IT Security Consultancies
A hacker's attack can have very serious repercussions. Information is power, and access to it must be seriously protected. Confronted to an attack, all the information from your servers is vulnerable to robbery or loss. To avoid this, we offer the following products:
You will just need to give us the IP address or domain to your servers so we can simulate all possible attacks that a hacker could use to access them. We then make a report with all the vulnerabilities found and the solutions to avoid a real attack.
Computer Forensic Analysis
Have you ever been "attacked?" Ever lost information you needed, for example, ever inopportunely deleted an important file? Has your hard drive ever crashed and made you lose important data? Do not worry. In most cases all the data can be recovered using special tools. Whether you have deleted them involuntarily or been victim of an attack, we will recover your data.
In the case of an attack, we can make a report in order to know the identity of the attacker, what actions he did and when and how he penetrated into your systems. We will then fix the bug so it does not happen again.
Source Code Consultancy
Programming an application usually costs quite some time and money, but if a software is not programmed adequately you may lose far more money in view of an attack. If you want to be assured that your application is safe, you need to conduct an audit to its source code and report and resolve all potential programming errors that a hacker could take advantage of to access your systems or to take control over them.
On Internet, each day are published a large number of widespread programs vulnerabilities. Know if your applications are vulnerable to XSS (cross site scripting), SQL injection, Blind SQL Injection, buffer overflows, format strings, ...
Securing your corporate servers
Linux is a secure operating system, but the use of the default settings, of a bad configuration, or the fact of not having updated programs, tools to monitor your files on disk or to counteract to dictionary attacks to your authentication systems, make it become an easy target for hackers.
With this service, you keep your servers fully updated and with minimal risk of potential attacks. Or, if you have more users on your systems, you have controlled hard disk quota, bandwidth and CPU load that you consume, etc., for the proper performance of your systems.