Best group member,
How can I prevent people from hijacking a query? I read this in an article about a few months ago, but now I can not find that article again. This question is maybe not so exact, and I do not know how risky it is to not protect your system from database hijackers? Can someone give an example of how a database can be hijacked or destroyed? What kind of queries is more vulnerable then others? Best regards, Peter Lauri