How to software use database security? [message #656707] |
Sat, 15 October 2016 01:37 |
|
datasunrise492
Messages: 1 Registered: October 2016
|
Junior Member |
|
|
Use of software database security Databases have been largely secured against hackers through network security measures such as firewalls, and network-based intrusion detection systems. While network security controls remain valuable in this regard,
|
|
|
|
|
|
Re: How to software use database security? [message #656730 is a reply to message #656728] |
Sun, 16 October 2016 04:00 |
|
Littlefoot
Messages: 21823 Registered: June 2005 Location: Croatia, Europe
|
Senior Member Account Moderator |
|
|
Well, that's what you think. I, on the other hand, KNOW that you're wrong "While" is supposed to be "while", because (now I'm playing smart) the whole message looked like unfinished copy/paste of some article. That just doesn't sound like a new forum member's initial message, especially if you look at the IP address location.
I was wrong, however, as I thought that it must be some kind of spam, advertising who-knows-what exactly - maybe not in the message body itself, but listed as OP's hobby, web page or something similar.
So: the origin of that message is on Wikipedia, Database security (search that page for "hackers" and you'll see it). The bottom line is: I have no idea what should be this message's purpose.
Looking forward to see what another Sherlock manages to conclude.
|
|
|
|
|