I wanted to outsource the management of our Linux servers.

Garda Informatica systems engineers have been the solution.

» Learn more

I wanted to outsource the management of our Linux servers. Garda Informatica systems engineers have been the solution.
My site was targeted by hackers.

Garda Informatica specialists have eliminated the threat.

» Learn more

My site was targeted by hackers. Garda Informatica specialists have eliminated the threat.
I had lost very important Word documents.

Garda Informatica systems engineers have recovered deleted files.

» Learn more

I had lost very important Word documents. Garda Informatica systems engineers have recovered deleted files.
We have chosen

Garda Informatica
We have chosen Garda Informatica

Linux, Web Application Security, Data Recovery and Forensics

We offer services of Linux Server Administration, Web Apps Vulnerability Analysis and Remedy, Forensics and Data Recovery

Linux Server Administration

We support the management of Linux Server in the following fields:

  • Device management;
  • Administration of permissions;
  • Process Management;
  • Backup filesystem;
  • System updates;
  • Monitoring resources and workloads;
  • Installation and configuration of specific packages;

Database Support

We support the MySQL and DB2 database management in the following areas:

  • Performance analysis and index creation;
  • Backup/Restore and related Policy;
  • Creating statement/query;
  • Parameters Configuration;

Bash Script

We develop Linux shell script utility in the following fields:

  • System diagnostics;
  • Monitoring devices and resources;
  • Backup/Restore database;
  • Activities Log;
  • Execution of Application;

Web Vulnerability Analysis

We carry out security assessment to eliminate the vulnerabilities of Web applications both proprietary and open source written in PHP. We operate in the prevention of possible threats through the activities of penetration testing and code review, but even after a system has been washing through the activities of data analysis, log analysis and implementation of a remediation plan:

  • security assessment: we analyze the IT infrastructure and web application of interest in order to identify vulenrabilità and potential security risks;
  • information gathering: we analyze what information can be found from the outside even by an attacker. Understanding what information an attacker can get is important to prevent cyber attacks;
  • vulnerability scan: We perform scans for known vulnerabilities in order to identify potential flaws;
  • penetration testing: We perform some attempted attacks to test the robustness of the system;
  • code review: we analyze the source code of the application in order to identify some common programming errors that can compromise the security of a web application;
  • data analysis, log analysis: as a result of an intrusion or after a defacement of a website, retrospectively we analyze the apache web server logs (error logs and access logs) to identify which HTTP call (GET and POST) have permitted to carry out the cyber attack;
  • remediation: once analyzed the vulnerability exploited by attackers we clean up the website from viruses, backdoors and malicious files. Also, once cleaned up the system we proceed to put it safely correcting vulnerabilities;
  • monitoring e intrusion detection systems: to prevent new attacks we prepare a series of tools that prevent threats and alert when vulnerabilities are exploited;
  • report and briefing: after our activities we write a document with details of the activity, vulnerability encounter and possible solutions to be introduced;

Computer forensics and data recovery

We are active in the field of computer forensics where we have engaged in the acquisition of evidence, deleted data recovery, recovery of versions of the same document at various intervals of time, looking for all the files and deleted with a certain content and generally all analysis and metadata extraction:

  • acquisition of evidence: this step involves creating a copy bitwise also called "image" of the support (hard drive, SSD, USB memory, etc.). The aim is to freeze the data for analysis in a non-editable format so that all subsequent analyzes do not compromise the original data;
  • deleted data recovery: once created the disk image we proceed to the recovery of deleted data. This is possible because when deleting a file the Operating Systems does not remove its contents, but remove only the file name and the reference to the storage area where it is saved. Looking in the areas of memory unallocated we can recover deleted files, provided that they have not been overwritten in the meantime;
  • volume shadow copy: for Windows operating systems we can also recover deleted files or retrieve older versions of a file by accessing copies stored in recovery points of windows. The S.O. windows with a certain rate and before any upgrade or installation of new driver creates the "recovery copies". Through these copies you can retrieve the version of the files on the disk at different moments;
  • data carving: this technique allows to recover deleted files looking into areas of the disk unallocated for common headers. For example if we want to recover the JPG file we know that these always start with the sequence of bytes "FF D8 FF". Searching this sequence in unallocated disk areas you can identify the beginning of JPG files;
  • advanced search: once retrieved the files of interest it is possible to operate a further search inside them to filter only those that contain a string of interest (eg. the name of a patient, the name of a street, etc. );
  • metadata extraction: this analysis focuses on metadata associated with files. The metadata include the name of the file, the dates of creation and modification, users of the latest change, etc.;
  • report: every forensic analysis ends with the production of a document containing the list of activities and an archive of recovered files;


Some solutions developed

Amministrazione Linux

SUSE Linux Enterprise Administration

Administration of servers with S.O. SUSE Linux Enterprise. The activities include: creation of DB2 backup scripts, backup application software, restore activities, disk occupation monitoring scripts, server status.

