Discussion in 'Server Administration' started by gkumar, Dec 8, 2009.
How to implement database security ?
SQL injection and buffer overflows are database vulnerabilities that have been exploited for more than a decade, yet they remain common attack vectors in compromising database systems, even when patches and workarounds exist. Attackers also burrow their way in using default user account names and passwords; all the while, database administrators and IT professionals complain about the costs of provisioning user accounts.
Separate names with a comma.