Assignment:
Do a bit of research into File Inclusion Vulnerability.
1. What is it?
2. Why is it dangerous?
3. What is the difference of low and remote inclusion?
4. What methods can be employed to prevent a security breach?
5. What programming languages are vulnerable to this type of attack.
Provide 250 words.