1 To view Part I of the article series, please open: http://resources.infosecinstitute.com/website-hacking-101/
2 This data can then be shown to the user so he can check for illegal logins or it can be processed by some script to check for abnormal user behavior.
3 Here is how a query might look like with prepare and execute methods applied.