It is a vulnerability in database queries, allow hackers to inject some logical code to get the expected output from the database.
There are different ways we perform SQL injection depends on structure and usage, for now, we will see the vulnerability in login queries. We will see what actually happen when hacker inject the code. What Programmer actually do wrong? and how to fix that?
Continue reading “In & Out of SQL Injection”
Hey, does your Linux operating system taking too much time to boot? So, here we are, going to reduce booting time of the system.
So what happens in the boot? It starts multiple services, Those services can have numerous errors, so it takes time to try again and again to start that service until it reaches some threshold or some of the services may not be that useful.
Continue reading “Reduce Booting Time of Operating System”