常見例句雙語例句This method removes the potential for an SQL injection attack.這種方法消除了 SQL 注入攻擊的可能性。Like the SQL injection attack, you can often easily deal with the threat if you follow best practices to develop secure applications.與 SQL 注入攻擊類似,如果使用最佳實踐開發(fā)安全的應(yīng)用程序,通常可以輕松地處理該威脅。Here is how an SQL injection works: First, assume an SQL statement accepts user-supplied data to look up a team member's contact information from a database without input validation rules.下面是 SQL 注入的工作方式:首先,假設(shè)一條 SQL 語句接受用戶提供的數(shù)據(jù),沒有輸入確認規(guī)則就可在數(shù)據(jù)庫中查找團隊成員的聯(lián)系信息。權(quán)威例句It appears that the old SQL Injection hack is still alive and well or at least it seems that way.FORBES: LulzSec Hackers Finally Explain ThemselvesThey add that SonyPictures.com was breached using a simple SQL injection technique.FORBES: LulzSec Hackers Purge SonyPictures.com, Say 1 Million User Accounts CompromisedYet, the continuing vulnerability of Web-facing applications made SQL injection one of the most common forms of attack against websites at the time.FORBES: The Hidden IT Security Threat: Multifunction Printers 返回 SQL injection