Description:
A vulnerability scanner is a computer program designed to assess computers, computer systems, networks or applications for known weaknesses. In plain words, these scanners are used to discover the weak points or poorly constructed parts. It's utilized for the identification and detection of vulnerabilities relating to mis-configured assets or flawed software that resides on a network-based asset such as a firewall, router, web server, application server, etc. Modern vulnerability scanners will allow for both authenticated and unauthenticated scans to occur. Modern scanners are typically available as SaaS (Software as a Service) by providers over the internet as a web application and the amount of host information is vast. The modern vulnerability scanner has the capabilities to customize vulnerability reports, installed software, open ports, certificates and much other host information that can be queried by users to increase network security.
Minimum System Requirements:
- Operating system: Microsoft Windows 7 or Windows 2008 R2 and later.
- CPU: 64 bit processor.
- System memory: minimum of 2 GB RAM.
- Storage: 200 MB of available hard-disk space. This does not include the storage required to save the scan results - this will depend on the level of usage of Acunetix.
0 Comments