SelecTViews With Stephen Wynkoop Find out the latest news involving Adobe’s Flash Builder 4.5. What’s going on with Oracle’s lawsuit against Google? How about some tips on cloud appropriateness? Stephen answers, "What is an outer union operation and how does it work?" How Much Do You Need to Know About Query Plans? Like anything to do with software, you need […]
Author: Ben Taylor
No More Injection
No More Injection Really! It’s time to move on to other topics. So today I want to close out on our discussion of application injection with some final reader’s comments. Next time we will be moving on to another topic of interest. One thing I would encourage you to look into if you haven’t heard the term before is Blind […]
No More Injection
No More Injection Really! It’s time to move on to other topics. So today I want to close out on our discussion of application injection with some final reader’s comments. Next time we will be moving on to another topic of interest. One thing I would encourage you to look into if you haven’t heard the term before is Blind […]
Injection Prevention Tips and Techniques
SelecTViews With Stephen Wynkoop Find out about business intelligence trend surveys, MySQL in the cloud…the latest news and your SQL Server BI tip for the day. [Watch the Show] Injection Prevention Tips and Techniques In the last couple of newsletters I have provided some code examples of how to prevent SQL Injection. The short answer was to use strongly typed […]
Injection Prevention Tips and Techniques
SelecTViews With Stephen Wynkoop Find out about business intelligence trend surveys, MySQL in the cloud…the latest news and your SQL Server BI tip for the day. [Watch the Show] Injection Prevention Tips and Techniques In the last couple of newsletters I have provided some code examples of how to prevent SQL Injection. The short answer was to use strongly typed […]
How Secure is Secure?
How Secure is Secure? It wasn’t more than a few years ago when Microsoft was the whipping kid when it came to inadequate security measures. Apple, Unix/Linux, Solaris, OS 400, MVS, CMS, etc. were considered more secure because they either didn’t have enough market share, or had less vulnerabilities. Less focus was paid to our own practices in writing code […]
How Secure is Secure?
How Secure is Secure? It wasn’t more than a few years ago when Microsoft was the whipping kid when it came to inadequate security measures. Apple, Unix/Linux, Solaris, OS 400, MVS, CMS, etc. were considered more secure because they either didn’t have enough market share, or had less vulnerabilities. Less focus was paid to our own practices in writing code […]
SQL Injection – What to Do?
SQL Injection – What to Do? Lots of good responses regarding what to do in the short term for SQL Injection. Before I list some of the great triage answers today, let me make a simple reminder of how to stop SQL Injection. The easiest answer is simple…use strongly typed parameters whenever you interact with your database. Most data access […]
SQL Injection – What to Do?
SQL Injection – What to Do? Lots of good responses regarding what to do in the short term for SQL Injection. Before I list some of the great triage answers today, let me make a simple reminder of how to stop SQL Injection. The easiest answer is simple…use strongly typed parameters whenever you interact with your database. Most data access […]
SQL Injection is Still Around
SQL Injection – It’s Still Around Recently I received an email from a colleague consulting for a company that has exposure for SQL Injection. They use a parameterized stored procedure, and determined that they had resolved their exposure to SQL Injection . SQL Injection occurs when a user embeds SQL Statements in input fields of an application or web form. […]