“Session Hijacking” Select one of
the following and discuss in no less than three paragraphs, and have at
least one response to another student of at least one paragraph: Consider the “What if” case in Chapter 1 from the Book: Web Applications and Data Servers and respond to one or more of the questions asked. Research
the web, and discuss any recent story concerning session hijacking.
Provide summary and discussion on what might have been done to prevent
such hijacking, or how such hijacking can be recognized. Any current topic or article related to penetration techniques.