Jump to content

rhythmnsmoke

Member
  • Posts

    142
  • Joined

  • Last visited

  • Donations

    0.00 USD 
  • Country

    United States

Everything posted by rhythmnsmoke

  1. The very machine I'm replying with is protected by ImmE. I have everything on here that I will ever need. DVD software, text messaging, Microsoft Office, Outlook, etc.. Trust me, besides running programs that don't belong, ImmE will not get in your way of doing your daily activity. I can open Word and save a document, just as much as I can surf the internet. You don't know it's running, except for the authentication bar that scrolls by in like a nano-sec. at times to check your program out, and the icon you see in the system tray. A little off subject, but man, my g/f mom's computer has Norton on it. And during one of it's moments when it was doing a scan of the machine, I check the task manager, and the thing was reading upwards of 60 CPU drainage. That crazy!
  2. You know, I have actually tested that out, and they try to achieve what we do. But they can't do it without you having to reboot the machine. And you can't work with normal daily activities like creating a word document. because it will erase it once you rebooted. I'm not knocking it, but it makes the computer useless. Anyone can go that route.
  3. No need for speakers, I talk over the phone. Just PM me your e-mail address. I assure you, all of your un-answered/not yet asked questions will be answered to the best of my ability. For credential sakes, I am the 3rd man down in our IT/R&D department, from our cheif programmer. My job title is Jr. Network Engineer, but I do so much more than that job title expresses. What we have done, goes farther than what can "easily" be done in windows as you proclaim. You can not tell windows to constanly scan the HDD for un-authorized executables for one. Windows does not have the ability to detect existing executables on the machine that have been copied to another part of the machine and changed, and not allow that executable to run. And that is just for starters! If you were to try and do everything we do, just by using Windows (not to mention the stuff Windows can't do, like protect non-critical OS files, or static data from being deleted, altered, or modified) as you say can "easily" be done, then you would render the OS useless, and perhaps cause it to crash.
  4. You are starting to get it now. What we haven't gotten to is what is NEXT for ImmE. It is YOUR job to know if there is an already existing virus, trojan, malware...ect. on your machine. It's always been YOUR job to make sure your machine was clean before you installed your security solution. You take Norton or any other product and install it after the virus is already infected the machine, same thing would apply. Security software is designed to stop stuff from getting in, not stop stuff after it's already on the machine. Now, what's NEXT for ImmE, is a version that you can use to install on a KNOWN clean box. The next ver. will then take a data dictionary of that known clean machine. Once that is done, you will be able to take it to all other existing machines on the network, and ImmE will anaylze everything on that machine, compare it to the data dictionary of the known clean machine, and report back all the "DELTA's" of the other machine. Given you control over whether or not to keep what was not recognized as being apart of the known clean machine. Again, the computer can't reason. Therefore, you are going to have to know what it is you are downloading while ImmE is down. If you don't trust the executable that you are about to put into the machine, then don't put it in. Traditional AV isn't going to do a lick for you when it comes to a Zero-Day attack, and that's with it RUNNING. So, correct me if I'm wrong, but you are comparing: AV software that IS running, and still getting infected with a new un-known virus and hosing your machine. TO: Having access to ImmE and shutting it down and installing your malicious code. Because it's not going to get on there while ImmE is running, unlike AV software. To sum that up, your argument is that ImmE NOT running is just as vulnerable as AV software RUNNING....lol. If that's your complaint my friend then what would you like your security solution to do. The logic: Shutting down ImmE and depositing a malicious program is like opening the bank vault door and throwing a bomb inside. When you close the vault back, and the bomb explodes, do you think it's going to save all the cash from burning up, let alone the building that the bank is in. But if you know the contents of the bag, then you know it's not a bomb, you open the vault door, and now that bag is under protection. When ImmE is up, and you get tricked into opening a program you thought was a word document, it's NOT going to run. So, what it boils down to is, YOU now have the POWER to infect your machine. If you bring the shield down and install a program that you don't know the history behind, you can't blame the software for it hosing your machine, when you told it to shut down. Not the same as "I have AV running and I still getting hosed". The comparison is the effectiveness of preventing infection with ImmE running vs. AV running. To which AV comes in second place. A lot of this stuff I should explain over the phone. There are so many nuts and bolts to ImmE, that your questions would be better answered in verbal communication. These are starting to be some long explanations that I would rather not have to type. By the way, ImmE has the capability to know what you are deleting, and will report your every move.
