SQL injection and security implications – final comments