Skip to Main Content
Hack Proofing Your Web Applications
book

Hack Proofing Your Web Applications

by Syngress
June 2001
Intermediate to advanced content levelIntermediate to advanced
512 pages
18h 49m
English
Syngress
Content preview from Hack Proofing Your Web Applications
Vulnerable CGI Scripts • Chapter 4 135
Without this line of code, the script won’t be able to compile, and will
be unable to run.
The next section of the program is used to accept the data from the
form on the Web page.This is so that the data can be processed, and
used in the next section, where the data in each variable is put into an
e-mail message. Once this is done, the final section of script is executed.
Here, a Web page is produced and returned to the user who initially
entered the data.This HTML document confirms that the feedback was
sent, so that the user knows the task is done and he or she can continue
browsing your site.
When Should You Use ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

Michael Cross
The CERT® Oracle® Secure Coding Standard for Java™

The CERT® Oracle® Secure Coding Standard for Java™

Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda
Troubleshooting CentOS

Troubleshooting CentOS

Jonathan Hobson

Publisher Resources

ISBN: 9781928994312