Security Rules Against SQL Injections