  5. My friend, you have it all wrong. If you want to call something a "Database", then the ENTIRE HDD is your Database. Nothing comes in plain and simple. That goes for CD's too. You put in a cd, and try to launch something from the CD, it gets scanned. Guess what, no execution. Next thing, how are you going to get to the registry when we shut it down? Don't matter if your an Admin or not, we SHUT IT DOWN. If we shut it down, how are you going to modify the registry? You can still read the contents of the CD, but your not going to execute something off of it. You are confusing everything. I was refereing to ImmuneEngine in it's way of defending the PC when I said "why waste time in trying to guess what is good or not". Becuase that's what other technologies do. They try to GUESS at things. ImmuneEngine doesn't give 2 cents, if you download something to the machine, and you didn't tell ImmuneEngine to take down the shield, it's going to be eaten whether it's malicious or not. We don't care about the actual process of you downloading. It's when the executable acutally gets to the machine that we care about. That's why I said it's HOST-Based. If it's not a malicious program, then you should have access to bring down the shield. If you don't have access to ImmuneEngine to download stuff, then obviously your boss dosen't trust you enough to be installing stuff on the machine anyway. What it boils down too, is the power to decide if the source is good or not, is left up to you. If you bring down the shield, and download stuff that you don't know where it's coming from, is the same analogy as the Vault manager at a large bank, having keys to the vault, opening the vault and depositing an unknown bag to which could possibly contain a bomb in it. Why are you comparing a heavy graphics processor, animation, control input induced game, with security software. You don't have to believe me, but when the next meeting takes place, I will show those guys the task manager, and show them how much processor power we utilize. You will only see a range of 0-3 cpu usage. If you can fake a taskmanager cpu usage display, please let me know. Read previous post, I said that I would go further into detail over the phone during the live demo. If you whish to know the answer to this question, then attend the meeting. Also, I thought the white paper of ours explained this. I could be wrong though. I haven't read it in a while. No wait, there is a brief description of this on the website: ImmuneEngine establishes SPECIFIC VECTORS AND DEFENSE QUADRANTS over 100% of the hard drive(s). ImmuneEngine not only monitors the traditional kernel events produced from the Microsoft operating system, it goes well beyond the normal dependency of monitoring the Microsoft kernel, by establishing an INDEPENDENT EVENT HANDLING SYSTEM to determine unauthorized program installation activity throughout the entire computer. ImmuneEngine, monitors (using several detection methods including binary analysis) in a real-time environment, all SPECIFIC VECTORS AND DEFENSE QUADRANTS for any unauthorized program file installations, unauthorized use of USB DRIVE DEVICES, unauthorized program file movement or unauthorized program file modifications/installations while utilizing virtually zero CPU resources and approximately and an insignificant amount of memory. I also stated that it was just ONE of the methods involved in our authenticating the executable before it's passed to the kernal. Again, take an existing executable on the machine, and change it. Now, wouldn't you also be changing the check sum value of it? Also, the Admin console does NOT need to be a server. I can take a XP Home machine and install our Admin console on it, and have my clients report to it. You said a "well-hidden malicious software". HOW are you going to insert it into a shielded computer that's being scanned constantly "REAL TIME"? You have to get it into the system first. Once more, there is no "database". The entire HDD is what we scan. Nothing gets in without our permission. There is no trial version. You have to take what you can get. By the way, it's Live Meeting, not Net meeting. You don't have to download a single piece of software to your machine to view the live meeting. Live meeting is hosted on their servers. Read previous post. I explained what I can and can't do. Curious as to why you don't want to see the demo. It will be the same as flipping on your TV screen, and watching a live broadcast of tech news or something. All you need is an internet conneciton. The majority of the questions you have asked can be answered by reading the website. Why are you seeking answers to questions about the software but you don't want to see the demo? That's very weird. Have you never seen a movie preview on TV, and find out that it comes out next year? Same thing. I'm telling you about software technology that will be the next level in computer security. Why wait to tell you later, when I can tell you now. Are you asking me to give you code? Please tell me you are not seriously asking me to release source code to you. "Can't be done". Same thing they said when a man set out on a mission to fly around the entire earth in a hot air ballon. Same thing they said when someone climed to the top of Mount Everst. Never say it "Can't be done", because that will motivate people more just to do it. To which it HAS Been Done. I'm sure you have every absolute proof that statement was pure truth. I must be a fraud. I must be full of it. We must not be able to stop executables from a CD. Our system must be a flaw. You have proven all of this right? I'm willing to put my statements to factual account. And prove them. What's your proof? Just other people saying the same thing as you, that it Can't be done? That's not proof. Some P.H.D's would say the same thing. What it boils down to is not that it CAN'T be done. The saying should be that it HASN'T been done. To which it HAS now. ps...I still don't understand why you are so interested in me entertaining your questions, but you don't want to see a live demo. It's like you want to ask for the truth, but when I try to show it to you, you don't want to look. Huunh? Don't get it. The live demo requires only for you to have an internet connection. No software download necessary. And I don't recall it sucking the juices from your PC either. I don't recall Dman saying anything about his machine being sluggish after that. As a matter of fact, Dman's internet connection was pretty good, that he did not experience any time delay between the transmission of my screen to his.
