5.1. CONTROLLING VIEWSTATE5.1.1. Validating ViewState5.1.2. Encrypting Viewstate5.1.3. Protecting Against ViewState One-Click Attacks5.1.4. Removing ViewState from the Client Page5.1.5. Disabling Browser Caching5.2. ERROR HANDLING AND LOGGING5.2.1. Improving Your Error Handling5.2.2. Watching for Special Exceptions5.2.3. Logging Errors and Monitoring Your Application5.2.3.1. Using the Windows Event Log5.2.3.2. Using Email to Log Events5.2.3.3. Using ASP.NET Tracing5.2.3.4. Using Performance Counters5.2.3.5. Using WMI Events5.2.3.6. Another Alternative: Logging Frameworks5.3. LIMITING SEARCH ENGINES5.3.1. Controlling Robots with a Metatag5.3.2. Controlling Robots with robots.txt5.4. PROTECTING PASSWORDS IN CONFIG FILES5.5. A CHECKLIST FOR QUERY STRINGS, FORMS, EVENTS, AND BROWSER INFORMATION