Good point Charles. But there are ways to mitigate that exposure.
- check SYSCOLUMNS for the name of the 'field' in that particular 'file'
That kills two of the three points of attack.


Rob Berendt




Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2015 by MIDRANGE dot COM and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available here. If you have questions about this, please contact