Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Machcobra, I'm confident in the Team ...
Yes sir, I can imagine the profit margin and with "LOW Float" we can be extreme...IMO.
Norton is like being in the dinosaur era of Network Security compared to Exobox...IMO.
Have a Great Night Friend,
Looks like 1Q07 should be very telling...per the Contract with OSR and Exobox....
Eagle1,
Exobox Roadmap to Success PR from November 28, 2005.
Exobox Technologies Engages Open Systems Resources; OSR to Write Company's Software Development Plan
http://findarticles.com/p/articles/mi_m0EIN/is_2005_Nov_28/ai_n15879283
Exobox White Papers provided by OSR as promised via the November 28, 2005 PR.
http://www.exoboxtech.com/White%20Paper%20Support%20Doc.pdf
Exobox is Listed on S&P Market Access Program
http://findarticles.com/p/articles/mi_m0EIN/is_2005_Nov_17/ai_n15857578
Exobox Strategic Alliances incuding the Department of Homeland Security, OSR, NIST, HTC, Cosmo.
http://www.exoboxtech.com/alliances.html
Open Systems Resources, Inc.
http://www.osr.com/
OSR is the world leader in low-level manipulation of the Microsoft Windows operating environment. OSR signed an agreement with Exobox in October, 2005, to produce for Exobox an economically viable software requirements document and an initial product ready for sale or license to the identified markets.
Comso, Inc.
http://www.comso.com/
A U.S. General Services Administration contractor, Comso is a software engineering and application development company. As a certified contractor, Comso provides government agencies a variety of technical services through a simple, straightforward ordering purchase system. Comso has agreed to use its GSA status to help Exobox obtain government funds and distribute the Company’s products on the U.S. Department of Commerce’s Commerce Information Technology Solutions list.
Cosmo Government Client List:
Department of Commerce
Department of Defense
Department of Interior
Federal Deposit Insurance Corporation
Housing and Urban Development
Intelligence Community
Maryland State Government
NASA
National Weather Service
National Environmental, Satellite, Data and Information Services (NESDIS)
Patent and Trademark Office
Resolution Trust Corporation
United States Postal Service
Cosmo Commercial Client List:
Allied Signal Technical Service
Computer Sciences Corporation
Lockheed Martin
Midland Data Systems
NCR
Ogden Government Services
PRC
Science Applications International Corporation
Westinghouse
Department of Homeland Security
http://www.dhs.gov/dhspublic/index.jsp
Exobox has met with the Department of Homeland Security to review the Company’s technology and the department indicated a willingness to help Exobox prove the Company’s products developed from its already validated technology. It also pledged to help Exobox gain governmental acceptance and distribution for such products.
Major Exobox Event: Patent Issued December 5, 2006
http://tinyurl.com/yke42b
United States Patent 7,146,640
Goodman , et al. December 5, 2006
Thanks Stock Analyzer!
Eagle1,
Here is my new board that I hang out mostly on if any one wants any DD done or what not http://www.investorshub.com/boards/board.asp?board_id=7882
Attack of the Zombie Computers Is Growing Threat
By JOHN MARKOFF+
January 7, 2007
In their persistent quest to breach the Internet’s defenses, the bad guys are honing their weapons and increasing their firepower.
With growing sophistication, they are taking advantage of programs that secretly install themselves on thousands or even millions of personal computers, band these computers together into an unwitting army of zombies, and use the collective power of the dragooned network to commit Internet crimes.
These systems, called botnets, are being blamed for the huge spike in spam that bedeviled the Internet in recent months, as well as fraud and data theft.
Security researchers have been concerned about botnets for some time because they automate and amplify the effects of viruses and other malicious programs.
What is new is the vastly escalating scale of the problem — and the precision with which some of the programs can scan computers for specific information, like corporate and personal data, to drain money from online bank accounts and stock brokerages.
“It’s the perfect crime, both low-risk and high-profit,” said Gadi Evron, a computer security researcher for an Israeli-based firm, Beyond Security, who coordinates an international volunteer effort to fight botnets. “The war to make the Internet safe was lost long ago, and we need to figure out what to do now.”
Last spring, a program was discovered at a foreign coast guard agency that systematically searched for documents that had shipping schedules, then forwarded them to an e-mail address in China, according to David Rand, chief technology officer of Trend Micro, a Tokyo-based computer security firm. He declined to identify the agency because it is a customer.
Although there is a wide range of estimates of the overall infection rate, the scale and the power of the botnet programs have clearly become immense. David Dagon, a Georgia Institute of Technology researcher who is a co-founder of Damballa, a start-up company focusing on controlling botnets, said the consensus among scientists is that botnet programs are present on about 11 percent of the more than 650 million computers attached to the Internet.
Plagues of viruses and other malicious programs have periodically swept through the Internet since 1988, when there were only 60,000 computers online. Each time, computer security managers and users have cleaned up the damage and patched holes in systems.
In recent years, however, such attacks have increasingly become endemic, forcing increasingly stringent security responses. And the emergence of botnets has alarmed not just computer security experts, but also specialists who created the early Internet infrastructure.
“It represents a threat but it’s one that is hard to explain,” said David J. Farber, a Carnegie Mellon computer scientist who was an Internet pioneer. “It’s an insidious threat, and what worries me is that the scope of the problem is still not clear to most people.” Referring to Windows computers, he added, “The popular machines are so easy to penetrate, and that’s scary.”
So far botnets have predominantly infected Windows-based computers, although there have been scattered reports of botnet-related attacks on computers running the Linux and Macintosh operating systems. The programs are often created by small groups of code writers in Eastern Europe and elsewhere and distributed in a variety of ways, including e-mail attachments and downloads by users who do not know they are getting something malicious. They can even be present in pirated software sold on online auction sites. Once installed on Internet-connected PCs, they can be controlled using a widely available communications system called Internet Relay Chat, or I.R.C.
ShadowServer, a voluntary organization of computer security experts that monitors botnet activity, is now tracking more than 400,000 infected machines and about 1,450 separate I.R.C. control systems, which are called Command & Control servers.
The financial danger can be seen in a technical report presented last summer by a security researcher who analyzed the information contained in a 200-megabyte file that he had intercepted. The file had been generated by a botnet that was systematically harvesting stolen information and then hiding it in a secret location where the data could be retrieved by the botnet master.
The data in the file had been collected during a 30-day period, according to Rick Wesson, chief executive of Support Intelligence, a San Francisco-based company that sells information on computer security threats to corporations and federal agencies. The data came from 793 infected computers and it generated 54,926 log-in credentials and 281 credit-card numbers. The stolen information affected 1,239 companies, he said, including 35 stock brokerages, 86 bank accounts, 174 e-commerce accounts and 245 e-mail accounts.
Sensor information collected by his company is now able to identify more than 250,000 new botnet infections daily, Mr. Wesson said.
“We are losing this war badly,” he said. “Even the vendors understand that we are losing the war.”
According to the annual intelligence report of MessageLabs, a New York-based computer security firm, more than 80 percent of all spam now originates from botnets. Last month, for the first time ever, a single Internet service provider generated more than one billion spam e-mail messages in a 24-hour period, according to a ranking system maintained by Trend Micro, the computer security firm. That indicated that machines of the service providers’ customers had been woven into a giant network, with a single control point using them to pump out spam.
The extent of the botnet threat was underscored in recent months by the emergence of a version of the stealthy program that adds computers to the botnet. The recent version of the program, which security researchers are calling “rustock,” infected several hundred thousand Internet-connected computers and then began generating vast quantities of spam e-mail messages as part of a “pump and dump” stock scheme.
The author of the program, who is active on Internet technical discussion groups and claims to live in Zimbabwe, has found a way to hide the infecting agent in such a way that it leaves none of the traditional digital fingerprints that have been used to detect such programs.
Moreover, although rustock is currently being used for distributing spam, it is a more general tool that can be used with many other forms of illegal Internet activity.
“It could be used for other types of malware as well,” said Joe Stewart, a researcher at SecureWorks, an Atlanta-based computer security firm. “It’s just a payload delivery system with extra stealth.”
Last month Mr. Stewart tracked trading around a penny stock being touted in a spam campaign. The Diamant Art Corporation was trading for 8 cents on Dec. 15 when a series of small transactions involving 11,532,726 shares raised the price of the stock to 11 cents. After the close of business that day, a Friday, a botnet began spewing out millions of spam messages, he said.
On the following Monday, the stock went first to 19 cents per share and then ultimately to 25 cents a share. He estimated that if the spammer then sold the shares purchased at the peak on Monday he would realize a $20,000 profit. (By Dec. 20, it was down to 12 cents.)
