On Thursday 19 April 2007 08:37:34 Amos Shapira wrote:
> On 19/04/07, Adam Kennedy <[EMAIL PROTECTED]> wrote:
> > The biggest example is probably SQL placeholders, which pretty much
> > remove any chance of SQL injections attack in one fell swoop.
> >
> > I know for DBI it's very difficult to do any non-trivial work without
> > using them.
>
> I was just bitten (again) by the lack of support for these in the
> MS-SQL DBI interface.
> Is there another implementation which allows using place holders with
> MS SQL (2005)?

I wasn't following the beginning of the thread, but if you are referring to 
perl's DBI, then it does support place holders:
http://search.cpan.org/~mewp/DBD-Sybase-1.07/Sybase.pm#Using_%3F_Placeholders_%26_bind_parameters_to_%24sth-%3Eexecute

Also, if the perl requirement can be lifted, I've used PHP's PDO extensively 
(though not with MS-SQL) and it also support place holders rather nicely - 
actually, better IMO then other implementations as the place holders are 
named in the query and you don't have to guess which question mark is 
responsible for which variable, like you have to with other implementations.

-- 
Oded 

=================================================================
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word "unsubscribe" in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]

Reply via email to