Authorization and authentication « Input Validation Basics: Your Application’s First Line of DefenseBasic User Authentication Strategies »