  6. Would be a good idea, but you would have to follow the proper channels to get something like that done. I'm not in sales, so you are going to have to talk to someone on that side of the field.
  7. By binary search, you mean identifying a file through comparing zeroes and ones. Nearly all files can still function correctly by changing a single byte, rendering your authenticaton useless. If you mean by identifying all binaries, it's just a matter of searching for the right extensions. Example: Non-harmful .bat file on the system. ImmuneEngine is installed. Since the .bat file is apart of the origninal matrix, ImmuneEngine will allow it to run. Now, edit that .bat file to something else and save it. It is thus far have been changed, so when you try to run it now, ImmuneEngine will analyze and stop it's execution, before it is passed to the kernal. This goes for scripts too. A computer can't reason. You either allow executables or not. Don't look to deep into it. It's pretty simple. Because of that simple reason that they can not reason, it is up to the user to know if any new executables are coming from a legit source. Simply put, it is those executables that you have no knowledge about being downloaded to the machine that you want to stop, or those that you accidentally execute yourself. Why waste time in trying to GUESS what is good or not. GUESS the wrong answer, and your toast as you have seen with some other methods of protection. As of right now, this statement is your theory. And is unfounded. If you haven't seen it, how can you be certain this is the case. In the live meeting, I will show you the task manager for proof that it's not processor-hungry. You started that response with IF it has a black/white-list. I noted above that there is no "list", "database", "signature" in our system. Previous post I stated that in our analyzation methods, a check sum is done. The check sum is just one part that we anaylze amongst other occurences that happen when whe analyze the executables. You change an existing OS executable, it won't run. Also, upon install, (out of the box installation that is, no extra configuration done), it will automatically build a backup for the critical system executables. Therefore, you modify something, it will 1) Report it, 2) Not allow you to execute it, and 3) Put back the original. Not to mention, Windows File protection would be in place as well. Again, why would I make a claim if it wasn't true. You have to see to believe. To which you have yet to see it in action. Again, you are going to have to see to believe. The scan is rather fast quite frankly. What's more important, wating 2 extra seconds to do a scan of something that might have been changed to be malicious, or being wide open and rather have 2 sec. of time not waiting? Again, I wouldn't make a statement if that was true. It has no more extra HDD space taken up than any normal application would. Microsoft Office takes up more space than we do. I assure you, the install is quick and small. Previous post, I stated, that I would explain things in more detailed over the phone during the demo as appose to typing them out. Again, If it hasn't been done, I wouldn't say that it was possible. Truth is, it has been done, and it is being done right now. Because we are doing it. For a software solution to do that, wouldn't you have to install it into the BIOS of the computer? Nothing has that ability. But I do have an answer for you. And thank you for point that out. 1) My home PC, and a lot of MB have a feature to turn on a BIOS password. If you have the BIOS set to only boot to the HDD, and then password protect it, how are you going to boot from your boot disk? 2) In order to change the BIOS password, you are going to have to open the case and reset the CMOS jumper to clear out the password and BIOS. This brings you around to the point that in order to get around this software, you are going to have to LITERALLY get out your Skrew Driver and physically change the hardware of the computer. And even then, the admin is going to know that the probe on your machine is no longer ACTIVE, because the admin console is going to tell him. Then he is going to come down to your desk and inquire why your machine is not reading ACTIVE only to find out that you are sitting there with a Skrew Driver and a open computer. Yes I know, this has not been heard of before with a Software Solution. But, I have an advantage with knowing the software, and if I can't get around it with it in lockdown mode, then someone who doesn't know, is going to have a stroke trying to figure it out.
