Buy PM's
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
HSN Peak Viewing Time is Midnight EST.
Re: StrikeForce products #1 & #2 Amazon Best Sellers in Networking Security
https://www.amazon.com/gp/bestsellers/software/289979/ref=sr_bs_2_289979_1
Yes #1 and #2.
Would like to see more Reviews though.
But what is there are Great Reviews.
Here are the First Line of the Reviews.
For complete Review of each use the Link.
Mobile Trust
Customer Reviews
5.0 out of 5 stars Great for ensuring information you type is secure!
5.0 out of 5 stars #1 Mobile phone protection against hacking!
5.0 out of 5 stars I wouldn't have a phone without it!
5.0 out of 5 stars A Must Buy!
5.0 out of 5 starsLove this product
5.0 out of 5 starsTerrific update to the iOS App today
5.0 out of 5 starsTHIS SOFTWARE IS A MUST FOR ANY MOBILE DEVICE!!!!!
5.0 out of 5 stars Great Product
5.0 out of 5 stars Awesome!
5.0 out of 5 stars Woop woop!!!
5.0 out of 5 stars Worth every dollar
5.0 out of 5 stars Excellent Keystroke Encryption the Best!
GUARDEDID
Customer Reviews
5.0 out of 5 stars Excellent Keystroke Encryption Security
5.0 out of 5 stars Non-intrusive and doesn't slow your machine down! Perfect!
5.0 out of 5 stars smooth install, not for edge
5.0 out of 5 stars I wouldn't shop or bank without it!
5.0 out of 5 stars THIS SOFTWARE IS A MUST IF YOU ARE LOOKING TO SECURE YOURSELF!!!!!
5.0 out of 5 stars A Must Have.
5.0 out of 5 stars Five Stars
5.0 out of 5 stars smooth install, not for edge of 5 stars A Must Have.
5.0 out of 5 stars extra key logger protection
5.0 out of 5 stars Excellent Keystroke Encryption Security
AMAZING - You are Correct Peggy !
He's been dead for 67 Years.
Ever the entagonist ....
Exploring New Financial Technology
First Discoverer when I was Researching FED COIN.
This is Truely Going to Change the Financial World Landscape.
31 Minutes, Carve Out Time at somepoint and Watch.
Optimism is great, but wait for Q1 Numbers.
Kay stated in an Interview, Deal(s) were not complete in 4th Q. Back in January.
We are bound to see Positives in the 10-K, but I'm waiting for the Q1 Numbers.
Revenues in 2016 $735,000 to $1M, anything above that would be Fantasic. Hoping for a surprise.
SFOR =
SUPER FANTASIC OVER-THE-COUNTER RARITY
This video explains MFA AZURE PERFECTLY
If we are going back to the subject of MSFT AZURE
Jerard Explains it Perfectly.
It's a Joke ! Talking about SFOR
Yeah, Jtech CHECKMATE !
Please tell me they are Publicly Traded!
I want in.
The PCI Post now contains Screen Captures of two pages and a Link to the Document.
More info added to PCI POST PIC Link
The PCI STANDARD SAYS IT ALL
That's it in a nutshell, we just have to have Time and Patience to contend with.
Hey Money Talks.
Quote:
The PCI Security Standards Council is a global open body formed to develop, enhance, disseminate and assist with the understanding of security standards for payment account security.
The Council maintains, evolves, and promotes the Payment Card Industry Security Standards. It also provides critical tools needed for implementation of the standards such as assessment and scanning qualifications, self-assessment questionnaires, training and education, and product certification programs.
The Council's founding members, American Express, Discover Financial Services, JCB International, MasterCard, and Visa Inc., have agreed to incorporate the PCI Data Security Standard (PCI DSS) as part of the technical requirements for each of their data security compliance programs. Each founding member also recognizes the Qualified Security Assessors and Approved Scanning Vendors qualified by the PCI Security Standards Council
So more than ever I am back to my Orginal Premise and Hope (since shortly after investing in Sept 2015) and seeming endless debate posts with a board member...of seeing SFOR's IP being included in Hardware in Intel's Microprocessors.
