Tag: security holes
Modify-function-return-value Hack! — Part 1
Sometimes it's helpful to think from a hacker's perspective. The information obtained can be used to write better code and a secure application. An...
The Comprehensive LAMP Guide — Part 2 (MySQL)
MySQL is the most widely used Relational Database Management System (RDBMS), and is the "M" in the LAMP stack. One of the main uses...