## BIO
We are a group of talented young professionals having strong background in computer science and information technology. We have the panache when it comes it reliable and efficient software development. We have expertise and experience of rendering Windows based, Unix/Linux( POSIX-compliant) based, Various kind of server-side/client-side Internet technologies, computer and network security and technical writing solutions. We have strong expertise in technical software writing as in producing software specification documents. testing software applications.
We have been working for US-Based IT companies like 23-degrees. So their portfolio is all what we have been doing since 2005 and have delivered several successful web solutions. Beside the traditional web development we are also interested in Web-base Business Solutions Development.
\---|\---|\---|\---|\---|\---|\---|\---|-
(Profile Last Updated on 17th Dec, 2010)
## Area of Expertise
We deliver solutions in following domains, but not limited to
Operating Systems:
Windows (All - Flavours)
Unix-based systems(Posix--compliant)
DataBase:
MS Sql Server,
MySQL,
Access 97,2000 and XP
\---|\---|\---|\---|\---|\---|\---|\---|-
Internet programming:
HTMl,DHTML,XML
ASP.NET
PHP,PERL
\---|\---|\---|\---|\---|\---|\---|\---|-
Languages and development environments:
C(under linux and windows),C++,Java,VB.NET,C#.
Visual [login to view URL],Borland JBuilder,Eclipse and GEL. IAIK (Crypto Library), and other open source crypto libraries as well
\---|\---|\---|\---|\---|\---|\---|\---|-
Software and Computer Security :
*Security is a journey , not a destination.*
Security has become very important in this ,almost, paperless society.
Our team has extensive experience in developing secure applications. Mostly,security fails not because of weak protocols,methods and algorithms , rather it fails because of their wrong use. We have developed softwares using large range of cryptographic protocols like( Bit Commitment,Blind Signatures,Zero-Knowledge, Threshold Secret Sharing and etc),ciphers-secret key(AES,Blowfish,Serpent,RC4,RC5,IDEA), public key-cryptography(RSA,Elgammal,Rabin,Knapsack Algorithm), Hash-functions(MD4,MD5 ,SHA-1,Ripe-MD,SNERFU)
\---|\---|\---|\---|\---|\---|\---|\---|-
Software Testing and Reliability:
We specialize in testing software application. Our team is impeccable in terms of testing softwares and has extensive experience. We test softwares with meticulous care and by adopting following test strategies(however,not limited to)
Application stress testing, penetration testing, application-content testing,requirement/information flow testing,url-navigation testing, url-malfunction testing,Responce time and latency,user-rights mangament and different browsers support will be tested.
We also perform software security testing. We assure that application will show resistance against different kind of attacks.
\---|\---|\---|\---|\---|\---|\---|\---|-
Technical Writing:
Technical writing of any kind, Software specification documentsNewsLetters,email-promotion,proposals and etc.
\---|\---|\---|\---|\---|\---|\---|\---|-
(Profile Last Update on 17th July,2006)