Once it was discovered that Intel had MFA in its Microprocessors. I had been trying to find anything stating it was of the OOB Flavor.
The PCI Standard document pretty much leaves no doubt that it is in fact the STANDARD is out-of-band MFA.
https://www.google.com/url?sa=t&source=web&rct=j&url=https://www.pcisecuritystandards.org/pdfs/Multi-Factor-Authentication-Guidance-v1.pdf&ved=0ahUKEwiDzefryZzTAhWCTCYKHZkxAPsQFggyMAA&usg=AFQjCNHM-WlRpRa3wO_8n8tz-pY1Lk7tMQ&sig2=dUeT7Fd8AoNcJ8zPNCwBPA
We've known it's coming for months
I check the site at least once a week.
Sleddogs - Did you Fall for a Shooting Star
Reminds me that there's Room To Grow
RDY2ROCK - You are ROCKING ! (ALL)
It was nice to see a well put together post with Links provided in which you based your thoughts on which to ponder.
This is a well thought out senerio.
I do think much of it is perdicated on the fact that TPG will perform a buyout or some form of M&A Action with SFOR.
Although TPG is inclined to invest in Technology.
They may look at SFOR, as something as a just Feature Set to add as a piece of the of the Whole Pie. And of course we as investors understand MFA/OOB as far more than just a Feature Set.
Perhaps TPG does too.
One thing is pretty clear, unless R&G were to be reprepresenting SFOR on a contingency bases, someone is footing the bill.
And as one of my earlier post described, soon after the new Lawsuits and New Law Firm were announced, that once it was discovered that R&G had helped TPG in a past acquisition, (Z I think showed that link) that the connection was made, that TPG was behind that Litigation Funding.
Why Intel’s Spin-Off of McAfee Makes Sense
April 5, 2017
Share on FacebookShare on Twitter
TPG Partner Bryan Taylor discusses Intel’s spin-off of its security unit, the landscape for cyber security software companies and the PE outlook for tech deals. He speaks with Bloomberg’s Jason Kelly on “Bloomberg Technology.” (Source: Bloomberg)
ON THE MARK, a Great Find !
Simply Put
You can take the Current Charts, Volume and OTC Stigma and Deposit in the nearest Trash Can.
We're ON A ROLL, Thanks Z
Z - You know how to Wake One Up!
After a late night of writing about aspects of the Network Deficiencies to support MFA in the Status Que, and the ongoing in Syria.
I sleep in until Market Open.
As you said an "EYEOPENER"
MY EYES ARE WIDE OPEN !
MFA/OBB may not fall under any IEEE Standards Body but PCI (Security Standards Council) It Might as well be.
And I did note that under SMS which part of the MFA, that Not only does it fall under ANSI Requirements (which ANSI is an International Standards Body under the IEEE) but NIST and ISO too.
Anyone above the grade of Peon in any Business / DoD Organization understands ISO Compliance.
Then there is NIST ! This is where Steven I Cooper Chairman of StrikeForce's Advisory Board) has been a Real Asset.
The National Institute of Standards and Technology (NIST) was founded in 1901 and now part of the U.S. Department of Commerce.
I would think that as MFA/OBB becomes ubiq that it to will fall under all three Oranizations as well just as 2FA has.
For NOW, PCI is the has the Gobal Difinitive Body covering MFA/OBB.
MONEY TALKS !
WITH SO MUCH AT STAKE ! I would not be surprised at all to see one of the Current Patent Lawsuits be Appealed and possible work it's way up to Federal Court and possibly the Supreme Court for final Determination should we not come out Victorious in any District Court.
