SQL injection attack

SQL injection attack
"An attack that attempts to compromise your database (and potentially the computer on which the database is running) by creating SQL commands that are executed instead of, or in addition to, the commands that you have built into your application."
حقنة هجوم SQL

English-Arabic terms dictionary. 2015.

Игры ⚽ Поможем написать реферат

Look at other dictionaries:

  • SQL injection — A SQL injection is often used to attack the security of a website by inputting SQL statements in a web form to get a badly designed website in order to dump the database content to the attacker. SQL injection is a code injection technique that… …   Wikipedia

  • Attack patterns — In computer science, attack patterns are a group of rigorous methods for finding bugs or errors in code related to computer security.Attack patterns are often used for testing purposes and are very important for ensuring that potential… …   Wikipedia

  • Code injection — is the exploitation of a computer bug that is caused by processing invalid data. Code injection can be used by an attacker to introduce (or inject ) code into a computer program to change the course of execution. The results of a code injection… …   Wikipedia

  • Database activity monitoring — (DAM) is a database security technology for monitoring and analyzing database activity that operates independently of the database management system (DBMS) and does not rely on any form of native (DBMS resident) auditing or native logs such as… …   Wikipedia

  • Salt (cryptography) — In cryptography, a salt consists of random bits, creating one of the inputs to a one way function. The other input is usually a password or passphrase. The output of the one way function can be stored rather than the password, and still be used… …   Wikipedia

  • Magic string — A magic string is an input that a programmer believes will never come externally and which activates otherwise hidden functionality. A user of this program would likely provide input that gives an expected response in most situations. However, if …   Wikipedia

  • String literal — A string literal is the representation of a string value within the source code of a computer program. There are numerous alternate notations for specifying string literals, and the exact notation depends on the individual programming language in …   Wikipedia

  • Scareware — Not to be confused with careware or shareware. Scareware comprises several classes of scam software with malicious payloads, or of limited or no benefit, that are sold to consumers via certain unethical marketing practices. The selling… …   Wikipedia

  • Broadband Reports — Broadband Reports, located at the web URL www.dslreports.com (mirrored at www.broadbandreports.com), is a North American oriented information and review site based in New York City. The site s main focus is on high speed Internet services in the… …   Wikipedia

  • Cross-site scripting — (XSS) is a type of computer security vulnerability typically found in Web applications that enables attackers to inject client side script into Web pages viewed by other users. A cross site scripting vulnerability may be used by attackers to… …   Wikipedia

  • Operation AntiSec — An image that Anonymous has used to represent the operation; it contains elements of symbols used to represent both Anonymous and LulzSec. Not to be confused with Antisec Movement. Operation Anti Security, also referred to as Operation AntiSec or …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”