Malware Secure Computers Question: Can
a Malware Infected, << email, web link, attachment or file >>,
be safely opened and processed as, no-longer-infected, without the need or
use of detection software? Short
answer: Yes
and I have. Brief
answer: Yes,
by redesigning how the computers’ hardware processes
data. This is not a software improvement.
It is a new Malware Secure Computer hardware design.
I
made a series of electronic component discoveries, resulting in a new
computer design. This new computer design is due to: - my discovery of, a new Information Conduit for computer data to travel on, - leading to a design of, a New Class of Computer Components (NCoCC), - leading to a design for, Malware Secure Computers, which SAFELY open and process malware infected files, as no-longer-infected. ·
This level
of malware safely, is actually accomplished without the need or use of,
detection software, encryption, VPN, AI or analytics. By using
technology from two satellite projects, which I supplied technical support
and electronic components to, I discovered a new, Information Conduit for
computer data to travel on. This new Information Conduit is
different from information conduits used today. Common types are,
fiber-optics, wire, RF, laser, ULF/sound and Wi-Fi. This new
Information Conduit discovery, enabled my design for a New Class of
Computer Components (NCoCC) and its support circuitry, my area of
specialty. It is the NCoCC and
support circuitry, which enables the new way by which the computers’
hardware, is now able to safely process data and is the core to my Malware
Secure Computer discovery. You
need to first know, my Malware Secure Computers are in fact, two
electrically and physically isolated desktop computers, contained within
one housing. They co-operate with each other and function as one
computer. They are: 1/ a virtual computer, the main input stage,
where it is 100% impossible to write to the hard drive (SSD) during normal
operating conditions (controversial, but a true fact) and 2/ a standard
air-gaped computer, functioning as the main storage and main
processing area. You
can think of the NCoCC as a one-way gate for data transfer. The use
of two NCoCCs set in opposite directions, is what enables the air-gaped,
bi-directional, malware safe, data communications between these two
electrically and physically isolated computers. One
half of the NCoCC (YELP), is on the virtual computer. The
YELP communicates the file, via a propitiatory method to the second half
of the NCoCC (PHE), located on the air-gaped computer & is set
in reverse to enable bi-directional communications & instructions. Here is the
part which you many find difficult to believe or understand, but it has
been proven in my lab. When a malware infected or clean file is
presented to the input of the YELP (can be thought of as a transmitter,
but does not transmit), when the file is received at the PHE, it is
absolutely a no-longer-infected file. (Further detail of how the NCoCC
functions, cannot be released at this time, but will be revealed at
product launch). That
file, is now in two locations, 1/ unknown if either clean or malware
infected in the input stage and 2/ absolutely "NOT infected" in
the air-gapped stage. That file, which is “NOT infected”, may
now be safely and confidently, saved, edited or shared with
others. After
the file has been safely copied from the virtual (input stage) to the
air-gapped computer, the problem is, we do not know if the file in the
input stage is clean or Malware infected, therefore, input stage is
“hard booted”, removing any potential unknown malware. As
rebooting is normally time consuming, we have five independent RAM / CPU
segments (containers) in the virtual computer, which are in a constant
state of processing or rebooting. The user does not see this
activity. The action of constantly rebooting, ensures that any
unknown malware present, such as key loggers, are deleted. After
POST, RAM storage locations are cleaned, then are safely reloaded with
data in the air-gapped stage. Removing
power from a single RAM / CPU container at a time, makes rebooting times
significantly faster. The main PSU, SSD, BIOS and other parts
remain power on. The
development of
a physical Proof of Concept (PoC) has been self-funded to date. I
am now at the final stage of needing to hire specialized technical help,
to build a physical PoC. Once a PoC is completed we will be able to
demonstrate to the world, what has been proven in my lab, a significantly
important malware protection discovery. I
am actively pursuing a grant for $20k (us $15k) to complete my four years
of research. Until now, my
efforts have not been successful. Wish me
luck. So close, yet so far. I personally
answer the phone 8am - 10pm, Eastern Time Zone, - 4 GMT. By keeping
these hours, we are able to have a minimum of 1 hour business time for all
time zones. I
am happy to personally talk with anyone who is interested or just curious.
I use WhatsApp to make it easier for international parties to easily
contact me. Safe
Computing, Ralph Kachur, President A Word copy of this file. /Malware SC Word 230810-00 .
| |||||||||||||||||