<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments on: Avoiding SQL Injection	</title>
	<atom:link href="https://blog.xojo.com/2016/02/18/avoiding-sql-injection/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.xojo.com/2016/02/18/avoiding-sql-injection/</link>
	<description>Blog about the Xojo programming language and IDE</description>
	<lastBuildDate>Thu, 10 Oct 2019 18:35:43 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>
		By: Database Usage with Web Apps &#8211; Xojo Blog		</title>
		<link>https://blog.xojo.com/2016/02/18/avoiding-sql-injection/#comment-34</link>

		<dc:creator><![CDATA[Database Usage with Web Apps &#8211; Xojo Blog]]></dc:creator>
		<pubDate>Thu, 07 Jul 2016 00:09:11 +0000</pubDate>
		<guid isPermaLink="false">http://blogtemp.xojo.com/2016/02/18/avoiding-sql-injection/#comment-34</guid>

					<description><![CDATA[[&#8230;] to remember is that because a web app can be accessed by many more users it is more susceptible to SQL Injection. To limit your exposure here, you should always use SQL Prepared Statements with any SQL statements [&#8230;]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] to remember is that because a web app can be accessed by many more users it is more susceptible to SQL Injection. To limit your exposure here, you should always use SQL Prepared Statements with any SQL statements [&#8230;]</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
