The Internet Engineering Task Force (IETF) document, RFC 3696, “Application Techniques for Checking and Transformation of Names” by John Klensin, gives several valid e-mail addresses that are rejected ...
There are several ways for hacking your database and Userbase. Also there are several possible SQL exploits (which are called SQL injections) which you need to consider into by doing appropriate input ...