How do you protect against injections in your web application and how do you keep track of what attackers are trying to break in?

Comments

Please login to leave a comment

Audience participation was something else! Great stuff!