hahapunks3629 hahapunks3629
  • 23-11-2017
  • Computers and Technology
contestada

Bob is developing a web application that depends upon a database backend. what type of attack could a malicious individual use to send commands through his web application to the database?

Respuesta :

Аноним Аноним
  • 24-11-2017
Evil user can do SQL Injections to destroy the database by typing query commands in the form provided by the application that have relation with the database.
Answer Link

Otras preguntas

Who can certify someone in CPR? 1. 2. 3. don't answer if you don't know. I need the correct answers.
Is 5.49 less than or greater than 5.409​
Please help me i will mark brainliest and thank you. ASAP!!!
What is the volume of the prism?
NEED HELP ASAP!!! Look at the meaning of "cease" in the chart. Which clue helps you understand what "cease" means?
Help me please I only have 2 minutes
What is (6x^2+11x+4) / (2x+1) A. 2x+1 B. 3x+4 C. 8x+4 D. 3x+7
Please help me with this
weak orange juice is an example of
Solve for the unknown values.