On April 5th 2012, Jacadis, Acunetix’s reseller in Ohio, USA, will be sponsoring the Detroit Tech-Security Conference and exhibiting Acunetix Web Vulnerability Scanner.
An .htaccess file is a configuration file which provides the ability to specify configuration settings for a specific directory in a website. The .htaccess file can include one or more configuration settings which apply only for the directory in which the .htaccess file has been placed. So while web servers have their own main configuration […]
The Acunetix Team today announced an updated build of the Web Vulnerability Scanner Version 8 (WVS 8). The new build, number 20120326, includes new security checks that detect even more vulnerabilities as well as a series of bug fixes. New Security Checks Acunetix WVS 8 now runs security tests for Joomla 1.6.x/1.7.x/2.5.x Privilege Escalation. Acunetix […]
One of the worst feelings I’ve ever experienced was when I received an email from one of my customers telling me that my website had been hacked. It got worse, as I couldn’t see any changes in my content, the design or the source code! The problem was that my users were seeing my website […]
A lot of developers are using version control systems such as SVN (Apache Subversion) and GIT in order to track changes in their source code. These types of server tools are essential for the organizations which have multi-developer projects. Most of these version control systems create internal hidden directories, which typically contain extensive information about […]
Note: This article refers to an older version of Acunetix. Click here to download the latest version. When you visit a website your browser sends an HTTP header called “User-Agent” to the web server. This header indicates which web browser you are using, its version number and details about your operating system and version.
A web application security breach means different things to different people. To some it could mean having attackers exploit a vulnerability that allows them to deface their website. To some it could mean cracking web passwords – or capturing them over an unsecured wireless network – and using the account credentials for ill-gotten gains. While […]
Since 1984, the word “virus” was used to describe what we now call malware. Malware is short for malicious software and collectively refers to things such as viruses, Trojan horses, spyware and rootkits. Recently we’re seeing new terms for certain types of malware such as Advanced Persistent Threats and advanced malware. The essence of malware […]
When running several large scans (using the Scheduler, for example), you may encounter a situation where you run out of hard disk space for the logs generated by the scans. It would be useful to be able to redirect the logs folder to some other location to take advantage, for example, of Network Attached Storage […]
After using Acunetix WVS on a website, the hosting provider may block your IP address so you are not capable of accessing your own website anymore. After requesting the hosting provider, the site becomes available again. How can you configure or use Acunetix WVS in a way that reduces the possibility of an ISP blocking the IP […]