V


V. When user allows auto-run mode of files through CD/DVD and USB drive. It is highly insecure file operation on computer.
VI. When user runs a file whose extension is hidden, it may be a Trojan or some other kind of harmful virus threat.
VII. When user allows a website to compile or run program file directly on computer. It is very insecure operation.
VIII. When user performs the storing operation of website form’s responses via SQL/Oracle. There is high possibility of code injection risk due to weak handling of validation checks.

V. When user allows auto-run mode of files through CD/DVD and USB drive. It is highly insecure file operation on computer.
VI. When user runs a file whose extension is hidden, it may be a Trojan or some other kind of harmful virus threat.
VII. When user allows a website to compile or run program file directly on computer. It is very insecure operation.
VIII. When user performs the storing operation of website form’s responses via SQL/Oracle. There is high possibility of code injection risk due to weak handling of validation checks.