Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Imgunnaretire,
Hi, sorry I do not know of any annual shareholder's meeting to even take place as of yet. I'll do some calling though.
Have you heard of any such?
tia,
Eagle1,
Hello EXBX Shareholders...
What is going on, I feel so alone here, but shouldn't be for to much longer..
Eagle1,
EXBX:
Do I smell an OTCBB listing here? I called OTCBB today and there is an open 211 form and an MM is on it.
Seems to be we will be listed OTCBB and just a skip and jump past Pinks...IMO. Pretty Impressive is you ask me, EXBX is acting like a big board stock already.
Eagle1,
HI Mary!
Eagle1,
EXBX: Anyone Home?
Where is everyone?
Eagle1,
Looks like its its coming folks..
Eagle1,
Thank You !!
Eagle1,
Anyone know a 100% effective Virus Killing Software program?
tia
Eagle1,
Computer Virus Timeline
How to Protect Yourself
1949
Theories for self-replicating programs are first developed.
1981
Apple Viruses 1, 2, and 3 are some of the first viruses “in the wild,” or in the public domain. Found on the Apple II operating system, the viruses spread through Texas A&M via pirated computer games.
1983
Fred Cohen, while working on his dissertation, formally defines a computer virus as “a computer program that can affect other computer programs by modifying them in such a way as to include a (possibly evolved) copy of itself.”
1986
Two programmers named Basit and Amjad replace the executable code in the boot sector of a floppy disk with their own code designed to infect each 360kb floppy accessed on any drive. Infected floppies had “© Brain” for a volume label.
1987
The Lehigh virus, one of the first file viruses, infects command.com files.
1988
One of the most common viruses, Jerusalem, is unleashed. Activated every Friday the 13th, the virus affects both .exe and .com files and deletes any programs run on that day.
MacMag and the Scores virus cause the first major Macintosh outbreaks.
1990
Symantec launches Norton AntiVirus, one of the first antivirus programs developed by a large company.
1991
Tequila is the first widespread polymorphic virus found in the wild. Polymorphic viruses make detection difficult for virus scanners by changing their appearance with each new infection.
1992
1300 viruses are in existence, an increase of 420% from
December of 1990.
The Dark Avenger Mutation Engine (DAME) is created. It is a toolkit that turns ordinary viruses into polymorphic viruses. The Virus Creation Laboratory (VCL) is also made available. It is the first actual virus creation kit.
1994
Good Times email hoax tears through the computer community. The hoax warns of a malicious virus that will erase an entire hard drive just by opening an email with the subject line “Good Times.” Though disproved, the hoax resurfaces every six to twelve months.
1995
Word Concept becomes one of the most prevalent viruses in the mid-1990s. It is spread through Microsoft Word documents.
1996
Baza, Laroux (a macro virus), and Staog viruses are the first to infect Windows95 files, Excel, and Linux respectively.
1998
Currently harmless and yet to be found in the wild, StrangeBrew is the first virus to infect Java files. The virus modifies CLASS files to contain a copy of itself within the middle of the file's code and to begin execution from the virus section.
The Chernobyl virus spreads quickly via .exe files. As the notoriety attached to its name would suggest, the virus is quite destructive, attacking not only files but also a certain chip within infected computers.
Two California teenagers infiltrate and take control of more than 500 military, government, and private sector computer systems.
1999
The Melissa virus, W97M/Melissa, executes a macro in a document attached to an email, which forwards the document to 50 people in the user's Outlook address book. The virus also infects other Word documents and subsequently mails them out as attachments. Melissa spread faster than any previous virus, infecting an estimated 1 million PCs.
Bubble Boy is the first worm that does not depend on the recipient opening an attachment in order for infection to occur. As soon as the user opens the email, Bubble Boy sets to work.
Tristate is the first multi-program macro virus; it infects Word, Excel, and PowerPoint files.
2000
The Love Bug, also known as the ILOVEYOU virus, sends itself out via Outlook, much like Melissa. The virus comes as a VBS attachment and deletes files, including MP3, MP2, and .JPG. It also sends usernames and passwords to the virus's author.
W97M.Resume.A, a new variation of the Melissa virus, is determined to be in the wild. The “resume” virus acts much like Melissa, using a Word macro to infect Outlook and spread itself.
The “Stages” virus, disguised as a joke email about the stages of life, spreads across the Internet. Unlike most previous viruses, Stages is hidden in an attachment with a false “.txt” extension, making it easier to lure recipients into opening it. Until now, it has generally been safe to assume that text files are safe.
