I just wanted to point out that it's likely not a good security practice to implement this type of behavior. You may want to look at your overall goal and determine if it's worth making such a change.
I just wanted to point out that it's likely not a good security practice to implement this type of behavior. You may want to look at your overall goal and determine if it's worth making such a change.