On Avoiding Common Sql Injection Attacks