This paper provides an overview of the main SQL
Attacking Technology and the basic preventing technology.
It illustrates that when the wrong information is masked, the
SQL injection flaws are also can be used. We should also
realize that the flaws in application programs can’t be
solved only by change the setting on the servers. We must
improve the security consciousness of the developer,
strengthen the control on the code security and check every
parameter before the solution of the server. And we must
solve the injection fundamentally.