relpipe-data/examples-guile-parametrized-queries.xml
branchv_0
changeset 314 a8bdd870a456
parent 247 087b8621fb3e
child 316 d7ae02390fac
--- a/relpipe-data/examples-guile-parametrized-queries.xml	Tue Aug 04 00:59:32 2020 +0200
+++ b/relpipe-data/examples-guile-parametrized-queries.xml	Tue Sep 08 14:21:19 2020 +0200
@@ -40,8 +40,7 @@
 			But it is fundamentally wrong. The input parameter is blindly pasted in middle of the Guile code.
 			So if we call e.g. <code>fstab-where-type 'ext4"'</code>, it crashes terribly.
 			Do you remember SQL injections in your first PHP scripts when you were 14?
-			Do you remember <a href="https://xkcd.com/327/">XKCD: Exploits of a Mom</a>?
-			Don't do it again!
+			Do not do it again!
 		</p>
 		
 		<p>