using tag instead of hardcoded reference to pentesting.

This commit is contained in:
Deborah 2016-08-26 16:32:04 +02:00
parent 43cf34aa25
commit 00304b9e4f
2 changed files with 2 additions and 3 deletions

View File

@ -43,7 +43,7 @@ Potential threats and vulnerabilities are indexed, based upon the collected info
<p><b>Step 6: Exploitation</b><br/>
Attempt to use vulnerabilities of the various components.
The diverse applications and components of the client's infrastructure are
relentlessly probed for frequently occurring design, configuration, and
rigorously probed for frequently occurring design, configuration, and
programming errors.</p>
<p>Note: <company_long/> uses open-source scanning tools to get its bearings,

View File

@ -8,8 +8,7 @@
</ul>
<!-- snippet --><p>
Our fixed-fee price quote for the above described penetration
testing services is <p_fee/>.- excl. VAT and out-of-pocket expenses.
Our fixed-fee price quote for the above described <company_svc_short/> is <p_fee/>.- excl. VAT and out-of-pocket expenses.
<company_short/> will send an invoice after completion of this assignment.
<client_short/> will pay the agreed amount within 30 days of the invoice date.
</p>