<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:wfw="http://wellformedweb.org/CommentAPI/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:atom="http://www.w3.org/2005/Atom"
    xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    >

<channel>
    <title>Webmonkey &#187; Databases</title>
    <atom:link href="http://www.webmonkey.com/tag/databases/feed/" rel="self" type="application/rss+xml" />
    <link>http://www.webmonkey.com</link>
    <description>The Web Developer&#039;s Resource</description>
    <lastBuildDate>Mon, 06 May 2013 17:29:19 +0000</lastBuildDate>
    <language>en-US</language>
    <sy:updatePeriod>hourly</sy:updatePeriod>
    <sy:updateFrequency>1</sy:updateFrequency>
    <generator>http://wordpress.org/?v=3.4.2</generator>
    
    <item>
        <title>XSS Vulnerabilities, Raw SQL Top List of Common Programming Errors</title>
        <link>http://www.webmonkey.com/2010/03/xss-vulnerabilities-raw-sql-top-list-of-common-programming-errors/</link>
        <comments>http://www.webmonkey.com/2010/03/xss-vulnerabilities-raw-sql-top-list-of-common-programming-errors/#comments</comments>
        <pubDate>Wed, 24 Mar 2010 18:24:21 +0000</pubDate>

                <dc:creator>Scott Gilbertson</dc:creator>

        <guid isPermaLink="false">http://www.webmonkey.com/?p=46976</guid>
        		<category><![CDATA[Programming]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Databases]]></category>
		<category><![CDATA[Web Apps]]></category>
		<category><![CDATA[xss]]></category>
            <enclosure url="http://www.webmonkey.com/wp-content/uploads/2010/03/bobbytables.jpg" type="image/jpeg" length="48000" />
                    <description><![CDATA[<div class="rss_thumbnail"><img src="http://www.webmonkey.com/wp-content/uploads/2010/03/bobbytables.jpg" alt="XSS Vulnerabilities, Raw SQL Top List of Common Programming Errors" /></div>No programmer is perfect, but some mistakes are more dangerous than others. While some mistakes might just slow down your site, others can open up vulnerabilities that expose your code, your database and even your users to all manner of attack. To help you identify the more serious errors common in programs of all types, [...]]]></description>

            <content:encoded><![CDATA[<p><!-- wpautop enabled -->
<p><a href="http://xkcd.com/327/"><img src="http://www.webmonkey.com/wp-content/uploads/2010/03/bobbytables-300x176.jpg" alt="bobbytables" title="bobbytables" width="300" height="176" class="alignleft size-medium wp-image-46975" /></a>No programmer is perfect, but some mistakes are more dangerous than others. While some mistakes might just slow down your site, others can open up vulnerabilities that expose your code, your database and even your users to all manner of attack.</p>
<p>To help you identify the more serious errors common in programs of all types, a group of top software security experts in the US and Europe have released their <a href="http://cwe.mitre.org/top25/">Top 25 Most Dangerous Programming Errors</a>.</p>
<p>Unsurprisingly, cross-site scripting vulnerabilities and improperly handled SQL top the list of common and dangerous mistakes. Remember kids, sanitize your database inputs; you just never know when someone is going to name their child: &#8220;Robert&#8217;) DROP TABLE Students;&#8221;</p>
<p>While not all the errors in the list are common in web programming, some of the more serious things are concerns for web developers &#8212; cross-site request forgeries, missing encryption of sensitive data and unrestricted file uploads are all common web programming issues.</p>
<p>Also interesting is the <a href="http://cwe.mitre.org/top25/profiles.html#ProfileLang">weaknesses by language</a> section, which breaks down common mistakes in PHP, Java, Perl and C/C++. No doubt web developers would like to have seen Python and Ruby in that list, but it should at least be useful for PHP and Perl programmers.</p>
<p><strong>See Also:</strong><br/></p>
<ul>
<li><a href="http://www.webmonkey.com/2009/04/oauth_security_exploit_tests_limits_of_open_web_standards/">OAuth Security Exploit Tests Limits of Open Web Standards</a></li>
<li><a href="http://www.webmonkey.com/2010/01/creating_a_better_privacy_policy/">Warning: This Site May Be Sharing Your Data</a></li>
<li><a href="http://www.webmonkey.com/2007/09/google_wants_global_privacy_rules/">Google Wants Global Privacy Rules</a></li>
</ul>
<div id='linker_widget' class='contextly-widget'></div>]]></content:encoded>
            <wfw:commentRss>http://www.webmonkey.com/2010/03/xss-vulnerabilities-raw-sql-top-list-of-common-programming-errors/feed/</wfw:commentRss>
        <slash:comments>3</slash:comments>

