C # anti-SQL Injection for like condition during SQL statement Splicing

Source: Internet
Author: User

C # anti-SQL Injection for like condition during SQL statement Splicing

This afternoon, my colleague asked me a basic question. What should I do if I encounter Like when splicing SQL statements.

My original writing method was simple concatenation of strings. Later, my colleague asked me what to do if I encountered SQL injection. This is indeed a problem.

I just found related instructions on the Internet. It was originally written in this way.

Such as an SQL statement:

Select * from game where gamename like '% three %'

In c # format:

String keywords = "James"; StringBuilder strSql = new StringBuilder (); strSql. append ("select * from game where gamename like @ keywords"); SqlParameter [] parameters = new SqlParameter [] {new SqlParameter ("@ keywords ", "%" + keywords + "% "),};

Although % is used here, it is quite simple and practical to filter SQL Injection effectively.

It is a small knowledge point and I hope it will help you! Pai_^

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.