Software Development
Applied Cryptography
Information Networks
Our products and services build upon the foundations in these three areas and we always do our best for ensuring the resulting product contains the best of them.
Our products and services build upon the foundations in these three areas and we always do our best for ensuring the resulting product contains the best of them.
We have been working for you for over 20 years on the following:
Although cryptography has its roots in abstract mathematics, its proper usage always comes with huge real-world impact on mitigating the risks of business operation problems and monetary damages.
Information security management includes the necessity to regularly test the systems and infrastructure security. Security auditing and penetration testing is used for performing such regular testing.
Professional analysis and viable design and implementation of specialized software or secure server and network infrastructure are the key components for success of new and current services no matter the scale.
Written by Dominik Pantůček on 2024-09-26
Working on a cryptographic library comes with certain challenges - like testing all the functions with (ideally all) incorrect inputs. In our recent project we leveraged Python's testing framework pytest with its support for coverage reporting to ensure we get to handle various - but very specific - kinds of corrupted input.
Written by Dominik Pantůček on 2024-09-12
When creating a library with some rather uncommon features, it is vital to ensure its users will be able to correctly use it by providing a useful documentation. Turns out this is possible even for Python projects.
Written by Dominik Pantůček on 2024-08-29
As most of the servers running actual software are these days virtual machines, in our case running under KVM, having a serial console accessible from the hypervisor is always a good idea in case troubleshooting is needed without network access.