"SQL injections" tag
Web Exploitation

Cyber Attacks Explained: Web Exploitation

Websites are no longer merely about having an “Internet presence” today, but are also used for commercial transactions and to transfer sensitive data. Such wide usage helps crackers gain more knowledge on vulnerabilities…

PostgreSQL

IT Service Provider Turns to PostgreSQL for Scalability

A S Kumaresan, an Enterprise DB contest winner, tells LINUX For You why PostgreSQL was an obvious choice for an ICT provider. When a client entrusts its database to an IT service provider,…

Securing Database Servers

Securing Database Servers

With the ever-expanding data requirements for Web applications, database administrators often configure security parameters at the OS and database layer. Unfortunately, administrators seldom consider implementing security at a network layer to protect the…

SQL or No?

Up Close and Personal with NoSQL

Aimed at Web developers, DBAs, programmers, et al., this article covers the basic concepts about NoSQL databases, the different types and their features. When you think of choosing a database for your application…

Lock it up!

Securing Apache, Part 1: The Basics

Targeted at readers with Web security concerns, information security experts, systems administrators and all those who want to jump-start their careers in Web security, this series of articles intends to cover the strengthening…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.