In the fourth and final part of our series, we examine the form emulator we built in the third part in the context of a practical example that puts the program to work. The form emulator can be used as a simple testing bed to help you build more robust and safer Web applications.
However, very often in real conditions, itís useful to consider how hacking techniques may be used to attack websites, and accordingly to improve the overall security, whether within the application and/or at administrative levels. As a result, hopefully safer Web programs will be written and more efficient security strategies will be implemented.
So, returning to the form emulator script, in the previous article I defined all the required functions to make the program fully functional. Therefore, in this last part Iíll set up a practical example that puts the program to work and demonstrates that post Web forms may be easily emulated, either with malicious purposes or for use as a simple testing bed.
Now that the articleís objectives have been defined, itís time to go forward and start coding the example.