| 1. | Sql server injection attack sql server 注入式攻击 |
| 2. | Follow best practices to help avoid attacks , such as sql injection attacks 遵循最佳做法有助于避免一些攻击,如sql注入式攻击。 |
| 3. | Specifies whether asp . net should check the request header for potential injection attacks 指定asp . net是否应检查请求标头,以检测可能的注入式攻击。 |
| 4. | This defeats header - injection attacks by making the injected material part of the same header line 这会使注入的内容成为同一标头行的一部分,从而使标头注入式攻击失效。 |
| 5. | That are found in response headers . this is to avoid injection attacks that exploit an application that echoes untrusted data contained by the header 这是为了避免利用能回显标头中包含的不受信任数据的应用程序进行注入式攻击。 |
| 6. | You need to plan for security during the design phase of the project , as well as plan how security will be maintained over the lifetime of the application 因此,必须确保用户输入不会插入到已在执行的命令。遵守这些原则可以帮助您抵御sql注入式攻击: |
| 7. | When creating a custom role provider , ensure that you follow security best practices to avoid attacks such as sql injection attacks when working with a database 创建自定义角色提供程序时,请确保遵循安全性最佳实践,以避免受到攻击(如在使用数据库时受到sql注入式攻击) 。 |
| 8. | When creating a custom membership provider , ensure that you follow security best practices to avoid attacks such as sql - injection attacks when working with a database 创建自定义成员资格提供程序时,请确保遵循安全最佳做法,以避免在使用数据库时受到攻击,如sql注入式攻击。 |
| 9. | When creating a custom session - state store provider , ensure that you follow security best practices to avoid attacks such as sql injection attacks when working with a database 创建自定义会话状态存储提供程序时,确保遵循安全性最佳做法以避免在使用数据库时遭受攻击(如sql注入式攻击) 。 |
| 10. | An application that does not properly validate user input can suffer from many types of malformed input attacks , including cross - site scripting and microsoft sql server injection attacks 如果应用程序不能正确验证用户输入,则可能会受到多种类型的格式错误的输入的攻击,包括跨站点脚本攻击和microsoft sql server注入式攻击。 |