Softwar Inc.
Nearby computer & electronics services
Ashburn 20191
N. Main Street, Cortland
Oswego 13126
West First Street, Oswego
SW 9th Street, Oswego
Swest, Oswego
16 E Utica St, Oswego
137 State Route 104, Ste 7, Oswego
New York, Oswego
Oswego 13126
Oswego 13126
Softwar Inc. is an information warfare and privacy company. Your information is your business. Keeping it your information is ours. The DICE OF THE COSMOS.
We developed the first TRUE RANDOM NUMBER generators using light in the 1990s. Light is quantum in nature and never repeats itself. Our hardware random number generation systems produce sequences of numbers that are not predictable, and therefore provide the greatest security when used to encrypt data. Today we continue to pioneer the use of advanced encryption technology to provide the highest le

https://www.softwar.net/about.html
April 18, 1775
On this day in 1775 a nation was born. It started with a code.
ONE IF BY LAND TWO IF BY SEA
Encryption proudly made in America since 1775
Do as the founding fathers did -protect freedom with encryption.

Softwar
https://www.softwar.net/freestuff.html
It's FREE Softwar Friday - free stuff - encrypted chat, encrypted SMS, file ciphers, source code & more...
Happy !

https://www.softwar.net/freestuff.html
FREE SOFTWAR FRIDAY
Encrypted SMS text for android, file ciphers, random pin number generators & more
Survival Gear for modern life..

Softwar
https://www.softwar.net/apksha256.html
As promised - APKs with SHA256 for verification - What say you Google Play store?

Softwar
https://www.softwar.net/lk8.html
LK8 is not linked to a social media site, game site or any site at all. LK8 sends data to you and no one else. There is no loss of privacy to third party vendors or web sites that may get hacked or try to re-sell the location information for marketing and spam.
Softwar LK8 is employee location data. LK8 provides monitoring on deliveries, routes and time spent on working at customer sites. LK8 information can be used for efficiency analysis by mapping out each employee in the progress of their daily work. LK8 is proof of work done by time/date at a contract site.

Cypher Combo Package
https://www.amazon.com/Softwar-Cypher-Pack-Combo-Package/dp/B00U6DR61C/ref=sr_1_1?m=A36RWNTS8YE7A7&s=merchant-items&ie=UTF8&qid=1439735294&sr=1-1
Cypher Enterprise Combo Pack SITE LICENSE - includes LINUX, Android & Windows software, USB camera
Cypher Combo Package The site license gives you unlimited number of installs for business or personal use. Get total security for your business, employees and customers on LINUX, Windows and Android. Cypher files, make light keys, share data, exchange secure email, send secure instant text messages. LINUX, Windows an...
Softwar Dice of the Cosmos
https://www.softwar.net/freestuff.html
It's Free Softwar Friday... encryption apps, file ciphers, even source code
No ads No spam No charge

nunyavid
https://www.youtube.com/watch?v=HPaFPOC25gM
How to use NUNYA encrypted SMS text systsm
nunyavid How to use the Softwar Nunya android secure text message app http://www.softwar.net

https://www.softwar.net/service.html
We apologize the "security" was left of the information security you were provided.

Motorola's newest mod puts an Alexa speaker on your phone
https://www.engadget.com/2017/10/18/motorola-introduces-amazon-alexa-speaker-moto-mod/
Alexa... Track me like a dolphin....
Motorola's newest mod puts an Alexa speaker on your phone Ever want an Amazon Echo with you at all times? Motorola just made it possible with an Alexa speaker mod for its phones.

