| http://www.w3.org/ns/prov#value | - Forsites that are based heavily on script languages, such as ASP, such functions canbe encapsulated in a COM object.Bypassing SQL-Backed Login FormsOn Web sites that perform Forms-based authentication with a SQL back-end,SQL injection can be used to bypass authentication (see Chapter 9 for morespecific details on the technique of SQL injection).
|