Potential System Invasion
Hi,
I an the head technical person for a CRM company. One of our clients just reported to me that the data on one of her records had been changed. The title of the record was changed to Arachni_name, which through my googling led me to your product.
I have downloaded your product, and run scans using the 3 profiles that were installed by default, and I am not seeing any obvious vulnerabilities. How would you suggest that I proceed?
Keyboard shortcuts
Generic
? | Show this help |
---|---|
ESC | Blurs the current field |
Comment Form
r | Focus the comment reply box |
---|---|
^ + ↩ | Submit the comment |
You can use Command ⌘
instead of Control ^
on Mac