You are here: Home > Partner Sites
Member Login  

IT Penetration Testing

One of my favorite movies from the 1990s was Sneakers, with Robert Redford, Dan Aykroyd, Sidney Poitier and other notables. It introduced a small band of experts who carried the audience through a seat-gripping intellectual thrill ride. Primarily a group of ex-criminals, the main characters employed a variety of clever devices and techniques to break into banks. They exploited the weaknesses in each bank's security, alarm systems and personnel. After breaking in, they presented the money they absconded along with a full report on the weaknesses they encountered, identifying possible measures to improve security. It was a clever work of fiction but could there really be men and women who make a living at putting security systems to the ultimate test?

In much the same way my silver screen icons outwitted some of the most sophisticated security systems, there are real students in real classrooms learning how to find the vulnerabilities in real computer networks owned and operated by real companies. Once trained and certified, these experts perform IT Penetration Testing or Pentests and then supply the client with detailed information regarding the weaknesses in its software, hardware, and personnel. Such tests provide valuable information and are much more common than what was portrayed on the big screen.

A few organizations have worked to create an industry standard and a set of guidelines and methodologies for the purpose of creating curriculum, providing support for professionals and identifying a measuring stick for performance evaluation. While these benefits are attractive and fall within the realm of measurability, which makes managers, marketers and customers more comfortable, the very idea of creating a standard runs contrary to the most valuable asset a pen-tester possesses. Their ability to think outside of the box and conceive of new and sometimes radical methods of attack make him or her more effective in identifying the chinks in the armor of the system at hand. It is imperative that the pen tester learn to think like and pre-empt the malicious hacker's creative attempts to penetrate the client's systems. The hacker will not follow a pre-determined guideline, so neither should the tester, if he or she really wants to be effective at more than going through the motions and producing a lengthy and redundant report. Standardized methodologies can serve an important function in the education of would-be pentest professionals but once the rudiments are learned, the standard should take a back seat, allowing experience and creativity to commence the learning.

IT Penetration Testing is not the only way to ensure a system is secure but can any system be considered so without it? I recently read about a company that fell victim to the theft of a large amount of customer information, including social security numbers, birth dates, account numbers, passwords, security question answers and other information. The theft occurred over five years ago and yet one IT security professional demonstrated on his blog, just how vulnerable that company's website remained after the attack. He was not intent in doing harm but he showed that such would not have been very difficult if his intentions were less than ethical. I think it is safe to say that the company in question spent a large sum on improving its system security. Is it also safe to say that the company did not hire a competent pentester to examine its systems? The interesting thing was that the methods used by the hacker to do all of that damage were not very advanced. I would contend that an effective penetration test would have saved the company a literal fortune in IT upgrades, court costs and lawyer fees, settlements if any and a virtual public relations nightmare (pun intended). The hope is that you and I will learn from this expensive lesson and save ourselves massive grief in the future by having our servers tested today.

Price (paid annually): 
Setup Fee: 
Money Back Guarantee: 
30 days
30 days
30 days
Disk Space
15000 MB
25000 MB
40000 MB
300 GB
400 GB
500 GB
Control Panel Demo
Username: demoacc
Password: demo
NEWS: launches a new system and a new site.
On October 18th, in an effort to reach a larger global market, Just 5 Bucks Hosting joined forces with LiquidNet and These new plans and services are in addition to our existing plans and services. All customers that signed up prior to 10/18/05 will still be able to use the HSphere Control Panel system without any changes in their current service. We plan on continuing the HSphere service and will continue to improve and manage the HSphere system indefinitely.
Members That Signed up prior to 10/18/05 - Click Here to go to the original Home Page.
To login to your Control Panel, Click Here.

Compare Hosting Plans
Which plan is right for you? Compare our plans.

$15 Domain Names
Save $20 on every domain by registering with us.

About Us
Find out who we are and how we work for you.

Knowledge Base - FAQ
Have a question? You can find most answers here.

Contact Us
Please let us know how we can help you with your needs.

 Member Login:


Customers using our HSphere system, please login here.

FREE Site Studio Website Builder with every account!
 Phone Sales & Support

Toll-free US Sales & Support
1-800-574-0902 ext. 30703

UK Sales & Support
+44-20-7993-2768 ext. 30703

International Sales & Support
+1-510-870-2470 ext. 30703

  Compare Hosting Plans | $15 Domains | About Us | Contact Us
© 2005 & LiquidNet Ltd. All Rights Reserved. 24/7 Support powered by our Proper Support system.
best web site host | low cost website hosting | small business web hosting | website hosting company | cheap internet hosting | e-commerce hosting | ecommerce web hosting | business website hosting | domain registration | Articles 1 | Articles 2 | Link to Us | Resources | cell phone deal | somalife growth hormone | email marketing tools | lds ctr rings