Answer Posted / vinod
When a haker gives input like username = vinod@gmail.com and
password = a' or 'x' = 'x-- than user name will be accepted
and password x=x will always true so system can allow to
haker to login.
Is This Answer Correct ? | 2 Yes | 1 No |
Post New Answer View All Answers
What are two types of transaction supported by ado.net?
What is difference between connected and disconnected architecture in ado.net?
How to bind the controls(best practice) comboboxes to the data in the dataset?
Which keyword is used to accept variable number of parameters?
Which property is used to check whether a DataReader is closed or opened?
What is two way data binding android?
What are ado.net objects?
Define bubbled event?
What are the pre-requisites for connection pooling?
Explain the difference between sqlcommand object and command behavior object?
What is adodb dll?
What are the different execute methods of Ado.Net?
What are the different namespaces used in the project to connect the database? What data providers available in .net to connect to database?
What is ado data control?
Where is adodb dll located?