Tag

SQL injection

0 views collected around this technical thread.

Code Mala Tang
Code Mala Tang
May 8, 2025 · Fundamentals

Why Python 3.14 Introduces T‑Strings: A Safer Alternative to f‑Strings

Python 3.14 adds the PEP 750 T‑string syntax to address security risks in existing string formatting methods like f‑strings, offering a template‑based approach that enables safer handling of user input, SQL queries, and HTML rendering.

PythonSQL injectionString Formatting
0 likes · 11 min read
Why Python 3.14 Introduces T‑Strings: A Safer Alternative to f‑Strings
Java Tech Enthusiast
Java Tech Enthusiast
Apr 27, 2025 · Frontend Development

Common Front-End Security Attacks, Principles, and Mitigations

The article outlines prevalent front‑end security threats such as XSS, SQL injection, CSRF, MITM, clickjacking, misconfiguration, and vulnerable dependencies, explains their underlying principles, and recommends practical mitigations including input validation, CSP, HTTPS/TLS, CSRF tokens, secure headers, regular audits, and dependency scanning.

CSRFClickjackingFrontend
0 likes · 8 min read
Common Front-End Security Attacks, Principles, and Mitigations
php中文网 Courses
php中文网 Courses
Mar 10, 2025 · Information Security

Security Protection Strategies and Vulnerability Mitigation for PHP Applications

This article examines essential security measures for PHP applications, covering protection against SQL injection, XSS, CSRF, unsafe file uploads, session fixation, weak passwords, error disclosure, and the importance of HTTPS, with practical code examples and configuration tips to build more resilient web services.

CSRFFile UploadHTTPS
0 likes · 8 min read
Security Protection Strategies and Vulnerability Mitigation for PHP Applications
DevOps Operations Practice
DevOps Operations Practice
Feb 23, 2025 · Information Security

Understanding Network Attacks: Definitions, Common Types, and Prevention Strategies

This article explains what network attacks are, outlines the most common attack types such as malware, DoS/DDoS, phishing, SQL injection and DNS tunneling, and provides practical prevention measures including regular updates, firewall configuration, VPN use, and security awareness training.

DDoSPreventionSQL injection
0 likes · 6 min read
Understanding Network Attacks: Definitions, Common Types, and Prevention Strategies
php中文网 Courses
php中文网 Courses
Jan 27, 2025 · Information Security

How to Prevent SQL Injection in PHP Applications

This article explains essential techniques to protect PHP applications from SQL injection attacks, covering prepared statements, input validation, ORM usage, escaping, stored procedures, permission restrictions, web application firewalls, and logging, with practical code examples for PDO, MySQLi, and Eloquent.

ORMPHPSQL injection
0 likes · 5 min read
How to Prevent SQL Injection in PHP Applications
Test Development Learning Exchange
Test Development Learning Exchange
Jul 24, 2024 · Databases

Python MySQL Database Operations: 10 Practical Examples

This article provides 10 detailed Python code examples demonstrating how to connect to, query, insert, update, delete, and manage MySQL databases with proper error handling and resource management.

CRUDDatabase ManagementDatabase Operations
0 likes · 4 min read
Python MySQL Database Operations: 10 Practical Examples
360 Smart Cloud
360 Smart Cloud
Jul 11, 2024 · Information Security

Web Security Fundamentals: Secure Coding, SQL Injection, XSS, and File Management

This article provides a comprehensive overview of web security, covering authentication, input validation, secure coding practices, SQL injection and XSS attack mechanisms, detection methods, defensive techniques, and best practices for secure file upload and download.

File UploadSQL injectionSecure Coding
0 likes · 15 min read
Web Security Fundamentals: Secure Coding, SQL Injection, XSS, and File Management
php中文网 Courses
php中文网 Courses
May 15, 2024 · Information Security

Detecting SQL Injection in PHP Using the Cloudmersive Security API

This guide explains how to protect PHP applications from SQL injection attacks by installing the Cloudmersive Security API client via Composer and using its content‑threat detection endpoint to scan user input, all with a free API key offering up to 800 scans per month.

APICloudmersive APIContent Threat Detection
0 likes · 3 min read
Detecting SQL Injection in PHP Using the Cloudmersive Security API
php中文网 Courses
php中文网 Courses
Apr 10, 2024 · Information Security

Preventing SQL Injection in PHP Using mysqli_real_escape_string

This article explains how SQL injection attacks can compromise web applications and demonstrates how to securely handle user input in PHP by using the mysqli_real_escape_string function to escape special characters before constructing SQL queries, thereby protecting the database from malicious exploitation.

