These vulnerabilities can, of course, exist in PHP applications. Here are some tips on how to avoid them. I’ve included related links and references where relevant.
read more | digg story
This entry was posted on October 19, 2007 at 3:20 pm and is filed under Programming. You can follow any responses to this entry through the RSS 2.0 feed.
Both comments and pings are currently closed.
Create a free website or blog at WordPress.com.
Entries (RSS) and Comments (RSS).