“Distributed denial-of-service” attacks by hackers knock Yahoo, eBay, Amazon, and other high profile web sites offline for several hours.
2001
Shortly after the September 11th attacks, the Nimda virus infects hundreds of thousands of computers in the world. The virus is one of the most sophisticated to date with as many as five different methods of replicating and infecting systems. The “Anna Kournikova” virus, which mails itself to persons listed in the victim's Microsoft Outlook address book, worries analysts who believe the relatively harmless virus was written with a “tool kit” that would allow even the most inexperienced programmers to create viruses. Worms increase in prevalence with Sircam, CodeRed, and BadTrans creating the most problems. Sircam spreads personal documents over the Internet through email. CodeRed attacks vulnerable webpages, and was expected to eventually reroute its attack to the White House homepage. It infected approximately 359,000 hosts in the first twelve hours. BadTrans is designed to capture passwords and credit card information.
2002
Author of the Melissa virus, David L. Smith, is sentenced to 20 months in federal prison. The LFM-926 virus appears in early January, displaying the message “Loading.Flash.Movie” as it infects Shockwave Flash (.swf) files. Celebrity named viruses continue with the “Shakira,” “Britney Spears,” and “Jennifer Lopez” viruses emerging. The Klez worm, an example of the increasing trend of worms that spread through email, overwrites files (its payload fills files with zeroes), creates hidden copies of the originals, and attempts to disable common anti-virus products. The Bugbear worm also makes it first appearance in September. It is a complex worm with many methods of infecting systems.
2003
In January the relatively benign “Slammer” (Sapphire) worm becomes the fastest spreading worm to date, infecting 75,000 computers in approximately ten minutes, doubling its numbers every 8.5 seconds in its first minute of infection. The Sobig worm becomes the one of the first to join the spam community. Infected computer systems have the potential to become spam relay points and spamming techniques are used to mass-mail copies of the worm to potential victims.
2004
In January a computer worm, called MyDoom or Novarg, spreads through emails and file-sharing software faster than any previous virus or worm. MyDoom entices email recipients to open an attachment that allows hackers to access the hard drive of the infected computer. The intended goal is a “denial of service attack” on the SCO Group, a company that is suing various groups for using an open-source version of its Unix programming language. SCO offers a $250,000 reward to anyone giving information that leads to the arrest and conviction of the people who wrote the worm.
An estimated one million computers running Windows are affected by the fast-spreading Sasser computer worm in May. Victims include businesses, such as British Airways, banks, and government offices, including Britain's Coast Guard. The worm does not cause irreparable harm to computers or data, but it does slow computers and cause some to quit or reboot without explanation. The Sasser worm is different than other viruses in that users do not have to open a file attachment to be affected by it. Instead, the worm seeks out computers with a security flaw and then sabotages them. An 18-year-old German high school student confessed to creating the worm. He's suspected of releasing another version of the virus.
Yes, agreed, I say
We should hear from the company within few months or so and worst case is that the software will hit the market no later than April 2007.
Thanks again for you DD!! :)
Eagle1,
FBI survey finds computer attacks up
this is old but good..information
Eagle1,
http://www.usatoday.com/tech/news/2002/04/08/fbi-survey.htm
WASHINGTON (AP) — Most large corporations and government agencies have been attacked by computer hackers, but they frequently do not inform authorities of the breaches, an FBI survey finds.
The survey released Sunday found about 90% of respondents detected computer security breaches in the past year but only 34% reported those attacks to authorities.
Many respondents cited the fear of bad publicity about computer security.
"There is much more illegal and unauthorized activity going on in cyberspace than corporations admit to their clients, stockholders and business partners or report to law enforcement," said Patrice Rapalus, director of the Computer Security Institute, which conducted the survey with the FBI's San Francisco computer crime squad.
The seventh annual survey polled 503 American corporations, government agencies, financial and medical institutions and universities. The names of the organizations polled were not released.
Overall, there were more computer crimes than in last year's survey. But fewer victims reported crimes to police than in 2001, reversing a trend from earlier surveys.
A former Justice Department computer crimes prosecutor said there is frequently little incentive for a company to report computer attacks or crimes.
"It tends not to help their bottom line, but hurt their bottom line," Mark Rasch said. "What a company wants to do is solve the problem and move on."
When those companies are financial institutions or other parts of the nation's critical technology infrastructure, however, more than the company's bottom line is at stake.
The government is using partnership groups — such as the FBI's InfraGard chapters in each field office — to persuade companies to report the attacks directly to FBI agents without public disclosure.
"They need to use a mechanism to report these incidents and vulnerabilities broadly so they can be fixed, but won't be attributable back to them," Rasch said.
