We’re going to be discussing database parameters that if not set correctly, it will allow hackers full access to the database.