answersLogoWhite

0


Best Answer

1. You need find all vulnerabilities in you appliacation, you can use a scanner such as WebCruiser - Web Vulnerability Scanner to detect it;

2. Then you need modify your application which handle the parameter, for exam, if you use the int variable id=10 , you should bind the id to a integer, if the submit parameter is not a integer, then refuse it; if you use a string variable, you need limit its length, and check if there is single quote or space in it.

3. Use scanner to Test it again.

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: How can I protect my database from SQL injection attacks urgent please?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

Database Design?

form_title=Database Design form_header=Transform your company by incorporating a new database design. What program will the database be used with?=_ Please explain what you will be using the database for?="" Do you have a database that you're already using?= () Yes () No


Who is responsible for database security?

Each database can have a security administrator who is in charge of enforcing and maintaining the database security policy. If the database system is small, the database administrator may also have security administrator responsibilities. To learn more about data science please visit- Learnbay.co


Database?

form_title=Database Design form_header=Transform your company by incorporating a new database design. What program will the database be used with?=_ Please explain what you will be using the database for?="" Do you have a database that you're already using?= () Yes () No


What is the meaning of Database security?

Database security refers to the many steps taken by businesses to protect their databases from both internal and external threats. The database, the data it holds, the database management system, and the numerous applications that access it are all covered by database security. To learn more about data science please visit- Learnbay.co


Why database is vulnerable?

Database is vulnerable because it collects, maintains, and disseminates information. These data essentially include exploitability and potential impact. Example of this is the Open Source Vulnerability Database.

Related questions

Database Design?

form_title=Database Design form_header=Transform your company by incorporating a new database design. What program will the database be used with?=_ Please explain what you will be using the database for?="" Do you have a database that you're already using?= () Yes () No


What are research topics on data mining or database?

please give me research topic from database and more information


The causes of the IRA attacks?

What? Please explain.


Frequently asked questions on database recovery?

can u please elaborate the question for details on database visit "tutorialsera"


How do you handle database in php?

Please refer link. The presentation gives complete understanding of how to deal with database (Mysql) with php.


How do you get a felony altering database expunged in California?

Re-word and re-submit the question please. What "felony altering database" are you referring to?


Who is responsible for database security?

Each database can have a security administrator who is in charge of enforcing and maintaining the database security policy. If the database system is small, the database administrator may also have security administrator responsibilities. To learn more about data science please visit- Learnbay.co


Database?

form_title=Database Design form_header=Transform your company by incorporating a new database design. What program will the database be used with?=_ Please explain what you will be using the database for?="" Do you have a database that you're already using?= () Yes () No


What is the use of GMH injection?

GMH is a biochemical injection that is administered to women who want to increase their chances of becoming pregnant. On the Humorous side- The acronym GMH also stands for 'Get Me to Hawaii' and I'd definitely like an injection of that please!


Fuel injection pump in ic engines?

If you are asking, "Is there a fuel injection pump in an internal combustion engine with fuel injection?". then the answer would be Yes, it is the fuel pump itself. If that is not your question then please rephrase your question and try again.


How did the aborigines protect their children when captain cook came?

Can someone please answer please


Can any one please tell me the difference between database management and data warehousing in brief?

Database management involves designing the actual tables in a database and making sure that the database is up and running smoothly. This is performed by a database administrator (DBA). Data warehousing involves storing data in a database. The DBA designed the database, but someone else (or a program that someone else is running) is actually inserting the data into the database.