Warning: "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /homepages/29/d140539993/htdocs/clickandbuilds/WordPress/MyCMS2/wp-content/plugins/revslider/includes/operations.class.php on line 2858

Warning: "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /homepages/29/d140539993/htdocs/clickandbuilds/WordPress/MyCMS2/wp-content/plugins/revslider/includes/operations.class.php on line 2862

Warning: "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /homepages/29/d140539993/htdocs/clickandbuilds/WordPress/MyCMS2/wp-content/plugins/revslider/includes/output.class.php on line 3708
CompuTronic - System Optimization, Embedded Linux and It-Security
  • Often IT contains faulty stuff -
    We assess and remedy!
  • Aspiring for higher things
    We will take you there!
  • Professionalism Online!
    We shield – secure –rate!
  • Do you really have to go to Silicon Valley for high-tech ...
    If good things can be found nearby?
  • To understand the matrix …
    We are glad to help!
  • Measure
    the benchmark for pleasure
  • We deliver ...
    bright results!
  • Hardware required? Always up to date –
    state of the art gadgets – only!
  • FOB -
    Welcome on board!


Can we make it a bit more?

Today´s world of information technology is subdivided into a multitude of special fields. May it be computer science in economics, technical informatics, IT security, software engineering, internet programming or the network world as a whole.

Even though the know-how of our staff spans most of these special fields, we feel very comfortable with the following areas:

  • Linux Adaptation

    Linux, also in its form as Google Android, has completed the entry into the present-day system environment. Particularly for the industry a Linux adaptation is an important process. Gladly you can tap our longtime wealth of experience.

  • Development, expansion or maintenance of your individual software

    You need or have software for your individual application purpose. Here we gladly support you in regard to maintenance or expansion of existing system and/or software design all the way to complete implementation.

  • System optimization and IT security

    Your IT systems for administration, production or on the Internet don´t function optimally the way you imagined it to be. Are there discrepancies with your bits and bytes? The optimization of any IT system succeeds! Get convinced.



Our know-how in detail

Here you find details about our service offer, structured by special fields.

  • Linux Server

    Apache, JBoss, Glassfish, Tomcat

    Sendmail MTA, Samba, NFS

    Webmin

    ThinClients (Thinstation) and IGEL

    PCHelpware Repeater

    different Deamons & Distributions

    SVN, GIT

  • Microsoft Standard and Serversoftware

    Win SBS2011, 2K12, 2K8, 2K3, 2K & NT Server

    RDP/Win Terminal Server and Citrix AE

    Exchange since 5.5

    Office 365 and Azure DirSync

    Win 8, 7, XP, NT, 3.11, DOS

  • Software-Dev. and Programming Skills

    Primaries: 

    QT4.8, C++ / C, Ruby on Rails, PHP, HTML, AJAX, Bash and Shellscripts, Wordpress

    Secondaries: 

    VBA, Typo3 Extensions, Java, JSP, J2EE, Maven 2, Struts, Hibernate, JSF

    Embedded: 

    ASM (Sparc ERC Rad Hard/x86), Atmel ATMegaX

  • Sectoral Software

    Adobe & Corel Produkte, Quark Xpress

    OpenOffice, Office Pakete (Excel, Word, PP), Office 365

    Velhotel, Intercafe, Intercall

    Datev

    Lexware Produkte (LFO-Pro)

    LXOffice, CIP-Komuna

    MS Dynamics NAV

    Faust6u.7 u. iServer

    AMS – Assekuranz Management System 

    Everest 2010

    Nemetschek Allplan und VectorWorks 

     

  • Embedded and Multimedia Linux

    Texas Instruments Sitara Linux on AM335x

    Freescale i.MX28 with LTIB

    Kernel- and Driver-Adjustment

    D-Bus

    X11 and compiz

    MPlayer

    DVB-API Linux TV

  • Additional Operating Systems

    RTOS VxWorks

    Apple Mac OSX

    different Linux derivates

    Kali-Linux

    Microsoft Windows (NT-W8)

  • IT Security and Networks

    Vulnerability analysis and penetration tests with Kali-Linux

    information procurement, password attacks, wireless attacks, exploitation, sniffing and spoofing

    watchguard und cyberoam UTM

    IPSec & VPN, WLAN Security

    Bluetooth and BLE for Linux

    Dynastream ANT+ 

  • Database Systeme

    MySQL

    sqlite

    Faust6u.7

    MSSQL

    Oracle

    AskSam

    PostgreSQL