Luckily we have Ropes & Gray (see Supreme Court at the Bottom)
I also noted your Excellent Sumation of the Webinar, and PCI in your Post.
https://investorshub.advfn.com/boards/read_msg.aspx?message_id=130275054
(FOR ALL) Two Important Things to Hightlight from the PCI MFA Document That Must be Complied with
1) Out-of-Band Authentication
Out-of-band (OOB) refers to authentication processes where authentication methods are conveyed through different networks or channels.
Where authentication factors are conveyed through a single device/channel—for example, entering credentials via a device that also receives, stores, or generates a software token—a malicious user who has established control of the device has the ability to capture both authentication factors.
Transmission of a one-time password (OTP) to a smartphone has traditionally been considered an effective out-of-band method. However, if the same phone is then used to submit the OTP—for example, via a web browser—the effectiveness of the OTP as a secondary factor is effectively nullified.
Out-of-band conveyance of authentication mechanisms is an additional control that can enhance the level of assurance for multi-factor authentication. In lieu of the ability to use out-of-band communication, the authentication process should establish controls to guarantee that the individual attempting to use the authentication is, in fact, the legitimate user in possession of the authentication factor.
2) Use of SMS for Authentication
PCI DSS relies on industry standards—such as NIST, ISO, and ANSI—that cover all industries, not just the payments industry. While NIST currently permits the use of SMS, they have advised that out-of-band authentication using SMS or voice has been deprecated and may be removed from future releases of their publication5.
https://www.ropesgray.com/practices/Appellate-and-Supreme-Court.aspx
Ropes & Gray’s experienced appellate attorneys have argued fifteen cases before the U.S. Supreme Court within the past decade.
We have filed numerous successful petitions for certiorari, ensuring that the cases that are important to our clients are among the few that the Court hears each year. The merits cases our attorneys have handled before the Court span the full range of our litigation practice and include the:
Unconstitutionality of imposing onerous new burdens on past business activity Protection of intellectual property rights against those who facilitate infringement
A group of 19 venture capital firms, in Microsoft v. i4i, explaining the importance of the clear-and-convincing standard for overcoming the presumption of a patent’s validity to investors’ decisions to fund commercialization of pharmaceutical discoveries.
Jurisdiction of bankruptcy judges
Preemption of state laws that interfere with conducting business on a national scale
Implied antitrust immunity
Limitations period for bringing securities fraud claims
False Claims Act’s public disclosure bar
Immunity of foreign states and their instrumentalities to suit
Our major successes before the Supreme Court include:
In Jones v. Harris Associates, the Supreme Court reaffirmed the deferential Gartenberg standard of judicial review that the courts have applied to fees charged by investment advisers to mutual funds.
In Ameriprise Financial v. Gallus, also involving a challenge to investment adviser fees, we successfully petitioned for certiorari from an appellate decision that departed from Gartenberg, obtaining an order remanding the case for reconsideration in light of Jones.
In Yeager v. United States, Ropes & Gray petitioned for certiorari on behalf of a former Enron official and won a ruling that the defendant’s acquittal on certain charges precluded retrying him on related charges as to which the original jury failed to reach a verdict.
In our active amicus practice, we file briefs in support of certiorari, and on the merits, on behalf of a wide range of clients, including:
Jim Obergefell and all fellow plaintiffs from Michigan, Ohio, Kentucky and Tennessee in Tanco v. Haslam in four landmark cases concerning whether the fundamental right to marry can be denied to same-sex couples. One of the granted petitions was filed on behalf of three Tennessee couples by Ropes & Gray, the National Center for Lesbian Rights, and several Tennessee firms.
Association of Dental Support Organizations in North Carolina State Board of Dental Examiners v. FTC regarding the state-action immunity doctrine, which provides a narrow exception to the federal antitrust laws.
Anti-Defamation League, in Windsor v. United States, a case seeking to overturn as unconstitutional Section 3 of the federal Defense of Marriage Act. The Court ruled unconstitutional a key part of DOMA that denied federal benefits to same-sex couples who are legally married in the states in which they reside.
