Articles tagged SQL

A Quick Way to Help Optimise MySQL Databases
The ANALYSE() procedure built into MySQL can give you a wealth of information about your database tables, making it easy to find out which tables need optimising. Read more – ‘A Quick Way to Help Optimise MySQL Databases’.
Apache Ant Best Practices
Before Ant, building and deploying web applications required a series of scripts or manual processes, which often led to mistakes. Apache Ant is a software tool for automating software build processes. It is similar to Make but is implemented using the Java language, requires the Java platform, and is best suited to building Java projects. However, that doesn’t mean it is restricted to Java projects. I use Ant increasingly for all my web development projects as it is an integral part of Eclipse, my IDE of choice. It makes building applications and releasing them across different servers far more efficient and less problematic. Read more – ‘Apache Ant Best Practices’.
Secure Your Application – PCI DSS Specifications
PCI DSS stands for Payment Card Industry Data Security Standard, and is a worldwide security standard assembled by the Payment Card Industry Security Standards Council (PCI SSC). The PCI security standards are technical and operational requirements that were created to help organizations that process card payments prevent credit card fraud, hacking and various other security vulnerabilities and threats. The standards apply to all organizations that store, process or transmit cardholder data – with guidance for software developers and manufacturers of applications and devices used in those transactions. A company processing, storing, or transmitting cardholder data must be PCI DSS compliant. Read more – ‘Secure Your Application – PCI DSS Specifications’.
SQL User-Defined Function: ListToTable
A common need in SQL is the ability to iterate over a list as if it were an array. In SQL it is not possible to declare arrays, unlike other programming languages such as ColdFusion, ActionScript and Java. Fortunately, there is a way around this problem: use a User-Defined Functions (UDFs) to create a tabular version of the data. Arrays are, after all, essentially tabular data (at their simplest, one dimension level). Read more – ‘SQL User-Defined Function: ListToTable’.
SQL User-Defined Function: ReplaceChars
The SQL Replace function enables us to look for a certain character phrase in a string and replace it with another character phrase. The updated string is then returned by the function. Read more – ‘SQL User-Defined Function: ReplaceChars’.
Preventing SQL Injection in an AIR Application
SQLite is a mostly ACID-compliant relational database management system contained in a relatively small (~500kB) C programming library. The Adobe AIR runtime includes the SQLite embedded database for use by Adobe AIR applications. This allows applications to run and store data locally and or synchronise the datastore with online repositories. Read more – ‘Preventing SQL Injection in an AIR Application’.
How to Protect Your Website from a Malicious Attack
Every seasoned developer will know that protecting your website from a hacker is a top priority, whether for your own reputation or for maintaining your company's reputation and log-term revenue prospects. Read more – ‘How to Protect Your Website from a Malicious Attack’.
How to Fix a SQL Injection Attack
In my previous post, What is a SQL Injection Attack, I gave a brief overview of SQL injection and Cross-Site Scripting (XSS), primarily with regard to websites. In the example given, we saw that an attack could take the form of a ‘hacked’ URL which contained either a literal SQL statement, or a hexadecimal string that could be interpreted by an insecure SQL database server. Read more – ‘How to Fix a SQL Injection Attack’.
What is a SQL Injection Attack
Over the past few weeks, subversive elements in the international arena have decided that attacking websites is a fun thing to do! The online world has become the new battle ground between nations vying to de-stabilise rivals. This may seem all very Jack Bauer, but we are increasingly seening ‘SQL injection attacks’ eminating from countries such as Russia, China and North Korea. Of course, that doesn’t mean our countries aren’t doing the same in return, but we only see the results from foreign-based attacks. Read more – ‘What is a SQL Injection Attack’.
Are these Contenders for Acquisition by Adobe?
Adobe has progressively been developing an online presence with Buzzword, Share, Brio and Photoshop Express. But the online presence falls short of important spreadsheet and presentation applications. So who could the contenders be? Here are two extremely promising applications built on the Flash platform Read more – ‘Are these Contenders for Acquisition by Adobe?’.