Software Development
Applied Cryptography
Information Networks
Our products and services build upon the foundations in these three areas and we always do our best for ensuring the resulting product contains the best of them.
Our products and services build upon the foundations in these three areas and we always do our best for ensuring the resulting product contains the best of them.
We have been working for you for over 20 years on the following:
Although cryptography has its roots in abstract mathematics, its proper usage always comes with huge real-world impact on mitigating the risks of business operation problems and monetary damages.
Information security management includes the necessity to regularly test the systems and infrastructure security. Security auditing and penetration testing is used for performing such regular testing.
Professional analysis and viable design and implementation of specialized software or secure server and network infrastructure are the key components for success of new and current services no matter the scale.
Written by Dominik Pantůček on 2024-11-07
As has been announced earlier, I had the opportunity to talk about recent rclone developments at the LinuxDays conference. Although the talk started at 10AM, the auditorium was crowded and it turns out many people were actually very interested how it is possible to ensure decent confidentiality when using public cloud object storage services!
Written by Dominik Pantůček on 2024-10-24
As we have already revealed, we use Punct to produce our new website. Punct is extending CommonMark with metadata and uses Racket racket-commonmark. Sometimes there are problems with software, but usually those can be solved - as happened in this case. And with a new release, new features arrived as well.
Written by Dominik Pantůček on 2024-10-10
In a previous blog two months ago we have shown an ongoing progress on improving protection of secret keys in rclone configuration. On 8th September 2024 new version 1.68 has been released which finally contains all the building blocks for implementing such protection in a very user-friendly manner. Let us see the important new features of this version.