Skip to Content

CyberSoft.com | Makers of Linux and UNIX anti-virus Computer Security Products

General Information

Many documents on this page are stored in PDF format and will require a PDF reader in order to view them. You may download Adobe Reader by clicking the button provided below.

Get Adobe Reader

Federal Government Information

Commercial & Government Entity (CAGE) Code: 03RL6

VFind National Stock Number (NSN): 7030-01-429-7495

Small Business Pass Number available upon request; CyberSoft products are available via federal contract vehicles.

Product License Agreements

End User Agreements

Combined End User License Agreement - October 2014

Export License Information

ENC Law
VFind Security Toolkit Family - Page 1, Page 2
VFind Security Toolkit Enterprise (without NTI-Crypto) - Page 1
NTI-Crypto - Page 1, Page 2
Wave Antivirus - Page 1

Patents and Trademarks

Patents

  • 7,716,736 - Apparatus, methods and articles of manufacture for computer virus testing
    Abstract: The present invention comprises apparatus, methods and articles of manufacture for computer virus testing in a networked environment. A host is provided that permits uploading of suspected files by a user. They are transferred to a server, where they are scanned for the presence of known virii. The files are then run, in an appropriate operating environment, separate from the operating system of the server, and the results compared to and noted against a reference. Any modified files are logged, as is some embodiments, the lists of modified files are made available to various users.
  • 7,703,078 - Apparatus, methods and articles of manufacture for software demonstration
    Abstract: Apparatus methods and articles of manufacture for software demonstration are disclosed. Apparatus include a server that provides, via a network, a program or programs to be demonstrated to a user. The user uploads the code that the program will execute. Results are then supplied after execution, and may be made available to the user in a number of ways. methods and articles of manufacture are also disclosed.
  • 7,661,134 - Apparatus, methods and articles of manufacture for securing computer networks
    Abstract: Apparatus methods, and articles of manufacture are claimed for securing, maintaining, monitoring and controlling computer networks and clients located therein by use of client hash code tables, which are stored on a server. Clients subsequently provide client state codes which are compared to the hash code tables to ensure only acceptable client modifications have taken place. In the event of unacceptable client modifications, mechanisms are used to notify appropriate resources.
  • 7,503,069 - Network Traffic Intercepting Method And System
    Abstract: A computer system and method for intercepting, examining, and controlling data streams flowing via transport connections between the transport layer of an operating system and the user application. All data streams that pass from a external network, through the transport layer of an operating system to the user application to the transport layer are intercepted by a network traffic interceptor. The network traffic interceptor processes all data streams for proscribed data that may include viruses, trojan horses, worms, and other hostile algorithms. The processing used by the network traffic interceptor can include monitoring blacking or destroying data, thereby protecting the single computer system from being infected by hostile algorithms.
  • 7,502,939 - Software Virus Detection Methods And Apparatus
    Abstract: Software virus detection methods, apparatus and articles of manufacture are shown. In the preferred embodiments, these comprise review of proscribed code by an evaluative interpreter, which interprets the code in order to review the code for the presence of disguised viral or other code. The interpreted result is then first scanned for the presence of file open, or file modify or other instructions of interest, as well as scanned again for the presence of viral code signatures. The results are reported as desired.
  • 7,502,829 - Apparatus, Methods And Articles Of Manufacture For Intercepting. Examining And Controlling Code. Data And Files And Their Transfer
    Abstract: Apparatus, methods, and articles of manufacture are claimed for processing code comprising the preprocessing of code, transferring of the code from a storage area to a transfer component, decomposing the code, valuing the code, and comparing the code to a threshold value. The processing indicates the presence or absence of proscribed code, which may be spam, virii, confidential material, harassing material, etc and so the code my be redirected. The especially preferred embodiments operate within a UNIX sendmail environment.
  • 7,404,212 - Apparatus and Methods for Intercepting, Examining and Controlling Code, Data and Files and Their Transfer
    Abstract: The present invention coprises apparatus and methods for processing code streams in a network. "Man in the middle" technology by use of decryptor/encryptor components are placed between client and server which permit alternation of the code as it passes through a communication channel. the code may then be examined by way of a proscribed code scanner. A protocol parser may also be implemented in order to intercept the code as it passes through the stack and transfer the code to decryptoe/encryptor components.
  • 7,389,540 - Apparatus, Methods For Intercepting, Examing and Controlling Code, Data and Files and Their Transfer
    Abstract: The present invention comprises apparatus and methods for processing code, that is, for intercepting, examing and/or controlling code streams in a network. A protocol parser is implemented in order to intercept the code as it passes through the channel and transfers the code to a proscribed code scanner. Embodiments for various platforms, including Unix.RTM. and Windows.RTM. NT are disclosed.
  • 7,373,643 - Apparatus, Methods and Articles of Manufacture for Data Transmission
    Abstract: The present invention comprises apparatus, methods and articles of manufacture for transferring data, comprising one or more update files made available upon distribution media, such as a server, a hash of the update files made available upon the server, as well as versions of the update and hash files upon a target or client. The distribution media then transmits the hash to the target or client, the hashes are compared, and, if they do not match, the update files are downloaded for further review and updating, if desired. If updating is desired, an update mechanism will then edit and/or replace files, modules, data and/or byte sequences on the target, according to the preferred embodiments. Embodiments for various platforms, including Unix.RTM. and Windows.RTM. NT are disclosed.
  • 7,363,506 - Software Virus Detection Methods, Apparatus and Articles of Manufacture
    Abstract: Methods, apparatus and articles of manufacture for indentifying, authenticating and securing code through proscribed code detection and deletion are shown. The preferred embodiments provide for scanning code determine the presence of prescribed code and the transmitting the code to a file reconstructor upon the detection of proscribed code. At the file reconstruction, templaes of the specfic document type are used to provide the document file structure, and so delete with precision the proscribed code from the orginal code.
  • 7,143,113 - Apparatus, methods and articles of manufacture for securing and maintaining computer systems and storage media
    Abstract: Apparatus, methods, and articles of manufacture are claimed for securing, maintaining, monitoring and controlling computer files. Various predetermined files are hashed on the machine, providing a first data file with the file names and hash values, which data file is stored as a baseline. At desired intervals, a comparison cycle begins. A second data file is provided comprised of desired file names, which are then taken one at a time, hashed, and compared to the baseline first data file. Results are recorded as desired.
  • 7,093,135 - Software Virus Detection Methods and Apparatus
    Abstract: The present invention is a system and method for identifying and securing code, as well as providing virus detection and code authentication. This detection and authentication occurs through modules or components which utilize certification identifiers to authenticate and validate code. Preferred embodiments include macro detection.
  • 6,779,117 - Authentication Program for a Computer Operating System
    Abstract: A Computer Authentication System, a software application which performs file authentication functions in any Microsoft Windows registry based computer operating system. The program system modifies the manner in which Microsoft Windows executes application programs.
  • 6,763,467 - Network Traffic Intercepting Method and System
    Abstract: A computer system and method for intercepting, examining, and controlling data streams flowing via transport connections between the transport layer of an operating system and the user application; which operates on a single computer.
  • 6,721,424 - Hostage System and Method for Intercepting Encrypted Hostile Data
    Abstract: A method for intercepting data transmissions in a system which is comprised of an external network and computers within a protected local network. A proxy server located in the communication path, between the external network and the computers, is equipped with virus detection capability and includes, also, key storage means and a hostage storage facility.
  • 6,338,141 - Method and Apparatus for Computer Virus Detection Analysis and Removal in Real Time
    Abstract: A method and apparatus for detecting computer viruses comprising the use of a collection of relational data to detect computer viruses in computer files. The collection of relational data comprises various relational signature objects created from viruses.

