What do you think?
Eagle1,
P.S. Will the Exobox Technology become the "Disruptive Technology" of Choice by the industry? IMO ... YES, YES and More YES!!!
Exobox "Peace of Mind" PDF Brochure.
http://www.inkspotcreative.com/Resources/exoboxfolder.pdf
Open Systems Resources (OSR) Produces Exobox White Papers:
http://www.exoboxtech.com/White%20Paper%20Support%20Doc.pdf
Who is Microsoft Press and OSR? http://tinyurl.com/386plt
Exobox Patent ISSUED - 12/5/06 : SUMMARY OF THE INVENTION
The present data security technology eradicates the threat potential of malicious code downloaded from an external data source onto a personal computer or the like.
Malicious code includes viruses, trojans, worms and such that may be loaded onto a computer from an external data source, such as the Internet, a network or an external data device (i.e., a floppy drive, CD ROM disc, etc.).
A computer with an application of the present inventive software technology installed, will remain completely safe from intrusion from all currently known hacker intrusion technologies.
There can be no file theft, data corruption, or nuisance applications (e.g., viruses) run on the computer. Nor will there be the downtime and technical service costs required to recover from exposure to these malicious codes.
The present inventive software technology does not rely on file scanners, virus definition patterns, Cyclical Redundancy Checks (CRC) checks, Name Address Translations (NAT), or similar strategies of current database driven security technologies.
Rather, the present inventive software technology exploits certain immutable hardware and software communication relationships underlying and basic to the system architecture of a computer to insure intrusion prevention.
Because the present inventive software technology is not database driven, it does not require malicious code definition updates. Therefore, it is not susceptible to new malicious codes or to mutation of existing malicious codes.
Further, hackers, cyber-terrorists and internet predators cannot breech a computer system running the present inventive software even if they possessed the source code and the complete design specifications. Again, this is because the security features of the present invention are not database dependent, but derive from the intrinsic architectural relationships of the computer's hardware and operating system software.
Implementation of the present inventive software technology is uncomplicated. If the user computer is on an intranet network, in most cases installation of the present inventive software will not require modifications of the user's existing intranet network.
Greenlite Ventures Inks Deal to Acquire No Limit Technology • GRNL • May 17, 2024 3:00 PM
Music Licensing, Inc. (OTC: SONG) Subsidiary Pro Music Rights Secures Final Judgment of $114,081.30 USD, Demonstrating Strength of Licensing Agreements • SONGD • May 17, 2024 11:00 AM
VPR Brands (VPRB) Reports First Quarter 2024 Financial Results • VPRB • May 17, 2024 8:04 AM
ILUS Provides a First Quarter Filing Update • ILUS • May 16, 2024 11:26 AM
Cannabix Technologies and Omega Laboratories Inc. enter Strategic Partnership to Commercialize Marijuana Breathalyzer Technology • BLO • May 16, 2024 8:13 AM
Avant Technologies to Revolutionize Data Center Management with Proprietary AI Software Platform • AVAI • May 16, 2024 8:00 AM