  8. I apologize for that. I can see your point. By the way, I just love your avatar pic. Wonder were I can score a bra like that for my girl...heehe. True to the extent that it will take some people quite some time to accept it's adoption. And with history and political pull behind current technology, it will be a wake up call to many people. If I came off this way, I apologize for that. But I was only merely trying to convey that our software stops what AV can't. And it protects the machine in a way that AV can't. I'm not the smartest guy here. I've only been out of college for about 3 years now. However, my understanding of computer security has come from a very respectable mentor. Our CP is a former Marine Corps Officer, ex-CIA operative and other lucrative job titles, the list goes on and on. He has been programming since he was a teen, and he is in his mid forties now. The stories he tells me, are just absolutely insane. He was a survivor of the Marine barracks bomb blast in Beirut, Lebanon during 1983. I have never seen such an individual with as much knowledge of the Microsoft environment as him. If you can imagine some real "James Bond" stuff, he is that type of person. So, everything I know and have learned comes from him. I have never read a single book on hacking. I have picked all my knowledge of hacking and breaking Windows by working here, and seeing actuall gov. "RED" teams go toe to toe with our software. I do have a hacking book that I have yet to read. I intend on reading it to find out how much I already know (from experience) that's in the book. We are to small to do all that. We don't have a "team" per-say of salesmen running around. The training purposes are for me. I want to get good with Live meeting, not ImmuneEngine. Now you see why we don't push out the home version. With our heavy involvement with contracts from major players, we don't have time to entertain 100+ thousands of people calling in asking questions to which they can find the answer to in the manual. I use to work in a tech. call center for Dell (worst IT job I've ever had) and you would be surprised at the number of people who called in about stuff they could have solved themselves. Now, imagine the volume of calls we would get when people are forced to actually READ the manual on a more advaced technology such as ours.
  9. The only thing standing in our way of that statement is peoples ability and willingness to accept CHANGE. Now, I know you haven't seen it yet, to which you will sometimes next week, but I will explain how we replace and coexist with AV software. Originally our position was to compliment AV technology. We didn't want to burn any bridges. But we were asked to do the impossible, to which we prevailed. We were asked to go this route and bring computer security to the next teir level. The PRO's and CON's about being at the next level: CON: I will tell you that during the demo. PRO: Security evolves, and we basically become the Microsoft of computer security. Are you familar with the Reference Monitor for Linux? Our chief programmer(I'm just going to start typing CP for short) often refers to it being similar to that. I'm not familar with the RM for Linux. But he said it was I guess the understanding point in creating this technology for the Windows environment. Looking forward to the demo.
  10. Obviously something must give. Wouldn't you like to know.
  11. So, If I make DonDamm into a non-skeptic. What then? Would that then spark that flame of curiosity in you? Is that what it's going to take for the rest of you? Will you nominate DonDamm as your representative to go seek the truth and the rest of you will follow suite. If so, THEN DonDamm come on down. I will send you a PM and you can be the person that bridges the gap between the skeptics and me. Applicable only if someon is trying to get you to buy something. I'm only trying to show it to you. You don't lose out on anything just by watching. One step at a time sir. Watch the live demo to see exaclty what you will be dealing with before you try to get a free copy just so you can tell your friends about it.
  12. I'm cool with that, because I'm sure ImmuneEngine will cross your path again. Have a good day.
  13. That was two years ago. And those prices are for the network version. Why would a company sell a product 2 years ago, and then just up and stop selling it? That is not what happened here. The home ver. has not been for sale like this. I've been here for over a year, and have not seen a slight push in sales for the home market. The focus of the company is to takle the current contracts in hand. Then we take another step forward to that market. You gain market, not simply just spring up out of no where and start selling. *EDIT* Visit CDWG and do a search and put in the search "BBX". I am not sure if that pricing is correct or not, I don't involve myself in the selling of the product.
