Välkommen till InfoTechSec® LLC!
Vi arbetar med juridisk rådgivning samt IT säkerhet

Vi är ett företag som arbetar med återställande av data när denna omedvetet eller medvetet har förstörts på en eller flera hårddiskar, minneskort eller SIM kort
Vi har över 20 års branscherfarenhet som IT forensiska utredare

Material vi använder och rekommenderar är endast det absolut bästa som finns. Inget annat än världens bästa kvalitet i produkter duger för oss
 

Klicka på någon av de två bilderna här nedan för mer information om respektive område

           

           

Här befinner du dig just nu och det här är ditt system. Your current location and system is located here:

Welcome to InfoTechSec
® LLC

This company was registered in Florida 2008 and has been active in Sweden since 1994 when the headquarter changed its location for many reasons.

We are mainly working with all kind of IT related issues for individuals and companies. The most important operation we conduct is to ensure that our clients have a clean, updated and secure computers at home, in your office or large server institutes.

We only use and recommend the best products available in the world!


Security issue regarding computers, both at home and centrally, is unfortunately still neglected and it seems like not many people realize that this is a major problem. This is why we are specialized with this.

e-Mail consultation
Every e-mail that we reply to will be charged before a reply is given with €65 or 500SEK.

Misuse of the word hacker
For an instance media, almost world wide, are misusing some terms that we want to correct, this word is "Hacker". As soon as an illegal attack has been made to an Internet site media blames a Hacker which is completely wrong. The individuals that are attacking and destroying IT systems are called "Crackers", and they are doing the illegal work that legal Hackers have to correct and restore. This is very unfortunate that media is not paying attention to these differences in the two words. It is hard to work with IT security issues when the general public are afraid of hackers but have no idea what a cracker is.

The most important thing regarding IT security is to be sure to have an Antivirus software installed, preferably with dynamic updates. Dynamic updates is when the antivirus software automatically downloads new virus definitions as soon as they are available. Also make scheduled automatic antivirus scans at least once a week. These kind of antivirus programs are available in almost any computer store or you can buy them from me. The antivirus software I sell comes with one year subscription of antivirus definition updates. The cost for such antivirus software is about €65. After the included 1 (one) year subscription is out of date you can buy additional updates on a yearly basis for as little as about €25, and that is a small investment to keep your computer clean. However, before installing any kind of antivirus software be sure that the computer is clean of viruses. Most antivirus software will perform such a virus scan prior  to installation.

Another way to increase the security of your computer, home network or large company networks is to install a hardware Firewall. Be sure to install and configure a hardware firewall, not software. Software firewalls can be eliminated by evil viruses and worms. When you install a hardware firewall the following procedure happens. Your ISP (Internet Service Provider) gives you an unique IP address such as an example 214.65.1.74, this IP address communicates with your hardware firewall which you are able to configure as you want, but your personal computer that is connected to the hardware firewall will get an internal IP address such as 169.0.0.1 or similar and your computer communicates with the hardware firewall with that IP number, so in this case all information such as hacker attacks will be halted by your hardware firewall. This kind of firewall are available for personal use with four (4) LAN (Local Area Network) ports (up to four computers can be connected to the internet at the same time using one internet access line) and one (1) WAN (Wide Area Network = internet) port. You simply connect the incoming internet connection cable to the WAN port on the firewall and connect your computer to one of the four LAN ports. After that, install the hardware firewall program and configure the firewall like you want to. But remember to set the security rate as high as possible and do not allow any internet connections to go unfiltered to your computer. A hardware firewall is a very good investment but you must know how to configure it so that it will keep you and your computer safe. Installation guides are included with all hardware firewalls. Prices varies, the one I sell for personal use is manufactured by SMC®. This firewall has one (1) WAN port and four (4) LAN ports and is available for as little as €115. But make sure that the computer is totally clear of all viruses included the register files are cleared of virus files otherwise the viruses that are present on the computer when you install a hardware firewall will be able to sneak through and access the internet and probably destroy vital software or system files.

For companies or larger home networks there are hardware firewalls available with either 4, 8, 16, 32, 64 ports and so on based on 16 ports upgrade, it varies with the type of manufacturer.

I want to illuminate the following two definitions you often read about, Hackers and Crackers.

A Hacker is a person that is hired by or employed by a company or works on behalf of a company or person to ensure the security on your computer and/or network. A Hacker may also backtrack attempted attacks on computers, sites, networks or e-mails and more.

A Cracker is a person that illegally cracks into your computer, network or spread viruses to cause your computer system or network to be corrupt, or plant spy ware software and monitor every single thing you do on your computer. They will be able to see your bank codes and account numbers, and if they want they can ruin all your system and empty all your bank accounts or hi-jack your credit card number and use it for themselves but the bill will go to you !

Media today often uses the term "Hacker attack" when they write about IT criminals, but that is wrong. Hackers are not evil people, they want to help you to get a better security. When media writes about Hacker attacks they often mean Cracker attack and nothing else.

About Privacy on the internet.
Every time you access the internet, either by dialup or broadband, you will be given a unique IP address that can look like this, 214.xx.xxx.xx. This IP address that your ISP will give you will leave traces on all sites and activities you do on the internet and will be traceable. Sometimes it even is possible to get the serial number of the computers CPU (Central Processor Unit). When an internet crime has been performed the IP number will be used to back-trace who has done the damage to the system or a cracker attack. After contacting the ISP the authorities can get access to the personal information about the person that had that IP address at that time. So think twice before you go out on the internet and believe that no one knows who you are. There are software available to download from the internet for a small amount of money to perform such back-traces. But authorities and hackers will use even more powerful tools to backtrack an IP address. Even a dialup internet access is traceable.

The same information is hidden in each e-mail you send, regardless of what kind of e-mail program you use, your ISP e-mail, or freeware e-mail software available on the internet the IP address will be included and is easy to bring forward.

To avoid SPAM e-mail's, make sure to have a number of different e-mail accounts. If you have been given an e-mail address from your ISP, use that only to persons that you trust and keep it secret for other people or companies. If you once have given you e-mail address to a company or information group or similar on the internet they store your e-mail address in a large database (unless they inform that they do not do that). This database with a lot of e-mail addresses can then be sold to a third party, that means that your e-mail will get a lot of SPAM e-mail's with different "offers", "special for you". To avoid these kind of SPAM e-mails get multiple e-mail addresses and use those when you have to give someone your e-mail address.

Everything is traceable. The internet is nothing else that a corporate LAN but much, much larger. As well as the IT staff at a company can monitor what their employees are doing on their computer, crackers can see what you do on the internet !


If you have any questions or want my help please contact us. By clicking the link you will send an e-mail to me.
Please note that I will not give support even by e-mail without a charge. All charges are paid with bank transfer and I will let you know what the charge will be to get online help.

All information on this side is protected by Copyright and may not be used without permission. All logotypes are used with permission from their owners.

 

                                                                                                                                                                        © InfoTechSec® LLC    1998 - 2024