Best group member,

 

How can I prevent people from hijacking a query? I read this in an article
about a few months ago, but now I can not find that article again. This
question is maybe not so exact, and I do not know how risky it is to not
protect your system from database hijackers?

 

Can someone give an example of how a database can be hijacked or destroyed?
What kind of queries is more vulnerable then others?

 

Best regards,

Peter Lauri

 

 

 

Reply via email to