Shannon Horn is the co-founder and chief software architect of Web Geniuses Corporation ( Hence, many times validation was not performed in a uniform manner, complex validation was difficult to implement, and Web servers were vulnerable to validation scripts being modified by malicious users.
He is a published author on several subjects including XML, the migration from Visual Basic 6 to VB. In this scenario, if an error occurs while performing validation on the user's computer, the application can directly display the error message on the page that the user is viewing without the page making a round trip to the Web server and then back to the user.
NET, data validation was performed through scripts using either Java Script or VBScript.
For example, if you use HTML entity encoding on user input before it is sent to a browser, it will prevent most XSS attacks.
However, simply preventing attacks is not enough - you must perform Intrusion Detection in your applications.
There are three possible data environments in which validation can occur in a three-tiered web database application: in the DBMS, in server-side scripts, and on the client.
We discuss the merits and possibilities of these approaches to validation in this chapter.
Validation is essential to web database applications.
Ensuring that data meets user and system requirements is important, but ensuring that the database constraints are met by the data is critical.
He has been a featured speaker at many industry events including Microsoft Dev Days and the ASP. Shannon speaks and trains for companies such as App Dev ( and Learn It ( and has been a featured speaker in training videos with Learn Key. Data validation over the Web is performed in one of two locations: on the user's computer, or on the Web server.Tags: Adult Dating, affair dating, sex dating