Amministrazione Linux

CentOS 6 and CentOS 7 server administration

Administration of LAMP web servers with Parallel Plesk. Backup tasks on S3 storage, development of intrusion detection and monitoring scripts.

Attività Forense

Forensic Activities Recovery Clinical Records

Forensic recovery of records in the .docx format. Were retrieved deleted and past versions of medical records using the shadow copy of Windows
» Approfondisci il Case History

Security Assessment

Joomla Vulnerability Attack Analysis

Analysis of several attacks that have characterized some thirty sites created with Joomla. Activities of safety, preventing new attacks and fix vulnerabilities.
» Approfondisci il Case History


All prices exclude VAT.


We are two brothers, software engineers, specialized in developing customized software solutions.
  • Lorenzo Chiodi

    Eng. Lorenzo Chiodi

    Position: Founder
    Fields of interest: management software, database, web, industrial automation.

    Linkedin profile of Giovanni Chiodi

  • Giovanni Chiodi

    Eng. Giovanni Chiodi

    Position: Founder
    Fields of interest: algorithms, networks, operating systems, computer vision.

    Linkedin profile of Giovanni Chiodi

Why choose us

☑ We are transparent
Our offers are clear, there are no hidden charges and never generate surprises for the customer. We are just as we seem.

☑ We speak simple
Although technicians we are able to explain the concept more complex for those who are not technical.

☑ We communicate with clarity
Our emails are clear and concise. We do not waste your breath yet, nor neither the band nor do we waste time to our customers.

☑ We find efficient and effective solutions
Once the customer explained his problem we can find the best solution for him because we can think about all the possibilities and find the right balance between costs and benefits.

☑ We are professionals
Since we were 14 years old we eat computer science : ITIS Informatica, Computer engineering, Worked in major software houses, continuous updating.

☑ We are healthy
We live a regular life, sleep at least 7 hours a night, do not work more than 8 hours, we do not drink coffee, do not smoke, do not drink alcohol, we are not overweight, we eat fruits, vegetables, and we exercise regularly.

☑ We are fast
We can deliver our solutions in a short time and in close contact with the customer who does not have to remain on hold on the phone, open ticket, expect answers: call us and talk with us directly.

☑ We are reliable
We plan always everything so you can safely handle high-risk situations: something does not go as it should? No problem , we had expected.

☑ We are a guarantee
Every euro spent on us is a euro well spent and that will produce a return on investment.

☑ We are economic
We demand the right for what we can deliver that, when compared to the rest of the market is quite cheap (we should not pay salaries managers, secretaries, clerks, commercial, consultants, etc.).

☑ We are informative
We transfer gladly to our customers all the knowledge and all the necessary materials so that they become autonomous: sharing is caring.

☑ We are objective
For every solution we propose Pros and Cons so that our customers can make an informed choice.

Why not choose us

☒ We do not go in a hurry
To do things properly takes time. Working in a hurry means working badly and we do not work badly.

☒ We do not follow trends
We tend to prefer technology mature and conservative choices to minimize the risks of our customers.

☒ We do not go around the world
We can meet in person to know and/or to define the progress of the project, but we carry the work from our office.

☒ We do not enter into other society
Our business is to develop software.

☒ We do not sign contracts
If you want tell us about your idea, but keep in mind that we don't sign NDA or contract with penalties.

☒ We don't give away our work
Our work takes time , commitment and dedication , and for this we can not offer discounts.

☒ We do not work without advance payment
From the micro to multinational we always ask a down payment.

☒ We do not accept payments beyond 60 days
Usually payments terms are 30 days, for some special cases 60, but not beyond.

☒ Do not do anything
The opinion of our customers is important , but we are professionals.

Customers / End Users

Our solutions are growing the business of the following Companies

Contact Us

For further information please do not hesitate to contact us.

Garda Informatica
via Padana Superiore 82/i
25080, Mazzano BS

Phone: (+39) 030 68 98 477

We will respond as soon as possible. Fields marked with * are required.