In the age of social networks and various more-or-less secure communication tools, it is hard to be at least basically sure that our communication over the Inernet reaches its recipient in unchanged form and confidentiality of such messages is untouched.
It has already been more than fifteen years since Trustica started providing its services in the field of secure communication over untrusted data networks and we are designing solutions for all imaginable variants of such communication. Should you need to secure a communication between your coworkers or ensure the communication with server systems remains confidential, we are at your service and not only we design communication with security on our mind but we also deliver fully functional implementations if requested.■ ■ ■
The Request Tracker system is used for implementing technical or customer support and keeping records of incoming phone, e-mail, web or other requests. With Request Tracker you always have perfect overview about tasks and their requesters, the issue status and which resources are missing for successfully finishing it. Your employees have exact information about requests assigned to them and when are they due.■ ■ ■
As you might have noticed, there was a conference in Prague on October 6th. It was a conference about Linux, an open source conference and on such conference, cryptography must have been present. If you know why, you know why you should read on – and if you do not know why, read on to find out what do open source and cryptography have in common.