Injection attacks can occur when transmitted data is not interpreted the same way by both the sender and the receiver. Guaranteeing equivalence in data interpretation by both the sender and the receiver is called operational congruity. There is a simple technique for achieving guaranteeing operational congruity: separating fields of data on the basis of their length. When the length of the data is known in advance, there is no risk of misinterpreting it on the basis of spaces or other text...