Images Events Jobs Premium Services Media Kit Network Map E-mail Offers Vendor Solutions Webcasts
IT Management Webcasts:
The Role of Security in IT Service Management

Preparing for an IT Audit

More Webcasts

Search EarthWeb Network

Be a Commerce Partner
Web Hosting Directory
KVM Switches
Condos For Sale
Career Education
Shop Online
Holiday Gift Ideas
Prepaid Phone Card
KVM Switch over IP
Promotional Golf
Cell Phones
Computer Deals
PDA Phones & Cases

Linked Data Planet Conference & Expo

IT Management : Columns : Executive Tech: A Mysterious Solution to Your Security?

Hyper-V: The Killer Feature in Windows Server 2008
It's fair to say that while many of the other new features are evolutionary, Hyper-V, by contrast, is revolutionary. Paul Rubens explores Microsoft's big step into virtualization. »

Download the Windows Server 2008 Trial
With Windows Server 2008 you can develop, deliver, and manage rich user experiences and applications, provide a secure network infrastructure, and increase technological efficiency and value within your organization. »

Reduce Complexity and Costs with Microsoft Identity and Access Solutions
Your organization depends on making digital information accessible to a broad spectrum of users over range of devices and networks. Register now for free Identity and Access Solutions from Microsoft. »

Virtualization from the Data Center to the Desktop
Integrated virtualization solutions from Microsoft can help you meet evolving demands more effectively as you transform your IT infrastructure from a cost center to a strategic business asset. »

Related Articles
Password Protection? Surely You're Joking!
Scan Any Document Without Even Being in the Room
Trash Your Drive? Now You Can Have a Do-Over
Fix Windows Without Patching
Pop-ups Are Coming to Screens Near You
- ITSMWatch Newsletter -
Tech Focus: Security

Cybersecurity: Laws Only Go So Far

Mozilla Firefox vs. Internet Explorer: Which is Safer?

Is Your Blog Leaking Trade Secrets?

The Las Vegas Counterfeiting Story: Is Your Privacy Worth More Than a Poker Chip?

Stopping Spammers at The Point of Sale

Product Watch
IOGEAR KVM - Includes Audio/Peripheral Sharing
Coverity Prevent / Coverity Thread Analyzer - Analyze Source Code For Defects, Security Vulnerabilities
USSD Series - SDRAM-Based Solid State Drives to 256 GB
UltraSMS - Send SMS From Your PC
Sentinel Sensors - Wi-Fi Based Temperature Monitoring Especially For Cold Storage

more products >>

Datamation Definitions
data mining
grid computing
network appliance
FREE Tech Newsletters

Download: SQL Compare Pro 6--For improving the speed and quality of your database changes SQL Compare has no comparison. It's faster, easier and it's around 90% more cost effective than the alternatives. Try it today for free!

A Mysterious Solution to Your Security?
April 5, 2004
By Brian Livingston

Brian Livingston When is a new computer technology like a riddle wrapped in a mystery inside an enigma?

When it's a new PC add-in board that's currently being manufactured in small, pre-production quantities in — of all places — Kiev, Ukraine.

I've heard rumors of this experimental development project for months. Now I've finally tracked down enough confirmed information to reveal it in print for the first time.

A PC Add-In That Does Windows

Imagine a simple circuit board that fits into a PCI slot of any machine running Windows or Linux and offers the following benefits:

Virus protection. The board reportedly stops all virus-type activity from occurring, without requiring "signature" files that must constantly be updated;

Intrusion protection. Attempts by malicious hackers to break into a PC or plant "Trojan horse" software are automatically defeated.

Outbound malware exclusion. The board can supposedly even detect and prevent attempts by rogue software to launch denial-of-service and other kinds of attacks from one PC against others on the Internet.

My first reaction upon hearing all this was, "How could you run an everyday, innocent application on such a PC without being stopped by the security mechanisms in this thing?"

I can't tell you the answer for sure. There appear to be only a handful of these boards in existence and the company that developed the technology won't provide me with one to test. Executives of the firm, however, say a user's normal work on a PC wouldn't be impaired — only malicious actions would be.

An Invention So Secure You Can't Figure It Out

The business entity behind this ambitious activity is called the Laboratory of Security Technologies (LST). It was co-founded by Aleksey Shevchenko, a Ukrainian inventor.

I first became aware of this company's claims when it ran a contest on its Web site last August. A cash reward was offered to anyone who could remotely break into a PC that had the add-in board installed but was otherwise unprotected. No one could, apparently, but the firm's Web site,, is a little short of details on this.

