in 3 lines Dan's method is:
This entry was posted
on Thursday, June 17th, 2010 at 1:22 pm and is filed under development, framework, infosec, injection, research, review, Security, sql, xss.
You can follow any responses to this entry through the RSS 2.0 feed.
Both comments and pings are currently closed.