Computer security experts warn that botnet programs are evolving faster than security firms can respond and have now come to represent a fundamental threat to the viability of the commercial Internet. The problem is being compounded, they say, because many Internet service providers are either ignoring or minimizing the problem.
“It’s a huge scientific, policy, and ultimately social crisis, and no one is taking any responsibility for addressing it,” said K. C. Claffy , a veteran Internet researcher at the San Diego Supercomputer Center.
The $6 billion computer security industry offers a growing array of products and services that are targeted at network operators, corporations and individual computer users. Yet the industry has a poor track record so far in combating the plague, according to computer security researchers.
“This is a little bit like airlines advertising how infrequently they crash into mountains,” said Mr. Dagon, the Georgia Tech researcher.
The malicious software is continually being refined by “black hat” programmers to defeat software that detects the malicious programs by tracking digital fingerprints.
Some botnet-installed programs have been identified that exploit features of the Windows operating system, like the ability to recognize recently viewed documents. Botnet authors assume that any personal document that a computer owner has used recently will also be of interest to a data thief, Mr. Dagon said.
Serry Winkler, a sales representative in Denver, said that she had turned off the network-security software provided by her Internet service provider because it slowed performance to a crawl on her PC, which was running Windows 98. A few months ago four sheriff’s deputies pounded on her apartment door to confiscate the PC, which they said was being used to order goods from Sears with a stolen credit card. The computer, it turned out, had been commandeered by an intruder who was using it remotely.
“I’m a middle-aged single woman living here for six years,” she said. “Do I sound like a terrorist?”
She is now planning to buy a more up-to-date PC, she said.
http://www.nytimes.com/2007/01/07/technology/07net.html?_r=1&em&ex=1168318800&en=79cc489...
Microsoft OneCare Security Suite Loses Ground By Gregg Keizer
InformationWeek
Fri Jan 5, 1:42 PM ET
Microsoft released version 1.5 of its consumer security suite, which supports the new Windows Vista operating system, to manufacturing earlier this week. But according to a market research firm, the product faces an uphill battle against long-time players such as Symantec.
Windows Live OneCare 1.5 met its RTM (Release To Manufacturing) milestone, said Yoav Schwartz, OneCare's lead program manager, on the group's blog Wednesday. "It will be available both at retail and on the Web at the end of January," said Schwartz.
Microsoft's security suite includes a personal firewall, anti-virus and anti-spyware scanning, general PC tune-up tools, and data backup features. Some of the tools are homegrown, while others come from several security acquisitions over the last two years. The subscription-based software costs $49.95 annually for use on up to three PCs.
However, according to data from the NDP Group, OneCare has had little success in stealing users from the traditional consumer security powerhouses like Symantec and McAfee. While OneCare accounted for nearly 11% of U.S. consumer security suite sales in June, the first full month after version 1.0 debuted, by October its slice had shrunk to 6%. Symantec, meanwhile, remained the dominant player, with 74% of the market in October, while McAfee held down second place with approximately 10%.
OneCare 1.5 will be available from the Microsoft Web site as well as in the retail channel. After a free 90-day trial using the downloaded version, users must pay the $49.95 annual fee. Existing paid users will be able to upgrade to 1.5 free of charge
----------------------------------------------------------------
From Exobox:
Our mission is to become the leading developer of licensed digital security technologies for a broad range of security-sensitive networks, devices, and other applications.
"We are uniquely positioned for the development and market introduction of what we believe is the most advanced computer security system available."
"Further, hackers, cyber-terrorists and internet predators cannot breech a computer system running the present inventive software even if they possessed the source code and the complete design specifications."
Exobox technology is like bulletproof glass in that it is virtually 100% effective in protecting against the daily cyber threats targeting Internet users, such as viruses and worms which can destroy documents and computer programs, and spyware which is used to gather personal information without the user's knowledge, increasing the risk for identity theft.
Just install the system and it does the rest, effectively building a protective barrier around computers and servers that has proven to be impenetrable by some of the world’s best hackers.
Major Exobox Event ~ Patent ISSUED December 5, 2006
SUMMARY OF THE INVENTION
http://www.investorshub.com/boards/read_msg.asp?message_id=15375482
ISSUED Patent for Exobox, US Patent Office
http://tinyurl.com/yke42b
Good Morning Machcobra and All! Thats nice to hear friend!
Everyone keep your eye on the Prize!
Eagle1,
Mach, have you ever seen any thing like Exobox?
I remember that you had over 35,000 hits a day on your site and many plays came across your plate.
Just wondering if you ever seen anything like it?
Eagle1,
P.S.
Major Exobox Event: Patent Issued December 5, 2006
United States Patent 7,146,640
http://tinyurl.com/yke42b
Exobox Technologies Corp.
http://www.Exoboxtech.com/
Stock Ticker: EXBX
as of 12-17-2006
Authorized Shares: 500,000,000
Operating Shares: 34,134,197
Estimated Float: 12,000,000
Exobox Technologies Engages Open Systems Resources; OSR to Write Company's Software Development Plan
http://findarticles.com/p/articles/mi_m0EIN/is_2005_Nov_28/ai_n15879283
Exobox White Papers provided by OSR as promised via the November 28, 2005 PR.
http://www.exoboxtech.com/White%20Paper%20Support%20Doc.pdf
Exobox is Listed on S&P Market Access Program
http://findarticles.com/p/articles/mi_m0EIN/is_2005_Nov_17/ai_n15857578
Exobox Strategic Alliances incuding the Department of Homeland Security, OSR, NIST, HTC, Cosmo.
http://www.exoboxtech.com/alliances.html
Open Systems Resources, Inc.
http://www.osr.com/
OSR is the world leader in low-level manipulation of the Microsoft Windows operating environment. OSR signed an agreement with Exobox in October, 2005, to produce for Exobox an economically viable software requirements document and an initial product ready for sale or license to the identified markets.
Comso, Inc.
http://www.comso.com/
A U.S. General Services Administration contractor, Comso is a software engineering and application development company. As a certified contractor, Comso provides government agencies a variety of technical services through a simple, straightforward ordering purchase system. Comso has agreed to use its GSA status to help Exobox obtain government funds and distribute the Company’s products on the U.S. Department of Commerce’s Commerce Information Technology Solutions list.
Cosmo Government Client List:
Department of Commerce
Department of Defense
Department of Interior
Federal Deposit Insurance Corporation
Housing and Urban Development
Intelligence Community
Maryland State Government
NASA
National Weather Service
National Environmental, Satellite, Data and Information Services (NESDIS)
Patent and Trademark Office
Resolution Trust Corporation
United States Postal Service
Cosmo Commercial Client List:
Allied Signal Technical Service
Computer Sciences Corporation
Lockheed Martin
Midland Data Systems
NCR
Ogden Government Services
PRC
Science Applications International Corporation
Westinghouse
Department of Homeland Security
http://www.dhs.gov/dhspublic/index.jsp
Exobox has met with the Department of Homeland Security to review the Company’s technology and the department indicated a willingness to help Exobox prove the Company’s products developed from its already validated technology. It also pledged to help Exobox gain governmental acceptance and distribution for such products.
~Exobox Form 3:~ Insiders and Exobox being a reporting company~
If one was to review the Form 3s for each of the Exobox Board members, one should come to the conclusion that we are in Safe Hands...IMO.
What I consider loose hands is the folks from the private placement....but it is possible that most of the private placement shares could be in strong hands and time will tell who is strong and who is not. I say this because of the fact they we cannot see if they (private placement investors) are converting their preferred shares, or not, via SEC filings yet. No doubt, that since Exobox is a fully reporting company we will see the light in the SEC filings in the very near future, who's who by monitoring the common operating share increase.
http://www.findarticles.com/p/articles/mi_m0EIN/is_2005_Nov_15/ai_n15797375
Furthermore, we can see who's who of the insiders from the Form 3 SEC filings. Who has what and who converts what will be reflected in the filings, such as the latest filing where Pernia converted. On November 30, 2006, Pernia converted series B preferred stock of 255,036 shares to 23,216,697 common stock shares.
http://www.secinfo.com/d19S19.v58.htm#1stPage
Our common Operating share structure is now 34,134,197 up from 10,917,500 since Pernia converted his preferred shares (see above link). This is not a bad thing unless he was to just sell them on the market without anything of substance forthcoming. I'm not sure why he is the only board member that has converted, but he seems to be the minority in doing such. This is fact as of 1/7/2007.
http://www.secinfo.com/d19S19.v58.htm#1stPage
When preferred shares are converted to common shares our common share structure is diluted. Dilution has proven to be not so good.
