* SQL Injection: Is a technique used to obtain, read and modify information/data from applications. This can be done by inserting or injecting a SQL query via the input data from an application.
* Remote Command Execution: This allows an attacker to execute operating system commands due to inadequate input validation. When attackers gain access to the system, they can execute commands from remote locations.
* Weak Authentication and Authorization: Authentication mechanisms that don’t prohibit multiple failed logins can be attacked. When an attacker gains access to login information, he/she can have full access to documents, emails, pictures, ability toputer settings, etc.
桃子° 发表于 2013-5-29 08:23 static/image/common/back.gif
谢谢你的回复
呵呵!#24#
怒伯 发表于 2013-5-29 11:54 static/image/common/back.gif
* SQL Injection: Is a technique used to obtain, read and modify information/data from applications....
谢谢你的回复
.。。。。。。。。。
小影 发表于 2013-5-29 12:57 static/image/common/back.gif
.。。。。。。。。。
谢谢你的回复
·······
474664978 发表于 2013-5-29 13:09 static/image/common/back.gif
·······
谢谢你的回复
-,--,-
nhxmars 发表于 2013-5-29 13:10 static/image/common/back.gif
谢谢你的回复
。。