Aditya Ladadityaladblog.hashnode.dev·Feb 27, 2024SQL injection attackIntroduction:- It involves inserting SQL Queries through user input to manipulate the database. Successful exploitation can result in: Reading sensitive data from the database. Modifying database entries through insert, update, or delete operati...Discuss·10 likes·31 reads#sqlinjection
Stephen Collinssteve555.hashnode.dev·Feb 3, 2024Basic Security Practices for SQLite: Safeguarding Your DataSQLite, a lightweight and widely-used database engine, offers convenience and simplicity for many applications, but as with any data storage solution, security is paramount. This post provides a basic introduction into some essential security practic...DiscussSQLite
Divij Sharmadvjsharma.hashnode.dev·Jan 30, 2024Building a Safer MERN App: Simple Steps for Strong SecurityIn today's digital era, small businesses are increasingly transitioning online, and web-based platforms offer significant advantages. As a result, developers often turn to the MERN stack (MongoDB, Express.js, React, Node.js) for building full-stack w...Discuss·2 likes·38 readsXSS Attacks
Pawan Dubeypawanadubey.hashnode.dev·Jan 7, 2024Easy Database Backups with PostgreSQL: Meet pg_dump and pg_restore!PostgreSQL, the data wizard of databases, comes with two awesome tools—pg_dump and pg_restore. These tools make backing up and restoring your data a piece of cake. Let's take a simple journey to understand these PostgreSQL gems! What's the Deal with ...Discuss·1 like·47 readsPostgreSQLBackup
Haneunhanlee.hashnode.dev·May 11, 2023Web Hacking: SQL injectionWeb Hacking: SQL injection Definition SQL injection is a technique where malicious SQL queries are inserted to attack a database system, allowing for data extraction, tampering, authentication bypass, and more. Pre-Attack Checklist SQL Injection Data...Discuss·31 readsProgrammingSQL Injection
aberds abingaberds1203.hashnode.dev·Mar 14, 2023Strategic database security behind the scenesSecuring databases is an ongoing challenge for organizations, especially with the ever-evolving nature of information technology. Whether it's a financial services company managing customer data or a manufacturer dealing with intellectual property, b...Discuss#cybersecurity