Exobox is a reporting company and is current in all filings.
Insiders of a reporting company have to file a form 3 for their holdings:
Exobox Technologies Listed on S&P Market Access Program
http://findarticles.com/p/articles/mi_m0EIN/is_2005_Nov_17/ai_n15857578
Form 3: A document that must be filed with the Securities and Exchange Commission (SEC) by an insider affiliated with a public company's operation or by any investor owning 10% or more of the company's outstanding shares.
The Exobox Board Members hold more than 90% of the company through preferred shares that can be converted to common shares, if my calculations are correct.
*From reviewing the "Exercisable dates" that can be viewed on the boardmember's form 3s, I believe without doubt, that the Team is keeping the Common OS as low as possible, for as long as possible....and I truly applaud this! Sorry for my exuberance, but never, have I seen this on a Grey, Pink or OTCBB security ...
There is at least one market maker that has filed a form 15c211 at the OTCBB. Call NASD OTC Compliance Unit at 240-386-5100 to confirm an open form 15c211 at OTCBB. This information (Fact) leads me to believe that Exobox is skipping the pinks and going to OTCBB.
This lowest possible Issued Operating Shares, will prove, to be very explosive for the Exobox PPS when the time is right for the first line of product to roll out ~ 1Q07(OSR and Exobox contract) , coupled with a higher exchange.
Regardless of what anyone says, the facts are, that Exobox is current in all filings, even though it is a grey stock. (unheard of)
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Watch this ... Form 3s
Has NOT converted: Robert B. Dillon, President and Chief Executive Officer
http://www.secinfo.com/d1Za67.v15.htm
Has NOT converted: Scott Copeland, Vice President of Operations and Director
http://www.secinfo.com/d1Za67.v11.htm
Has NOT converted:Reginald Goodman, Manager of Information Systems
http://www.secinfo.com/d1Za67.v1v.htm
Has NOT converted:Michael Wittenburg, Vice President of Marketing and Secretary, Treasurer and Director
http://www.secinfo.com/d1Za67.v1r.htm
Has NOT converted:Michael G. Wirtz-Vice President & Chief Financial Officer
http://www.secinfo.com/d1Za67.v1t.htm
Has NOT converted: Richard A. Evans, M.D. Director
http://www.secinfo.com/d1Za67.v1p.htm
What does this tell us?
------------------------------------------------------------------------------------------------------------------------------------------------------------
The good things is this...since we are a reporting company Rule 144 is in place for shareholders ...
Rule 144
http://www.investopedia.com/terms/r/rule144.asp
A Securities and Exchange Commission rule that sets the conditions under which restricted, unregistered and control securities can be sold. These are the five conditions that must be met for these securities to be sold:
1. The prescribed holding period must be met.
2. There is an 'adequate' amount of current information available to the public regarding the historical performance of the security.
3. The amount to be sold is less than 1% of the shares outstanding and accounts for less than 1% of the average of the previous four weeks' trading volume.
4. All of the normal trading conditions that apply to any trade have been met.
5. If wishing to sell more than 500 shares or an amount worth more than $10,000, the seller must file a form with the SEC before the sale. .
From my calculations there are no more than 10-15 Million shares that is in what I would consider LOOSE Hands (private Placement) ...
Eagle1,
P.S.
Why didn't most of the Officers of Exobox convert their shares yet?
Why didn't the Exobox Team PR this Issued Patent?
Major Exobox Event: Patent Issued December 5, 2006
United States Patent 7,146,640
http://tinyurl.com/yke42b
EXBX White Papers:
http://www.exoboxtech.com/White%20Paper%20Support%20Doc.pdf
Authorized Shares: 500,000,000
Operating Shares: 34,134,197
Estimated Float: 12,000,000
Anyone been reading the FORM 3s?
Eagle1,
With the World Class Exobox Technology in Place, comes a World Class Assembly of Team Members to push it through!
Looks like the Team is getting things done!
Thanks to All!
Eagle1,
P.S. Why didn't Exobox PR that they got their patent issued?
Major Exobox Event: Patent Issued December 5, 2006
United States Patent 7,146,640
http://tinyurl.com/yke42b
Meet the Exobox Team:
Robert B. Dillon, President and Chief Executive Officer
Mr. Dillon is a practicing attorney and seasoned executive with more than 30 years of litigation and transactional experience. He is a 1971 graduate of the University of Texas and a 1974 graduate of the University Texas School of Law.
Scott Copeland, Vice President of Operations and Director
Mr. Copeland, an expert programmer with extensive Internet security experience gleaned during his years with Compaq, Gateway, Matrix and Axis Host, is co-founder of Exobox Technologies and co-inventor of its proprietary technology.
Reginald Goodman, Manager of Information Systems
Mr. Goodman is a founding member of Exobox Technologies and co-inventor of the Company’s proprietary software. With extensive experience in computer programming, especially the mastery of the tools and techniques needed for computer hacking, he has been instrumental in identifying security problems and developing solutions addressed by Exobox’s technology. In addition to his expert computer programming, Mr. Goodman is also a seasoned website developer and was successful in demonstrating the Exobox technology to the U.S. Department of Commerce and the National Institute of Standards & Technology.
Michael Wittenburg, Vice President of Marketing and Secretary, Treasurer and Director
A successful marketing and management professional with more than 20 years of experience, Mr. Wittenburg holds a bachelor’s degree from Warburg College and has extensive management training from the University of Iowa and Harvard University. He has been responsible for marketing products internationally for Dornier Medical, a subsidiary of Daimler Benz A.G.; Edap Technomed; and PET Scans of America.
Marc Pernia - Chief Product Development Administrator and Director
Mr. Pernia is a Senior Unix Systems Administrator with an A.S. degree in Computer Science from Foothill College in 1994 and Computer Science studies at Stanford University, has extensive computer systems program development and administrative experience in the industry over the last
10 years for such Silicon Valley entities as Electronic Arts, Mind Source, the SETI Institute and the NASA Ames Research Center, as well as considerable experience in the configuration and maintenance of such software applications as Veritas, Weblogic, Netscape, iPlanet, Marimba,
LDAP and *SQL, Tomcat, Apache and WebX.
Michael G. Wirtz - Vice President & Chief Financial Officer Mr. Wirtz is a 1984 MBA graduate of Texas Tech University who also earned a B.S. degree in Accounting from the University of Mary. He is a financial professional with experience as a corporate comptroller for a group of marine companies and previously managed another public
corporation.
Richard A. Evans, M.D. Director
Dr. Evans, received his Bachelor of Arts degree from Rice University in Houston, and his Doctor of Medicine and Master of Science (physiology and immunology) degrees from Tulane University School of Medicine in New Orleans.
He pursued specialty training in general surgery at the University of California School of Medicine, San Francisco and at Stanford University School of Medicine in Palo Alto.
Dr. Evans completed his general surgery training at St. Joseph Hospital in Houston. This included training at the University of Texas M. D. Anderson Cancer Center and a one year fellowship in surgical oncology working under world renowned cancer specialist, Dr. John S. Stehlin, Jr. Dr. Evans maintains a private practice in oncology and alternative medicine in Houston, Texas. He founded the Texas Cancer Center, a 501(c)(3) nonprofit organization in 1998.
Exobox Inventors: = Geniuses ...
Thank You Reginald Goodman and Scott Copeland and all of the Exobox Team for producing!
Major Exobox Event: Patent Issued December 5, 2006
http://tinyurl.com/yke42b
United States Patent 7,146,640
Goodman , et al. December 5, 2006
IMO these two men are absolutely = Genius Software Gurus
Personal computer internet security system
Abstract
An intrusion secure personal computer system includes a central processing unit, a data storage means, a memory means, a primary operating system, a virtual machine operating system providing an isolated secondary operating environment functioning separate from the primary operating system and controlling operations of the personal computer system within the isolated secondary operating environment and at least one input/output (I/O) connection in operative communication with an external data source, where the personal computer system is secured from malicious code contained in a file downloaded from the external data source.
Exobox technology is like bulletproof glass in that it is virtually 100% effective in protecting against the daily cyber threats targeting Internet users, such as viruses and worms which can destroy documents and computer programs, and spyware which is used to gather personal information without the user's knowledge, increasing the risk for identity theft.
Just install the system and it does the rest, effectively building a protective barrier around computers and servers that has proven to be impenetrable by some of the world’s best hackers.
The present data security technology eradicates the threat potential of malicious code downloaded from an external data source onto a personal computer or the like.
Malicious code includes viruses, trojans, worms and such that may be loaded onto a computer from an external data source, such as the Internet, a network or an external data device (i.e., a floppy drive, CD ROM disc, etc.).