Patents Pending

  • 10/832,137 - Apparatus, Methods and Articles of Manufacture for Intercepting, Examining and Controlling Code, Data and Files and Their Transfer
  • 10/831,985 - Apparatus, Methods and Articles of Manufacture for Intercepting, Examining and Controlling Code, Data and Files and Their Transfer
  • 10/665,387 - Apparatus and Methods for Intercepting, Examining and Controlling Code, Data and Files and Their Transfer in Instant Messaging and Peer-to-Peer Applications
  • 10/404,378 - Methods, Apparatus and Articles of Manufacture for Computer File Integrity and Baseline Maintenance
  • 10/032,252 - Apparatus, Methods and Articles of Manufacture for Securing and Maintaining Computer Systems and Storage Media
  • 10/032,251 - Apparatus, Methods and Articles of Manufacture for Securing Computer Networks
  • 09/886,169 - Apparatus, Methods and Articles of Manufacture for Intercepting, Examining and Controlling Code, Data and Files and Their Transfer
  • 09/838,979 - Software Virus Detection of Methods, Apparatus and Articles of Manufacture
  • 09/800,314 - Apparatus, Methods and Articles of Manufacture for Intercepting, Examining and Controlling Code, Data and Files and Their Transfer

Trademarks

  • 2,896,958 - High Flying Flag
  • 2,871,210 - CyberSoft
  • 2,857,717 - Centurion
  • 2,854,640 - CyberSoft International and Design
  • 2,620,317 - CyberSoft
  • 2,422,687 - CyberSoft
  • 2,405,413 - THD
  • 2,395,136 - CIT
  • 2,377,135 - MPScan
  • 2,328,641 - Centurion Logo
  • 2,326,517 - UAD
  • 2,316,772 - Avatar
  • 2,302,031 - Wave
  • 2,242,353 - Cyber.com
  • 2,057,188 - VFind
  • 530,298 - Wave (Canada)

Want More Info?

Need more information about how we can help protect your servers and safeguard your desktops no matter what OS they run?

If you see this field, please leave it blank.