[go: up one dir, main page]

Anley, 2004 - Google Patents

Hackproofing MySQL

Anley, 2004

View PDF
Document ID
4357725343728696680
Author
Anley C
Publication year
Publication venue
An NGSSoftware Insight Security Research (NISR) Publication

External Links

Snippet

MySQL claims to be the world's most popular open source database, and with good reason. It is free, runs on a wide variety of platforms, is relatively simple, easy to configure and performs well even under significant load. By comparison to some other popular database …
Continue reading at www.nccgroup.com (PDF) (other versions)

Similar Documents

Publication Publication Date Title
JP5941872B2 (en) Systems and methods for authentication, data transfer and phishing protection
EP3430557B1 (en) System and method for reverse command shell detection
Parampalli et al. A practical mimicry attack against powerful system-call monitors
US10552603B2 (en) Malicious mobile code runtime monitoring system and methods
US8474032B2 (en) Firewall+ storage apparatus, method and system
EP2748751B1 (en) System and method for day-zero authentication of activex controls
US7512977B2 (en) Intrustion protection system utilizing layers
Chien et al. Blended attacks exploits, vulnerabilities and buffer-overflow techniques in computer viruses
US12406060B2 (en) Automated interpreted application control for workloads
US20110119484A1 (en) Systems and Methods for Securely Providing and/or Accessing Information
Sharif Web attacks analysis and mitigation techniques
Onarlioglu et al. Sentinel: Securing legacy firefox extensions
US12050681B2 (en) Software build system protection engine
Krishnamurthy et al. Fine-grained privilege separation for web applications
US11409878B2 (en) Trusted sequence for computing devices via hashes
Guimarães Advanced SQL injection to operating system full control
AU2014200698B2 (en) A computer-implemented method for detecting domain injection or evasion
Safford et al. A trusted linux client (tlc)
Anley Hackproofing MySQL
Catuogno et al. A format-independent architecture for run-time integrity checking of executable code
Liu et al. A trusted integrity measurement architecture for securing enterprise network
Mustafa et al. Oracle Database Threats
Desimone Windows credential theft: Methods and mitigations
WO2001061473A1 (en) Computer security using dual functional security contexts
Singaravelu et al. Enforcing configurable trust in client-side software stacks by splitting information flow