aboutsummaryrefslogtreecommitdiff
path: root/files/ja/glossary/sql_injection
diff options
context:
space:
mode:
Diffstat (limited to 'files/ja/glossary/sql_injection')
-rw-r--r--files/ja/glossary/sql_injection/index.html4
-rw-r--r--files/ja/glossary/sql_injection/sql_inj_xss.gifbin0 -> 19077 bytes
-rw-r--r--files/ja/glossary/sql_injection/updates_loginscreen.pngbin0 -> 5780 bytes
3 files changed, 2 insertions, 2 deletions
diff --git a/files/ja/glossary/sql_injection/index.html b/files/ja/glossary/sql_injection/index.html
index 411ba6a250..eb2c325519 100644
--- a/files/ja/glossary/sql_injection/index.html
+++ b/files/ja/glossary/sql_injection/index.html
@@ -13,11 +13,11 @@ translation_of: Glossary/SQL_Injection
<p>SQL インジェクションはデータベースへの不正アクセスを行ったり、データベースから直接情報を取得することが可能です。多くのデータ侵害は SQL インジェクションによるものです。</p>
-<p><a href="http://www.acunetix.com/wp-content/uploads/2010/09/sql_inj_xss.gif"><img alt="" src="http://www.acunetix.com/wp-content/uploads/2010/09/sql_inj_xss.gif"></a></p>
+<p><a href="http://www.acunetix.com/wp-content/uploads/2010/09/sql_inj_xss.gif"><img alt="" src="sql_inj_xss.gif"></a></p>
<h2 id="How_It_Works" name="How_It_Works">攻撃動作</h2>
-<p><img alt="" src="http://www.infosemantics.com.au/sites/default/files/image/widget_tutorials/Updates_LoginScreen.png" style="height: 309px; width: 293px;"></p>
+<p><img alt="" src="updates_loginscreen.png"></p>
<p>Username と Password を入力した後、GUI の裏では次の SQL クエリが実行されます。</p>
diff --git a/files/ja/glossary/sql_injection/sql_inj_xss.gif b/files/ja/glossary/sql_injection/sql_inj_xss.gif
new file mode 100644
index 0000000000..645eaa376a
--- /dev/null
+++ b/files/ja/glossary/sql_injection/sql_inj_xss.gif
Binary files differ
diff --git a/files/ja/glossary/sql_injection/updates_loginscreen.png b/files/ja/glossary/sql_injection/updates_loginscreen.png
new file mode 100644
index 0000000000..ba92b1ef87
--- /dev/null
+++ b/files/ja/glossary/sql_injection/updates_loginscreen.png
Binary files differ