Softwar
https://www.softwar.net/lk8.html
EMPLOYERS - PARENTS - GUARDIANS - INSTITUTIONS - SCHOOLS
LK8 is employee location data. LK8 provides monitoring on deliveries, routes and time spent on working at customer sites. LK8 information can be used for efficiency analysis by mapping out each employee in the progress of their daily work. LK8 is proof of work done by time/date at a contract site.
LK8 is location data for personal safety of those you care about. LK8 provides monitoring data on your relatives and loved ones, whether they are minors or the elderly. You'll know where they are. LK8 can tell you if a loved one arrived safely and provide you with life saving data in case of an emergency.
LK8 is stand-alone and encrypted for your security. Personal and employee location data is valuable and breach of that data may violate labor and/or privacy laws.
LK8 is not linked to a social media site, game site or any site at all. LK8 sends data to you and no one else. There is no loss of privacy to third party vendors or web sites that may get hacked or try to re-sell the location information for marketing and spam.
LK8 is one time. A single fee one-time. No monthly fees. No annual fees.
LK8 is not covert spy-ware to be used against people. It is an openly displayed application. We provide covert applications only to certified law enforcement agencies. If you are looking for illegal software to spy on someone - this is not the place.
LK8 tracking software is designed to provide, track and display location data transmitted from an Android phone. The location data is encrypted for security and sent to the LK8 Command server by standard SMS text.
Softwar LK8 is employee location data. LK8 provides monitoring on deliveries, routes and time spent on working at customer sites. LK8 information can be used for efficiency analysis by mapping out each employee in the progress of their daily work. LK8 is proof of work done by time/date at a contract site.

Softwar
https://www.softwar.net/index.html
We developed the first TRUE RANDOM NUMBER generators using light in the 1990s. Light is quantum in nature and never repeats itself. Our hardware random number generation systems produce sequences of numbers that are not predictable, and therefore provide the greatest security when used to encrypt data. The DICE OF THE COSMOS.
Softwar The modern world is built on a complex and interdependent fabric that offers a target highly sensitive to sudden and overwhelming cyber strikes. Encryption is a critical element in protecting the global industrial base, including nuclear power plants, the electric grid, water systems, communications...

Softwar
https://www.softwar.net/blackjack.html
Free Android app - Blackjack game with embedded covert sound recorder. Full source code. Good for learning how games can be used as covert surveillance systems.
Softwar - does not install as a "SERVICE" so only runs when app is in use. - does not have a special listener to detect ultrasonic beacon sounds. - does not have a transmit feature to send data back to a controller. - stores the recorded sound locally in an mp4 file so you can examine it.
Softwar Power of the Cosmos
Professional information security. We continue to pioneer the use of advanced encryption technology to provide the highest levels of security for our business and private customers with the addition of secure offensive surveillance software and tracking systems. We respond to our customers needs with technology that is light years ahead of the threat. Our skills are our greatest asset. Our goal is simple:
Your information is your business. Keeping it your information is ours.
Softwar Black Cat

Softwar
https://www.softwar.net/privacy.html
our privacy statement
WE DO NOT issue cookies or any data to store or track your activities on our web site
Softwar SOFTWAR PRODUCT PRIVACY WE DO NOT collect or obtain any information from our software products during their operation or use. Our software products DO NOT send any data other than what you designate from that software as its intended purpose indicates. If you use our software to communicate be sure…

https://www.softwar.net/ravenlinux.html
Silent Raven for Linux is 100% compatible with the Android and Windows Versions
SILENT RAVEN (LINUX) for Twitter* Instant Message service requires JAVA to be installed on your linux system.
CONNECTED REAL TIME MESSAGES
RAVEN allows Twitter users to exchange real time secure instant messages using 4096 RSA keys. The keys are stored in memory and are never stored on disk. A new key is made for each session of secure messages. RAVEN also has a built in verification system to ensure defend against unauthorized access during a secure session. RAVEN deletes the messages from the Twitter in/out boxes on your account when you exit the program.
OLM or OFF LINE MESSAGES
The OFF LINE MESSAGE system is handled differently than the "connected" communication sessions. Off line messages are sent and received without a real time scanning connection. OLM allows you to create, post and get a 4096 RSA public key via the message system. This allows you to post and get off line secure messages to other RAVEN users. The private key data and the address book is stored on your system using 256 AES encryption.

https://www.softwar.net/lchoctaw.html
Choctaw for Linux - an email system that provides you with complete security. Fully compatible with the Android and Windows versions.
Choctaw sends and receives email with the highest levels of security and provides a nearly seamless method of encoding and decoding messages. Choctaw can use either asymmetric cryptography (public key) or symmetric cryptography (private key) cyphering. Choctaw works with TLS and SSL security automatically with your email service providers.
The real power of Choctaw is in your hands. Choctaw comes with the PDA public key utility and the CYPHER light key utility. Your email messages can be cyphered with password, key file or public key security. You control the keys. Send Public keys or use the ONE TIME PAD feature with private keys made with our revolutionary CYPHER light key TRUE random number generator.

