Upload
ben-dahl
View
216
Download
0
Embed Size (px)
Citation preview
7/27/2019 Vantage Point Computing Project Proposal
1/1
MEMORANDUM
TO: HK Revisions
FROM: Vantage Point Computing (Ben Dahl, Tony James, Benny Leung)
DATE: APRIL 20, 2009
SUBJECT: Vantage Point Computing Security Manual Proposal
_______________________________________________________________________
Dear Professor Hornat-Kaval:
After investigating your network setup, we have determined that you are not protected.
In order to keep your date safe, this network must be secured. This needs to be fixed as soon as
possible to prevent loss or theft.
The current equipment does not need to be changed, but settings need to be adjusted. This will
require us to access to your Internet connection and your computers. You need to choose names
and passwords for your connection and hardware. Once we have these items we will fix your
security.
The setup will be performed using the Vantage Point Computing Security Manual. This manual
is a step-by-step guide for securely setting up your equipment. This manual explains how to set
up your router and computers using the actual computer screens you will see. After the setup is
done, this manual is yours to keep. We have found that you can fix many problems with this
easy to use manual. This saves you the effort and cost of having to contact technical support.
The setup takes between two to four hours and will be done by one of our technicians. The fee is
$125 per hour. After the setup, the technician will provide you with your copy of the manual and
answer any questions you may have.
Please contact us as soon as possible for scheduling. You may also contact us with questions,
comments, or concerns.
Vantage Point Computing202 69th St.Darien, IL [email protected]