  14. Your approach is respectable. I have learned my lesson from this. The next tech board I come across will be more along the lines of the approach that you suggested. I will less and less try to sound like a salesmen. I am not a salesman, and I'm not trying to get you to buy the software (just for the record). However, here lies the problem. I drive the car, maintain it, change it's tires if they feel misaligned, etc... What I didn't do is build it. I'm not the programmer, therefore any ends and outs of the software would be better answered by the guy who actually built it. He is the Co-CEO of the company, therefore you won't find him on some tech chat forum. Now do you see how this is not a medium for our advertising. The software sells itself. I don't have to try and sell anything to you. For record, my official job title here is Jr. Network Engineer. But that title is somewhat out of context to what I actually do here. If you want the nuts and bolts of how the software interacts with the OS, then you have to ASK nuts and bolts questions. NO ONE is doing that. Instead it's the "smart comments" of how its BS. NOW, what I can do is relay messages. I am the 3rd man down on the food chain in the IT department from the man himself. You can ask me those nuts and bolt questions, and if I happen to not know the answer to that specific question, then I can find it out for you and explain it to you. But no one is asking me those important questions to begin with. I would so LOVE to give you those answers. Also, most of those answers to those nuts and bolt questions that you have pondering in your head, could very well be answered by the presentation. One thing I have learned about the ends and outs of this buisness is that you don't put things in writing without an NDA. I have been very careful in what I say here because of the simple reason of the non-presence of an NDA. With that in mind, I feel more comfortable if I where to set up a live meeting and verbally communicate things to you. That's why I have been pushing the live meeting so bad. Simply, anyone can deny ever saying something, but you can't fake that you wrote, or typed that. Last but not final...This thread has gone on for 14+ pages. I have responded to numerous critics and still have hung in there. I have made one believer, and I'm willing to make more. Now, ask yourself this would ANY person who is a sane individual carry this on if it was merely just a sharade? In the history of this forum, has there been anyone who has carried on this long, and whole heartedly believe in something so much that he carried it this far, and it was all smokin mirrors when eveything was said and done? All I ask is 30 mins. of your time and just a smiggin of curiousty. I gurantee you sir that I will not waste your time. I will try to answer those questions that I can't here. And that you will walk in the meeting with nothing, and come out with something to think about. (now that sounded like a sales pitch...LOL) *EDIT* I graduated from TTU in Cookeville, TN with degree in MIS.
  15. The logic: 20 or 30 people whom you spend possible 4+ hrs. a day conversing about all topics dealing with computers. To whom you have developed trust in and believe what they say. To whom you find credible because of you history and interaction with. Or the neighbors down the road whom more than likely you only have spoken to once or twice within a month. To which it more than likely was not about IT, or computer security. To which you probably have never spent the amount of time mingling with as much as you do talking to people on this board. So, naturally the people whom you have listen to on multiple occassions on other issues, you are more than likely are going to put more weight on what they say, vs. what your neighbor (you rarely ever talk to) would say. In this case, it is more along the lines of me trying to describe to you how the software is different than current technology today, and you saying it's not without even seeing it. And when I state factual knowledge of what it can do, you say that I'm living in a fantasy world. Again, without actually seeing it. Before Live Meeting, all I could do was just tell you about the software, to which I would recieve the same skeptisim. But now I can actually show you it. And yet you would perfer to spend hours post skeptical comments instead of 30mins. watching me demonstrate the functionality of the software. I am willing to accept that you find it fictional, and smoking mirrors. But what you are not prepared to accept is the POSSIBILITY that it does what I say it does. Why is that? And to answer you question about the limited number of buzz going around. Tell me this sir. IF you were responsible for 10's of millions of dollars invested into a multi billion dollar industry to which everyone (AV Conglomerates) is racing to see who can make their automatic virus signature updates the fastest (based on technology that's about a decade old), and then some small company from Nashville, TN of all places, comes in and says we did away with virus signature updates, you don't need them anymore. Do you really think you are going to welcome us with open arms? Do you think you would run to all your clients to have them discard your old AV? ALL that money being invested into signature updated technology and us coming along saying it's no longer necessary will make a whole lot of people upset. Despite the investment money put into creating signature updated software, you just made their R&D spending go into the negative. I have seen coutless situations where companies were a little scared to just discard their AV software, because someone high up will get an ear full from their AV supplier to whom they have been supplied with for years upon years. There is a little saying my mom use to tell me when I younger to which I live by. "You never fail till you stop trying". Well, sir it took our chief programmer 10 yrs. to get where we are today. I have been around long enough to see it evolve through 3 generations (not in years, but in functionality of the software). Why don't you hope to see it NOW, and hope to play with it in the near future?