Softwar
https://www.softwar.net/morelock.html
Morelock Windows
Morelock is a utility designed to encrypt compressed zip file systems using the AES encryption system. Morelock uses 256 and 128 bit AES encryption to lock files and directories inside a zip output file. Morelock .MRK files are locked zip files that contain the data selected. Morelock does not delete the selected files and directories. Morelock WINDOWS is 100% compatible with the Android and Linux versions of Morelock. KEY IN FILE locked files can be transferred from/to any system.
AES (acronym of Advanced Encryption Standard) is a symmetric encryption algorithm. The algorithm was developed by two Belgian cryptographers Joan Daemen and Vincent Rijmen. AES was designed to be efficient in both hardware and software. Morelock supports key lengths of 128 and 256 bits.
Softwar Morelock is a utility designed to encrypt compressed zip file systems using the AES encryption system. Morelock uses 256 and 128 bit AES encryption to lock files and directories inside a zip output file. Morelock .MRK files are locked zip files that contain the data selected. Morelock does not delet...

Softwar
https://www.softwar.net/cypher.html
Cypher WIndows
CYPHER can create random keys by using your PC equipped with either a web camera or the included USB camera hardware. Because of light’s randomness, the camera constantly receives a different number of light particles, also known as photons. This data results in a steady stream of random numbers. This system is known as a True Random Number Generator (TRNG) because the key is generated by the number of photons recorded over time by the camera sensor. The light key is secure because it is created using quantum physics by recording the values of light photons electronically. The light key is similar in performance to keys generated by sensors inside Atomic clocks that detect radioactivity.
Softwar The major use for hardware random number generators is in the field of data encryption, for example to create random cryptographic keys to encrypt data. They are a more secure alternative to pseudorandom number generators (PRNGs), software programs commonly used in computers to generate "random" num...

Softwar
https://www.softwar.net/choctaw.html
Choctaw for Windows - an email system that provides you with complete security.
New feature added two-factor authentication (2FA KEY) requires both a KEY FILE and a password. You can put that key file on a separate encryptedUSB drive or flash storage. Enter the password and select the key file using the file selection window.
Choctaw sends and receives email with the highest levels of security and provides a nearly seamless method of encoding and decoding messages. Choctaw can use either asymmetric cryptography (public key) or symmetric cryptography (private key) cyphering. Choctaw works with TLS and SSL security automatically with your email service providers.
The real power of Choctaw is in your hands. Choctaw comes with the PDA public key utility and the CYPHER light key utility. Your email messages can be cyphered with password, key file or public key security. You control the keys. Send Public keys or use the ONE TIME PAD feature with private keys made with our revolutionary CYPHER light key TRUE random number generator.
Softwar WE DON'T UPLOAD YOUR CONTACT LIST During other email installations, a pop-up may appear requesting access to the address book. This may be useful in some cases, as it allows the app to import all contacts straight away and the user to launch an email easily. However, it involves uploading the email…

Softwar
https://www.softwar.net/raven.html
SILENT RAVEN (WINDOWS) for Twitter* Instant Message service
CONNECTED REAL TIME MESSAGES
RAVEN allows Twitter users to exchange real time secure instant messages using 4096 RSA keys. The keys are stored in memory and are never stored on disk. A new key is made for each session of secure messages. RAVEN also has a built in verification system to ensure defend against unauthorized access during a secure session. RAVEN deletes the messages from the Twitter in/out boxes on your account when you exit the program.
OLM or OFF LINE MESSAGES
The OFF LINE MESSAGE system is handled differently than the "connected" communication sessions. Off line messages are sent and received without a real time scanning connection. OLM allows you to create, post and get a 4096 RSA public key via the message system. This allows you to post and get off line secure messages to other RAVEN users. The private key data and the address book is stored on your system using 256 AES encryption.
Softwar RAVEN allows Twitter users to exchange real time secure instant messages using 4096 RSA keys. The keys are stored in memory and are never stored on disk. A new key is made for each session of secure messages. RAVEN also has a built in verification system to ensure defend against unauthorized access…