A computer with an application of the present inventive software technology installed, will remain completely safe from intrusion from all currently known hacker intrusion technologies.
There can be no file theft, data corruption, or nuisance applications (e.g., viruses) run on the computer. Nor will there be the downtime and technical service costs required to recover from exposure to these malicious codes.
The present inventive software technology does not rely on file scanners, virus definition patterns, Cyclical Redundancy Checks (CRC) checks, Name Address Translations (NAT), or similar strategies of current database driven security technologies.
Rather, the present inventive software technology exploits certain immutable hardware and software communication relationships underlying and basic to the system architecture of a computer to insure intrusion prevention.
Because the present inventive software technology is not database driven, it does not require malicious code definition updates. Therefore, it is not susceptible to new malicious codes or to mutation of existing malicious codes.
Further, hackers, cyber-terrorists and internet predators cannot breech a computer system running the present inventive software even if they possessed the source code and the complete design specifications.
Again, this is because the security features of the present invention are not database dependent, but derive from the intrinsic architectural relationships of the computer's hardware and operating system software.
Implementation of the present inventive software technology is uncomplicated. If the user computer is on an intranet network, in most cases installation of the present inventive software will not require modifications of the user's existing intranet network.
Exobox Roadmap to Success PR from November 28, 2005.
Exobox Technologies Engages Open Systems Resources; OSR to Write Company's Software Development Plan
http://findarticles.com/p/articles/mi_m0EIN/is_2005_Nov_28/ai_n15879283
Exobox White Papers provided by OSR as promised via the November 28, 2005 PR.
http://www.exoboxtech.com/White%20Paper%20Support%20Doc.pdf
Exobox is Listed on S&P Market Access Program
http://findarticles.com/p/articles/mi_m0EIN/is_2005_Nov_17/ai_n15857578
Exobox Strategic Alliances incuding the Department of Homeland Security, OSR, NIST, HTC, Cosmo.
http://www.exoboxtech.com/alliances.html
Open Systems Resources, Inc.
http://www.osr.com/
OSR is the world leader in low-level manipulation of the Microsoft Windows operating environment. OSR signed an agreement with Exobox in October, 2005, to produce for Exobox an economically viable software requirements document and an initial product ready for sale or license to the identified markets.
Comso, Inc.
http://www.comso.com/
A U.S. General Services Administration contractor, Comso is a software engineering and application development company. As a certified contractor, Comso provides government agencies a variety of technical services through a simple, straightforward ordering purchase system. Comso has agreed to use its GSA status to help Exobox obtain government funds and distribute the Company’s products on the U.S. Department of Commerce’s Commerce Information Technology Solutions list.
Cosmo Government Client List:
Department of Commerce
Department of Defense
Department of Interior
Federal Deposit Insurance Corporation
Housing and Urban Development
Intelligence Community
Maryland State Government
NASA
National Weather Service
National Environmental, Satellite, Data and Information Services (NESDIS)
Patent and Trademark Office
Resolution Trust Corporation
United States Postal Service
Cosmo Commercial Client List:
Allied Signal Technical Service
Computer Sciences Corporation
Lockheed Martin
Midland Data Systems
NCR
Ogden Government Services
PRC
Science Applications International Corporation
Westinghouse
Department of Homeland Security
http://www.dhs.gov/dhspublic/index.jsp
Exobox has met with the Department of Homeland Security to review the Company’s technology and the department indicated a willingness to help Exobox prove the Company’s products developed from its already validated technology. It also pledged to help Exobox gain governmental acceptance and distribution for such products.
Get it?
Got it?
Good...
Eagle1
Microsoft Baseline Security Analyzer
Microsoft Baseline Security Analyzer (MBSA) is an easy-to-use tool designed for the IT professional that helps small- and medium-sized businesses determine their security state in accordance with Microsoft security recommendations and offers specific remediation guidance.
Improve your security management process by using MBSA to detect common security misconfigurations and missing security updates on your computer systems.
http://www.microsoft.com/technet/security/tools/mbsahome.mspx
--------------------------------------------------------------
Exobox = Hacker Proof ~ end of story ...
Exobox is a cutting edge developer of innovative enterprise and home user endpoint security products. With our SUEZ™ (Secure User Environment Zone) technology White Paper and Software Requirements and Development Documentation completed by OSR Open System Resources, Inc., http://www.exoboxtech.com/White%20Paper%20Support%20Doc.pdf
"We are uniquely positioned for the development and market introduction of what we believe is the most advanced computer security system available."
Our mission is to become the leading developer of licensed digital security technologies for a broad range of security-sensitive networks, devices, and other applications.
We have developed two revolutionary, proprietary, patent-pending software technologies to meet this need in a unique, proactive way, providing 100% of such protection without affecting workflow or requiring a continuously updated database of known viruses.
Compared to other technologies, ours is truly revolutionary, representing a paradigm shift from the largely ineffective “reactive” network security software currently available from others.
Our SUEZ™ technology is a true solution that stops all cyber threats while eliminating the need for CRC (Cyclic Redundancy Checking) and viral database drive retroactive file scanning.
We are currently developing comprehensive product lines from our technology to provide complete and effective security for all servers and computers using our products
Major Exobox Event ~ Patent ISSUED December 5, 2006
SUMMARY OF THE INVENTION
The present data security technology eradicates the threat potential of malicious code downloaded from an external data source onto a personal computer or the like.
Malicious code includes viruses, trojans, worms and such that may be loaded onto a computer from an external data source, such as the Internet, a network or an external data device (i.e., a floppy drive, CD ROM disc, etc.).
A computer with an application of the present inventive software technology installed, will remain completely safe from intrusion from all currently known hacker intrusion technologies.
There can be no file theft, data corruption, or nuisance applications (e.g., viruses) run on the computer. Nor will there be the downtime and technical service costs required to recover from exposure to these malicious codes.
The present inventive software technology does not rely on file scanners, virus definition patterns, Cyclical Redundancy Checks (CRC) checks, Name Address Translations (NAT), or similar strategies of current database driven security technologies.
Rather, the present inventive software technology exploits certain immutable hardware and software communication relationships underlying and basic to the system architecture of a computer to insure intrusion prevention.
Because the present inventive software technology is not database driven, it does not require malicious code definition updates. Therefore, it is not susceptible to new malicious codes or to mutation of existing malicious codes.
Further, hackers, cyber-terrorists and internet predators cannot breech a computer system running the present inventive software even if they possessed the source code and the complete design specifications.
Again, this is because the security features of the present invention are not database dependent,[/v] but derive from the intrinsic architectural relationships of the computer's hardware and operating system software.
Implementation of the present inventive software technology is uncomplicated. If the user computer is on an intranet network, in most cases installation of the present inventive software will not require modifications of the user's existing intranet network
Final Wishes:
Dan Rather, Peter Jennings, Sam Donaldson, and a tough old U.S. Marine Sergeant were all captured by terrorists in Iraq. The leader of the terrorists told them that he would grant them each one last request before they were beheaded.
Dan Rather said, "Well, I'm a Texan; so I'd like one last bowl full of hot spicy chili." The leader nodded to an underling who left and returned with the chili. Rather ate it all and said, "Now I can die content."
Peter Jennings said, "I am Canadian, so I'd like to hear the song "O Canada" one last time." The leader nodded to a terrorist who had studied the Western world and knew the music. He returned with some rag-tag Musicians and played the anthem. Jennings sighed and declared he could now die peacefully.
Sam Donaldson said, "I'm a reporter to the end. I want to take out my tape recorder and describe the scene here and what's about to happen. Maybe someday someone will hear it and know that I was on the job till end." The leader directed an aide to hand over the tape recorder and Donaldson dictated some comments. He then said, "Now I can die happy."
The leader turned and said, "And now, Mr. U.S. Marine, what is your final wish?"
"Kick me in the butt," said the Marine.
"What?" asked the leader. "Will you mock us in your last hour?"
"No, I'm not kidding. I want you to kick me in the butt," insisted the Marine. So the leader shoved him into the open, and kicked him in the butt.
The Marine went sprawling, but rolled to his knees, pull ed a 9 mm pistol from inside his cammies, and shot the leader dead. In the resulting confusion, he leapt to his knapsack, pulled out his M4 carbine and sprayed the Iraqis with gunfire. In a flash, all the Iraqis were either dead or fleeing for their lives.
As the Marine was untying Rather, Jennings, and Donaldson, they asked him, "Why didn't you just shoot them in the beginning? Why did you ask them to kick you in the butt first?"