  16. Read previous post. I already said it has been put through attacks with hackers. Quite a number of attacks. Suit yourself. I haven't once boasted about anything. So, who is screaming I'm right you are wrong? I'm just trying to show you something.
  17. I just got through scrolling the testimonials from the Fortres website of people saying how good it is. Here is my question: What is better, 10, 20 of your next door neighbors telling you that Fortres is the best they have seen, or 3 security IT professionals from 3 different major corporations telling you No..no..no..ImmuneEngine is the best? Because everyone on their testomonial list were the average JOE from around the block.
  18. You know, I couldn't have said that any better myself. Well said sir, well said. I haven't forgotten about given you a demo Thauzar. So, I will keep you posted on the time of my next meeting. Oh by the way, I can't remember whoever it was that said the graphic didn't look professional, and like crap....Here is the logic for you behind why such a limited graphic was used. Graphics with great degrees of color and animation = higher consumption of computer resources. ImmuneEngine is designed to run lean. With level and degree of protection we provide over the machine, it's truly amazing that we consume less memory space to operate than one session of Microsoft Word. If you have Microsoft Word open, and are looking at the task manager, you might see Words memory consumption upwards of 90,000+ kb. ImmuneEngine running is not even half that size.
  19. Oh, by the way, I looked at the bullet points describing some of Fortres key features and here is what I thought. - Restrict unwanted computer use; users cannot change desktop, file, and Registry settings Configuration, not security - Lock and hide files; block users from browsing the hard drive How do you find your word documents after you have saved them, and what happens if I save stuff to the desktop - Prevent downloads and software installations, including Spyware and Adware Not everything malicious has to be installed. (including spyware and adware) Sounds like it monitors network traffic. ImmuneEngine is pure host based - Secure files; Restrict access to any file, folder, or file type Correct me if I'm wrong, but dosen't Windows already do that? Why would you do something Windows already has built in to do? - Block specific applications from running Again, configuration not security. If you had everything on the machine you ever wanted ever to run, and nothing more, and then installed ImmuneEngine, you will not get a new program that you needed to prevent from running, because it wouldn't be on the machine anyway. - Quick to disable and reactivate security; no need to reboot the computer That's usually a must have for networks and compaines - Supports and secures third-party Internet filtering What does that actually mean for security? Sounds like they are saying they secure the firewall (which already secures network traffic). We concentrate on the host itself, not monitoring network channels, that's what a firewall is for. However, as we have always seen time and time again, firewalls get tricked, and stuff still gets through. All the more to focus on the actual host itself. -Allows access to only specified Web sites Configuration again. Correct me if I'm wrong here also, but can't you already do that with browser settings and a registry modify to have IE configuration settings grayed out so you can't change it? Why would you buy a product that did the same as something that already came with the system? The only security that provides is to stop people from looking at maybe in appropriate material at work. But then that would be more along the lines of preventing policy violation, and not an actual security feature when it comes to someone trying to hack the machine. We don't focus our technology in that way, but you could do the same in a round about/different approach to it. With ImmuneEngine, you can send a signal to the machine to look for key words, such as sexy, nasty, dirty. And you can modify it or add any keyword you wanted. So, if in the event that I was to open notepad, and just type the word "sexy" into it, you would see a big grey screen pop up and give you a "Policy Violation Warning", and then it in real time send an alert to the Admin console, displaying the Machine it was done on, the user logged in at the time, exact time the violation occured, what application was open, and display that you typed the word "sexy" into notepad. Notepad is an example..this goes for EVERY thing I can type the word "sexy" into, like your browser (any browser that is, not just IE) This can be done all just by pushing a button to tell ImmuneEngine that word to look for. No registry hack has to be done, no listing of web address I have to create...etc.
