- Setup a server to demonstrate SQL injection - Add more injection commands to a SQL file - Measures to prevent SQL injections