InvestorsHub Logo
Followers 236
Posts 7834
Boards Moderated 5
Alias Born 01/23/2006

Re: None

Monday, 01/15/2007 8:45:53 PM

Monday, January 15, 2007 8:45:53 PM

Post# of 47790
Exobox = What Disruptive Technology is all About!

Exobox Management “expects” that EXOBOX’s Technology will soon be generally acknowledged as the “Disruptive Technology of Choice” for the Network Security Industry.

Major Exobox Event ~ Patent ISSUED December 5, 2006
SUMMARY OF THE INVENTION

http://www.investorshub.com/boards/read_msg.asp?message_id=15375482

ISSUED Patent for Exobox, US Patent Office
http://tinyurl.com/yke42b

Got Exobox?

~SUMMARY OF THE EXOBOX INVENTION~

The present data security technology eradicates the threat potential of malicious code downloaded from an external data source onto a personal computer or the like.

Malicious code includes viruses, trojans, worms and such that may be loaded onto a computer from an external data source, such as the Internet, a network or an external data device (i.e., a floppy drive, CD ROM disc, etc.).

A computer with an application of the present inventive software technology installed, will remain completely safe from intrusion from all currently known hacker intrusion technologies.

There can be no file theft, data corruption, or nuisance applications (e.g., viruses) run on the computer.

Nor will there be the downtime and technical service costs required to recover from exposure to these malicious codes.

The present inventive software technology does not rely on file scanners, virus definition patterns, Cyclical Redundancy Checks (CRC) checks, Name Address Translations (NAT), or similar strategies of current database driven security technologies.

Rather, the present inventive software technology exploits certain immutable hardware and software communication relationships underlying and basic to the system architecture of a computer to insure intrusion prevention.

Because the present inventive software technology is not database driven, it does not require malicious code definition updates.

Therefore, it is not susceptible to new malicious codes or to mutation of existing malicious codes.

Further, hackers, cyber-terrorists and internet predators cannot breech a computer system running the present inventive software even if they possessed the source code and the complete design specifications.

Again, this is because the security features of the present invention are not database dependent, but derive from the intrinsic architectural relationships of the computer's hardware and operating system software.

Implementation of the present inventive software technology is uncomplicated. If the user computer is on an intranet network, in most cases installation of the present inventive software will not require modifications of the user's existing intranet network.

We have developed two revolutionary, proprietary, patent-pending software technologies to meet this need in a unique, proactive way, providing 100% of such protection without affecting workflow or requiring a continuously updated database of known viruses.

Compared to other technologies, ours is truly revolutionary, representing a paradigm shift from the largely ineffective “reactive” network security software currently available from others.

Our SUEZ™ technology is a true solution that stops all cyber threats while eliminating the need for CRC (Cyclic Redundancy Checking) and viral database drive retroactive file scanning.

We are currently developing comprehensive product lines from our technology to provide complete and effective security for all servers and computers using our products


Get it?

Got it?

Go Exobox!
http://www.Exoboxtech.com/


Eagle1,