PHPSQL injectionWeb Development
0 likes · 4 min read
Preventing SQL Injection in PHP Using mysqli_real_escape_string
php中文网 Courses
php中文网 Courses
Jan 29, 2024 · Information Security

Guide to Preventing LDAP and SQL Injection Attacks in PHP

This article explains the principles, provides code examples, and outlines preventive measures for LDAP and SQL injection attacks in PHP, helping developers understand how these vulnerabilities work and how to secure their web applications through input validation, parameter binding, and access control.

LDAP injectionPHP securitySQL injection
0 likes · 6 min read
Guide to Preventing LDAP and SQL Injection Attacks in PHP
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Jan 8, 2024 · Information Security

Understanding SQL Injection and Prevention with Spring Boot and MyBatis

This article explains the concept of SQL injection, demonstrates a vulnerable query example, and provides a step‑by‑step Spring Boot and MyBatis implementation—including table creation, Java controller, service, DAO, mapper, and configuration—to illustrate how proper parameter handling prevents injection attacks.

JavaMyBatisSQL injection
0 likes · 10 min read
Understanding SQL Injection and Prevention with Spring Boot and MyBatis
php中文网 Courses
php中文网 Courses
Dec 13, 2023 · Backend Development

Handling Cross-Origin Requests and Security Restrictions in PHP

This article explains how to use PHP functions such as header(), mysqli_real_escape_string(), and htmlspecialchars() to enable cross-origin resource sharing, handle preflight OPTIONS requests, and protect against SQL injection and XSS attacks, thereby improving web security and user experience.

CORSSQL injectionXSS
0 likes · 4 min read
Handling Cross-Origin Requests and Security Restrictions in PHP
php中文网 Courses
php中文网 Courses
Oct 25, 2023 · Information Security

Common Security Vulnerabilities in PHP Web Applications and How to Prevent Them

This article outlines the most frequent security flaws found in PHP web applications—including SQL injection, XSS, CSRF, insecure file uploads, remote code execution, weak password storage, and session hijacking—and provides practical mitigation techniques for each.

CSRFFile UploadPHP
0 likes · 6 min read
Common Security Vulnerabilities in PHP Web Applications and How to Prevent Them
Test Development Learning Exchange
Test Development Learning Exchange
Oct 16, 2023 · Information Security

Python Techniques for Data Protection and Privacy: Encryption, Hashing, SSL/TLS, and Common Security Measures

This article presents practical Python examples for enhancing network security, covering symmetric and asymmetric encryption, hash functions, password hashing, SSL/TLS communication, SQL injection prevention, XSS mitigation, CSRF protection, and secure password storage to safeguard data and privacy.

CSRFEncryptionHashing
0 likes · 7 min read
Python Techniques for Data Protection and Privacy: Encryption, Hashing, SSL/TLS, and Common Security Measures
php中文网 Courses
php中文网 Courses
Oct 10, 2023 · Information Security

Common PHP Security Vulnerabilities and Mitigation Techniques

This article outlines prevalent PHP security issues such as SQL injection, cross‑site scripting, and session hijacking, and provides practical mitigation strategies with detailed code examples to help developers safeguard their applications against these attacks.

Code ExamplePHPSQL injection
0 likes · 4 min read
Common PHP Security Vulnerabilities and Mitigation Techniques
php中文网 Courses
php中文网 Courses
Oct 8, 2023 · Information Security

Common PHP Security Issues and Mitigation Techniques

This article outlines frequent PHP security vulnerabilities such as SQL injection, XSS, unsafe file uploads, and sensitive data exposure, and demonstrates how to mitigate them with prepared statements, input escaping, file validation, and secure configuration practices using concrete code examples.

File UploadSQL injectionSensitive Data
0 likes · 5 min read
Common PHP Security Issues and Mitigation Techniques
php中文网 Courses
php中文网 Courses
Sep 19, 2023 · Backend Development

Understanding PHP's addslashes() Function: Syntax, Usage, and Security Considerations

The article explains PHP's addslashes() function, detailing its syntax, how it escapes specific characters, provides code examples, demonstrates its role in preventing SQL injection, and advises using stronger escaping methods such as mysqli_real_escape_string or PDO prepared statements.

Backend DevelopmentSQL injectionaddslashes
0 likes · 6 min read
Understanding PHP's addslashes() Function: Syntax, Usage, and Security Considerations
Laravel Tech Community
Laravel Tech Community
Sep 5, 2023 · Backend Development

Using MySQLi and PDO to Prevent SQL Injection in PHP

The article explains why directly concatenating user input into SQL queries leads to injection vulnerabilities and demonstrates how to secure PHP database operations using input validation, escaping functions, and prepared statements with MySQLi and PDO, while comparing related sanitization functions.

PDOSQL injectionmysqli
0 likes · 5 min read
Using MySQLi and PDO to Prevent SQL Injection in PHP