From: Syler Grey on 31 May 2007 04:25 This project is completely new and has only been online for a few weeks. I am currently updating this project daily. The examples you find on www.evilsql.com are the real syntaxes that have been verified and are being used to compromise web applications on the internet. The purpose of this project is to inform and help prevent the next compromised site. Please feel free to start a post for any questions you may have. Also please inform us of new SQL injection techniques. This project will primarily focus on Microsoft SQL and MySQL. -- Syler Grey
|
Pages: 1 Prev: Creating Linked Server to Oracle 9i - HELP! Next: Problems with T-SQL select convert |