| 1. | Inserted a security note about sql injection 插入了有关sql注入的安全说明。 |
| 2. | The following script shows a simple sql injection 以下脚本显示了一个简单的sql注入。 |
| 3. | Added the section " reviewing code for sql injection . 添加了“在代码中检查sql注入”部分。 |
| 4. | To avoid sql injection attacks , follow these guidelines 若要避免sql注入攻击,请遵循以下准则: |
| 5. | Reviewing code for sql injection 在代码中检查sql注入 |
| 6. | Follow best practices to help avoid attacks , such as sql injection attacks 遵循最佳做法有助于避免一些攻击,如sql注入式攻击。 |
| 7. | Using the execute statement to execute a string facilitates sql injection attacks 使用execute语句执行字符串容易受到sql注入攻击。 |
| 8. | Stored procedures may be susceptible to sql injection if they use unfiltered input 存储过程如果使用未筛选的输入,则可能容易受sql injection攻击。 |
| 9. | Parameterized stored procedures can help protect your application from sql injection attacks 参数化存储过程有助于保护应用程序不受sql injection攻击。 |
| 10. | Filtering input may also be helpful in protecting against sql injection by removing escape characters 筛选输入可以删除转义符,这也可能有助于防止sql注入。 |