tag:blogger.com,1999:blog-21612553.post116050685211396464..comments2024-03-29T15:40:41.478+11:00Comments on robertmaldon: Web 2.0 AttacksUnknownnoreply@blogger.comBlogger2125tag:blogger.com,1999:blog-21612553.post-1160689204491343362006-10-13T07:40:00.000+10:002006-10-13T07:40:00.000+10:00Excellent question. This is very relevant to me si...Excellent question. This is very relevant to me since I'm currently doing some AJAX work for a client.Robert Maldonhttps://www.blogger.com/profile/16280163358319153586noreply@blogger.comtag:blogger.com,1999:blog-21612553.post-1160587363687407132006-10-12T03:22:00.000+10:002006-10-12T03:22:00.000+10:00Now that you have listed some of the ways to attac...Now that you have listed some of the ways to attack Web 2.0 sites, what are the appropriate solutions, and guidelines to developing these types of sites?Anonymousnoreply@blogger.com