The survey respondents said they lost at least $455 million as a result of computer crime, compared with $377 million the previous year. In both surveys, only about half chose to quantify their losses.
The most serious monetary losses came from the theft of money or proprietary information, such as blueprints for computer programs, and fraud, such as failure to deliver services or equipment that have been paid for.
Despite concerns that foreign governments would begin using computer attacks as a method of terrorism or war, most attacks on American companies still come from individual hackers and disgruntled employees, the report said.
The survey also addresses the increasing frequency of attacks on Internet retailers. There have been several reports of thefts of credit card data over the past year, including some instances in which the thief threatened to release sensitive data unless the victim paid a ransom.
WorldCom, The New York Times and others have had holes exposed in their Web security, leading to unwanted intruders.
Thirty-eight percent of the respondents said their Web sites have been broken into over the past year, and 21% said they were not sure. Eighteen percent reported some sort of theft of transaction information, such as credit card numbers or customer data, or financial fraud.
Seventy percent of organizations reported online graffiti, usually the simplest and least damaging type of attack. A graffiti hacker replaces the Web site's front page with his or her own text and, sometimes, offensive pictures.
Companies are also seeing problems from within. Seventy-eight percent said their employees abused Internet privileges, including downloading pornography or pirated software.
Thanks for your help imgunnaretire,
While I do see what you are saying I also see this from the white papers.
Eagle1,
Exobox’s unique approach to network security provides an unrivaled level of security, coupled with the addition of significant, revolutionary features that other network security products fail to provide.
These multiple features and benefits described in the White Paper should make SUEZ Technology the foremost network/data protection solution on the market.
The Enterprise Solution currently being developed for anticipated licensing in 2006 represents the first in a line of SUEZ based products from Exobox.
Fire,
No problem friend, would be glad to help out ;)
Talk soon,
Eagle1,
Thanks Fire....
Eagle1,
Yes Sir RU, will Do!!
Talk soon,
Eagle1,
Thanks RU, and Nice Site...
Eagle1,
Shakerzz, you on ARET yet?
tia
Shakerzz...Add one more ;))
Eagle1,
Thanks Irish and Yes Happy Fathers Day to All!
Eagle1,
HI Ru and MOMO, Whats HOT/ Any HOT Subpenny plays with LOW O/S
's here?
tia..
Eagle1,
Good Morning folks, am I hearing Rumblings here?
Are we looking for .005 anytimes soon here?
tia...
Eagle1,
Looks like the company is spending money where it needs to be spent....
No Dumping going on either.....
No worries here, just let EXBX do their thing. Read all the PR's, Read all the filings...its all there.
Only thing is that we could be till April 2007 before the software hits...
Eagle1,
Got more at .15 yippee....
Eagle1,
Thanks workoutorgohome...
Did he by chance that the software will hit market by year end or not?, or whether they are behind a bit or not?
Thank YOU!
P.S. Wouldn't it be nice if EXBX did forward splits?
Symantec: Cyber attacks from China up 153 percent last year
http://www.worldtribune.com/worldtribune/06/front2453902.0597222224.html
Special to World Tribune.com
EAST-ASIA-INTEL.COM
Thursday, June 15, 2006
The threat of computer attack from China is growing, according to the chairman of the House Energy and Commerce Subcommittee on Oversight and Investigations citing a report by Symantec.
In addition, U.S. intelligence officials say China is a leading threat against U.S. nuclear weapons research facilities and that one key method is to make inquiries to nuclear scientists by email.
Rep. Ed Whitfield CNN
China gained valuable nuclear secrets from the United States through a careful program of eliciting information, often from U.S. scientists and technicians who visited China.
Three nuclear scientists have been linked to spying for China in the past: Wen Ho Lee, who worked in Los Alamos National Laboratory’s X Division, where nuclear arms are designed, was suspected of passing secrets to China but was recently cleared of all charges. Los Alamos scientist Peter Lee pleaded guilty in 1985 to passing secrets to China, and Gwo Bao Minh, a Lawrence Livermore National Laboratory scientist passed secrets to China.
Rep. Ed Whitfield (R-Ky) told a hearing last week that a computer security report highlighted the threat from China. Whitfield said there is a “rapidly increasing cyber threat originating from China.”
He noted that a March 2006 report from Symantec indicated that “attacks originating in China last year increased by 153 percent.”
“According to Symantec, these attacks from China are likely signs that more attackers have become active within the country,” he said.
Gregory Friedman, Energy Department inspector general, told the hearing that controls over 800 information systems at weapons labs need to be improved.
