Why is it not a good idea to use the GET method to send data such as social security number and credit card number with an HTTP request?

Experiment with the Web form example presesnted in Figures ...


With the GET method, the query string is sent from the HTTP client to the HTTP server by attaching the string to the URI in the response line, and it is transmitted from the server to the web script via the environment variable QUERY_STRING.
There are at least two problems with using the method to send query data:
The query string is displayed in the URL window on a browser such as the Internet Explorer;
The length of the string is limited, due to buffer constraints.
The first problem is detrimental to sensitive data such as credit card numbers.

Computer Science & Information Technology

You might also like to view...

Which of the following statements about regular expressions is true.

a. The set of braces containing two numbers, {n,m}, matches between n and m occurrences (inclusively) of the pattern that it quantifies. b. All of the regular expression quantifiers are greedy; they’ll match as many occurrences of the pattern as possible until the pattern fails to make a match. c. If a quantifier is followed by a question mark (?), the quantifier becomes lazy and will match as few occurrences as possible as long as there is a successful match. d. All of the above.

Computer Science & Information Technology

Different sorting algorithms on a particular array produce the same result; the choice of algorithm affects ________ of the program that implements the algorithm.

a. only the run time b. the run time and the memory use c. only the memory use d. neither the run time nor the memory use

Computer Science & Information Technology

It is common to use gettimeofday(2) to measurethe performance of a code segment under study,similar to the following: struct timeval start, end;


If the code segment executes in only 1 microsecond, describe two ways that you can prevent the execution cost of calling gettimeofday from interfering with your measurements

Computer Science & Information Technology

Which advanced audit policy setting tracks when tasks are performed that require a user rights assignment, such as changing the system time?

A. object access B. account management C. privilege use D. process tracking

Computer Science & Information Technology