- Extensive experience (since 2012) in creating web projects of any complexity.
- We work under an official contract on behalf of a legal entity (LLC) according to the TOR.
- We have our own system for analyzing and evaluating the TOR, which includes a mechanism for assisting in drafting the TOR for the customer.
- We implement your project using the LAMP/WAMP stack (Linux/Windows, Apache, Mysql, PHP).
- If there is a need to use emulation of human actions in the browser (for example, when parsing data from third-party web resources that have an active anti-bot system with protection against parsing), we will connect ZennoBox (C#), which will work in parallel with the main software system implemented on the LAMP/WAMP stack.
- Since 2012, we have developed a large number of projects using ZennoPoster/ZennoBox as a software basis for bypassing antibot systems of various web services.
- As a result, you will receive a website (web application) with the functionality you need. The WAMP stack (Windows, Apache, MySQL, PHP) will implement processing, storage and display of information.
- We will create the application web interface based on HTML/CSS+JavaScript.
- Dynamic loading of information into the web interface (without the need to reload the page) will be implemented based on AJAX technology.
- No frameworks will be used for development (Laravel, Symfony, YII, etc.). Any framework is a potential risk of security leakage. All project functionality will be implemented on the original PHP code, without adding source code from third-party sources to your project.
- We will connect your chosen payment aggregator (Robokassa, freekassa, yookassa and others) to accept payments on the site.
- We will ensure the security of all software algorithms that implement the operation of your website.
- We will configure the web server taking into account security standards.
- We will organize the operation of algorithms taking into account the blocking of all possible types of vulnerabilities (SQL injection, XSS, RFI / LFI, Code Execution, Path Disclosure, Broken Authentication and Session Management, Insecure Direct Object References, Security Misconfiguration, Sensitive Data Exposure, CSRF / XSRF, OWASP-10 and others)
- We are experts in understanding the principles of information security. We have our own development in this area – Security-Scan Vulnerability Scanner (Detailed information about it is available on our website: https://isaweb.tech/main/index.php?page=projects&hash=gjd2ydyokyd4xpmncc5 )
- FL Portfolio: https://www.fl.ru/users/isawebtech/portfolio/