by Asim K
When I was in High School, I had an acquaintance who, it seemed, was vehemently active in the online hacking community. During sophomore year, I joined his online hacking community online because, at the time, I thought hackers were one of the coolest people on the planet. To create with permission is one thing, but to destroy regardless of permission is another: it is a display of ones power. One of the basic hacking techniques he explained to me was SQL injection. At the time, I had no idea what a database was and what SQL was so it was tough for me to grab the concepts. Although I tried to learn, I felt like I was trying to land further than I could jump, and going at a pace that was too advanced for me – what eventually happened is that the online community broke apart and I lost interest. The scary part was that most of the people who were involved in the online community were high school students. These guy were passionate about their hacking, and to think a high school student could take down a large scale website is scary indeed, especially with the amount of information available freely about hacking online. This Smashing Magazine article, for example, could be used for either good or bad. Ultimately it depends on the user’s intentions.
Tellis, P. (2010, October 18). Common security mistakes in web applications. Retrieved from http://coding.smashingmagazine.com/2010/10/18/common-security-mistakes-in-web-applications/