When I heard that Shevchenko was visiting the United States recently to meet with potential investors, I decided that this was worth investigating further.

Technology In Search of an Angel

I called Kiev and reached LST co-founder and board member Paul Waters. He describes himself as an American citizen who was a real estate agent in northern California before moving to Ukraine in 1991.

Waters' phone manners are impeccable, and he was quite open to my questions. (The exception was that he repeatedly declined to allow me to review one of the company's circuit boards.) The hacker contest, he said, had in fact attracted between 600 and 700 break-in attempts from around the world. Only 16 of them were truly serious, in the company's opinion, but even those got nowhere.

"There's an incredibly simple principle that this is based on," Waters says. "If you saw it, you'd go, 'Ah-ha!' "

He reiterated the company's claims that the add-in board could repel hacker and virus attacks without continual updating. "There's no need to update it every day or ever. I know it's hard to accept, but it's true."

Waters says the company is firming up its intellectual property rights while it seeks investments of $1 million in return for a 4% to 5% stake. "For an investor or someone who's willing to sign an NDA (Non-Disclosure Agreement), we can be very open," he adds.


I'm not a venture capitalist, but if I were, a measly million bucks would seem to be a cheap price to pay for a peek at this gizmo. If it can do half of what the company claims, a lot of corporate CIOs I know would be installing these boards in a New York minute for the low-maintenance security they promise.

In case you find the LST Web site to be a little obtuse, Waters encourages people to e-mail him at "paul at lrpeople dot com". (I'm spelling out the punctuation marks here to protect his address from being harvested by spammers.)

This technology feels to me like it's either a great big breakthrough or a great big nothing. I hope one of my readers buys a seat at the table and then tells me all about it.

Brian Livingston is the editor of and the co-author of Windows Vista Secrets and 10 other books. Send story ideas to him via his contact page. To subscribe free and receive Executive Tech via e-mail, visit our signup page.

Add to your favorites
Add to your browser search box
IE 7 | Firefox 2.0 | Firefox 1.5.x
Receive news via our XML/RSS feed

Executive Tech Archives



Jupitermedia Corporation has two divisions: Jupiterimages and JupiterOnlineMedia

Jupitermedia Corporate Info

Legal Notices, Licensing, Reprints, & Permissions, Privacy Policy.

Advertise | Newsletters | Tech Jobs | Shopping | E-mail Offers

Whitepapers and eBooks
Microsoft Article: Will Hyper-V Make VMware This Decade's Netscape?
Microsoft Article: 7.0, Microsoft's Lucky Version?
Microsoft Article: Hyper-V--The Killer Feature in Windows Server 2008
Avaya Article: How to Feed Data into the Avaya Event Processor
Microsoft Article: Install What You Need with Windows Server 2008
HP eBook: Putting the Green into IT
Whitepaper: HP Integrated Citrix XenServer for HP ProLiant Servers
Intel Go Parallel Portal: Interview with C++ Guru Herb Sutter, Part 1
Intel Go Parallel Portal: Interview with C++ Guru Herb Sutter, Part 2--The Future of Concurrency
Avaya Article: Setting Up a SIP A/S Development Environment
IBM Article: How Cool Is Your Data Center?
Microsoft Article: Managing Virtual Machines with Microsoft System Center
HP eBook: Storage Networking , Part 1
Microsoft Article: Solving Data Center Complexity with Microsoft System Center Configuration Manager 2007
Intel Video: Are Multi-core Processors Here to Stay?
On-Demand Webcast: Five Virtualization Trends to Watch
HP Video: Page Cost Calculator
Intel Video: APIs for Parallel Programming
HP Webcast: Storage Is Changing Fast - Be Ready or Be Left Behind
Microsoft Silverlight Video: Creating Fading Controls with Expression Design and Expression Blend 2
Downloads and eKits
Sun Download: Solaris 8 Migration Assistant
Sybase Download: SQL Anywhere Developer Edition
Red Gate Download: SQL Backup Pro and free DBA Best Practices eBook
Red Gate Download: SQL Compare Pro 6
Iron Speed Designer Application Generator
Tutorials and Demos
How-to-Article: Preparing for Hyper-Threading Technology and Dual Core Technology
eTouch PDF: Conquering the Tyranny of E-Mail and Word Processors
IBM Article: Collaborating in the High-Performance Workplace
HP Demo: StorageWorks EVA4400
Intel Featured Algorhythm: Intel Threading Building Blocks--The Pipeline Class
Microsoft How-to Article: Get Going with Silverlight and Windows Live