During a recent review of cyber security, “we noticed systemic problems that exposed the department's critical systems to an increased risk of compromise. Specifically, the department had not yet established a complete inventory of networks, applications, or external interfaces,” Friedman said.
Today, I was able to call the transfer agent to see if the company has been dumping as I questioned the volume increase since April 2006.
From November 2005 the pps went from just above $1.50 to over $22.00 on light volume and then down to .15 to .50 cents as of now.
Please take note, that IMO, there is "NO company Dumping" going on here but only shareholder trading back and forth.
Take a look see.
Share Structure as of 6/15/2006
A/S is 500,000,000
O/S is 10,917,500
Eagle1,
P.S. Im trying to load at .15ish....
Bought more today...anyone getting filled?
More at .20..
Eagle1,
Hi MoMO, well actually a MOMO Stock play..got any?
tia..
Eagle1,
http://www.investorshub.com/boards/board.asp?board_id=5667
Looking for MOMO... Whats HOT????? Tia
Eagle1,
Workoutorgohome }}
Thanks!
Do you by chance have any opinion or idea why they would want to sell the restricted shares in the first place?
If you would like, you can email me ...
Thank You for your DD!!
Eagle1,
P.S. I agree, the company did say that the software would be ready in 11 months from November 2005. Lets see, that should put us about October 2006 and right around the corner.
EXBX is the only software that is proactive and 100% bulletproof against Computer viruses and also backed by the prestigious NIST (National Institute of Standardizeds and Technology)so, we shold be in for a heck of a run.
Looks like the common shares O/S could end up being about 20 Million or so after the conversions...IMO. Still very low for a stock with so much potential.
--------------------------------------
Reliable source----
The lawsuit was because of restricted shares.
It was settled by allowing the sale of said shares
causing the pps to decline to the current level.
Company news said the product would be Microsoft compatable
in late Sept.
HOUSTON, Nov 28, 2005 (BUSINESS WIRE) -- Exobox Technologies Corp. (Pink Sheets:EXBX), a network security company with a proprietary software designed to stop all cyber threats, announced today that it has executed an engagement agreement with Open Systems Resources, Inc ("OSR") to adapt Exobox's software to the Windows operating system. OSR consultants know the Windows system better than any other programmers in the industry making OSR the world leader in low level manipulation of the Windows environment. OSR has already examined and validated Exobox's underlying technology and has agreed to write Exobox's commercial software development plan for Windows. Under their agreement with Exobox, effective October 26, 2005, OSR also has agreed to develop and provide Exobox a commercially viable product for Windows within 11 months, for a turnkey fee, once it has completed the software development plan.
Just called the old IR Group for EXBX...
They are no longer working for EXBX. She gave me the company's number to contact them directly 713-781- 6173. I asked what happened and she said that the company no longer is contracting them and the company may do IR in house, or possibly will be contracting another IR firm.
One thing is that some shares have been hitting the market since April 2006. I don't think its been over 5 Million so should not be a problem.
Also, called Pinksheets and they said that a market maker needs to file a form 211 before any will show up on level II quotes.
Anyone talked to the company lately?
Thanks,
Eagle1,
EXOBOX TECHNOLOGIES CORP.
Washington, D.C. 20549
FORM 8-K
CURRENT REPORT
PURSUANT TO SECTION 13 OR 15 (D)
of the
SECURITIES EXCHANGE ACT OF 1934
Date of Report (Date of Earliest Event Reported) May 17, 2006
EXOBOX TECHNOLOGIES CORP.
(Exact name of registrant as specified in its charter)
Nevada
(State or other jurisdiction of incorporation or organization)
88-0456274
(IRS Employer Identification Number)
6303 Beverly Hill, Suite 210
Houston, Texas 77057
(Address of principal executive offices)
Robert B. Dillon, President
Exobox Technologies Corp.
6303 Beverly Hill, Suite 210
Houston, Texas 77057
(Name and address of agent for service)
(713) 781-6173
(Telephone number, including area code of agent for service)
ITEM 3. SECURITIES AND TRADING MARKETS
ITEM 3.02 - UNREGISTERED SALES OF EQUITY SECURITIES.
On the 8th day of June, 2006, Exobox Technology Corp., a Nevada corporation
(?Exobox?) issued 6,000 shares of Series C Convertible ITEM 3. SECURITIES AND TRADING MARKETS
ITEM 3.02 - UNREGISTERED SALES OF EQUITY SECURITIES.
