|
|
|
MySQL for Python : Forming a query in MySQL |
In order to best understand how to submit a query through MySQL for Python, it is important to ensure you understand how to submit a query in MySQL itself. The similarities between the two outnumber the differences, but the first may seem confusing if you don't properly understand the second. |
|
|
|
|
|
|
SQL Injection : Code-Level Defenses - Encoding Output |
In addition to validating input received by the application, it is often necessary to also encode what is passed between different modules or parts of the application. In the context of SQL injection, this is applied as requirements to encode, or “quote,” content that is sent to the database to ensure that it is not treated inappropriately. |
|
|
Upgrading and Converting to Access 2010 : TO CONVERT OR TO ENABLE |
You have several things to consider when deciding whether to convert an application to the Access ACCDB file format. The primary reason to convert is to take advantage of the new features that require the ACCDB file format, such as the ability to work with complex data, the ease of collecting data from e-mail forms, linking to SharePoint Services, and creating Web applications. |
|
|
|
|
SQL Server 2005 : Advanced OLAP - Calculations (part 1) - Calculated Members |
There’s a lot more to explore than these measure and dimension features. For instance, Analysis Services allows you to store calculated MDX expressions on the server that you can use in your queries. You can reference custom-built sets by name, create calculated measures or dimension attribute members, and more. |
|
|
Exploiting SQL Injection : Out-of-Band Communication |
The HTTP(S) connection that is used to send the request is also used to receive the response. However, this does not always have to be the case: The results can be transferred across a completely different channel, and we refer to such a communication as “out of band,” or simply OOB. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
SQL Server 2008 : Failover clustering - Clustering overview |
As a cluster-aware application, a SQL Server instance can be installed into an existing Windows cluster, creating what's referred to as a failover clustering instance. Once installed, the instance is accessed using a network name without needing to know which of the underlying physical cluster servers the instance is currently running on. |
|
|
Exploiting SQL Injection : Escalating Privileges |
All modern DBMSs provide their administrators with very granular control over the actions that users can perform. You can carefully manage and control access to the stored information by giving each user very specific rights, such as the ability to access only specific databases and perform only specific actions on it. |
|
|
|
Exploiting SQL Injection : Enumerating the Database Schema (part 1) - SQL Server |
To mount a successful attack, and to properly assess the risk that is posed by an SQL injection vulnerability, performing a fingerprint and squeezing a few bits of information is not enough: You must show that a skilled and resourceful attacker is able to enumerate the tables that are present in the database and quickly extract the ones that he is interested in.
|
|