Ten private research universities, in Fisher v. University of Texas at Austin, regarding the use of race in the college admissions process.
Former U.S. Attorney General Dick Thornburgh, former Solicitor General Drew Days III, and eight former Justice Department officials, in Shelby County v. Holder, regarding whether Section 5 of the Voting Rights Act unconstitutionally infringes upon state sovereignty by requiring covered jurisdictions to demonstrate that changes to voting laws are non-discriminatory before those laws are permitted to take effect.
Pharmaceutical Research and Manufacturers of America (PhRMA), in FTC v. Actavis, regarding liability under the antitrust laws for Hatch-Waxman patent settlements.
Ten health care provider trade associations, in Douglas v. Independent Living Centers, regarding the availability of a cause of action under the Supremacy Clause to challenge Medicaid reimbursement rate cuts.
Lambda Legal Defense and Education Fund and 15 other HIV-rights organizations, addressing the constitutionality of the requirement in the Affordable Care Act that most people get health insurance by 2014 or pay a tax. The recent landmark ruling from the Court upheld the constitutionality of the requirement.
The Constitution Project, in a case testing the limits on police installation and use of a GPS tracking device in a suspect’s vehicle. In a significant constitutional law victory the Court held, in United States v. Jones, that the government’s warrantless installation of the GPS device violated the Fourth Amendment.
WOW ! See the Post Below KEEPIN-EYE
Your Trying since you replied, so I Tried.
Perhaps the bigger picture in simplified Networking Language, no complicated networking diagrams, may ease understanding of complicated Sheeet.
https://investorshub.advfn.com/boards/read_msg.aspx?message_id=130270208
Z - Understanding MFA in the Network and Adoption
Z Gauging by the Replies or lack there of on the post this is in reply to, most here only care that SFOR has MFA and the Deals and other $$ Aspects, but not what goes on behind the scenes in MFA and Networks and the technical aspects.
Which in many ways I can understand. This not to say there are some here who wish to understand more and put forth an Effort. For them I will try to keep things in-Depth yet simple to understand. At least I hope to.
This late night Midshift post means I won’t get a lot of Nonsence Replies from the, the, well you know. It will be read mostly by those following my Posts and replies to you.
Its about time to get down to Brass Tacks
Those technical aspects I mentioned, are what has delayed the rapid deployment of Multifactor Authentication.
Again, I will try, in terms most can understand, from what I know and understand from my understanding of Networking Management and trying to implement MFA.
Ever notice how 2FA was adopted quickly and implemented to make an immediate attempt to stop Cyber Hackers. Where MFA is sloooowly being adopted?
Intel Leapfrogging in its 7th Gen Processors is a good start, but probably can't have a huge effect until Network Legacy Equipment and Protocols have been modified / replaced. Although with the Urgent need, the Networking Industry is trying to revamp quickly with putting Band-Aids on Existing Network Hardware, which can be done by Local Network Engineers and Networkin Techs, until the Legacy Hardware can be replaced.
Just like most people don't really understand how a PC or Mobile Device does what it does, besides a cursory understanding. The same goes for the vast amount of Network Routers, Switches and other Networking Appliances, only at least a 10 times deeper understanding of what really transpires.
I'm going to try to quickly try to explain the MFA role in the Network and the difficulties of implementing.
When it comes to Security in managing a Network. This function is usually incorporated into enterprise networks through Authentication (verification of identity), Authorization (control of the access privileges) and Accounting (recording the actions for auditing) an “AAA” Security Framework.
Any device such as Routers, Servers, etc. that serve as a gateway to access Critical Infrastructure Resources must be able to adhere to and enforce the AAA Framework.
In most typical commercial two-factor authentication solutions they integrate with the AAA server using Radius Protocol.
Unfortunately two examples of these are RSA SecurID and ( Dare I say the nasty words) Duo Security.
