about us internet programs software security

Programming .


1. Custom software design and development
  • Data protection complex systems,
  • software for attacks detection and prevention

2. Analysis and detection of security holes in program source code:
  • CGI scripts check-up server-side scripts check-up
  • C,C++ programs check-up:
  • holes of improper actions executions
  • holes for buffer overflow,format string attacks
  • confidentiality and integrity check-up
  • intensive workload stability check-up
  • DoS attacks stability check-up

Web application boom brought to the surface a lot of complicated and often insecured CGI scripts (who cares about security when the project deadline is over?). CGI scripts check-up allows to reveal holes in CGI code for plotter to gain an unathorized access to your resources. Most of Web sites are broken through CGI scripts.Certain dataflow processing mechanisms in C & C++ applications give plotter the opportunity to execute harmful code in the system being attacked. Written code stability with high workloads is another problem. Since it is difficult to protect your system from Denial Of Service attacks, you can make these attacks ineffective though.


3. Security design.
  • security data processing technologies design
  • secured protocols design

Spend a bit time to specify security problems, developing your system. Protection of data processing technologies and manipulating data via special secured protocols will take away from you headaches with developing complementary patches then.


4. Data protection software.

Put the power of modern encrypting/decrypting technologies into your business! About 10 different symmetric encrypting/decrypting algorithms are implemented to ensure the following features:

  • encrypting/decrypting "in-flight" software,
  • hidden local drives for PC and laptops. Hidden drive is activated with special formatted key diskette,
  • encrypting mailing client software to exchange private and confident information with your addressees,
  • protecting CDROMs with confident data or installations from unathorized access,
  • simple plug-ins,
  • modules or C++ classes to supply your developed software with encrypting/decrypting technologies.