Posts

Showing posts from April, 2021

What is SQL Injection (SQLi) and How to Prevent It

Image
What is SQL Injection (SQLi) and How to Prevent It SQL Injection (SQLi) is a type of an  injection attack  that makes it possible to execute malicious SQL statements. These statements control a database server behind a web application. Attackers can use SQL Injection vulnerabilities to bypass application security measures. They can go around authentication and authorization of a web page or web application and retrieve the content of the entire SQL database. They can also use SQL Injection to add, modify, and delete records in the database. An SQL Injection vulnerability may affect any website or web application that uses an SQL database such as MySQL, Oracle, SQL Server, or others. Criminals may use it to gain unauthorized access to your sensitive data: customer information, personal data, trade secrets, intellectual property, and more. SQL Injection attacks are one of the oldest, most prevalent, and most dangerous web application vulnerabilities. The OWASP organization (Open Web Appl

How to be hacker?

Image
  In computer security, a hacker is someone who focuses on security mechanisms of computer and network systems. There are communities and shared cultures of expert programmers and networking wizards that trace its history back through decades to the first time-sharing minicomputers and the earliest ARPAnet experiments. The members of this culture were the first "hackers." Breaking into computers and phone systems have come to symbolize hacking in popular culture, but this culture is much more complicated and moralistic than most people know. To become a hacker, learning basic hacking techniques, how to think like a hacker, and how to gain respect within the ethical hacking community. [1] Part  1  of 3: Learning Fundamentals 1 Run a UNIX-like OS, such as  Linux . UNIX and UNIX-like operating systems are the operating systems of the Internet. While you can learn to use the Internet without knowing UNIX, you can't be an Internet hacker without understanding UNIX. For this re