One of my clients uses McAfee ScanAlert (i.e. HackerSafe). It basically lands on a site with about 1,500 bad queries per day, looking for security holes. Since it exhibits malicious behavior, it is tempting to simply block it after a couple of bad requests, but maybe I should let it implement the user interface. Is this a true test if I don't let it finish?
Isn't this a website security flaw that allows hackers to drop everything in their arsenal against the site?
, , , ( ). .
, , . 5 , , 6- .
EDIT: , - , 1495, , ., .
. , . 3 , IP- .
ScanAlert , SQL-, - - , , , " ".
, UrlScan eEye SecureIIS , . / . ?
ScanAlert : . , :
, , . 1000 , , , .
, , .
Source: https://habr.com/ru/post/1696508/More articles:https://translate.googleusercontent.com/translate_c?depth=1&pto=aue&rurl=translate.google.com&sl=ru&sp=nmt4&tl=en&u=https://fooobar.com/questions/1696503/syncing-libraryproject-subversion-respositories&usg=ALkJrhgJbAozqF2hilfqxUjw5cs3U87mdwWhich Javascript text editor will not violate browser spell checking? - javascriptFree or open source collaboration / e-learning software - productRunning Apache with another web server? - linuxHow to handle the necessary classes in PHP - includeExperience Using ASP.NET MVC Framework - .netTo what extent should a developer study the features of database systems? - databaseГенератор кода Python для Visual Studio? - pythonИспользовать QItemDelegate для отображения эскизов изображений - c++Select existing data from the database to create test data - databaseAll Articles