Users receive a token card (which looks like a small calculator) or a have a mobile app that present one-time-use passcodes and other we know of, that are time-synchronized with the authentication server.
For MFA, enterprise solutions need to transition away from Radius Protocols and offer PAM Modules that can with relieve and easily be installed in General Purpose Machines and installing them into embedded Network Appliances such as Routers, Switches Access Gateways and Control Servers.
This is a new and complex challenge. Not only modifying the vast array of current Equipment, but the kicker being the technical collaboration between the Appliance and the Software Vendors.
During the next year or two, we will see those technologies coming together and making the transition of MFA simpler and less expensive, than is currently seen.
Normally I would have liked to see, instead of Regulations and Alliances governing the use if MFA, I would rather an Official International Standards Body such as the IEEE (Institute of Electrical and Electronics Engineers) create a MFA Standard and see and Industry Wide Battle it out for the best MFA Solution.
But since this was never begun and most likely due to the criticality and Non-forward thinking by the Network Vendors and the Urgent need for a Cyber Security Solution with the exponential growth in Hacking..........
And StrikeForce being more a decade ahead if the Industry in thinking about Cyber Security, and despite it Shouting the Alarm years in advance, we have the Status Que in Network Equipment.
As it sits, this is probably the best possible situation that exists for StrikeForce, as without a standard, OBBA looks to have been adapted as an Industry Standard gauging by the Very Long List of Patent infringement Vendors on StrikeForce Technologies IP.
Now, one might understand why DUO was one of the First to receive the Gift of a Notification of Patent Infringement letter from our CEO.
"Greetings and Salutations" WTF do you think your doing ? or perhaps something more politically correct.......LOL
This Transition of the Network Equipment plays in StrikeForce’s Favor, as it gives time for a few Lawsuits and Settlements to finalize and prove out as Who Owns the Ultimate MFA Solution, StrikeForce and OBBA.
Meanwhile we can watch as more and more Cyber Security Companies continue to make OOBA an Industry Standard, many Blindly, until the outcome of a few Patent Lawsuits is Emblazoned in Headlines across the Tech Industry.
Seemingly, coming out of nowhere in 15 short Months, the combined StrikeForce of the forward thinking of SFOR’s CTO, a CEO with a Great Background and MD coming out of JP Morgan, a few Law Firms of Law Firm’s that are above reproach and IP who’s Patents that have survived the magnifying glass of scrutiny in one prior Markman hearing and a Kickass Channel Partner, ACS getting itself in Bed With and Embedded in Industry Giants Products, an a Large DoD Contractor.
I Hope this helps some out there.
49'er
(ALL) Important to understand - Upgrades/modifications to existing Network Infrastructure is needed for MFA to be used on a Worldwide Scale, this is why MFA taking much longer to impliment than 2FA which is / has quickly becoming ubiquitous until MFA can be implimented.
Networking Equipment Manufactures were not as Forward Thinking as Ram Pemmaraju.
The Exponential Increase in Hacking seems to have caught them between a ROCK and a Hard Place. And having now having to impliment Hardware Patches in Legacy Equipment is the only quick alternative to include switching from AAA Radius Protocols to hardware Modules Capable of making the change in fairLy easy, but still time consuming on a Global Scale.
You can solve the problem.
If you take possession of the Stock Certificates, you can rip them in half and have your own little stock split.
Run them through a crosscut shredder and you'll be a Trillionaire.
Yes Diego, there's a Big Difference in that analogy.
At one time a New four bedroom house cost $25K, gas was 35 cents a gallon, Gold $35 an Ounce too.
No need to wait for 43 years of Inflation here, Years are Months.
My grandmother use to walk me across to a Railway Shipping Point about 200 yards from her home to watch the trains.
I finally bought a ticket on the SFOR Express.
Actually amazing considering the FED Actions today.
The FED pulled the wind out of the Sails of the Market today.
So SFOR held up fairly good. I won't expect any good upward momentum or a PR, until the Market has digested Today's FED Action.
