In my last column, I introduced SQLite, an amazing little database engine written and provided entirely in C source code. I showed you how to begin wrapping it up in modern C++, producing a correct ...
In my last article I wrote about accessing a PostgreSQL database in C/C++. In this article, I'm going to discuss performing the same functions in C against an SQLite database. Unlike Postgresql and ...
SQLite databases can be modified in such a way that they execute malicious code inside other apps that rely on them to store data, security researchers have revealed. In demos presented at the DEF CON ...
Whether you want some quick and dirty data storage, or simply don’t have that heavy requirements for your local database system, SQLite is always a good choice. With its portable single-file approach, ...
The Windows Runtime stack is currently lacking a local relational database from Microsoft. Never fear, because SQLite is freely available and up to the task. Today I'll be covering how to use SQLite ...
Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with content, and download exclusive resources. Cory Benfield discusses the evolution of ...
A security vulnerability in the massively popular SQLite database engine puts thousands of desktop and mobile applications at risk. Discovered by Tencent's Blade security team, the vulnerability ...
Most Android apps will need to persist user data at sometime. There are different ways to store user data, but SQLite databases are a very convenient and speedy method of saving user (or app) data and ...
Researchers at security conference Def Con 2019 demonstrated a method of exploiting regular database searches to produce malicious results, and used Apple's standard iOS Contacts app to prove it.
Researchers exploit a SQLite memory corruption issue outside of a browser. LAS VEGAS – Researchers at Check Point have identified a new class of vulnerabilities targeting SQLite, outside the context ...