"What," replied the Marine, "and have you three A$$holes report that I was the aggressor?
SUPPORT THE TROOPS -- OUR AMERICAN HEROES.
Good Morning/Day Everyone! Wake up!
Eagle1,
P.S.
OT: Dan Rather, Peter Jennings, Sam Donaldson, and a tough old U.S. Marine Sergeant were all captured by terrorists in Iraq. The leader of the terrorists told them that he would grant them each one last request before they were beheaded.
Dan Rather said, "Well, I'm a Texan; so I'd like one last bowl full of hot spicy chili." The leader nodded to an underling who left and returned with the chili. Rather ate it all and said, "Now I can die content."
Peter Jennings said, "I am Canadian, so I'd like to hear the song "O Canada" one last time." The leader nodded to a terrorist who had studied the Western world and knew the music. He returned with some rag-tag Musicians and played the anthem. Jennings sighed and declared he could now die peacefully.
Sam Donaldson said, "I'm a reporter to the end. I want to take out my tape recorder and describe the scene here and what's about to happen. Maybe someday someone will hear it and know that I was on the job till end." The leader directed an aide to hand over the tape recorder and Donaldson dictated some comments. He then said, "Now I can die happy."
The leader turned and said, "And now, Mr. U.S. Marine, what is your final wish?"
"Kick me in the butt," said the Marine.
"What?" asked the leader. "Will you mock us in your last hour?"
"No, I'm not kidding. I want you to kick me in the butt," insisted the Marine. So the leader shoved him into the open, and kicked him in the butt.
The Marine went sprawling, but rolled to his knees, pull ed a 9 mm pistol from inside his cammies, and shot the leader dead. In the resulting confusion, he leapt to his knapsack, pulled out his M4 carbine and sprayed the Iraqis with gunfire. In a flash, all the Iraqis were either dead or fleeing for their lives.
As the Marine was untying Rather, Jennings, and Donaldson, they asked him, "Why didn't you just shoot them in the beginning? Why did you ask them to kick you in the butt first?"
"What," replied the Marine, "and have you three A$$holes report that I was the aggressor?
SUPPORT THE TROOPS -- OUR AMERICAN HEROES.
Exobox goes public through reverse merger
Houston Business Journal - October 31, 2005
Exobox Technologies Corp. has completed its reverse merger with TMC Acquisition Corp. and Jin Pin Inc.
http://www.findarticles.com/p/articles/mi_m0EIN/is_2005_Nov_15/ai_n15797375
The resulting publicly owned company will be known as Exobox Technologies Corp. and will trade on the Pink Sheets under the symbol EXBX.
Houston-based Exobox is a network security company with a proprietary software designed to stop cyber threats for individuals, corporations and government agencies.
"We are excited about the prospects afforded us by becoming a public company, and believe we quickly shall raise the capital needed to take our company and software to the next level," Exobox President and CEO Robert B. Dillon said.
---------------------------------------------------------------
Business Wire, Nov 15, 2005 Exobox Technologies Raises $1,000,000 Through Private Placement; Private Placement Offer Sold Out In Less Than One Week
http://www.findarticles.com/p/articles/mi_m0EIN/is_2005_Nov_15/ai_n15797375
HOUSTON -- Exobox Technologies Corp. (PinkSheets:EXBX), a network security company with a proprietary software designed to stop all cyber threats, announced today that it has sold out its Private Placement of convertible preferred stock and warrants for 4% equity in the Company, raising $1,000,000 in less than one week. If the warrants are fully exercised, the Company will receive an additional $900,000.
Robert B. Dillon, Exobox's President and Chief Executive Officer, commented, "Investor confidence in the tremendous value of our revolutionary software has made it possible for us to raise the $1 million currently needed for Exobox operations in less than a week on terms very beneficial for the Company."
---------------------------------------------------------------
November 28, 2005 Exobox Technologies Engages Open Systems Resources; OSR to Write Company's Software Development Plan
http://findarticles.com/p/articles/mi_m0EIN/is_2005_Nov_28/ai_n15879283
HOUSTON -- Exobox Technologies Corp. (Pink Sheets:EXBX), a network security company with a proprietary software designed to stop all cyber threats, announced today that it has executed an engagement agreement with Open Systems Resources, Inc ("OSR") to adapt Exobox's software to the Windows operating system.
OSR consultants know the Windows system better than any other programmers in the industry making OSR the world leader in low level manipulation of the Windows environment. O
OSR has already examined and validated Exobox's underlying technology and has agreed to write Exobox's commercial software development plan for Windows. Under their agreement with Exobox, effective October 26, 2005, OSR also has agreed to develop and provide Exobox a commercially viable product for Windows within 11 months, for a turnkey fee, once it has completed the software development plan.
--------------------------------------------------------------
May 2006...White Papers Produced by OSR As promised via November 28, 2005 PR from Exobox Tech.
http://www.exoboxtech.com/White%20Paper%20Support%20Doc.pdf
--------------------------------------------------------------
OSR also has agreed to develop and provide Exobox a commercially viable product for Windows within 11 months,once it has completed the software development plan.
Do we see a trend here from Exobox? You make the choice.
Eagle1,
txharvey wrote:
What happened to IPO? I taught they go public after an IPO?
Excuse my 'ignorant' questions if you will, but you cant learn if you dont ask...
Thanks for your help Eagle1 - Does that mean you're an Philly Eagles fan?
txharvey,
Exobox is already public and the trading symbol is EXBX.
Common shares are what is trading in the market now with EXBX.
The preferred shares are shares that can be converted to common shares and this will increase the common issued O/S (operating shares).
The more that the preferred shareholders convert into common shares the more dliution. I do believe that most of the company is in safe hands.
It appears that we had only one board member that has converted his preferred shares into common share thus far.
Hope this helps and below is a good link for you to start reading if you chose.
Eagle1,
http://www.investopedia.com/university/stocks/stocks2.asp
Stocks Basics: Different Types Of Stocks
There are two main types of stocks: common stock and preferred stock.
Common Stock
Common stock is, well, common. When people talk about stocks they are usually referring to this type. In fact, the majority of stock is issued is in this form. We basically went over features of common stock in the last section. Common shares represent ownership in a company and a claim (dividends) on a portion of profits. Investors get one vote per share to elect the board members, who oversee the major decisions made by management.
Over the long term, common stock, by means of capital growth, yields higher returns than almost every other investment. This higher return comes at a cost since common stocks entail the most risk. If a company goes bankrupt and liquidates, the common shareholders will not receive money until the creditors, bondholders and preferred shareholders are paid.
Preferred Stock
Preferred stock represents some degree of ownership in a company but usually doesn't come with the same voting rights. (This may vary depending on the company.) With preferred shares, investors are usually guaranteed a fixed dividend forever. This is different than common stock, which has variable dividends that are never guaranteed. Another advantage is that in the event of liquidation, preferred shareholders are paid off before the common shareholder (but still after debt holders). Preferred stock may also be callable, meaning that the company has the option to purchase the shares from shareholders at anytime for any reason (usually for a premium).
Some people consider preferred stock to be more like debt than equity. A good way to think of these kinds of shares is to see them as being in between bonds and common shares.
Imgunnaretire..Doing Fine Thanks!
Hope you did not eat too much over the holidays..LOL..I did.
Eagle1,
Posted by: imgunnaretire
In reply to: Eagle1 who wrote msg# 1058 Date:1/5/2007 12:04:45 AM
Post #of 1063
Eagle1,
I hope your doing well brother!! I understand people becoming restless and I'm not a patient person myself. But I have kept focused on the November 28,2005 PR, you have referred to it as the road map. As long as EXOBOX continues to meet the goals laid out in that PR I will remain encouraged.
I prefer not to engage in speculation and rumor, but remain focused on facts. EXOBOX has presented me with enough facts through DD, execution of stated milestones, independent validation, patent approval, and undisputed established alliances to the point that I'm a believer.
IMO this speaks volumes to their credibility, I am convinced that management laid out their plan to us and have systematically worked to achieve each milestone.
I'm also convinced that IMO while on the greys MM's play with us (and many others) like a cat playing with a mouse, so moving to a larger more regulated exchange is a must. IMO although Reg SHO and tighter SEC scrutiny throughout all the markets is an effort to combat the problems and reestablish investor confidence within the markets, the problems are so large and complex that progress will be slow coming. Illegal stock manipulation needs to be stopped, it's robbing investors and hurting companies and the guilty need to be prosecuted. So I applaud the SEC's efforts in this area.
I'm done...
Take care
Imgunnaretire
Interesting Hipster911! Hope that is correct.
Thanks!
