in reply to Re^3: Preventing malicious T-SQL injection attacks
in thread Preventing malicious T-SQL injection attacks

This node falls below the community's threshold of quality. You may see it by logging in.
  • Comment on Re^4: Preventing malicious T-SQL injection attacks

Replies are listed 'Best First'.
Re^5: Preventing malicious T-SQL injection attacks
by davorg (Chancellor) on Mar 05, 2007 at 16:05 UTC

    You can question whatever you want. It's your code, after all.

    But you need to know the number of parameters in order to create an SQL string with the correct number of placeholders. So DBI checks the number of parameters for you for free.

    You get an extra layer of defensive programming for no cost. I can't see any reason why you wouldn't want to make use of it.

    A reply falls below the community's threshold of quality. You may see it by logging in.