Bypass site protection by means SQL injections and protection against them.

Keywords: SQL injection, database, site, PDO.

Abstract

The article reveals the essence of unauthorized access to the web-site database; possibilities of using SQL-injections; ways to protect against unauthorized intrusion; POD advantages and disadvantages.

References

Addison Berry, Angela Byron, Bruno De Bondt. Using Drupal (2nd Edition). – O'Reilly. 2012. – 500p.

Al-Darwish, N.: Page Gen: An Effective Scheme for Ddynamic Generation of Web Pages. Information and Software Technology 45(10), 15 July 2003, Pages 651-662

Cynthia McCourt. Drupal: The Guide to Plainning and Building Websites. – Wrox. 2011. – 504 p.

Douglas Vernon Denny. Drupal 7 Webform Cookbook. – Packt Publishing. 2012. – 276 p.

FabienPotencier. TemplatingEnginesin PHP (переклад), Templatingenginesin PHP – Follow-Up (переклад)

Jennifer Hodgdon. A Programmer's Guide to Drupal. – O'Reilly. 2012. – 114p.

Ric Shreves, Brice Dunwoodie. Drupal 7 Bible. – Wiley. 2011. – 768 p.

Smarty 3.1.29 Released – 2015.

Trevor James. Migrating to Drupal 7. – Packt Publishing. 2012. – 158p.

http://anton.shevchuk.name/php/php-template-engin/

https://drudesk.com.ua/blog/funktsionalni-mozhlyvosti-twig

ZhangZhuo, The SQL injection attack technology and preventive measures research, 2-4 2007.01.

ZhouWenYu, Based on preventing SQL injection network security technology analysis and application, 43-50 2010.06.

Xiaozhu The SQL;1; injection into holes of ASP too mystierious full contact, 2005.01.

Abstract views: 140
PDF Downloads: 251
Published
2020-05-19
How to Cite
Kostiuchko , S., Sahniuk А., & Melnyk К. (2020). Bypass site protection by means SQL injections and protection against them . COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, (39), 136-140. https://doi.org/10.36910/6775-2524-0560-2020-39-23
Section
Computer science and computer engineering