Security holes manifest themselves in (broadly) four ways...

Printable View