Academic Journals Database
Disseminating quality controlled scientific knowledge

Safe Guard Anomalies against SQL Injection Attacks

Author(s): Romil Rawat | Chandrapal Singh Dangi | Jagdish Patil

Journal: International Journal of Computer Applications
ISSN 0975-8887

Volume: 22;
Issue: 2;
Start page: 11;
Date: 2011;
Original page

Keywords: SQL Injection | Database Security | Authentication | HTTP

For internet, web application exists and for web application syntax, semantics, coding and design exists, and for coding and designing, algorithm exists, and for algorithm, protecting techniques and rules exists, But as the internet technologies advanced, vulnerability also advanced .Various old procedures, algorithm functions, coding and designing syntax and semantics are there, which are vulnerable to attack and if used could be easily traced or hacked by the attacker. Old practices which are vulnerable should be banned in organization, companies and govt. sectors and secure guidelines should be issued, which consists of security guildelines.and should be strictly followed. In this paper we have proposed coding flaws at different platforms and their solutions.
Why do you need a reservation system?      Save time & money - Smart Internet Solutions