Spend 30 minutes doing a google search on ‘SQL injection’.  For this discussion

Spend 30 minutes doing a google search on ‘SQL injection’.  For this discussion

Spend 30 minutes doing a google search on ‘SQL injection’.  For this discussion board, provide a paragraph description of your interpretation of SQL injection.  Many times, the SQL used in SQL injection comes from a hacker/user of a web application through an INPUT textbox.  In a second paragraph, theorize how we can stop a hacker from being able to use an input textbox (or the console) as a mechanism for doing SQL injection.

× How can I help you?