On the 17th day of May, 2006, Exobox Technology Corp., a Nevada
corporation ("Exobox") issued 4,000 shares of Series C Convertible Preferred
Stock for the cash sum of One Hundred Thousand Dollars ($100,000) pursuant to
the terms of the Securities Purchase Agreement dated as of September 20, 2005
between Exobox and Manillo Investors, Ltd.
EXOBOX TECHNOLOGIES CORP.
By: /s/Robert B. Dillon
-----------------------------------------
Robert B. Dillon, President
Dated: May 17, 2006
Preferred Stock for the
cash sum of One Hundred Fifty Thousand Dollars ($150,000) pursuant to the terms
of the Securities Purchase Agreement dated as of September 20, 2005 between
Exobox and Manillo Investors, Ltd.
EXOBOX TECHNOLOGIES CORP.
By: /s/Robert B. Dillon
-----------------------------------------
Robert B. Dillon, President
Dated: June 8, 2006
Exobox's Software Very Impressive compared to the competition >
Competition
Antivirus Software such as that produced by Norton and McAfee is the most obvious competitor. On average anti-virus software currently available from some 20 sources is only about 60% effective in catching and/or eliminating viral threats. Today's Trojan scanners produced by at least 42 companies, the spy ware removal technology currently available from at least 11 companies and the spy ware prevention solutions offered by over 14 companies fare no better. Our company's Technology is 100% effective against viruses and also stops Trojan activity and Identity theft.
Also, unlike other anti-virus software, our company's Technology never needs to be updated. Our company's Technology does not "scan" for malicious code and therefore is not dependent on a database of known threats. We do not believe that any other source of technology approaching the capability of our company's revolutionary, proprietary Technology exists or is in development today. Accordingly, we do not believe it will have any significant, merit-based, competition once our Technology is ready for sale or license to the Market and proof of our effectiveness is established in the industry.
Workoutorgohome, Thanks, any idea how many shares were allowed?
Thanks,
Eagle1,
------------------------------------------------------------------------------------------------------------------------------------------------------------
Companies that have struggled with the time-consuming and laborious process of retraining entire staffs when new software is introduced will be glad to know that Exobox’s software doesn’t require any training. Just install the system and it does the rest, effectively building a protective barrier around computers and servers that has proven to be impenetrable by some of the world’s best hackers.
Our technology is unique, representing a proactive way to protect computers from cyberspace threats. Because of the exclusivity of our products, Exobox is seeking comprehensive United States and international patent protection of its technology, which precludes the Company from divulging significant technical specifications at this time.
However, the software has been evaluated and received the validation of several sources, including the National Institute of Standards and Technology and OSR Open Systems Resources, Inc., the world leader in low-level manipulation of the Windows operating system. In addition, Exobox is a client of the Houston Technology Center, a non-profit organization that helps develop technology centric businesses that have proven software or products.
Hi Same11 and Welcome!
Sorry for the delay ...
1) The EXBX Software is not on the market yet. I do believe that in April 2006 the software was completed and ready, but will go to market sometimes in 4Q06.
The pps went to over $22 and now back down to under $1.00
There is not alot of tradeable float out there and any buying pressure will make it move up and any selling will make it move down. If you have level II there are no narket makers there, hence makes investors kinda nervous for now as well.
*From what I have read, NO malicious Code has broken thru EXBX's software for over 5 years now.
Did some people sell recently? I think so and there was a lawsuit that was settled, but I do not know the details.
Does anyone know the details of the lawsuit that was recently settled?
Have a great day...
Eagle1,
Good Morning Everyone!
Well, I believe EXBX has been very interesting lately. Seems like .25 was a bottom and I was able to pick some up at .29 and .30 last week.
Anyone else get filled at these levels?
Thanks,
Eagle1,
IH Admin [Matt],
If you don't want to restore I understand!
Thanks,
Eagle1,
Message received and understood, will never occur again.
I read many boards here that have RB posted on it so I did not think that posting other message boards would be a problem, but it will not occur again!
Thanks!
Eagle1,
IH Admin [Matt],
I respectfully ask you for a restore. The only thing I was trying to acclomplish was to bring shareholders together. Our site could never be an IHUB. I have links to IHUB from our site as networking is a great thing. I will further add IHUB Links at our site, if you wish me to do so to show that I am doing just that, networking.
There are many posters that have their links at the bottom of their posts...I could have went overboard and accept that I did that.
I would appreciate a restore!
Thank You!
Sincerly,
Eagle1,
OK who was the wise guy that took down the bikini Fight girl?
I wanta know now..the only reason I came here and shes gone....shoot...
Where is she?
lol
Eagle1,