Eagle1,
P.S. Can you expand moreso on this "That equates to a restricted 1% 90 day sell ceiling of ~300K shares for pernia"
Hipster911 wrote:
Hmmm... I don't believe the volume is related to trades by anyone from the private placement or internal to ExoBox. For that to happen, we would see their conversions from preferred shares reflected in the common shares outstanding, which has not changed, other than the single conversion by pernia, that is all. That equates to a restricted 1% 90 day sell ceiling of ~300K shares for pernia -which added to the previous float would have been insignificant ( staying around ~11Mil ). And this is assuming pernia has even sold any shares. IMHO, this looks like simple MM crap to me.
Harvey, then they are common shares if you bought them on the open market via Etrade!
Eagle1,
Imgunnaretired, I total agree! Thanks,
Posted by: imgunnaretire
In reply to: hfdman27 who wrote msg# 1054 Date:1/4/2007 11:15:59 AM
Post #of 1057
hfdman27,
This is a repost of my thoughts, and my feelings have not changed and will not change as long as management meets their timeline spelled out in their November 28, 2005 PR.
I agree with you on wanting to see a PR from the company on where we are and where we are headed. As far as the 11 month time frame from completion of the white paper to having a commercial product ready, that was stated in a PR in November of 2005. Since there hasn't been an update we can only assume that they are on schedule. Is 11 months too long to develope a software package? I don't know either, I'm not familiar with what all is involved and if that timeline would vary depending on the complexity of the software, and I doubt that anyone here can answer that question.
In that PR they nailed it on the time that it would take for OSR to complete the white paper and the recent SEC filing stated that OSR was paid for their work just as the company stated they would be. And other milestones that they stated they would meet, have been met. So this management has not given me any reason to doubt if they would remain on schedule. And the PR did state it would be ready within 11 months, so I interpreted that to mean that it could be sooner. When the PR was released they were looking 16 months into the future, thus far they have done everything they stated they would do.
As for the O/S increasing, IMO that will happen according to SEC filings if and when holders of preferred shares choose to put them out there. As I've stated before if the product does what they say it will do, IMO we all should be fine. When they say 100% effective, that is a bold statement. And if that proves to be correct, then who wouldn't want the product? The world is crying out for a product that will do everything that EXOBOX has stated SUEZ will do. Thus my reason for being invested in this company.
Take care
Imgunnaretire
Hackers Target U.S. Defenses
Pentagon report says Asia-Pacific region hackers are targeting U.S. missile systems.
January 3, 2007
By Reuters
Foreign countries, especially nations in the Asia-Pacific region, have intensified their efforts to steal sensitive U.S. defense technology, according to a Pentagon report circulated on Wednesday.
The Defense Security Service Counterintelligence Office recorded an annual jump of nearly 43 percent in the number of suspicious foreign contacts reported to U.S. authorities by defense contractors and other defense-related sources.
The agency, which helps protect the U.S. defense industry from foreign espionage, said in an unclassified report that spies used phony business offers and computer hackers to target advanced U.S. technology including lasers, sensors, missiles and other systems.
The report covered the fiscal year ending September 2005 and is the most recent for which complete statistics are available.
In one case, a female spy seduced an American translator to learn his computer password. His unclassified network was later found to be infected by viruses planted by a foreign intelligence service.
- ADVERTISEMENT -
The total number of suspicious foreign contacts climbed to 971 during fiscal year 2005, the report said. The number of countries trying to obtain U.S. technology also rose, to 106 from 90 a year earlier.
"The majority of reported targeting originated from East Asia and the Pacific, which accounted for 31 percent of all reporting," the Pentagon agency said in the report.
The Near East made up 23.1 percent of the targeting, followed by Eurasia at 19.3 percent and South Asia at 13.2 percent. Africa and the Western Hemisphere, not including the United States, accounted for 11.5 percent.
The report, entitled "Technology Collection Trends in the U.S. Defense Industry," did not accuse specific countries of espionage. But U.S. officials have long identified China, Russia, and Iran as the leading counterintelligence threats to the United States.
The Defense Security Service posted its 29-page report on a password-protected government web site. The Washington Times first reported on the report's existence on Wednesday. The Federation of American Scientists, a nonprofit group that advocates for government openness, later posted the document on its own web site.
The Defense Security Service did not return phone calls seeking comment
--------------------------------------------------------------
http://www.exoboxtech.com/alliances.html
Department of Homeland Security:
Exobox has met with the Department of Homeland Security to review the Company’s technology and the department indicated a willingness to help Exobox prove the Company’s products developed from its already validated technology. It also pledged to help Exobox gain governmental acceptance and distribution for such products
Comso, Inc.:
A U.S. General Services Administration contractor, Comso is a software engineering and application development company. As a certified contractor, Comso provides government agencies a variety of technical services through a simple, straightforward ordering purchase system. Comso has agreed to use its GSA status to help Exobox obtain government funds and distribute the Company’s products on the U.S. Department of Commerce’s Commerce Information Technology Solutions list.
Exobox = Hacker Proof ~ end of story ...
NONE: compares to Exobox.
Get it? Got it? Good!!!
Fact!
Eagle1,
Exobox is a cutting edge developer of innovative enterprise and home user endpoint security products. With our SUEZ™ (Secure User Environment Zone) technology White Paper and Software Requirements and Development Documentation completed by OSR Open System Resources, Inc., http://www.exoboxtech.com/White%20Paper%20Support%20Doc.pdf
we are uniquely positioned for the development and market introduction of what we believe is the most advanced computer security system available.
Our mission is to become the leading developer of licensed digital security technologies for a broad range of security-sensitive networks, devices, and other applications.
We have developed two revolutionary, proprietary, patent-pending software technologies to meet this need in a unique, proactive way, providing 100% of such protection without affecting workflow or requiring a continuously updated database of known viruses. Compared to other technologies, ours is truly revolutionary, representing a paradigm shift from the largely ineffective “reactive” network security software currently available from others. Our SUEZ™ technology is a true solution that stops all cyber threats while eliminating the need for CRC (Cyclic Redundancy Checking) and viral database drive retroactive file scanning.
We are currently developing comprehensive product lines from our technology to provide complete and effective security for all servers and computers using our products
Major Exobox Event ~ Patent ISSUED December 5, 2006
SUMMARY OF THE INVENTION
The present data security technology eradicates the threat potential of malicious code downloaded from an external data source onto a personal computer or the like.
Malicious code includes viruses, trojans, worms and such that may be loaded onto a computer from an external data source, such as the Internet, a network or an external data device (i.e., a floppy drive, CD ROM disc, etc.).
A computer with an application of the present inventive software technology installed, will remain completely safe from intrusion from all currently known hacker intrusion technologies.
There can be no file theft, data corruption, or nuisance applications (e.g., viruses) run on the computer. Nor will there be the downtime and technical service costs required to recover from exposure to these malicious codes.
The present inventive software technology does not rely on file scanners, virus definition patterns, Cyclical Redundancy Checks (CRC) checks, Name Address Translations (NAT), or similar strategies of current database driven security technologies.
Rather, the present inventive software technology exploits certain immutable hardware and software communication relationships underlying and basic to the system architecture of a computer to insure intrusion prevention.
Because the present inventive software technology is not database driven, it does not require malicious code definition updates. Therefore, it is not susceptible to new malicious codes or to mutation of existing malicious codes.
Further, hackers, cyber-terrorists and internet predators cannot breech a computer system running the present inventive software even if they possessed the source code and the complete design specifications.
Again, this is because the security features of the present invention are not database dependent, but derive from the intrinsic architectural relationships of the computer's hardware and operating system software.
Implementation of the present inventive software technology is uncomplicated. If the user computer is on an intranet network, in most cases installation of the present inventive software will not require modifications of the user's existing intranet network.
Thanks Better Days... Too, I concur with those thoughts.
I continue to say that IMO, I believe we are in good hands unless I see some form 144s filed with nothing of substance to back up those sells ...
I trust the Exobox Team! ... as they have proved that they mean what they say!
Lets SEE..
EXBX White Papers promised in the November 28, 2005 PR Accomplised:
http://www.exoboxtech.com/White%20Paper%20Support%20Doc.pdf
Exobox Patent ISSUED - 12/5/06 : SUMMARY OF THE INVENTION as promised via website.
http://www.investorshub.com/boards/read_msg.asp?message_id=15375482
Low OS
as of 12-17-2006
Authorized Shares: 500,000,000
Operating Shares: 34,134,197
Estimated Float: 12,000,000
Umm..did I miss anything..?
Eagle1,
P.S. Form 15c211 filled by an MM at the OTCBB ...
