Skip to content
FREE USA SHIPPING $149+/ CALL 877-220-7510
FREE US SHIPPING $149+ / 877-220-7510

Your Cart (0)

View cart

Your cart is empty

Continue shopping

Why buy with Power Detector?

Why buy with Power Detector?
  • We have the highest levels of Online Security.
  • Your information is protected because We are certified with PCI COMPLIANCE & SSL CERTIFICATE.
  • When you place an order, you will automatically receive the receipt of your payment in your email, and in the following days the tracking number to ensure delivery of your device.

What is PCI Compliance?

It is a set of security standards designed to ensure that ALL companies that accept, process, store or transmit credit card information maintain a secure environment.

The Payment Card Industry Security Standards Council (PCI SSC) was launched on September 7, 2006 to manage the continued evolution of the Payment Card Industry (PCI) security standards with a focus on improving the security of the payment account throughout the transaction process. PCI DSS is administered by PCI SSC (www.pcisecuritystandards.org), an independent body created by the major payment card brands (Visa, MasterCard, American Express, Discover and JCB). It is important to note that payment marks and acquirers are responsible for enforcing compliance, not the PCI Board.

What is an SSL Certificate?

Digital certificates serve as the backbone of Internet security. Secure Sockets Layer (SSL) certificates, sometimes referred to as digital certificates, are used to establish an encrypted connection between a user's browser or computer and a server or website. The SSL connection protects sensitive data, such as credit card information, exchanged during each visit, which is called a session, from being intercepted by unauthorized parties.

How do I create a secure SSL connection?

SSL is the standard security technology.

Invisible to the end user, a process called "SSL handshake" creates a secure connection between a web server and a browser. Three keys are used to create a symmetric session key, which is used to encrypt all transit data.

  1. The server sends a copy of your asymmetric public key to the browser.
  2. The browser creates a symmetric session key and encrypts it with the server's asymmetric public key and then sends it to the server.
  3. The server decrypts the encrypted session key using its asymmetric private key to obtain the symmetric session key.

The server and browser now encrypt and decrypt all data transmitted with the symmetric session key. This allows for a secure channel because only the browser and server know the symmetric session key and the session key is only used for that specific session. If the browser connects to the same server the next day, a new session key will be created.

Join the thousands of Detector Power customers!

Detector Online Training

With your new detector, you will receive a Quick Start Guide, a valuable resource designed to guide you through the essential steps of operating your new device seamlessly. This user-friendly guide is tailored to ensure that even beginners can quickly grasp the fundamental functions and features.

For those seeking a more profound understanding, a comprehensive manual accompanies your purchase. This detailed manual delves into the intricacies of your detector, providing a wealth of information for users eager to explore advanced settings and capabilities.

However, the pinnacle of expertise in harnessing your detector's full potential lies in professional training. While guides and manuals offer a solid foundation, professional training takes your knowledge to the next level. Through hands-on instruction and insights from seasoned experts, you'll gain a deeper understanding of your detector's nuances and unlock its optimal performance.

During the individual training, our detector Expert addresses your wishes and questions, provides you tips and tricks and helps you to improve your chances of success with your detector.

  • Theoretical introduction
  • Overview of the functionality and operating modes of your detector
  • Using the detector on the test field
  • Tips and tricks for advanced users
  • Improving your measurement procedure
  • Evaluation of the scans on the detector display
  • Answers to your questions

In addition to a general introduction to the functionality and operating modes of your detector, the detector Expert explains how to use the detector efficiently in the field. In doing so, he can correct small errors during the measurement and advise you on special features of your search projects.

You will learn how to check your measurements and further improve your scanning technique independently. You can also draw initial conclusions about potential target objects in the underground.

  • Service & Support: for entry-level, experienced and professional detectorists
  • Schedule: After you add the paid training, we will contact you to schedule your training with our expert.

Trainings are charged per hour! Additional costs may apply for training sessions. For special requests please contact us at info@detectorpower.com