--- a/relpipe-data/examples-guile-parametrized-queries.xml Tue Aug 04 00:59:32 2020 +0200
+++ b/relpipe-data/examples-guile-parametrized-queries.xml Tue Sep 08 14:21:19 2020 +0200
@@ -40,8 +40,7 @@
But it is fundamentally wrong. The input parameter is blindly pasted in middle of the Guile code.
So if we call e.g. <code>fstab-where-type 'ext4"'</code>, it crashes terribly.
Do you remember SQL injections in your first PHP scripts when you were 14?
- Do you remember <a href="https://xkcd.com/327/">XKCD: Exploits of a Mom</a>?
- Don't do it again!
+ Do not do it again!
</p>
<p>
--- a/relpipe-data/faq.xml Tue Aug 04 00:59:32 2020 +0200
+++ b/relpipe-data/faq.xml Tue Sep 08 14:21:19 2020 +0200
@@ -134,12 +134,6 @@
<p>Implementation in other languages will follow. Java is the next one. Then probably Perl, Python, Rust, Go, PHP etc. (depends on community involvement).</p>
- <p>
- <strong>Have you seen <a href="https://xkcd.com/927/">XKCD 927</a>?</strong>
- <br/>
- Yes. And we liked it so much that we followed their instructions and created <m:name/>.
- </p>
-
<p>
<strong>Are <m:name/> compatible with cloud, IoT, SPA/PWA, AI, blockchain and mobile-first? Should our DevOps use it in our serverless hipster fintech app with strong focus on SEO, UX and machine learning?</strong>
<br/>