<?xml version="1.0" encoding="utf-8" ?><rss version="2.0" xml:base="https://www.webmaster-forums.net/crss/node/1041002" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title></title>
    <link>https://www.webmaster-forums.net/crss/node/1041002</link>
    <description></description>
    <language>en</language>
          <item>
    <title>An SQL injection is a common</title>
    <link>https://www.webmaster-forums.net/web-database-development/how-prevent-mysql-injection-forms#comment-1291288</link>
    <description> &lt;p&gt;An SQL injection is a common type of attack that uses malicious SQL code.&lt;/p&gt;
&lt;p&gt;A few things to do:&lt;/p&gt;
&lt;p&gt;1.	Input validation and sanitation – writing code to illegally identify user inputs. Note that it’s impossible, though, to cover all scenarios&lt;br /&gt;
2.	Use a WAF – a Web Application Firewall – so even if your code isn’t perfect (no ones is), you are still protected. You can read a &lt;a href=&quot;https://www.incapsula.com/web-application-security/sql-injection.html&quot;&gt;good description about SQL injections&lt;/a&gt; from one vendor.&lt;/p&gt;
 </description>
     <pubDate>Mon, 21 Aug 2017 13:58:23 +0000</pubDate>
 <dc:creator>whitehatdefender</dc:creator>
 <guid isPermaLink="false">comment 1291288 at https://www.webmaster-forums.net</guid>
  </item>
  <item>
    <title>Really nice thread quite</title>
    <link>https://www.webmaster-forums.net/web-database-development/how-prevent-mysql-injection-forms#comment-1282385</link>
    <description> &lt;p&gt;Really nice thread quite informative  thanks to all.&lt;/p&gt;
 </description>
     <pubDate>Fri, 28 Dec 2012 06:15:00 +0000</pubDate>
 <dc:creator>Adsystem</dc:creator>
 <guid isPermaLink="false">comment 1282385 at https://www.webmaster-forums.net</guid>
  </item>
  <item>
    <title>thanks for the help !!</title>
    <link>https://www.webmaster-forums.net/web-database-development/how-prevent-mysql-injection-forms#comment-1282076</link>
    <description> &lt;p&gt;thanks for the help !!&lt;/p&gt;
 </description>
     <pubDate>Fri, 14 Dec 2012 05:37:57 +0000</pubDate>
 <dc:creator>giffy</dc:creator>
 <guid isPermaLink="false">comment 1282076 at https://www.webmaster-forums.net</guid>
  </item>
  <item>
    <title>mysql_real_escape_string($myf</title>
    <link>https://www.webmaster-forums.net/web-database-development/how-prevent-mysql-injection-forms#comment-1276374</link>
    <description> &lt;p&gt;mysql_real_escape_string($myfield);&lt;br /&gt;
mysql_real_escape_string($myfied2);&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://www.webmaster-forums.net/misc/smileys/smile.png&quot; title=&quot;Smiling&quot; alt=&quot;Smiling&quot; class=&quot;smiley-content&quot; /&gt;&lt;/p&gt;
 </description>
     <pubDate>Mon, 16 Jul 2012 11:01:27 +0000</pubDate>
 <dc:creator>samtrek</dc:creator>
 <guid isPermaLink="false">comment 1276374 at https://www.webmaster-forums.net</guid>
  </item>
  <item>
    <title>Thanks john for this</title>
    <link>https://www.webmaster-forums.net/web-database-development/how-prevent-mysql-injection-forms#comment-1276138</link>
    <description> &lt;p&gt;Thanks john for this example..&lt;/p&gt;
 </description>
     <pubDate>Wed, 04 Jul 2012 10:05:29 +0000</pubDate>
 <dc:creator>vasvigupt</dc:creator>
 <guid isPermaLink="false">comment 1276138 at https://www.webmaster-forums.net</guid>
  </item>
  <item>
    <title>Use
&lt;?php      $query =</title>
    <link>https://www.webmaster-forums.net/web-database-development/how-prevent-mysql-injection-forms#comment-1274279</link>
    <description> &lt;p&gt;Use&lt;/p&gt;
