Company
We are an efficient web development and computer repair company formed in May 1999. Earnestly, we specialize in a variety of programming languages and art skills. Our design is with intensity and stainless significance. Internationally, we serve the world, unlimited to any country. Our projects are assorted, but we remain at moral grounds. We operate in the method of business to business, programmer to programmer, person to person.
- Navigation:
- Products and Services
- Computer languages
- Software knowledge
- Server experience
- Security
- Accessibility
Products and Services ^
Contact us for a quote.
- Desktop application development
- ERP development
- Web development
- Web design
- Databases
- Hosting
- Website restore/revamp
- Servers
- Server maintenance and renovations
- SEO and Search engine input and checkup
- Web marketing operations
Computer languages ^
Contact us for a quote.
- Valid and Accessible XHTML 1.1 and HTML DOM
- Accessible CSS 1, 2, 3
- ECMAScript (DMDScript, JavaScript, JScript)/XMLHTTPREQUESTS
- OOP PHP
- Python
- MySQL
- PostgreSQL
- SQLite
- Scheme/DTD
- XML, XML DOM, RDF, RSS, XSL (and Transformations), SVG
- COBOL
- Java
- POSIX Shell/Bash
- MS-DOS Shell/Batch
- PowerShell
- Perl
- JSON
- C
- C++
- Ruby
- BASIC
- LaTeX
- Restructured Text
- And Much More!
Software knowledge ^
Contact us for a quote.
- Adobe Photoshop
- Adobe ImageReady
- Gimp/Gimpshop
- Inkscape
- GD graphics library
- Imagemagick
- Sablotron
- Custom application development
Server experience ^
- Unix system-like & GNU/Linux operating systems:
- Debian
- Ubuntu
- CentOS
- Solaris
- FreeBSD
- OpenBSD
- And more!
- Web Servers:
- Apache HTTP Server
- Cherokee HTTP Server
- IIS
- nginx
- Xitami
- Zope
- Database Servers:
- MySQL
- PostgreSQL
- Oracle
Security ^
- Regular Expressions (used very extensively)
- Base64 encoding on top of SHA1/2 encryption
- Very secure site with mod_rewrite and disabling any sign of backend services
- SSL/HTTPS workings
-
We follow the OWASP Top Ten Project
- Unvalidated Input
- Broken Access Control
- Broken Authentication and Session Management
- XSS
- Buffer Overflow
- Injection Flaws
- Improper Error Handling
- Insecure Storage
- Application Denial of Service
- Insecure Configuration Management
Accessibility ^
- Follow WAI-Guidelines Priorities 1,2,3
- Mobile Phone Tests
- Text-Only Browser Tests
- Color Blind Tests
- Cross-Browser Compliance
- Valid Section 508
- Valid WAI