BEGIN:VCALENDAR
VERSION:2.0
CALSCALE:GREGORIAN
BEGIN:VEVENT
URL:https://www.learndesk.us/class/4608670140727296/lesson/cbd34fd8cbe7e5329ca743276de82ba6?ref=outlook-calendar
SUMMARY:SQL Injection & Prepared Statements
DTSTART;TZID=America/Los_Angeles:20260423T190000
DTEND;TZID=America/Los_Angeles:20260423T200000
LOCATION:https://www.learndesk.us/class/4608670140727296/lesson/cbd34fd8cbe7e5329ca743276de82ba6?ref=outlook-calendar
DESCRIPTION: In a nutshell, with prepared statements malicious code introduced via user input will not be executed! In SQL Server, using a prepared statement is definitely injection-proof because the input parameters don't form the query. It means that the executed query is not a dynamic query.

https://www.learndesk.us/class/4608670140727296/lesson/cbd34fd8cbe7e5329ca743276de82ba6?ref=outlook-calendar
STATUS:CONFIRMED
SEQUENCE:3
BEGIN:VALARM
TRIGGER:-PT10M
DESCRIPTION:Class Reminder
ACTION:DISPLAY
END:VALARM
END:VEVENT
END:VCALENDAR