&lt;p&gt;&lt;div class=&quot;codeblock&quot;&gt;&lt;code&gt;&lt;span style=&quot;color: #000000&quot;&gt;&lt;span style=&quot;color: #0000BB&quot;&gt;&amp;lt;?php&lt;br /&gt;&amp;nbsp; &lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; $query &lt;/span&gt;&lt;span style=&quot;color: #007700&quot;&gt;= &lt;/span&gt;&lt;span style=&quot;color: #0000BB&quot;&gt;mysql_query&lt;/span&gt;&lt;span style=&quot;color: #007700&quot;&gt;(&lt;/span&gt;&lt;span style=&quot;color: #DD0000&quot;&gt;&quot;SELECT id FROM users WHERE username = &#039;&quot;&lt;/span&gt;&lt;span style=&quot;color: #007700&quot;&gt;.&lt;/span&gt;&lt;span style=&quot;color: #0000BB&quot;&gt;mysql_real_escape_string&lt;/span&gt;&lt;span style=&quot;color: #007700&quot;&gt;(&lt;/span&gt;&lt;span style=&quot;color: #0000BB&quot;&gt;$username&lt;/span&gt;&lt;span style=&quot;color: #007700&quot;&gt;).&lt;/span&gt;&lt;span style=&quot;color: #DD0000&quot;&gt;&quot;&#039; AND password = &#039;&quot;&lt;/span&gt;&lt;span style=&quot;color: #007700&quot;&gt;.&lt;/span&gt;&lt;span style=&quot;color: #0000BB&quot;&gt;mysql_real_escape_string&lt;/span&gt;&lt;span style=&quot;color: #007700&quot;&gt;(&lt;/span&gt;&lt;span style=&quot;color: #0000BB&quot;&gt;$password&lt;/span&gt;&lt;span style=&quot;color: #007700&quot;&gt;).&lt;/span&gt;&lt;span style=&quot;color: #DD0000&quot;&gt;&quot;&#039;&quot;&lt;/span&gt;&lt;span style=&quot;color: #007700&quot;&gt;);&amp;nbsp; &lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;color: #0000BB&quot;&gt;?&amp;gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/div&gt;&lt;/p&gt;
 </description>
     <pubDate>Tue, 27 Mar 2012 15:31:10 +0000</pubDate>
 <dc:creator>johnsmith32</dc:creator>
 <guid isPermaLink="false">comment 1274279 at https://www.webmaster-forums.net</guid>
  </item>
  <item>
    <title>every one is talking about in</title>
    <link>https://www.webmaster-forums.net/web-database-development/how-prevent-mysql-injection-forms#comment-1274068</link>
    <description> &lt;p&gt;every one is talking about in this forum to avoid sql injection through &quot;real escape string &quot; . But can any one tell me that How can we make its best use. and how can we prevent attacker from writing sql query on our page.&lt;/p&gt;
 </description>
     <pubDate>Tue, 20 Mar 2012 13:02:38 +0000</pubDate>
 <dc:creator>vasvigupt</dc:creator>
 <guid isPermaLink="false">comment 1274068 at https://www.webmaster-forums.net</guid>
  </item>
  <item>
    <title>&lt;?php
md5(serialize(base64_en</title>
    <link>https://www.webmaster-forums.net/web-database-development/how-prevent-mysql-injection-forms#comment-1273963</link>
    <description> &lt;p&gt;&amp;lt;?php&lt;br /&gt;
md5(serialize(base64_encode(mysql_real_escape_string($username)));&lt;br /&gt;
md5(serialize(base64_encode(mysql_real_escape_string($password)));&lt;br /&gt;
?&lt;/p&gt;
&lt;p&gt;It&#039;s a bit of an overkill (there is no point doing all that, then md5&#039;ing it), but you get my point. For things such as usernames and passwords you only really need to compare them, not much else.&lt;/p&gt;
 </description>
     <pubDate>Thu, 15 Mar 2012 12:19:53 +0000</pubDate>
 <dc:creator>David26</dc:creator>
 <guid isPermaLink="false">comment 1273963 at https://www.webmaster-forums.net</guid>
  </item>
  <item>
    <title>You can use stored procedure</title>
    <link>https://www.webmaster-forums.net/web-database-development/how-prevent-mysql-injection-forms#comment-1268087</link>
    <description> &lt;p&gt;You can use stored procedure for prevent SQL injections. I have tried stores procedures in MS SQL and it working fine when SQL injection queries applied.&lt;/p&gt;
 </description>
     <pubDate>Fri, 12 Aug 2011 05:29:52 +0000</pubDate>
 <dc:creator>stonecold</dc:creator>
 <guid isPermaLink="false">comment 1268087 at https://www.webmaster-forums.net</guid>
  </item>
  <item>
    <title>A MySQL injection attack</title>
    <link>https://www.webmaster-forums.net/web-database-development/how-prevent-mysql-injection-forms#comment-1267686</link>
    <description> &lt;p&gt;A MySQL injection attack occurs only when the user has permission to write something that is used as part of a query? &lt;/p&gt;
&lt;p&gt;What about the ways in which the user can only select the radio button / checkbox / drop-down lists .. They can not really do many things SQL?&lt;/p&gt;
 </description>
     <pubDate>Mon, 01 Aug 2011 08:13:18 +0000</pubDate>
 <dc:creator>SEO Company</dc:creator>
 <guid isPermaLink="false">comment 1267686 at https://www.webmaster-forums.net</guid>
  </item>
  </channel>
</rss>
