This document discusses client-side controls for restricting user input in web applications. It describes how client-side controls like HTML forms, JavaScript validation, Java applets, and ActiveX controls can validate user input. However, all client-side controls are vulnerable because they run on untrusted clients and can be bypassed. The document recommends validating all user input on the server-side and not trusting any client-side validation. It also discusses techniques attackers use like decompiling bytecode and monitoring processes to bypass client-side controls.