The articles to follow deal with one of the most discussed topics around the world, e-mail security. GFI.COM was kind enough to allow Firewall.cx visitors to gain access to their excellent White Page database covering hot e-mail security topics.
Articles Tagged ‘Protection’
The following articles deal with one of the hottest topics around: Network, Web and IDS (Intrusion Detection System) Security.
The articles have been carefully selected to ensure they provide acurate and upto date information to our readers, while some have been written by our team, in response to our visitors request!
SQL Injections have been keeping security experts busy for over a decade now as they continue to be one of the most common type of attacks against webservers, websites and web application servers. In this article, we explain what a SQL injection is, show you SQL injection examples and analyse how these type of attacks manage to exploit web applications and webservers, providing hackers access to sensitive data.
What is a SQL Injection?
Websites operate typically with two sides to them: the frontend and backend. The frontend is the element we see, the rendered HTML, images, and so forth. On the backend however, there are layers upon layers of systems rendering the elements for the frontend. One such layer, the database, most commonly uses a database language called SQL, or Structured Query Language. This standardized language provides a logical, human-readable sentence to perform definition, manipulation, or control instructions on relational data in tabular form. The problem, however, is while this provides a structure for human readability, it also opens up a major problem for security.