Introduction - If you have any usage issues, please Google them yourself
Early stage of development of database injection techniques for web applications, web page back door via the web backdoor can execute instructions to further penetrate the network, along with the development of database injection techniques, and database features and the database itself formed through the injection technique. Database injection techniques have been formed from the previous web page back door into the formation of the system back door of the interactive shell of the remote system. Database injection technology development trend of the development with the development of the database itself, the injection itself is to use the features of the database because the database.