. . . "Some of these techniques define a special escape character, and other techniques have a more sophisticated syntax that involves several characters.+When untrusted data is used by an application, it is often inserted into a command, document, or other structure." .