I hope I'll be forgiven for having one last try... :^)
Sounds like a possible DoS attack in the making.
Whilst I've never heard of it being done in this particular way--and my attempts at seeing what would happen on my local Apache server where foiled by simply not being able to generate enough queries fast enough as the user agent and the webserver were always competing for cpu and were therefore self limiting--but it wouldn't be the first time that causing logs to fill/overflow or simply sapping the horsepower of the server by causing it to generate gobs of useless warnings has been used to bend or break a server.
That is probably what I would do, locally, for the duration of the untaining of the parameters and validation that I had them all.
In reply to Re: Re: Re: Re: Re: Re: Re: Re: "Correct" program style questions
by BrowserUk
in thread "Correct" program style questions
by Ovid
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |