(g+) security gaps: Have you ever chopped? How to learn and take advantage of security gaps on the basis of an insecure demosoftware. ((Security,, SQL))) Go to source