week-9 discussion

 Do a bit  if research into File Inclusion Vulnerability.

  • What is it and  Why it is dangerous  and what are  the difference of low and remote inclusion .What methods can me employed to prevent a security breach?
Tags: No tags