Contributors Thanked: 10 kez
I want to know more about this CRSF.. I write a lot of plugins, so I need to know how i should protect my plugins for these kind of attacks... (Any best practices ??) I do a lot of JSON stuff through POST and GET's
thnx
Is there a Tutorial somewhere for devs ?