Sentinel Logo
PATREON EXCLUSIVES
Support me on Patreon
Supporting me on Patreon means that you have access to my e-Guide which contains up-to-date critical information relating to cybersecurity and much more and Articles which is not openly accessible to all since bad actors. Essentially avoiding threats is part of my Zero tolerance policy.
QFSERVICES ADS
Below is list of all our adverts, past and present. Click on the a image to show the original advert.
TECH SUPPORT PRICING
Windows Related
R700 per hour
Hardware Related
R700 per hour
Internet Related
R700 per hour
Cybersecurity Related
R750 per hour
Data Recovery Related
R800 per hour
CONTACT DETAILS INFORMATION
While I mention on the right to consult a security expert. Which you should be careful when doing, however, since you really do no want to take any chances with any sort of Malware rather consult a an expect you can trust. Below is my contact details. I make use of Proton Mail.

Proton was born in Switzerland in 2014 when a team of scientists who met at CERN (the European Organization for Nuclear Research) decided to build a better internet where privacy is the default. It is the most secure and privacy focussed email service by far. You may be using GMAIL and well perhaps you should read WHO is using Proton and why. I will add the link to Proton below, however, since people tend use email addresses listed online chaos results, with proton, I can track who is using attempted to scam me.
MY CONTACT DETAILS
Steville Hattingh
info@qf-security.co.za
Phone
+27 66 291 3687
In case you want to verify my creditendials, you can visit either:
Master of Computing
Belgium Campus iTversity
Bachelor of Computing
SAQA
CRITICAL INFORMATION
The cyber threat landscape have always been shifting, but unlike any other period in time, cyber risks are so frequent that the time of posting this, much of this is not resolved but instead overshadowed by additional threats. This section deals with threats you cannot ignore.
MAIN SECTIONS
When I initially created this site the intent was to create a simple one page site showing only the services I offered. However, after a lot of research into current trends regarding security and the risks posed by cyber security threats, I have decided to turn the site into a platform into one that expands on clear and present danger of cyber threats. You can thus find a breakdown on the services I offer by going to   SERVICES or by using the MENU -> SERVICES
WINDOWS (OPERATING SYSTEMS)
Since most people use Microsoft Windows, this section is dedicated explain some of the common problems experienced, the symptoms and what to you are experiencing any of the problems mentioned in this section.
HARDWARE
Since many of the problems as mentioned in the WINDOWS SECTION might be as result of hardware and / or software. For example: If you have laptop and your webcam is not working it may very well be related to corrupt drivers (drivers is the interface between you operating system and hardware, which when not working, can result in your webcam not working. However the problem can be hardware related. Only once I have diagnosed the system will I be able to determine whether it is software related or hardware related. It is for this reason that I do not have section which is dedicated to HARDWARE.
CYBER SECURITY
Perhaps the primary reason why I expanded the website to be as insightful as possible is because of cyber security matters. Cyber threats are not only related to computers such as laptops or computer but instead spans all devices connected to the internet. Most of the content on the site relates to online security since it is by far the biggest issue people are facing. Conversly it is the least understood by users. The site contains a wealth of information that explains the critical nature of cyber threats. From the various terms used and what they mean to real-time monitors showing you attacks as they happen on a global scale.
INTERNET
Internet means everything that enables you to communicate with anyone else not simply browsing website and working with email. IoT refers to everything that is capable to connect to internet even though such may not be used by you it is a gateway that hackers can use to gain access not only to that device but all other devices you own. This could be something as simple as smart watch to even your vehicle. For this reason it important to understand how unprotected you are.
THE INFLECTION POINT
The meaning of INFLECTION POINT is a moment when significant change occurs or may occur (dictionary definition). In IT, the inflection point can be consider as something unexpected to which you have been compromized beyond the point where something can be done to assist you and thus the only way to mitigate this from becoming a reality is by having the proper security protection measures in place. This section also deals with cutting edge methods criminals deceive you. How services you frequently used, usually considered as safe, can be deceptive and used against you. There is a ton of information available under this section which better explain this.
DATA RECOVERY
You might have important information which due to corrupt storage media such as a hard drive or accidental deletion of files which offers you no means to recover the lost data. Though it is not always possible to recover data it is possible to recover data using specific techniques and tools to recover what can be recovered. Data loss may be as result of the aforementioned but can also be as result of bad actors who delete your data. When you have fallen victim to ransomware than data recovery is not possible. I have spend a significant time adding information explaining how extremely dangerous this kind of attack is by adding both text a video content showing how not even the best cyber security experts in the world can help you.