* SQL Injection: Is a technique used to obtain, read and modify information/data from applications. This can be done by inserting or injecting a SQL query via the input data from an application.
* Remote Command Execution: This allows an attacker to execute operating system commands due to inadequate input validation. When attackers gain access to the system, they can execute commands from remote locations.
* Weak Authentication and Authorization: Authentication mechanisms that don’t prohibit multiple failed logins can be attacked. When an attacker gains access to login information, he/she can have full access to documents, emails, pictures, ability toputer settings, etc.				
			
		桃子° 发表于 2013-5-29 08:23 static/image/common/back.gif
谢谢你的回复
呵呵!#24#				
			
		怒伯 发表于 2013-5-29 11:54 static/image/common/back.gif
* SQL Injection: Is a technique used to obtain, read and modify information/data from applications....
谢谢你的回复				
			
		.。。。。。。。。。				
			
		小影 发表于 2013-5-29 12:57 static/image/common/back.gif
.。。。。。。。。。
谢谢你的回复				
			
		·······				
			
		474664978 发表于 2013-5-29 13:09 static/image/common/back.gif
·······
谢谢你的回复				
			
		-,--,-				
			
		nhxmars 发表于 2013-5-29 13:10 static/image/common/back.gif
谢谢你的回复				
			
		。。