A computer with an application of the present inventive software technology installed, will remain completely safe from intrusion from all currently known hacker intrusion technologies.
Further, hackers, cyber-terrorists and internet predators cannot breech a computer system running the present inventive software even if they possessed the source code and the complete design specifications.
Q: How does Exobox technology compare to other newly emerging internet security technology?
A: The Company's monitoring of developments in the patent office, trademark office and the industry in general reveals no other emerging technology anywhere close to ours. For instance, MacAfee offers an arrayed server technology and IBM has a certificate authorization mechanism which each touts as it's proposed "cutting edge" response to the serious ongoing and ever increasing menace of international cyber terrorism.
However, neither of these technologies offers any degree of security that can compare with that provided by Exobox.
Q: How is Exobox technology differentiated from that currently provided by other network security providers?
A: Exobox uses a revolutionary approach which presents a paradigm shift from existing network security technology.
Current approaches by others involve both hardware and software which attempts to recognize and react to ever changing database of cyber threats.
Exobox technology involves a patent-protected approach radically different from that utilized by any existing internet security companies and produces a unique, proactive and unprecedented environment of complete computer security.