        
    </item>
    
    <item>
        <title>Data Binding</title>
        <link>http://www.webmonkey.com/2010/02/data_binding/</link>
        <comments>http://www.webmonkey.com/2010/02/data_binding/#comments</comments>
        <pubDate>Mon, 15 Feb 2010 20:45:47 +0000</pubDate>

                <dc:creator>Webmonkey Staff</dc:creator>

        <guid isPermaLink="false">http://stag.wired.com/primate/?p=95</guid>
        		<category><![CDATA[Glossary]]></category>
		<category><![CDATA[Backend]]></category>
		<category><![CDATA[Databases]]></category>
		<category><![CDATA[wiki]]></category>
        <description><![CDATA[As a computer science term, data binding is the substitution of a real value in a program after it has been compiled. For example, during compilation a compiler can assign symbolic addresses to certain variables or instructions. When the program is bound, or linked, the binder replaces the symbolic addresses with real machine addresses. The [...]]]></description>

            <content:encoded><![CDATA[<!-- wpautop disabled --><p>As a computer science term, data binding is the substitution of a real value in a program after it has been compiled.

</p><p>For example, during compilation a compiler can assign symbolic addresses to certain variables or instructions. When the program is bound, or linked, the binder replaces the symbolic addresses with real machine addresses. The moment at which binding occurs is called &#8220;bind time&#8221; or &#8220;link time.&#8221; In dHTML, data binding allows the client to look into a database and retrieve the content. This data can be automatically displayed in your table using the HTML data binding extensions, or you can manipulate the data with a <a href="/2010/02/Script" title="Reference:Script">script</a>.

</p><div id='linker_widget' class='contextly-widget'></div>]]></content:encoded>
            <wfw:commentRss>http://www.webmonkey.com/2010/02/data_binding/feed/</wfw:commentRss>
        <slash:comments>1</slash:comments>

        
    </item>
    
    <item>
        <title>SQL Basics: Four Reasons Never to Select All</title>
        <link>http://www.webmonkey.com/2008/07/sql_basics_four_reasons_never_to_select_all/</link>
        <comments>http://www.webmonkey.com/2008/07/sql_basics_four_reasons_never_to_select_all/#comments</comments>
        <pubDate>Mon, 28 Jul 2008 06:05:27 +0000</pubDate>

                <dc:creator>Adam Duvander</dc:creator>

        <guid isPermaLink="false">http://www.webmonkey.com/blog/sqlbasicsfourreasonsnevertoselectall</guid>
        		<category><![CDATA[Programming]]></category>
		<category><![CDATA[Web Basics]]></category>
		<category><![CDATA[Databases]]></category>
		<category><![CDATA[sql]]></category>
        <description><![CDATA[Have you ever written a database call that went something like&#8230; select * from posts where id=3;? We probably all have, but it&#8217;s bad for several reasons. Four of them, according to a programmer that goes by pizza_milkshake. To database administrators and advanced programmers, this may not come as news. Even many seasoned coders could [...]]]></description>

            <content:encoded><![CDATA[<p><!-- wpautop enabled --><img class="blogimg" src="http://howto.wired.com/mediawiki/images/Selectstar-error.png" alt="Select error" />Have you ever written a database call that went something like&#8230; <em>select * from posts where id=3;</em>? We probably all have, but it&#8217;s bad for several reasons. <a href="http://parseerror.com/sql/select*isevil.html">Four of them</a>, according to a programmer that goes by pizza_milkshake.</p>
<p>To database administrators and advanced programmers, this may not come as news. Even many seasoned coders could use a reminder not to be lazy.</p>
<p><strong>pizza_milkshake&#8217;s Four Reasons Not to Select All</strong>
<ol>
<li>If you include the field names, your code is self-documenting</li>
<li>When a field name changes, you want to know with a query error, not later</li>
<li>Asking for more than you need is just wasting resources</li>
<li>Without naming the fields, you can&#8217;t be certain of the order you&#8217;ll receive them</li>
</ol>
<p>I hope these reasons are good enough to encourage your next query to not start <em>select *</em>.</p>
<p><strong>See also:</strong></p>
<ul>
<li><a href="/2010/02/Manage_Transactions_in_MySQL_-_Lesson_1"> Manage Transactions in MySQL</a></li>
<li><a href="http://www.webmonkey.com/blog/Amazon_SimpleDB%3A_Your_Database_in_the_Cloud">Amazon SimpleDB: Your Database in the Cloud</a></li>
<li><a href="http://www.webmonkey.com/blog/Drizzle_Wants_to_Make_MySQL_Sizzle">Drizzle Wants to Make MySQL Sizzle</a></li>
</ul>
<div id='linker_widget' class='contextly-widget'></div>
]]></content:encoded>
            <wfw:commentRss>http://www.webmonkey.com/2008/07/sql_basics_four_reasons_never_to_select_all/feed/</wfw:commentRss>
        <slash:comments>0</slash:comments>

        
    </item>
    </channel>
</rss>