Confirm OTCBB Form 15c211 Status: * NASD OTC Compliance Unit at 240-386-5100.
Got Vista Security? Umm never mind, they are not hacker proof but Exobox is..
Exobox technology is like bulletproof glass in that it is virtually 100% effective in protecting against the daily cyber threats targeting Internet users, such as viruses and worms which can destroy documents and computer programs, and spyware which is used to gather personal information without the user's knowledge, increasing the risk for identity theft.
Just install the system and it does the rest, effectively building a protective barrier around computers and servers that has proven to be impenetrable by some of the world’s best hackers.
Hackers, Got Exobox?
LOL
Posted by: Better Days
In reply to: None Date:1/3/2007 11:50:05 PM
Post #of 1049
IMO Exobox is in good hands, and well worth the wait.
I’m looking forward to the day I turn my computer on, check the stocks at the end of the trading day, see Exobox and smile…from ear to ear.
dodlerose, its all in the SEC filings, All conversion rates..
Hope this helps!
Eagle1,
Posted by: doodlerose
In reply to: Eagle1 who wrote msg# 1043 Date:1/3/2007 10:09:23 PM
Post #of 1048
Hey Eagle1, How did you find the preferred conversions, just curious. I can't believe anyone would be anxious to jump ship at this point. I guess life ain't easy for a boy named Sue. Keep your ear to the ground for us. Doodlerose
Thanks Better Days! As we know, EXBX is currently a grey stock and can be manipulated very easy by mms or the like...IMO. Even though we can't see a bid and ask, the MMS are still trading this stock...and Mach provided a link earlier that proves this to be fact.
.
Again, being a Grey Stock, we are very susceptible to a serious spread and manipulation by the market makers
Imagine if an inocent investor does a market buy (some brokers allow this in greys/pinks) and the Market Maker says hey, we have a GREY stock and a Market BUY from a un-nformed investor. That basicly equals an "OPEN Check book" for us (the MMs) to get what we want....so let our MM firm raise the ASK on LOW volume, since we have an OPEN Check BOOK....?
The MMS walks away smiling, no one will ever know...just another Financial Terrorism ACT by the MM...IMO.
If your rumor is true, I applaud any SEC investigation of our EXBX investment! As a matter of fact, as I said before, anyone who wants to toy with EXBX and manipulate it, whether be market maker, offshore hedgie or basher etc....should have paint thinner poured on them in full concentration.
EXBX was on the REG SHO Threshold list for some reason in the recent past. I think that volume can be hidden from the TAPE as the post I previously posted with another company with a Market maker JEFF.
I'm tired of market manipulation by naked shorters and the like...as they have siphoned trillions from our country...IMO.
I don't think that Exobox would be the company to mess with...hence, take heed any unethical...IMO.
The grey market is the wild west of the stock market and the market makers "THINK" they can get away with murder and rip off the innocent investors...but, I think, from my DD, that the SEC is very aware of the market maker, etc manipulations of innocent investors. The newswire proves this to be true..
Eagle1,
P.S.
http://www.exoboxtech.com/alliances.html
Exobox Technologies has developed the following strategic alliances in an effort to ensure that the Company delivers the highest performing, most effective Internet security product available.
Organizations allied with Exobox include:
Houston Technology Center
The Houston Technology Center is a non-profit agency aimed at ensuring the success of qualifying companies. Exobox has met all of HTC’s rigorous requirements and is now considered a “Superstar Technology,” uniquely qualified to work with HTC.
Open Systems Resources, Inc.
OSR is the world leader in low-level manipulation of the Microsoft Windows operating environment. OSR signed an agreement with Exobox in October, 2005, to produce for Exobox an economically viable software requirements document and an initial product ready for sale or license to the identified markets.
Comso, Inc.
A U.S. General Services Administration contractor, Comso is a software engineering and application development company. As a certified contractor, Comso provides government agencies a variety of technical services through a simple, straightforward ordering purchase system. Comso has agreed to use its GSA status to help Exobox obtain government funds and distribute the Company’s products on the U.S. Department of Commerce’s Commerce Information Technology Solutions list.
National Institutes of Standards and Technology
The National Institute of Standards and Technology is a non-regulatory federal agency in the U.S. Commerce Department’s Technology Administration. Its role is to develop and promote measurement, standards and technology to enhance productivity, facilitate trade and improve the quality of life in this country. NIST oversees many programs for U.S. manufacturers and partially funds research and development partnerships with the private sector.
Department of Homeland Security
Exobox has met with the Department of Homeland Security to review the Company’s technology and the department indicated a willingness to help Exobox prove the Company’s products developed from its already validated technology. It also pledged to help Exobox gain governmental acceptance and distribution for such products.
Osha Liang LLP
Osha - Liang is an internationally reconigized intellectual property firm with offices in Houston, Texas, Silicon Valley, California, and Paris, France. The firm provides expertise in all matters pertaining to the acquisition, licensing, and enforcement of intellectual property rights.
As an adjunct professor of law, Mr. Osha has lectured on patent prosecution at the University of Houston, which consistently ranks as one of the top intellectual property law schools in the United States. In addition to patent prosecution, Mr. Osha's practice includes infringement and invalidity opinions, licensing, copyrights, trademarks, and related litigation. He also is a frequent speaker and author on matters related to intellectual property rights, focusing on topics of interest to international practitioners.
Dr. Liang specializes in intellectual property issues involving chemicals, pharmaceuticals, and biotechnology. He heads up the biotechnology group at Osha · Liang and frequently speaks on biotechnology topics as well as intellectual property issues involving Asia. Dr. Liang was previously on the Faculty of Biochemistry at the University of Texas-Houston Medical School and is fluent in Chinese (Mandarin) and Taiwanese.
----------------------------------------------------------------
Posted by: Better Days
In reply to: None Date:1/3/2007 10:24:53 PM
Post #of 1046
This could just be a rumor. I heard that the SEC is still investigating Exobox, and this has been going on for 9 months. I’m not sure what they would be looking for, but from what I was told they haven’t found ANY wrong doing with Exobox. All proper paper work has been filed, all T’s crossed and I’s doted. Maybe they’re just confused by a company that seems to have it together.
IMO, this is good. Yes it’s a pain having to wait, but with such a deep investigation they will leave no question unasked. That will hopefully leave Exobox in a position to move forward.
Thanks Phxgold...what is the outlook IYO here with FUGO?
Do we have some manipulation here?
Low float, PPS down?
Eagle1,
Come on Exobox Team, Please get us off this Grey Floor!
Looks like we have some preferred conversions from the private placement coming to market .... Who ever you Are Thanks (NOT)!
I have been buying this stock from $1.00 and down to .15 and I have NEVER SOLD ONE SHARE EVER!
Eagle1,
P.S. From my calculations there are no more than 10-15 Million shares that is in what I would consider LOOSE Hands...IMO
Today's volume I believe is some LOOSE hands IMO!
~Lets not forget this~
*Exobox Roadmap to Success PR from November 28, 2005.
Exobox Technologies Engages Open Systems Resources; OSR to Write Company's Software Development Plan
http://findarticles.com/p/articles/mi_m0EIN/is_2005_Nov_28/ai_n15879283
Exobox White Papers provided by OSR as promised via the November 28, 2005 PR.
http://www.exoboxtech.com/White%20Paper%20Support%20Doc.pdf
Exobox is Listed on S&P Market Access Program
http://findarticles.com/p/articles/mi_m0EIN/is_2005_Nov_17/ai_n15857578
Exobox Strategic Alliances incuding the Department of Homeland Security, OSR, NIST, HTC, Cosmos.
http://www.exoboxtech.com/alliances.html
According to the PR from November 28, 2005, Exobox's First line of product should be ready for market in 1Q07.
----------------------------------------------------------------
Loose hands pay attention...
Total Volume 1/4/2006 - 195.15 k
0.40 5000 OTO 15:32:36
0.40 5000 OTO 15:32:36
0.40 5007 OTO 15:32:35
0.40 2000 OTO 15:32:34
0.40 2465 OTO 15:32:32
0.40 1000 OTO 15:32:31
0.38 40000 OTO 15:32:21
0.43 800 OTO 15:26:09
0.40 800 OTO 15:25:56
0.43 20000 OTO 14:50:24
0.42 1240 OTO 14:50:19
0.40 18760 OTO 14:50:10
0.43 20000 OTO 14:50:08
0.45 21470 OTO 14:49:56
0.44 2240 OTO 14:42:14
0.40 2240 OTO 14:41:52
0.45 4000 OTO 14:31:34
0.45 4000 OTO 14:31:26
0.40 4000 OTO 14:31:22
0.45 5000 OTO 14:31:14
0.45 900 OTO 12:14:12
0.40 14993 OTO 12:08:54
0.40 2500 OTO 12:08:53
0.40 5540 OTO 12:08:51
0.42 3000 OTO 12:08:32
0.43 2300 OTO 12:08:27
0.40 23890 OTO 12:08:15
0.40 1000 OTO 12:07:57
Welcome txharvey!
