Useful SQL Injection Info
May 27, 2009
At Los Alamos National Lab several years ago, a fellow speaker for an in-house conference gave a brilliant analysis of SQL injection. The talk was not made public. I came across a Bitpipe white paper from Breach. I have a Bitpipe user name and password, so locating the document was no problem. If you don’t have access to Bitpipe, click here, fill out the form, and download the seven page document. Useful.
Stephen Arnold, May 27, 2009
Share this:
Written by Stephen E. Arnold · Filed Under Enterprise, News, Security
Comments
One Response to “Useful SQL Injection Info”
Search the site
-
Feature archive
News archive
Stephen E. Arnold monitors search, content processing, text mining and related topics from his high-tech nerve center in rural Kentucky. He tries to winnow the goose feathers from the giblets. He works with colleagues worldwide to make this Web log useful to those who want to go "beyond search". Contact him at sa [at] arnoldit.com. His Web site with additional information about search is arnoldit.com.
Categories
- 3D-Printing
- Acquisition
- Advertising
- Aggregation
- AI
- Alexa
- algorithms
- Amazon
- Amazonia
- Analytics
- Appliance
- Applications
- Audio
- Augmented Reality
- Big data
- Bing
- Bitcoin
- Bitext
- Book review
- Business intelligence
- Business process
- Business strategy
- Censorship
- Cloud computing
- Company Profile
- Conferences
- Connectors
- Consulting
- Consumer
- Content processing
- Copyright
- Corporate Concerns
- Cost
- Crawl
- Crowdfunding
- cryptocurrency
- Customer support
- Cyber OSINT
- cybercrime
- cybersecurity
- Dark Web
- DarkCyber
- Data
- Data mining
- Database
- Deepfakes
- Digital Assistant
- Digital Library
- E2EE
- ECommerce
- EDiscovery
- Editorial opinion
- Education
- Emoticons
- Enterprise
- Enterprise search
- Entity extraction
- Ethics
- Faceted search
- Factualities
- Feature
- Federated search
- Financial
- Fogint
- Governance
- Government
- Hackers
- healthcare
- IBM Watson
- Image search
- Indexing
- Infrastructure
- Innovation
- Integration
- intelware
- Interface
- Internet
- Interview
- Investment
- law enforcement
- Legal matters
- Library automation
- Management
- Marketing
- Mathematics
- Metadata
- Microsoft
- Mobile
- Natural language processing
- News
- NGIA
- Online (general)
- Open Access
- Open source
- OSINT
- Osint Radar
- Overflight
- Palantir
- Patents
- Personnel
- Podcast
- Policeware
- Portals
- Predictive coding
- Privacy
- Profile
- Publishing
- Quotation
- Real time search
- Reference tool
- Rich media
- Robot Writer
- Search
- Search enabled applications
- search engine
- Search quality
- Security
- Semantic
- Sentiment analysis
- SEO
- SharePoint
- Short Honks
- Smart Technology
- Social
- Social Media
- software
- Statistics
- Taxonomy
- Technology
- Text analytics
- Text processing
- Tools
- Tor
- Training
- Translation
- Uncategorized
- Unstructured Data
- User experience
- User Interface
- Vertical search
- Video
- visualization
- Voice search
- Voice technology
- Web 3
- Web Services
- Webinar
- Windows
- Work flow
- XML
- Yahoo
-
Archives
-
Recent Posts
Meta
[…] Useful SQL Injection Info (arnoldit.com) Possibly related posts: (automatically generated)Helping the ACP Categories: Cybersecurity, Hacking, Security breach, Web, attacks, vulnerability Tags: Add new tag, Database, NASA, Plaintext, Proof of concept, Security, SQL injection, Table, vulnerability Comments (0) Trackbacks (0) Leave a comment Trackback […]