



|


[A] Start click here to begin the
search.
[B] Stop click here to stop the search.
[C] Location to check Type here the
location of the server you want to check. (yours of course)
[D] Check CGI & Servlet directories
This will test if all your executable directories have the right privileges. It will
test the accessibility of your /cgi-bin or /servlets
directories. This is quite usefull when you change oftenly things in these directories.
Sometimes, you can forget to set their accessibility rights, and let them unsecured. It
can also test the location you have set in [C]. Therefore, if you have
particular files like Perl script (*.pl) and you want to know if you haven't forget to set
their access rights just click on this button...
[E] Search progression This will shows
percentage of search already done

If the program finds a new weak login from the specified
destination, it will store it in the History weak list (see above).
The history tab will let you store/manage all weak logins that
you have found. With these logins you can remember which logins are weak from your login
database. This login can be own by one of your users, customers, or yourself. So, you'll
be abble to know and to contact the person who owns a weak login, and give him a new one.
But this is your only responsibility

[A] Refresh the list This will
checks logins stored in your list if they are always weak ones.See [G]
for more infos.
[B] Delete selection If you have chosen
some logins from the list, then, it will delete these ones.
[C] Search retry from the specified selection
This will start another complete search based on destination address specified by your
selection.
[D] Name if you
have many secured locations on your server, you can rename each weak login. This will ease
your work.
[E] Save weak login into a file Click
here if you want to backup the list. You can choose a Text file format or an HTML format (Access Diver only).
[F] Test weak login Click here if you
want to open your server with the weak login found. So, it will open your default WEB
browse on the specified location.
- [G] History weak logins List Every weak
login found will be stored here
[H] Delete/Keep invalid Authentication
If during a List refreshing, a login is no more weak, it will be kept or deleted from the
weak login list. It depends of the check-box state. If this check-box is checked, then
these logins will be deleted. Otherwise, they will be kept in the list.
 |