The members of Fatasan Company, which have a history of performing various research and industrial activities, including the National Search Engine, the design of smart systems, computer security, etc., have sought to integrate their activities into a company. In this way, the Fatasan Company officially began its activity in the summer of 2012.
Penetration testing, also called pen testing or ethical hacking, is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit. Penetration testing can be automated with software applications or performed manually. Either way, the process involves gathering information about the target before the test, identifyingLearn More
The process of software development services in our company goes through a series of stages in step wise fashion that almost every developing company follows. Known as the ‘software development life cycle,’ these six steps include planning, analysis, design, development & implementation, testing & deployment and maintenance. 1. Planning: Without the perfect plan, calculating the strengths andLearn More
Lines of Code
General Automobile System for Free zonesPortfolio
General Industry System for Free zonesPortfolio
General Payment System for Free ZonesPortfolio
The 12th International ISC conference on information security and cryptology, held on September 8-10, 2015, with the presence of security and cryptography activists. In the course of the conference held at the University of Guilan, 45 papers have been accepted in various areas of information security that was presented at the conference days.