SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Microcap & Penny Stocks : JAWS Technologies - NASDAQ (NM):JAWZ -- Ignore unavailable to you. Want to Upgrade?


To: saltbox who wrote (92)4/8/1998 8:29:00 PM
From: Joe Copia  Read Replies (1) | Respond to of 3086
 
here it is:

biz.yahoo.com

E-BIZ Changes Name to JAWS Technologies Inc.

CALGARY, April 8 /CNW-PRN/ - Effective Friday, April 3, 1998, E-Biz. Solutions Inc. has changed its name to JAWS Technologies Inc. Also effective Friday, April 3, 1998, the new ticker symbol for the company is ''JAWW'', NASDAQ-OTC.

Mr. Robert Kubbemus, President of JAWS Technologies Inc., said, ''the name and ticker symbol changes more accurately reflect the direction of our efforts. Our sole business is the development and sale of Information Security Solutions.''

JAWS Technologies Inc. is the owner and developer of what is onsidered to be the world's strongest encryption software, JAWS ''L5'' 4096 Bit Encryption. With its numerous programming enhancements and abilities, JAWS ''L5'' is fully developed security software that is
ideal for both personal and corporate security use. With the explosion of Internet commerce and the skyrocketing use of computer data systems, computer security has risen to become a primary concern for leading edge IT professionals. JAWS Technologies Inc. is moving forward with its flagship ''L5'' products as well as further research and development in the information security field. The corporation anticipates several world-class product launches within the next 24 to 48 months.

The ''L5'' routine uses the keys as a portion of the formulae to decrypt, making it mathematically impossible to break given a large enough key. The data is shifted and additionally encrypted with
a random number generated at the time of encryption, used to determine password authorization upon decryption. Any combination of encryption/authorization keys may be used, i.e.: Master key, Dual Key, Recipient Confirmation Key, Date Key, Location /Status Key, etc.

Security has become the single most important issue in the current IT paradigm shift. As the rapid change from private system computing to public system computing continues, the opportunities for intruders and the need for improved security escalates. Amateur and highly paid professional hackers are out-pacing the abilities of the security solution providers. Billions of dollars of information could wind up in the wrong hands. Such security issues will become even more
pronounced in the future.

Joe PTG&LI !!!

allstocks.com



To: saltbox who wrote (92)4/8/1998 8:30:00 PM
From: Mark[ox5]  Read Replies (1) | Respond to of 3086
 
Your worth your weight in Salt ;)

Yikes...what an ugly newswire it is on.. (CNW-PRN)? Hmm probably Canadian something.

Thanks for the heads up.

Mark