Lười đọc thì ko bao giờ lĩnh hội được điều gì cả :)) About SQL Injection Cheat Sheet Currently only for MySQL and Microsoft SQL Server, some ORACLE and some PostgreSQL . Most of samples are not correct for every single situation. Most of the real world environments may change because of parenthesis, different code bases and unexpected, strange SQL sentences. Samples are provided to allow reader to get basic idea of a potential attack and almost every section includes a brief information about itself. M : MySQL S : SQL Server P : PostgreSQL O : Oracle + : Possibly all other databases Examples; (MS) means : MySQL and SQL Server etc. (M*S) means : Only in some versions of MySQL or special conditions see related note and SQL Server Syntax Reference, Sample Attacks and Dirty SQL Injection Tricks Ending / Commenting Out / Line Comments Line Comments Comments out rest of ...
The IBM X-Force 2011 Mid-year Trend and Risk report has been published. Woot! I have to say, this report is bursting with great information about the latest threats that have occurred in the first half of this year and even though we have witnessed many high-profile security breaches in the beginning of 2011, improvements in areas of computer security are being made, showing that the industry is making headway. We encourage readers to not only check out the highlights listed here, but read the full report for contributions from our colleagues in Rational AppScan, Emergency Response Services (ERS), Managed Security Services (MSS), BigFix, Guardium and Identity Access and Management. Each of these dedicated security professionals has taken a pro-active approach in their respective articles to assist readers with additional guidance. Understanding threats is the starting point, but knowing what actions to take next is just as important. So, let’s take a look at some of those hi...
Comments
Post a Comment
Để lại góp ý của bạn để blog của mình hoàn thiện hơn :))