Answer the question
In order to leave comments, you need to log in
Whether SQL Injections such variant of protection is possible?
Recently I found this method of protection, can you comment on what its disadvantages
are and if there is a much better option, can you share it?) The point
is to check the request for the presence of basic commands for SQL queries and if it is,
then interrupt the execution
Answer the question
In order to leave comments, you need to log in
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question