the input received by the server.
■■
Controls implemented in thick-client components are sometimes more
difficult to circumvent, but this may merely slow down an attacker for a
short period.
■■
Using heavily obfuscated or packed client-side code provides addi-
tional
obstacles; however, a determined attacker will always be able to
overcome these. (A point of comparison in other areas is the use of
DRM technologies to prevent users from copying digital media files.
Many companies have invested very heavily in these client-side con-
trols, and each new solution is usually broken within a short interval.)
The only secure way to validate client-generated data is on the server side of
the application. Every item of data received from the client should be regarded
as tainted and potentially malicious.
Do'stlaringiz bilan baham: