You are on page 1of 9

Security Assessment MONITORING

Automatic Documentations

We conduct monitoring of servers, networks and PCs, using
analysis tools that enable us to measure risks, to which our clients
computing environment is vulnerable, by assessing what the risk
incidence did, now it did it, and the consequences of doing so.

These analysis software tools provide comprehensive desktop
surveillance that monitors, captures leads, and records all unknown
activities, such as:
 Malicious and intrusions activities
 Internal and internet email abuse (sent and received)

 Computer frauds and abuse, via all websites
visited/chats/downloads done/browsing/keystrokes recorded,
hacking, etc..
 Electronic disclosures and corporate espionage
 Critical daily(or temporary) to master files, swap files, sources of

ambient data.

Our set of monitory tools are specially designed to identify, contain,
eradicate, and recover from losses, through performance of
counter-measure follow-up activities.
Other special monitory activities include:

DOWNLOAD ORDER (SUB-PAGE)
PROGRAM NAME: BDSMONITORING. EXE/ BDMONITORING. ZIP
Amount: $099.0 or its equivalent in £, E, N, or other currencies
ACCOUNT TYPE: CURRENT
ACCOUNT NAME: CHUKWUEMEKA NWORU (BDS NIGERIA LTD)
ACCOUNT NUMBER: 321430000128101
BANKER: FINBANK PLC, FAULKS ROAD BRANCH, ABA, ABIA STATE,
NIGERIA
AFTER PAYMENT: Email us details of your payments. On
confirmation of your payments, we will send you the down load link
for the executable monitoring softwares named above.

REQUEST FOR OUR SERVICES: You can also click on this heading to
request for our monitoring services of your company or private
computing activities, on a contractual basis, so that we can on site
or remotely monitor your computing environment against all forms
of frauds and risk.

On receipt of your completed form, we will send you a quotation for
contractual service based on evaluation of your computer/digital
security requirements.
Configuration Reporting
Trouble Shooting SURVEILLANCE
Security Assessment

DETECTION AND PROTECTION TOOLS
Our company installs detection tools- which are computer
software’s on our clients computer servers, PCs, and other digital
devices. This can be done before or after any critical or lethal
incident, to help identify the risks involved in the incident

NETWORK VERSION: The network based version of our
detection tools: BDSSURVEILLANCENET.EXE, has a versatile
information gathering capability, which enables scanning tools to
exhibit dissipation to detect critical and lethal risks, and to analyze,
evaluate one host from another host using he same network, scan
the different protocols (Http,Tcp,Udp,etc) and conduct innocuous
port scans, detect operating systems in use, specify IP address/DNS
Name /Network number, all required to confirm a picture of positive
image of general security.

CLIENT SERVER MODEL : The Client-Server model of our
software detection tools: BDSSURVEILLANCENET.EXE, has excellent
graphical user interface (GUI), and work as general purpose
vulnerability scanners, that
• Analyze IP Packet responses
• Detect fragmented packets and illegal Ftp/Http Sites
• Audits a web server for Cgi vulnerabilities
• Conducts IP ID/ Port/Network ID/ Configuration file scannings
• Identifies malicious traffic based on signatures and alerts the
compromised organization of the intrusion.
PROTECTION TOOLS: We employ protection tools:
BDSPROTECTIONS.EXE , to mitigate risk that our detection tools
have identified on clients system or networks. These protection
tools work to complement existing network or system counter-
measures.

Our protection tools are directed at controlling malicious traffic of a
specific type, in depth intrusions, and loss of information assets.
These protection tools automatically document excellently
maintained logs that help to identify and mitigate these risks to
systems and servers.

DOWNLOAD ORDER (SUB-PAGE)
BDSSURVEILLANCENET.EXE $99.95
BDS SURVEILLANCECSM.EXE $97.95
Bds protections.exe $97.95

PASTE PEPEATED TEXT HERE
Security Assessment www.networkinstruments.com
Configuration Reporting www.ecora.com/eval
Trouble Shooting www.perfgal.com
System Recovery
NETWORK SECURITY

We provide our clients with real network securities, which is
constantly on alert to spot internal and external threats and
attacks, before they occur and respond to them to mitigate the risk
of occurrence that may compromise our client’s business.

Our suite of network security monitoring and analysis softwares is a
complete network security performance solution for servers,
operating systems, applications, workstations, and network
systems.

In offering our services, we complement our network security
software solution with a host of other third party softwares from our
partners, or others for whom we act as resellers.

Our services include:
a. Creating effective computer crime policy and ensuring that
compliant issues defined in corporate computing policies
are adhered to completely
b. Provision of network infrastructure security
c. Defection of network vulnerability and penetration testing.
This includes diagnose of critical problems automatically,
monitoring all ports in a switch, blocking security holes from
probes, detection of network abnormalities, device or router
failure, and configuration of instant notifications
d. Provision of internet, web/E-commerce security and
monitoring of individual users and sites contacted on the
internet.
e. Protection from viruses, spam, spyware, adware, employee
abuse of emails (email security), and information
espionage.
f. Restriction of files /data/programs/software/hardware
components for security reasons.

DOWNLOAD ORDER (SUB-PAGE)
SOFTWARE NAME: BDSNESECURITY.EXE/BDSNETSECURITY.ZIP.
AMOUNT: $499.95 or its equivalent in £, N, E, or other currencies
ACCOUNT TYPE: CURRENT
ACCOUNT NAME: CHUKWUEMEKA NWOSU (BDS NIGERIA LTD)
ACCOUNT NUMBER: 321430000128101
BANKER: FINBANK PLC, FAULKS ROAD BRANCH, ABA, ABIA STATE,
NIGERIA

AFTERPAYMENT Email us details of your payment. On
confirmation of your payments, we will send you the download link
for those executable network security software programs named
above.

REQUEST OR OUR SERVICE (click this heading to request) You
can also request for our service instead of procuring the network
security software, so that we can contract to watch and respond to
all your network security problems. On receipt of your completed
form, we will send you a quotation that is done out of an evaluation
of your security requirements.
Auditing
Compliance management

E-AUDITING

To keep your critical systems secure, and be enabled to catch
intruders and identify internal/external risks you need to
collect and analyze you personal or company audit trail data
regularly and efficiently .

Our automated auditing software suite allows our clients to take a
deep and revealing look at their audit data, and automatically
analyze security events.

This is a service we conduct in the form of fraud investigation or e-
auditing, using our set of powerful security monitoring and
analyzing softwares: BDASUDITOR, which automates the processes
of documentation, processing and analysis of information related to
a fraud investigation.

FEATURES:
The features of our software suite for e-auditing include:
a. Capturing security audit trails
b. Automatically identifying policy violations and complaint
information
c. Reducing business losses and increasing information assets
security
d. Automatically setting up case files for fraud investigation
e. Extracting records into case files
f. Checking for sequence gaps in records of relevant files
g. Creating suspects files
h. Documenting evidence in an admissible manner
i. Generating findings and conducting interviews
j. Presenting internal report and creating management
opinions
k. Preparing evidence for prosecution
l. Tracking expenses by case
m. Viewing cases by status, investigator, findings, fraud types,
etc

ORDER NOW: (SUB-PAGE)
Download our e-auditing software’s for ($1500.00). Thereafter, we
will send you the down link for the e-auditing software. Complete a
form to request for our e-auditing service: click here
Click “payments” to Pay by Bank Deposit/Transfer/Credit Card/Atm

DOWNLOADBLE FILES:
http://Bdsforensicsandnetsecurity.weebly.com/E-
Auditing/BDSAUDITORS.EXE
http://Bdsforusicsandnetsecurity.weebly.com/E-
Auditing/BdsAuditor.zip

A-PAYMENT: (SUB-PAGE)
Amount: $1500.00 or its equivalent in £, E,N, or other currencies
ACCOUNT TYPE: CURRENT
ACCOUNT NAME : CHUKWUEMEKA NWORU CBDS NIGERIA LTD,
ACCOUNT NUMBER: 321430000128101
BANKER: FINBANK PLC, FAULKS ROAD BRANCH, ABA, ABIA STATE,
NIGERIA
AFTER PAYMENTS
Email us your details: Payment Teller Number, Date of Payment,
Amount deposited, Depositor’s Name, Bank of Deposit, Branch of
Deposit, Form of Deposit,.(Cash /Cheque /Atm /credit card).

On confirmation of your payments, we will immediately send you a
download link for the e-auditing software: BDSAUDITOR.