  20. Not even close to the topic at hand. Anyway, I have a couple more people who have been following this thread from this site. They will attend my next meeting. So, when they come back and post on here after the presentation that it did what I say it does, maybe you will have second thoughts. With each demo I do, your mountain of disbelief will shrink more and more. One person vouched for me, and you discredited him as well. When the other two come on and vouch for me after my next demo, there will be four you will have to discredit. How many people is it going to take for you to stop discrediting everyone that vouch for me, before you actually go see what the buzz is about for yourself. 10, 20, 30....actually just how big is your skeptisim? Just for the record, a brief description of Microsoft Live Meeting, which is the product I use to allow you to see my desktop. Live Meeting gives you the power to work together with colleagues, customers, and suppliers, no matter where you are. For online meetings, training, and events, Live Meeting is the effective meeting solution that enables you to collaborate with groups of three or even thousands—without leaving your desk. With meeting attendees participating from their PCs, you can kick off a project, brainstorm ideas, edit files, collaborate on whiteboards, and negotiate deals at a fraction of the cost and hassle of travel. Link to Microsoft Live Meeting
  21. Not practicing selling. I practice my presentation of the software. I don't make a sales pitch. And yes, you can demo something without it being a sales pitch. For example: I'm your next door neighbor and I work for Dodge. I get to drive the new 700hp Viper that only a few people on the block have heard about. I drive around the companies new 700hp Viper (also there is a less beeffier 500hp ver. for those daily commuters, but the focus is on the new 700hp ver. right now), cause I want practice shifting gears, and stop by your house. I tell you how so much faster it is over your Corvette. I say, "Do you want to go for a ride?" I take you for a spin, and whip you at break neck speeds. But I don't tell you "Hey go trade in your Vette and get you a Viper". Would you consider that a sales pitch, or a demonstration? Because pretty much what it boils down to. However, some of you are so egotistical that you say "Your 700hp Viper is no where near faster than my 400hp Vette, and no I don't want to go for a ride for you to prove it to me, because you won't let me take the car home overnight". Sounds a little bit ridiculous. And frankly, that's a stupid reason to claim it's not faster than the Vette. Let's just say hypothetically I was to start passing out free copies like the world was going to end tomorrow. And I walk you through the installation. I don't think you would then play with it a couple of days and then turn around and uninstall it and mail the disk back to me. No, I wouldn't see it ever again. You just scored yourself a free copy of ImmuneEngine.
  22. Live on a computer? yeah right like you can't program fake software that looks real acts real and support inputs? Doh! Read the description of Live Meeting 4 words..."Come To The Meeting".
  23. Why don't you watch the live meeting demonstration and answer the question for yourself. I'm sure you will see a whole different animal. But from what the little bit I've read on fortres so far, it sounds more like a Windows configuration software. For starters, does fortres still provide the level of lockdown protection despite whether you are logged in as a User or Admin? Also does fortres protect you from remote hacking attacks? Also, will fortres stop you from the code "del c: /s /q /f" like someone asked in the previous post? If you can answer these starter questions for me, that would be great, cause I'm not all to familar with that software in particular. Also, if you could download fortres and do one distinct test for me. That test is this: 1) Install the fortres software. (If you want, you can also try this with any other software solution that you already have). 2) Configure it to the tightest level that you can 3) Now take an existing Script file that already comes in windows, and edit that file to do something else (like open the registry or something like that). 4) Now, save it under the same name. And run it Let me know if fortres (or your already existing AV software) software stopped it from execution. One thing I do know is this. Everytime someone sees our software in action, we always ask the question, "Have you seen any or do you know of any software that can do what we just did?" The answer is always "NO". So, just watch me go through the paces and you judge for yourself.
  24. Did you see the Demo of Win98 on your TV, or were you actually there? Live Meeting is more like you actually being there. Logic: You dissing the software without actually seeing it (because you can't have a freebie) is the equivalent as you telling someone, "Yeah, that book sucked and I don't believe the guy who reads it everyday that it had a picture of Hallie Barry doing a headstand in it . However, he offered to show me the page where it was, but I didn't want to look at it. But that dosen't matter, because I wasn't allowed to take the book home with me, even though he offered to show to me where in the book exactly the picture was". Sounds ridiculous in a different context dosen't it.
  25. Here is the bottom line you guys are not seeing. YOU DON'T LOSE ANYTHING BY WATCHING ME DEMONSTRATE IT. Why are you so afraid of watching it? I am not making it up. I have other people on this very board backing me up, I have unbiased 3rd party articles backing me up. These are factual statements by professionals. The opportunity has presented itself to you to actually see it at no hassle to you, and you don't take the offer. Guess you guys must not be the "Seize the Opportunity" type people.
×
×
  • Create New...