Methodology and Analysis for Various SQL Injection Techniques
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 4
Abstract
Now day’s online transaction is done by most of web applications. These applications have vulnerabilities which make its security weak. Every application has provided authentication and authorization functionality, security remains an issues. SQL injection is a technique which gives access to backend database without valid credentials. SQL injection technique has been discovered with new innovative method. This paper presents analysis of various new methodologies of SQL injection, their preventions and its vulnerabilities. We experimented on various methodology of this attack with various applications and analyzed its prevention strategies for programmer of web applications.
Authors and Affiliations
Antveer Kaur
Review paper of Character recognition using image processing
The paper proposes a system for gesture or hand images recognition to provide a easy method for communication between deaf-dump and vocal people it allow the user to deal with the system in a natural way. The hand can be...
An SMS and USSD Model for Locationbased Mobile Advertising
The use of mobile phones to deliver context specific information in the form of advertisements tailored to a user’s profile, location among other related characteristics has been on the increase in the last few years. Lo...
CONTENT WRITING IN THE 21ST CENTURY -INFORMATION NEEDS, CHALLENGES AND OPPORTUNITIES: AN OVERVIEW
Content writing and SEO are new generation jobs in Information Technology. This paper give a basic idea about content writing, its scope, general jobs of a content writer, basic qualifications, challenges, opportunities...
Enhancing Security System of Short Message Service for M-Commerce in GSM
Global System for Mobile (GSM) is a second generation cellular standard developed to cater voice services and data delivery using digital modulation. Short Message Service (SMS) is the text communication service componen...
Routing and Security in Self Organizing Mobile Ad Hoc Networks (MANET): Challenges and Solutions
Ad hoc networks in general have to deal with a highly decentralized as well as a continuously changing topology due to the mobility of the nodes. MANET is not a new paradigm in wireless community. The technology is quite...