All Aboard!Eagle1
For the FIRST TIME in the History of Exobox Technologies~ Scott Copeland from Houston-based Exobox was interviewed "ON THE AIR" by Technology GURU - High Tech Texan (Michael Garfield
www.hightechtexan.com/) as his guest Saturday 2/2/08 at 11:00am Central Time.
Listen to the podcast here.
www.950kprc.com/cc-common/podcast/single_podcast.html?podcast=garfield.xmlThe High Tech Texan (Michael Garfield) says "Scott Copeland will tell the story how he developed the software that could be the end-all, be-all protection for the IT industry~ The fun starts at 11am CT this Saturday. Listen and watch online."
www.hightechtexan.com/Exobox Technology is like bulletproof glass in that it is virtually 100% effective in protecting against the daily cyber threats targeting Internet users, such as viruses and worms which can destroy documents and computer programs, and spyware which is used to gather personal information without the user's knowledge, increasing the risk for identity theft. Just install the system and it does the rest, effectively building a protective barrier around computers and servers that has proven to be impenetrable by some of the world’s best hackers.
Exobox's Technology has been evaluated and received the validation of several sources, including the National Institute of Standards and Technology and OSR Open Systems Resources, Inc., the world leader in low-level manipulation of the Windows operating system.
www.osr.com/~Exobox Recieves White Paper by OSR ~
tinyurl.com/2zu2fw~Exobox has signed a Co-Existing Agreement with Microsoft~ on January 18, 2007 ~
tinyurl.com/2plclr~Exobox Retains J.C. Watts Companies as Its Registered Lobbyist~ January 3, 2008 ~
tinyurl.com/3xd5eqExobox FAQ:
www.exoboxtech.com/Frequently%20Asked%20Questions.htmlQ: How does Exobox technology compare to other newly emerging internet security technology?
A: The Company's monitoring of developments in the patent office, trademark office and the industry in general reveals no other emerging technology anywhere close to ours. For instance, MacAfee offers an arrayed server technology and IBM has a certificate authorization mechanism which each touts as it's proposed "cutting edge" response to the serious ongoing and ever increasing menace of international cyber terrorism. However, neither of these technologies offers any degree of security that can compare with that provided by Exobox.
Q: Is Exobox technology limited to Windows or does it have other platform compatibility?
A: The Exobox technology is designed to be compatible with all versions of Windows XP and Windows Vista. The company can easily port its technology to other operating systems, such as Blackberry, cell phones, MAC and Unix/Linux, when and if Market economic conditions warrant.
Q: How is Exobox technology differentiated from that currently provided by other network security providers?
A: Exobox uses a revolutionary approach which presents a paradigm shift from existing network security technology. Current approaches by others involve both hardware and software which attempts to recognize and react to ever changing database of cyber threats. Exobox technology involves a patent-protected approach radically different from that utilized by any existing internet security companies and produces a unique, proactive and unprecedented environment of complete computer security.
EXOBOX Mission Statement:
Our mission is to become the leading developer of licensed digital security technologies for a broad range of security-sensitive networks, devices, and other applications. "We are uniquely positioned for the development and market introduction of what we believe is the most advanced computer security system available."
Major Exobox Events
SUMMARY OF THE INVENTION
www.investorshub.com/boards/read_msg.asp?message_id=15375482Exobox ISSUED Patents
tinyurl.com/2a82lu 1 7,281,266 Personal computer internet security system
2 7,146,640 Personal computer internet security system
A computer with an application of the present inventive software technology installed, will remain completely safe from intrusion from all currently known hacker intrusion technologies.