It all depends on where you bought it from...
Did you buy it on the open market? Is this a trick question...lol?
Eagle1,
Posted by: txharvey
In reply to: Localinvestor who wrote msg# 1034 Date:1/2/2007 11:40:41 PM
Post #of 1041
I have bought over $50k in stock. How do I know what type it is? Are all shares worth the same when IPO happens?
bulldog, In all due respect
That is the only thing that I said would be any day was the OTCBB listing and yes months ago.
I called the NASD Compliance center (months ago) and they told me as they would any investor that there was a form 15c211 "open" and under review. They said that once approved, it could trade on the OTCBB next day.
You can call for yourself to Confirm OTCBB Form 15c211 Status: * NASD OTC Compliance Unit at 240-386-5100.
Now, you will have to study up on this PR for the business.
*Exobox Roadmap to Success PR from November 28, 2005.
Exobox Technologies Engages Open Systems Resources; OSR to Write Company's Software Development Plan
http://findarticles.com/p/articles/mi_m0EIN/is_2005_Nov_28/ai_n15879283
Exobox White Papers provided by OSR as promised via the November 28, 2005 PR.
http://www.exoboxtech.com/White%20Paper%20Support%20Doc.pdf
Exobox is Listed on S&P Market Access Program
http://findarticles.com/p/articles/mi_m0EIN/is_2005_Nov_17/ai_n15857578
Exobox Strategic Alliances incuding the Department of Homeland Security, OSR, NIST, HTC, Cosmos.
http://www.exoboxtech.com/alliances.html
According to the PR from November 28, 2005, Exobox's First line of product should be ready for market in 1Q07.
Hope this helps,
Eagle1,
Posted by: bulldog1
In reply to: Eagle1 who wrote msg# 1033 Date:1/3/2007 8:58:20 AM
Post #of 1036
i'm just saying "any day now" because that's what people have been saying for 6 months and i'm tired of talk....i want some action.
bulldog could you be a bit more specific with your question?
Thanks, kinda hard to read minds
Posted by: bulldog1
In reply to: None Date:1/2/2007 1:55:59 PM
Post #of 1032
let me guess.......any day now.
Thanks Stock Anaylzer, Technical Analysts Board Bookmarked!
Eagle1,
Posted by: Stock Analyzer
In reply to: None Date:1/2/2007 8:58:36 AM
Post #of 2
Welcome all, I would like to get this board off the ground and active as most people are looking for technical plays where charts give certain signals. I started my last board to teach you how to read charts, now I am hoping this board will be the next step to posting plays that are chart plays. Please keep all posts about charts and technical plays. If you need help please let us know.
Welcome
Happy New Years Mick and All BBC Members!
Eagle1,
Happy New Years Irish and All!
Eagle1,
Happy New Years Stock Analyzer and All!
Be Safe!
Eagle1,
~Happy New Year 2007 ~ Stay Safe Everyone!
Eagle1,
Everyone~ Have a Happy and Safe New Years 2007 ~
Stay Safe, keep a close eye on the kiddos while they do fireworks, and Eat lots of Good Food...
Go Exobox ~ 1Q07
Eagle1,
Lifegear, Thanks for Adding EXBX to the list ...
From what I can see, EXBX has the Best stats on the list for PPS/OS ratio... :)
Thanks,
Eagle1,
------100M O/S and Lower---Stocklist/Charts-------
-----2006--Outstanding
-----Close--Shares
EGLP .04____1M
CEXP .0002__3.2M
GCAP .015___3.4M
GNCE .02____5.2M
FCIN .017___5.3M
MAGZ .005___7.9M
PHAR .005__10.7M
CIBM .006__10.9M
JPEI .005__14M
DIRX .017__15.3M
SPOC .004__16M
SRGE .0005_16.5M
CFGI .005__18.4M
TINN .005__19.1M
CNGG .0036_20.6M
ZLNK .004__21M
EXBX .40___34.1M
CRLU .007__39M
TMXU .0015_49.5M
SMMT .0001_65M
AIMH .001__82M
GCCP .0006_98M
DTEK .015__100M
Thanks for stopping by lifegear....
Thanks Lifegear! Please add EXBX to your List 100M O/S and Lower---Stocklist/Charts.
Eagle1,
P.S. PPS as of 12-30-06 .35 to .50
Exobox Website
http://www.exoboxtech.com/index.html
as of 12-17-2006
Authorized Shares: 500,000,000
Operating Shares: 34,134,197
Estimated Float: 12,000,000
A Market Maker has filed a form 15c211 for EXBX at the OTCBB that is currently under review. Confirm OTCBB Form 15c211 Status: * NASD OTC Compliance Unit at 240-386-5100.
Exobox technology is like bulletproof glass in that it is virtually 100% effective in protecting against the daily cyber threats targeting Internet users, such as viruses and worms which can destroy documents and computer programs, and spyware which is used to gather personal information without the user's knowledge, increasing the risk for identity theft. Just install the system and it does the rest, effectively building a protective barrier around computers and servers that has proven to be impenetrable by some of the world’s best hackers.
Major Exobox Event ~ Patent ISSUED December 5, 2006
SUMMARY OF THE INVENTION
http://www.investorshub.com/boards/read_msg.asp?message_id=15375482
Exobox Patent ISSUED - 12/5/06 : SUMMARY OF THE INVENTION
The present data security technology eradicates the threat potential of malicious code downloaded from an external data source onto a personal computer or the like.
Malicious code includes viruses, trojans, worms and such that may be loaded onto a computer from an external data source, such as the Internet, a network or an external data device (i.e., a floppy drive, CD ROM disc, etc.).
A computer with an application of the present inventive software technology installed, will remain completely safe from intrusion from all currently known hacker intrusion technologies.
There can be no file theft, data corruption, or nuisance applications (e.g., viruses) run on the computer. Nor will there be the downtime and technical service costs required to recover from exposure to these malicious codes.
The present inventive software technology does not rely on file scanners, virus definition patterns, Cyclical Redundancy Checks (CRC) checks, Name Address Translations (NAT), or similar strategies of current database driven security technologies.
Rather, the present inventive software technology exploits certain immutable hardware and software communication relationships underlying and basic to the system architecture of a computer to insure intrusion prevention.
Because the present inventive software technology is not database driven,it does not require malicious code definition updates. Therefore, it is not susceptible to new malicious codes or to mutation of existing malicious codes.
Further, hackers, cyber-terrorists and internet predators cannot breech a computer system running the present inventive software even if they possessed the source code and the complete design specifications.
Again, this is because the security features of the present invention are not database dependent, but derive from the intrinsic architectural relationships of the computer's hardware and operating system software.
Implementation of the present inventive software technology is uncomplicated. If the user computer is on an intranet network, in most cases installation of the present inventive software will not require modifications of the user's existing intranet network.
*Exobox Roadmap to Success PR from November 28, 2005.
Exobox Technologies Engages Open Systems Resources; OSR to Write Company's Software Development Plan
http://findarticles.com/p/articles/mi_m0EIN/is_2005_Nov_28/ai_n15879283
Exobox White Papers provided by OSR as promised via the November 28, 2005 PR.
http://www.exoboxtech.com/White%20Paper%20Support%20Doc.pdf
Exobox is Listed on S&P Market Access Program
http://findarticles.com/p/articles/mi_m0EIN/is_2005_Nov_17/ai_n15857578
Exobox Strategic Alliances incuding the Department of Homeland Security, OSR, NIST, HTC, Cosmos.
http://www.exoboxtech.com/alliances.html
According to the PR from November 28, 2005, Exobox's First line of product should be ready for market in 1Q07.
Exobox does not believe that any other source of technology approaching the capability of Exobox's revolutionary, proprietary technology exists or is in development today.
Accordingly, the Company does not believe it will have any significant, merit-based competition once its technology is ready for sale or license to the Market and proof of its effectiveness is established in the industry.
Thanks MOMO...Happy New Years to All!
Eagle1
"One Team; One Goal"
P.S. Wish me best Wishes...I entered a contest at Rig's Platinum Penny Picks
http://www.investorshub.com/boards/read_msg.asp?message_id=15892210
Your Welcome Rig! Happy New Years to All!
Eagle1,