We not only harden the applications we make for you, we utilize best practices
throughout our organization to ensure both of us remain productive:
- Validation
- All programs strictly sanitize input and output. This blocks exploitation methods
such as Cross-Site Scripting and SQL Injection.
- Patches
- The operating system and software used on our computers are kept up to
date in order to avoid vulnerabilities.
- Viruses
- Incoming mail and files are carefully managed and scanned so unsavory
elements like viruses are kept at bay.
- Backups
- Multiple off-site backups of essential data are made to minimize downtime and losses
due to catastrophic events.
- Encryption and Digital Signatures
- Sensitive information is
GPG/PGP encrypted
and signed. Here's our public key.
The integrity of our software can be checked via our
software signing key
and md5 sums.
Our president is a Principal of the PHP Security Consortium.
(
< Search Engine Ranking |
Source Code >
)