... "http:" to "https:". For example, if the <form> tag in your HTML file looks like this: <form method=POST action="http://www.company.com/cgi-bin/enter"> ... and look for potential weaknesses • Tools that monitor your system over time, looking for unauthorized changes • Tools that scan your network, looking for network-based weaknesses • Tools that ... Protocol agnostic Although SSL was designed to run on top of TCP/IP, it can in fact run on top of any reliable connection-oriented protocol, such as X.25 or OSI. The SSL protocol cannot run on...