Discussion Post
Do a bit if research into File Inclusion Vulnerability.
o What is it and Why it is dangerous and what are the difference of low and remote inclusion. What methods can me employed to prevent a security breach?
The response must include a reference list. Using one-inch margins, double-space, Times New Roman 12 pnt font and APA style of writing and citations.