlvuln
2) '+sqlvuln
3) sqlvuln;
4) (sqlvuln


if i enter in these strings in username password that strings

what will happen and what is the strings activities.

Thanking you,
Anji..
So you are focusing on Sql Injections....

Please try this link so that you can know all about them..

Hacking Through Using SQL

please right click and save it as .pdf so that you can download the file in pdf format...
Jul 4 '07 #4
dafodil
392 256MB
Moderator please change the topic to SQL Injections so that many can easily see the topic thanks...
Jul 4 '07 #5
Atli
5,058 Expert 4TB
I have edited the thread's title to better describe it's contents.
Please read the Posting Guidlines before posting

Moderator
Jul 4 '07 #6
Atli
5,058 Expert 4TB
Yes I want to know about the 1st 4 strings

1) 'sqlvuln
2) '+sqlvuln
3) sqlvuln;
4) (sqlvuln


if i enter in these strings in username password that strings

what will happen and what is the strings activities.

Thanking you,
Anji..
What do you mean? In what context?

Are you talking about what would happen if this was entered in a HTML form that is requesting user information, or are you talking about actually login into a MySQL Server? Or perhaps something else?
Jul 4 '07 #7
dafodil
392 256MB
Most development languages today has fixed the SQL injections so you don't have to worry about that anymore
Jul 5 '07 #8

Sign in to post your reply or Sign up for a free account.

Similar topics

10
by: Matthew Sims | last post by:
I've been performing search after search all over the internet reading up on all topics about making PHP secure with MySQL. There's a lot out there and not many concrete examples on how you should...
5
by: Daniel | last post by:
Does anyone know how this can be done? Thanks
14
by: Ludwig77 | last post by:
I read that there are some tags that can be entered in a web page's meta tags in order to prevent web bot searching and indexing of the web page for search engines. What is the tagging that I...
3
by: Tony Maresca | last post by:
Hi. I have a class derived from a UserControl, that I want to allow others to derive controls from. I don't want them to design the base class (which is derived from a UserControl). I know that...
2
by: techfuzz | last post by:
I scoured this group and others looking for the best way to disable a button after the first click to prevent multiple submissions, but never did find anything that worked like they said it would. ...
9
by: Daniel Walzenbach | last post by:
Hi I am faced with the following problem: I have a page (let’s call this page page1.aspx) containing some TextBoxes and a hyperlink which opens another page (let’s call this page page2.aspx)...
0
by: Frankie | last post by:
When I want to prevent a page from being cached, I have been using the following directive: <%@ OutputCache Location="none" %> I have also seen a few other methods recommended to prevent page...
9
by: Larry Woods | last post by:
I have a method in my base class that I want ALL derived classes to use. But, I find that I can create a "Shadow" method in my derived class that "overrides" the method in my base class. Can't...
24
by: Charles Law | last post by:
When I click a button I don't want the click event to fire. Is this possible? In fact, what I would really like is to be able to intercept the click event, perform some action, and then prevent...
6
by: teser3 | last post by:
I have my PHP inserting into Oracle 9i. But how do I prevent duplicate record entries? I only have 3 fields in the insert in the action page: CODE <?php $c=OCILogon("scott", "tiger",...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.