Software Development
Applied Cryptography
Information Networks
Our products and services build upon the foundations in these three areas and we always do our best for ensuring the resulting product contains the best of them.
Our products and services build upon the foundations in these three areas and we always do our best for ensuring the resulting product contains the best of them.
We have been working for you for over 20 years on the following:
Although cryptography has its roots in abstract mathematics, its proper usage always comes with huge real-world impact on mitigating the risks of business operation problems and monetary damages.
Information security management includes the necessity to regularly test the systems and infrastructure security. Security auditing and penetration testing is used for performing such regular testing.
Professional analysis and viable design and implementation of specialized software or secure server and network infrastructure are the key components for success of new and current services no matter the scale.
Written by Dominik Pantůček on 2024-07-18
In 2016 we decided to implement our website in WordPress which was deemed adequate at that time. However the times are a-changing and now we have migrated to our custom publishing pipeline using Racket and Punct.
Written by Dominik Pantůček on 2024-07-04
It took ages, however the replacement of our autonomous system border router (ASBR) is done. In addition we managed to converge our backbone L2 and L3 equipment and finally get a rid of two single points of failure (SPOF) in sequence.
Written by Jiří Keresteš on 2021-04-08
Did you know that Ghidra SRE has the ability to emulate code? If you want to know how we use it to save time when reversing firmware binaries, read on!