Figure 1: Unprotected login.

Back to Article