03Nov2008 (UTC +8) On 11/1/08, Philip Morales <[EMAIL PROTECTED]> wrote: [...] > Do you know any additional fix I can do?
Sorry that I only described how the attacks are done in my previous e-mail. Here's a much better answer: http://www.owasp.org/index.php/Category:OWASP_Guide_Project It's an excellent start to developing secure web applications. Audit the source code later using methods from the Common Criteria standard, and you'll be quite happy with it. Drexx Laggui -- CISA, CISSP, CFE Associate, ISO27001 LA, CCSI, CSA http://www.laggui.com ( Singapore / Manila / California ) Computer forensics; Penetration testing; QMS & ISMS developers; K-Transfer PGP fingerprint = 6E62 A089 E3EA 1B93 BFB4 8363 FFEC 3976 FF31 8A4E _________________________________________________ Philippine Linux Users' Group (PLUG) Mailing List http://lists.linux.org.ph/mailman/listinfo/plug Searchable Archives: http://archives.free.net.ph

