On Sep 30, 2008, at 9:40 AM, [EMAIL PROTECTED] wrote:
Seems like a cheap way (listing a bunch of frameworks in a security paper) to gain cheap traffic on your paper.
Isn't that how and why white papers are written. :) I only skimmed the top page but I got the impression that following best practices would circumvent (most of?) the exploits. POSTs being required to manipulate data, specifically. -Ashley _______________________________________________ List: [email protected] Listinfo: http://lists.scsys.co.uk/cgi-bin/mailman/listinfo/catalyst Searchable archive: http://www.mail-archive.com/[email protected]/ Dev site: http://dev.catalyst.perl.org/
