IN 300 Words,
Do a bit if research into File Inclusion Vulnerability.
- What is it?
 - Why is is dangerous?
 - What is the difference of low and remote inclusion?
 - What methods can me employed to prevent a security breach?
 - What programming languages are vulnerable to this type of attack.
 
Do not copy the work.
Include references, do not copy paste strictly.