Still hoping we can breech $0.003 by Friday.
Re: "Motha-Humpin-Man"
Never would try to take away ZPaul's Status, as the Man with the SFOR Plan.
But only heard of "Motha-Humpin-Man" from one place before.
I am the Motha-Humpa since 1976 when Working on the F-4 Simulator @ Bergstrom AFB in Austin, Texas. We had a group of Motha-Humpa's all working on Coordinated Hump Time (CHT).
I just got through talking with Another Motha-Humpa out in California last week about SFOR.
Could not let Another Motha-Humpa miss out on this Oppertunity of a Life Time !
Thanks. EOM
Yes I saw that, could not forget the coaches Applause
Thanks Frank !
I must have missed that? Could you post a link to that email today..
Thanks
Or convince Temasek Holding to Cough up the Cash to help Protect SingTel's A $ $ ets.
The Red Dragon Lady enters the Great and Powerful OZ Dragons Chambers.
We need help Sir, our little TrustWave is in dire need of your help Sir...
Could you have made an error Lady Dragon, in your purchase of TrustWave ? Says Temasek Holdings’ CEO Ho Ching.
The Lady Dragon spoke up, while slivering in her Ruby Dragon Slippers .....
But Grand Dragon Sir, SingTel needed Trustwave with is Cyber Security Knowledge To Protect our Networks.
Then You Failed Me, Lady Red Dragon ! I am angered..
No we have not fail you completely Sir..
Once we heard of the mistake in the SFOR vs MSFT outcome, we changed our Plan to Fold Little Trustwave into Singtel and left it as it's own enity, which is what MSFT failed to do with PhoneFactor, which left MSFT open and they were slapped with a Lawsuit.
Has your Law Firm Team offered to Settle with This SFOR enity ?
We tried with the same of Peanuts of SGD such as MSFT settled with them for, but their Blank Rome Law Firm said their Client StrikeForce is not playing games anymore for something called Chump Change anymore and they now have 6 More Lawsuits going.
Have you offered to buy this StrikeForce? says Dragon Ching.
That's why I came to see the All Powerful OZ Dragon Sir.
Yes we have, but their Blank Rome Law Firm turned down our offer, Sir.
We need the Capital from Temasek Holdings, otherwise we fear losing our Precious #1 Singapore Market Cap Title, if the Story ever leaked we settled or Paid for what they are asking for from the American Company, that owns the Patents on OBBA MFA, we would Lose Face too !
How much would it cost to Buyout this, this StrikeForce?
Billions Sir..
Be Gone With you, Little Dragon Lady. Deal with this Problem yourself,
But Fix it and quickly, before you anger the Great and Powerful Oz Dragon any further.
Sir may I ask one more Question Sir, Now Qaking in her Ruby Red Dragon Slippers.
Yes Yes Go ahead. WHAT IS IT NOW ?
Who is that man behind the Curtain ?
Sleddogs (All) - Tea Leaves and Insight
Pd - Skip
Hey Sleddogs, you never know He may have had afternoon Tea with The Red Dragon and looked in her cup ?
BTW: Singtel is called The Red Dragon
SINGTEL : RED DRAGON OF THE TELCO WORLD
https://maliksadiq13.wordpress.com/2013/05/20/singtel-red-dragon-of-the-telco-world/
http://musicstore.sg/musicstore/index.php?r=artist&artistID=23125
I don't know the year, After 2007 49'er
This year’s Forbes Magazine’s top 100 World's Most Powerful Women list includes two Singaporeans.
SingTel group chief executive officer Chua Sock Koong was ranked 74th. Ms Chua started working at SingTel in 1989 and climbed the ranks to Group CEO in 2007.
Temasek Holdings’ CEO Ho Ching fell four places from last year to be ranked 76th this year.
Singtel is also the largest company by market capitalisation listed on the Singapore Exchange and is majority owned by Temasek Holdings, the investment arm of the Singapore government.