Website/IP DIALSERVICESINVESTIGATIONS.COM may be hackable #PI, #GA, #hackerproof


Personal Notes: BENNY BASHAM is the founder and President of Dial Services.  He has over 17 years of law enforcement experience, is a graduate of Atlanta Law School, and has more than 30 years in the private legal sector .   He has established a well respected company that prides itself in professionalism, thorough investigations, and confidentiality.  Mr. Basham is a member of  IntelleNet, Ltd., Georgia Association of Professional Private Investigators, Investigative and Security Professional Association of Georgia, and Associate Member of the Georgia Association of Criminal Defense Lawyers, and is an authorized instructor on investigative techniques; and, has, himself , hundreds of hours of specialized training from law enforcement, legal, and investigative seminars and workshops he has attended over the life of his career.  Mr. Basham can be contacted directly at (404) 886-4501 or through his email address:  [email protected]

            CAROLYN TYRRELL,  an officer of Dial Services, has over 30 years experience in investigations, trial preparation, trial consultation, and courtroom assistance.  Prior to joining Dial Services, she was employed for approximately nine years as a paralegal with a prestigious law firm in Atlanta, Georgia.    Ms. Tyrrell specializes in sex crime cases and mortgage fraud.  She has been an authorized continuing education instructor in Georgia, Louisiana, and Texas.  Ms. Tyrrell has frequently presented on investigative techniques and trial preparation at lawyers association workshops in Georgia and Alabama, as well  as national  and state investigative associations.  Ms. Tyrrell is a member of the National Association of Legal Investigators, Georgia Association of Professional Private Investigators, and an Associate Member of  the Georgia Association of Criminal Defense Lawyers.  She has held memberships with  the  Georgia Council of Child Abuse, and student affiliate of the American Psychological Association.  Ms. Tyrrell has a bachelor of science degree in psychology, and holds an associate broker license in real estate with a GRI designation and CDPE certification.  She has hundreds of hours of continuing and specialized education from numerous workshops both in the legal , psychological, and real estate fields.   Carolyn Tyrrell can be contacted directly at (404) 550-6806 or through her email address:  [email protected]

           STEVE BASHAM is also an officer of Dial Services. Steve has been employed in the security and investigative industry for approximately 30 years.   He is a member of  the Georgia Association of Professional Private Investigators.  He participates in continuing seminars and workshops in the investigative and legal fields. Steve Basham specializes in skip tracing, background investigations, asset investigations, process service, and video surveillance.   He additionally oversees all day to day operations.  He may be contacted through the office or directly at (404) 886-4499 or his email address:  [email protected]


Industry: Law Enforcement
Vulnerabilities: 7
Scan Date/Time: Mon, 21 Mar 2016 15:30:44
Purchase: Click here to
Purchase the Report for $25

Follow us on Social Media to receive a 50% to 100% discount code we post every week.

If This Is Not Your Website:

  • You should cautious before giving this website any personal information.
  • Make sure you do not use the same password on this website (or any website) that you may use for your email address, bank account, social media accounts or any other accounts you may have.
  • Before entering any personal information like credit cards, social security number or even your personal address, make sure you see https in the URL. It should have a lock next to the

AIHP Disclaimer:

There are 5 stages to computer hacking, Reconnaissance, Scanning, Gaining Access, Maintaining Access and Covering Tracks. handles the first 2 stages, Reconnaissance and Scanning. When you see a computer hacker in the movies or on television, they never show you the reconnaissance or the scanning portion. 80% of computer hacking is research. also scans your website like a hacker to find vulnerabilities that might exploit the website.

The following information is based on our vulnerability test, which may differ from other vulnerability scanners. Please note, websites are not hosted on the same server as the email server or the home/office network. What this scan does show, is the level of experience of the individuals hired by the company to protect their website. A persons level of education in website design or computer science, does not suggest they are computer hackers. Most computer hackers do not have college degrees.

Some people believe that because they do not have any personal, financial or client information at their website, they are not vulnerable to being hacked. Here are some reasons that disprove this idea:

  • A hacker can redirect your website to your competitors website.
  • A hacker can change or delete your SEO information. SEO is how search engines like Google and Bing rank your website. This can make a difference in your website being number 1 in a search or number 1million.
  • If you collect email addresses at your website, so you can send out news letters, press releases or information about product or services, a hacker can add 2 lines of code that will forward all email addresses to another site.
  • A hacker can add malicious code to your website so that anyone who clicks on any link at your site could get marleware, spyware or even a virus downloaded to their computer.
  • If a website allows visitors to register, a hacker could download your entire user database including their names, emails addresses as well as the users passwords.
  • You can have your website defaced. A hacker can deface it by posting your competitions products or services on your home page.
  • A hacker could change your phone number or address on your websites so that your customers cannot call or find your business.

The post Website/IP DIALSERVICESINVESTIGATIONS.COM may be hackable #PI, #GA, #hackerproof appeared first on

View full post on | Can You Be Hacked?

. . . . .

View full post on Are You Hacker Proof

. . . . . . . .

Leave a Reply