diff --git a/xml/source/snippets/offerte/en/methodology.xml b/xml/source/snippets/offerte/en/methodology.xml index 7a26cc2..eacdfb1 100644 --- a/xml/source/snippets/offerte/en/methodology.xml +++ b/xml/source/snippets/offerte/en/methodology.xml @@ -43,7 +43,7 @@ Potential threats and vulnerabilities are indexed, based upon the collected info

Step 6: Exploitation
Attempt to use vulnerabilities of the various components. The diverse applications and components of the client's infrastructure are -relentlessly probed for frequently occurring design, configuration, and +rigorously probed for frequently occurring design, configuration, and programming errors.

Note: uses open-source scanning tools to get its bearings, diff --git a/xml/source/snippets/offerte/en/planningandpayment.xml b/xml/source/snippets/offerte/en/planningandpayment.xml index 9de70b3..5bc06ae 100644 --- a/xml/source/snippets/offerte/en/planningandpayment.xml +++ b/xml/source/snippets/offerte/en/planningandpayment.xml @@ -8,8 +8,7 @@

- Our fixed-fee price quote for the above described penetration - testing services is .- excl. VAT and out-of-pocket expenses. + Our fixed-fee price quote for the above described is .- excl. VAT and out-of-pocket expenses. will send an invoice after completion of this assignment. will pay the agreed amount within 30 days of the invoice date.