top of page

FAQs

See the questions most frequently asked by our customers. You should find the answer you are looking for there.
If not, feel free to ask. I will be happy to answer you.

DO I MUST REGISTER FOR AN ONLINE INTERVENTION?

No, but it is nice to simply register to define intervention slots based on availability. This is so that I can get back to you at a time slot that best suits you. (You can reserve a slot directly online.)

WHAT IS A PENTEST?
 
A Pentest is an intrusion test with a very specific orientation. This involves testing the computer system by looking for flaws/vulnerabilities or weaknesses. This is in order to exploit these weaknesses by carrying out various attacks revealing system security failures. There are mainly 3 pentesting methods depending on the approach: - "WhiteBox" - "BlackBox" - "GreyBox" - The Pentest or -intrusion test- provides different elements compared to a vulnerability scanner or a security audit.

 

Examples of reports

WHAT IS THE DIFFERENCE BETWEEN RESEARCH AND FORENSIC?
 
The difference lies in the context and the use you want to make of it. The research is carried out with a view to finding the problem of initial flaw(s) which allowed access to your identifiers (on social networks for example), or as prevention to test the system/configuration, and thus be able to make adjustments to it. a security solution & remediation of flaws/vulnerabilities found. Forensic is a procedure allowing the establishment of evidence in the context of filing a complaint, for example. This corresponds to the extraction of data (in 1 admissible copy) from your material which can be followed by its analysis. The 2 approaches are different & can be complementary in the context of hacking and legal action.

CAN WE EXCHANGE EMAILS SAFELY ?

Exchanges or communication by email are configured securely through an encrypted communication vector.
If this concerns confidential or sensitive data, it is possible to add a further encryption and/ or adapted according to the situation or data in question.
To do this, simply notify it when making contact.



 

DO I HAVE TO DOWNLOAD SPECIFIC SOFTWARE TO ACCESS THE ONLINE INTERVENTION SERVICE?

It is not necessary to download anything before any intervention. I am sending you a link which, upon receipt, and once launched on your side, will allow you to work on your computer in complete security. So you are in control to start the connection.

 

WHAT IS A SOLUTION?
 
A solution contribution (Pro Administrative Service) allows you to respond to your specific organizational needs by making the use of the IT tool as simple as possible. This allows you to create automation of the tasks that you have to carry out, for example, in the context of planning management, accounting, etc.

CAN YOU RECOVER HACKED ACCOUNTS?

Hacked accounts, particularly on social networks, are obviously recoverable. However, it is imperative that the account holder himself is legal and in compliance with the regulations of this same social network. If the holder provides false information about his own account, then the social network may well indicate the violation of its regulations, and in this case it can decide and be able to accept or not the recovery of the account.

WHAT CAN BE DONE TO SECURE YOUR SYSTEM ?

As a professional, many standards must be respected and all references (type CVE, NIST, ..etc.) are necessary as well as the update and patch to be implemented regularly. To know if everything is configured, audits can be carried out and bring you the confirmation of compliance with security standards.
However, a "hacker" or pirate will always find more or less easily over a longer or longer period, the path to reach its goal.
Penetration tests or "pentest" allow to find the paths to which the official standards do not necessarily have an answer. Indeed, a hacker will look for any way to reach your system, whether you are auditing standard or not. It will simply look for another way to access it.


 

Do not hesitate to contact us if you have any questions

bottom of page