Back to the English start page Choose your language here Send us an email Go to our web links page

 

Order a copy of AccessDiver

 

 

 

 

  • [A]  Start click here to begin the search.
  • [B]  Stop click here to stop the search.
  • [C]  Location to check Type here the location of the server you want to check. (yours of course)
  • [D]  Check CGI & Servlet directories This will test if all your executable directories have  the right privileges. It will test the accessibility of your /cgi-bin or /servlets directories. This is quite usefull when you change oftenly things in these directories. Sometimes, you can forget to set their accessibility rights, and let them unsecured. It can also test the location you have set in [C]. Therefore, if you have particular files like Perl script (*.pl) and you want to know if you haven't forget to set their access rights just click on this button...
  • [E]  Search progression This will shows percentage of search already done

If the program finds a new weak login from the specified destination, it will store it in the History weak list (see above).

The history tab will let you store/manage all weak logins that you have found. With these logins you can remember which logins are weak from your login database. This login can be own by one of your users, customers, or yourself. So, you'll be abble to know and to contact the person who owns a weak login, and give him a new one. But this is your only responsibility…

  • [A]  Refresh the list This will checks logins stored in your list if they are always weak ones.See [G] for more infos.
  • [B]  Delete selection If you have chosen some logins from the list, then, it will delete these ones.
  • [C]  Search retry from the specified selection This will start another complete search based on destination address specified by your selection.
  • [D]  Name if you have many secured locations on your server, you can rename each weak login. This will ease your work.
  • [E]  Save weak login into a file Click here if you want to backup the list. You can choose a Text file format or an HTML format (Access Diver only).
  • [F]  Test weak login Click here if you want to open your server with the weak login found. So, it will open your default WEB browse on the specified location.
  • [G]  History weak logins List Every weak login found will be stored here…
  • [H]  Delete/Keep invalid Authentication If during a List refreshing, a login is no more weak, it will be kept or deleted from the weak login list. It depends of the check-box state. If this check-box is checked, then these logins will be deleted. Otherwise, they will be kept in the list.