This page will be completed by November 30th

!"Security, Hacking, Privacy"!

When my site is complete you will have more information to understand the procedures I take when you hire me for security services. Till then you can discuss with me verbally or by email your interest.

When completed, this page will provide you extreme detail of the firewall services, anti-virus solutions, and network penetration scans that I can perform on your network. I consider myself an Ethical Hacker. What this means is " I studied the traits of hackers and how they penetrate systems, just so I can learn how to hack and defend from those attacks. To defend yourself from the ENEMY you must see through the ENEMY's eyes". I use the same tools that hackers/crackers use just so I can see what they will see on your network. For example lets say you are the victim to a tcp, udp or icmp scan. If I detect any open ports on your computers. I will then run vulnerability scanners to see if those services/ports that are running is EXPLOITABLE by a hacker.
This was just a basic brief explanation of my security services. I know you will enjoy this page when it is complete and full of detail of how I can secure your computers/network!

Read what IBM has to say about ETHICAL HACKING

http://www.ibm.com/Search?v=11&lang=en&cc=us&q=ethical+hacking

joeycepeda@yahoo.com
956-648-8409

copyright ©2002 JoeyCepeda.com All Rights Reserved

A+ Certification Logo
Network + Certification Logo
I-Net Certification Logo
Certified Internet Webmaster Certification Logo
Cisco CCNA Certification Logo
Cisco CCDA Certification Logo

     
 
 
 
   

Security Evaluations, Penetration Testing, Vulnerability Scanning Are you studying for a Certification Exam?