We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks
CGPN @ 1 cent... a "LoJack" for computers and more?
An SI Board Since September 2001
Posts SubjectMarks Bans Symbol
1 1 0 CGPN
Emcee:  Arizona997 Type:  Unmoderated
"Our pick this week is nothing short of the equivalent of a LoJack for computers… and much more, when one considers the extreme importance of its patent pending encryption software. Cyber Group Network Corp. (OTC BB: CGPN) has developed a new product that is designed to present a virtually unbreakable barrier to the unauthorized use of a computer. The innovation uses an extension of the technology that will be available in the CGPN’s upcoming E-Snitch product, which enables the user of a lost or stolen portable computing device to track it to within five feet of its location in real time, retrieve or destroy stored data and programs and/or disable the computer.

In theory, any encryption code can be broken, but the company’s PIRT technology limits the number of attempts to crack the code that can be made before PIRT makes the file disappear, deletes it or limits the intruder's access time by rebooting the computer. In addition, while most encryption software uses a single key, PIRT technology uses three keys.

When PIRT is installed on a computer for the first time, it scans the hard disk for over eleven identifying characteristics such as bios date, bios version number and network card type. If the encrypted file is ever transferred to another computer it will not decrypt if 7 of the 11 characteristics do not match. After it completes this check, a PIRT icon appears on the computer's toolbar menu. To encrypt a file using the PIRT technology, the user simply drags the file down to the icon, where a small window appears, with a prompt requesting the user to assign a password of at least six characters to the file.

On August 28, CGPN announced that they have formed an alliance with CenDyne, Inc. to be the worldwide exclusive marketing organization for CGPN’s PIRT security software. Edward Meadows, president of CenDyne, Inc. stated, “With the many features of PIRT Security Suite, there is no doubt that there will be great demand from our OEM, corporate and retail clients. The PIRT Security Suite is so advanced that it will reshape the way people protect their computers, pagers, PDA's and the data that is stored on them… When our R & D department reviewed PIRT Security Suite and saw it perform all of it's functions, I knew we were looking at the next generation of cyber- security software. The PIRT Security Suite gives a unique and far-reaching way for computer users to protect their businesses and home.” CenDyne was recently ranked by Entrepreneur Magazine and Dun & Bradstreet as #4 on their 2001 list of “America’s Hot 100 Fastest-Growing New Businesses.”

PIRT Security Suite Software was designed to be the most advanced software to protect against computer and computer data piracy. The software provides several methods of protection against unwanted intrusion into lost or stolen data housed on a computer, pager or PDA. For example, PIRT encrypts data, making it virtually unhackable and can also completely destroy data - literally irreversibly wiping it from the device. The PIRT Security Suite also can track a lost or stolen computer across the Internet and remotely retrieve and/or destroy data from your computer or pager.

…As a consequence of the terrorist attacks of September 11, has reported that experts around the world fear a cyber war may break out between hackers within the Middle East and the United States… and system administrators run the risk of their networks either being hijacked “ to be used in distributed denial-of-service attacks, or having their Web sites defaced by sympathetic hacking groups located in Palestine or Afghanistan.”

Regarding its soon to be released E-Snitch product, the CGPN has successfully demonstrated a prototype that is able to locate missing and stolen computers globally within 5 feet of their location. Independent and impartial observers in attendance including Troy Cook, law enforcement official for San Bernardino County Sheriffs Department, Hi-Tech Crime Division; Dan Evans, reporter for The San Bernardino County Sun, and Rose Baird, a representative from AT&T. Evans stated: “The E-Snitch prototype tracked a computer in real time through the use of global positioning satellites. It also downloaded a file off the laptop computer and was able to destroy the file off the hard drive of the computer. Maybe best of all, the device doesn't have to be connected to any hard line to be activated.” Cook stated: “I think there is a lot of potential for this. Hi-tech crime has become such a big topic in San Bernardino County, the sheriffs department started an investigative unit in December. You're constantly trying to stay up with security for crime prevention, and this is the only product of its kind I've seen. I think this is a good idea.” Baird stated, “This by far exceeded my expectations.”

Stockprowler views CGPN as very high risk, as is the case with most OTC BB stocks given current market conditions… as to the upside, we see it as potentially explosive, given the fact that it has traded as high as 8 cents in the past couple of months. Shares of CGPN closed Friday at 1.15 cents on volume of 1,864,300 shares… Remember you saw it here on did not receive compensation of any kind from the company or third parties for writing this report. Readers are urged to read the company SEC filings and do their own due diligence before investing in this or any other stock."

*reprinted by permission from the article dated 9-23-2001
 Previous 25 | Next 25 | View Recent | Post Message
Go to reply# or date (mm/dd/yy):
ReplyMessage PreviewFromRecsPosted
1Subject 37471c.horn-9/22/2001
 Previous 25 | Next 25 | View Recent | Post Message
Go to reply# or date (mm/dd/yy):