How SQL Injection works and how a hacker could take advantage of it.

Published --