InvestorsHub Logo
Followers 52
Posts 2539
Boards Moderated 9
Alias Born 08/30/2000

Re: None

Friday, 07/27/2001 11:11:06 PM

Friday, July 27, 2001 11:11:06 PM

Post# of 103
(OTC Bulletin Board: CGPN) The Cyber Group Network Corporation Announces New, Enhanced Security PIRT Encryption Technology for Computing Devices
- Company Offers 'Virtually Unbreakable' Extension of E-Snitch Technology To FBI

SAN BERNARDINO, Calif., July 27 /PRNewswire/ -- The Cyber Group Network Corporation today announced the release of new encryption technology designed for Motorola two-way pagers based on the FLEX(TM) and Wisdom(TM) OS software platforms, as well as for personal digital assistants ("PDAs") and PCs under any brand using Windows OS. Motorola has sold over 2.2 million two-way pagers using the FLEX(TM) and Wisdom(TM) OS.

Called Password Protection Information Technology, or "PIRT," The Cyber Group's new product is designed to present a virtually unbreakable barrier to the unauthorized use of a computer. The innovation uses an extension of the technology that will be available in The Cyber Group's upcoming E-Snitch product, which enables the user of a lost or stolen portable computing device to track it to within five feet of its location in real time, retrieve or destroy stored data and programs and/or disable the computer.

While any encryption code can be broken in theory, PIRT technology limits the number of attempts to crack the code that can be made before PIRT makes the file disappear, deletes it or limits the intruder's access time by rebooting the computer. In addition, while most encryption software uses a single key, PIRT technology uses three keys.

"PIRT has the potential to become a widely adopted standard for computer security because of its attractive price and advanced features," said the Gregory D. Evans, the Company's CEO.

When PIRT is installed on a computer for the first time, it scans the hard disk for over eleven identifying characteristics such as bios date, bios version number and network card type. If the encrypted file is ever transferred to another computer it will not decrypt if 7 of the 11 characteristics do not match. After it completes this check, a PIRT icon appears on the computer's toolbar menu. To encrypt a file using the PIRT technology, the user simply drags the file down to the icon, where a small window appears, with a prompt requesting the user to assign a password of at least six characters to the file. Then the user chooses from the following menu of options:


Activate
Event
Attempts
[
]
Reboot Computer [ ]
[
]
Forward
[ ] Email to:
[
]
Delete
[ ]
[
]
Rename
[ ] Rename to:


Choosing the "Activate" option will trigger the selected event, either rebooting the computer or forwarding, deleting or renaming the encrypted file. Entering a number in the "Attempts" column will trigger the selected event once incorrect passwords are entered the specified number of times.

User-friendly options

Mr. Evans described the "Delete" and "Forward" options using an example: "Suppose you want to encrypt a file named 'CGPN.doc.' You drag the document to the icon at the bottom of your screen. When prompted to enter a password, you type in, let's say, '12345678' (even though that wouldn't be a very smart choice of password). You then select 'Forward,' set 'Attempts' to '5' and fill in the 'Email' line with an e-mail address 'yourname@hotmail.com.' You then also select 'Delete' and set 'Attempts' to '6.' If an unauthorized person tries to open 'CGPN.doc,' they will be prompted to enter a password. If they enter the password wrong five times, the computer will e-mail the file to you at 'yourname@hotmail.com.' After logging six unauthorized entry attempts and confirming that the e-mail was sent to and received by 'yourname@hotmail.com,' PIRT will destroy the file. Once destroyed, the file is unrecoverable except from your e-mail address, which of course is separately password-protected."

Activating "Rename" and setting "Attempts" at "15," (for example), will cause the computer to assign the file a new filename, known only to the PIRT user, after an intruder enters incorrect passwords fifteen times.

Selecting "Reboot" and setting "Attempts" at "15" will cause the computer to reboot after fifteen incorrect password entries. If the user activates "Reboot" and sets "Attempts" to "1," the computer will reboot each time the password is entered incorrectly.

Availability and marketing

The Cyber Group will be offering this new technology on August 15th at its Web sites www.cybercrimecorp.com or www.spyamericaonline.com. The Company has filed for a copyright on PIRT and is working with a patent attorney to patent the source code. PIRT utilizes other security features that the Company is holding confidential until the patent process has been completed.

The Cyber Group has contacted the FBI to offer this new technology as a cost-effective countermeasure to the FBI's recent highly publicized alleged lapses in computer security. The Company has offered to make 100 sample copies of PIRT available to the FBI free of charge to allow real-world demonstration and testing of the technology.

The Company has also contacted hard-drive distributors to market PIRT as a feature bundled with each hard drive sold.

About Cyber Group

The Cyber Group Network Corp. is a technology company with the three main goals of computer security technology, patented public Internet access devices, and acquisitions of Internet, communications and financial service sector industries to expand its resources. For more information about the Company, visit the following Web sites: www.thecybergroup.net or www.cybercrimecorp.com.

This news release may contain forward-looking statements related to E- Snitch, distribution timeline and functionality which are made pursuant to the safe harbor provisions of the Private Securities Litigation Reform Act of 1995. These forward-looking statements involve a number of risks and uncertainties, including the timely development and market acceptance of products and technologies and other factors described in the company's filings with the Securities and Exchange Commission. The actual results may differ materially from any forward-looking statements due to such risk and uncertainties. The company undertakes no obligation to revise or update any forward-looking statements in order to reflect events or circumstances that may arise after the date of this release.

Motorola, Wisdom and FLEX are trademarks or registered trademarks of Motorola, Inc.

For more information about the company, please contact: Investor Relations, The Cyber Group Network Corp., San Bernardino, 866-660-CGPN, or fax 909-890-5849 or visit the following Web sites: www.cybergroupnetwork.com or www.cybercrimecorp.com.

MAKE YOUR OPINION COUNT - Click Here http://tbutton.prnewswire.com/prn/11690X61673687

SOURCE Cyber Group Network Corporation

/CONTACT: Investor Relations of The Cyber Group Network Corporation,
+1-866-660-CGPN/

/Web site: http://www.cybergroupnetwork.com /

/Web site: http://www.spyamericaonline.com /

/Web site: http://www.cybercrimecorp.com /

/Web site: http://www.thecybergroup.net/



:=) Gary Swancey

:=) Gary Swancey

Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.