To: Joe Copia who wrote (3915 ) 6/1/1998 1:40:00 PM From: Joe Copia Read Replies (2) | Respond to of 25711
For those that may have forgotten about JAWZ pick: Friday May 29, 3:00 pm Eastern Time Company Press Release SOURCE: JAWS Technologies Inc.JAWS Launches $5,000,000 ''Break the Code'' Encryption Contest CALGARY, May 29 /CNW-PRN/ - Mr. Robert Kubbernus, President of JAWS Technologies Inc. (NASD-OTC BB:''JAWZ'') is pleased to announce that, as of 12:01 Mountain Standard Time on May 28, 1998, the company has launched its $5,000,000 ''Break the Code'' Contest. Full details and contest rules are available on the web site. jawstech.com ''We're inviting the world to break our code and we're betting $5,000,000 that it can't be done. Our information security solutions, including JAWS L5 Data Encryption are now available in the marketplace,'' said Mr. Kubbernus. Entrants in the contest will receive a file containing information that has been encrypted using JAWS L5 Data Encryption. The document is in plain English text with no special formatting characters. The task is to return the plain text message from the encrypted version. Entrants may employ any tools or methodologies they wish in their efforts to break the code. JAWS Technologies Inc. is the owner and developer of what is considered to be the world's strongest encryption software,JAWS L5 4096 Bit Encryption. With its numerous programming enhancements and abilities, JAWS L5 is fully developed security software that is ideal for both personal and corporate security use. With the explosion of Internet commerce and the skyrocketing use of computer data systems, computer security has risen to become a primary concern for leading edge IT professionals. JAWS Technologies Inc. is moving forward with its flagship ''L5'' products as well as further research and development in the information security field. The Company anticipates several world-class product launches within the next 24 to 48 months. Security has become the single most important issue in the current IT paradigm shift. As the rapid change from private system computing to public system computing continues, the opportunities for intruders and the need for improved security escalates. Amateur and highly paid professional hackers are out-pacing the abilities of the security solution providers. Billions of dollars of information could wind up in the wrong hands. Such security issues will become even more pronounced in the future. Joe PTG&LI !!! allstocks.com jawstech.com