Malware Protection

without using detection software

August 31,  2020

 

Overview of our discovery: 

 

 For details of our discovery:    www.roati.com

 

    Question:   

                     

What if, a major cyber security discovery was made 

and nobody believed it possible.    Click here  

 

Our discovery will allow us to manufacture in Canada, Malware Secure Computers which do not need to use Detection Software, Encryption, AI or Analytics, in order to "safely":

  • open Malware infected web sites

  • open Malware infected emails

  • open Malware infected email attachments - which are text based, such as Word, PDF, SQL or Oracle data base tables.  

  • watch Malware infected video streaming

  • view Malware infected pictures

I understand the above is contrary to current Cyber Security thinking however, the enabling technology has been proven in our lab.

For us "it is perfectly safe" to have a Malware file located in our input stage, including any yet to be discovered Malware which would normally would bypass existing  detection software systems.  

We are now in the design of a Proof of Concept (PoC) demonstrator.  The president of a major Canadian bank has offered to fund our commercial product development for a small equity stake, contingent upon demonstrating what I said could actually be done.

───────────────────────────

The on-site introduction of a Malware, via a USB, CD or Wi-Fi, is a major concern for Cyber Security experts.  We protect against the purposeful injection of a Malware by a malicious employee, the inadvertent introduction of a Malware by a good employee or the pre-meditated attack by an on-site hacker.  This extra level of protection is also accomplished without the need or use of detection software, encryption AI or analytics.

I have a 30+ year background in electronic component technical sales, sales management, and project management, including the supply of electronic components used in three satellites circulating the globe today.

My highest profile satellite project, was the supply of the CCD imaging sensor used in the imaging portion of the European Space Agency VIKING satellite, which produced the first images from outer space of the Aurora Borealis looking like a crown hovering above Earths North Pole.

Due to my exposure to a breadth of electronic technologies, I made this major Malware security discovery. 

───────────────────────────

One of the main reason I am able to provide this level of Malware Security is because of my discovery and development of a New Class of Computer Components (NCoCC), which has enabled me to do a major redesign of the architecture of the input section of our computers.   It is via the input stage where most Malware obtain entry into your computer.  When a clean or malware infected user data file (such as Word, PDF and SQL or Oracle data base tables files) are presented to the input of the NCoCC, the output is always no-longer-infected.

The other major market for our NCoCC is for the Malware protection of certain types of data communications lines, such as those used in IOT, IIOT, SCADA, Critical Infrastructure and Process Control.  Again, without the need or use of detection software, encryption, AI or analytics.

───────────────────────────

We have self-funded this project in to date.   Despite our best efforts, we just cannot take this project any further without obtain the financial support needed to hire specialized technical help to build a simple PoC demonstrator, for the bank president mentioned above. 

Our phone is answered from 8:00 am - 9:00 pm EST, 7dpw.  I sincerely invite you the reader to be in contact. 

For a detailed explanation of my discovery go to www.roati.com 

 

Safe Computing,
Ralph Kachur,              
f
President

I cannot see the future, only the now.

I can only hope that what I do today

will prepare me for tomorrows now.

 

ROATI Technologies Inc.
1216 - 64  Bramalea  Road
Brampton,  Ontario,  L6T 2W8 
Canada

(905) 846-1233    ( -4 GMT, -4 UTC ) 
(800) 458-3089    ( USA & Canada )
www.roati.com
ralph@roati.com 

Protecting Electronic Information
      

Phones answered :   7 days per week
8:00 am - 9:00 pm,  EST, 
5:00 am - 6:00 pm,  Pacific Time
≥ 1 hour all World Wide time zones