SQL injection vulnerabilities are often been described as the most serious threat for Web applications, regardless of what language they are written in . Web applications that are vulnerable to…
Here’s how to pass the arguments to MySQL to restore from a Dump: mysql [database name] < [backup file name] The “[database name]” specifies the name of the database to…
I recently was working with a 3rd party DB that was designed well and used lots of foreign keys to enforce referential integrity. Unfortunately, the application that used the DB…
I am one of the unfortunate many who’s name is in the FBI’s Terrorist Screening Database, also known as the Terrorist Watch List. What this means is that when I…