In most cases, we don't get that lucky, and there are safeguards in place to prevent this type of attack. But often we can bypass those restrictions with some clever use of PHP's filter wrapper. PHP has a number of wrappers that allow access to input and output streams, and they are...