On Thu, 2012-06-21 at 10:40 +0100, Ben Laurie wrote:

> 
> 4. Use something that is hard to optimise in hardware (ideally).


5.  Only hire web developers who know what they're doing, who know what
security is, and how to audit their code :)

If they cant get the database, then it wouldn't mater if they were in
*gulp* plain text

<<attachment: face-smile.png>>

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to