Page 2 of 2

Posted: Mon Mar 12, 2007 12:07 pm
by JAB Creations
All good points and I completely agree. However I have some other methods that I team up with the one we've been talking about. Layers of checkpoints that I never mention publicly that have no adverse or noticeable effect on the visitor but cover up potential holes more effective then necessary.

If for some reason the visitor is sending a password and fails to meet the requirements there will be a full fledged page to help them out. If you've tinkered enough with my site you'd find it surprisingly detailed and that is something I take pride in. :)