Cypher Combo Package
https://www.amazon.com/Softwar-Cypher-Pack-Combo-Package/dp/B00U6DR61C/ref=sr_1_1?m=A36RWNTS8YE7A7&s=merchant-items&ie=UTF8&qid=1439735294&sr=1-1
Items included:
WINDOWS
Choctaw encrypted email
Cypher light based encryption
PDA RSA public key file utility
Silent Raven encrypted instant messager
Morelock pro 256 AES file cipher utility
ANDROID
Choctaw encrypted email
Cypher light based encryption
PDA RSA public key file utility
Silent Raven encrypted instant messager
Morelock pro 256 AES file cipher utility
NUNYA encrypted SMS instant messager
Franklinizer encrypted video/camera utility
George encrypted text notepad
LK8 tracker and command control GPS tracking system
White Rat lost phone tracking utility
LINUX
Choctaw encrypted email
Cypher light based encryption
PDA RSA public key file utility
Silent Raven encrypted instant messager
Morelock pro 256 AES file cipher utility
HARDWARE
USB Camera and software
Cypher Combo Package Get total security for LINUX, Windows and Android. Cypher files, make light keys, share data, exchange secure email, send secure instant text messages. LINUX, Windows and Android Choctaw, Cypher and PDA software are fully compatible. Files, email and keys can be shared by both systems. USB camera...

Morelock
https://play.google.com/store/apps/details?id=com.softwar.morelock
Morelock is a utility designed to encrypt compressed zip file systems using the AES encryption system. Morelock uses 256 and 128 bit AES encryption to lock files and directories inside a zip output file. Morelock .MRK files are locked zip files that contain the data selected. Morelock does not delete the selected files and directories. Morelock ANDROID is 100% compatible with WINDOWS and Linux versions of Morelock. KEY IN FILE locked files can be transferred from/to any system.
AES (acronym of Advanced Encryption Standard) is a symmetric encryption algorithm. The algorithm was developed by two Belgian cryptographers Joan Daemen and Vincent Rijmen. AES was designed to be efficient in both hardware and software. Morelock supports key lengths of 128 and 256 bits.
Morelock is intended to perform in 2 ways -
LOCAL OPERATION
Locks and unlocks files on a specific device. The files are controlled locally on the device and are not intended to be shared.
KEY IN FILE OPERATION
Locks and unlock files independent of the device. The AES keys are embedded inside the .MRK output file. The .MRK file can be shared between devices, sent as email attachment, placed on websites or in the cloud. Any user who has the password and Morelock application can access the .MRK file contents. Morelock ANDROID is 100% compatible with WINDOWS and Linux versions of Morelock. KEY IN FILE locked files can be transferred from/to any system.

Franklinizer
https://play.google.com/store/apps/details?id=com.softwar.franklinizer
Franklinizer is an ANDROID based image viewer-video recorder and camera system that automatically secures jpeg images and mp4 videos using AES 256 bit encryption. Images/Videos taken with the camera are converted in memory to encrypted .ben/bf4 format and stored in the default pictures "softwar" sub-directory. Ben files are always encrypted and decrypted in memory so only the secured image file is stored on your system. Franklinizer also includes a "SELF DESTRUCT" feature designed to destroy the AES keys and delete the encrypted image files.

Nunya
https://play.google.com/store/apps/details?id=com.softwar.nunya
EVOLVE TO STAND ALONE ENCRYPTED SMS TEXT
NUNYA is an encrypted text SMS message system that enables the user to secure instant messages using a wide variety of cyphering methods both PUBLIC and PRIVATE. NUNYA allows the user to send and receive secure messages with selected partners. The keys and passwords are held by the users and no one else. All messages sent and received by Nunya are stored in a cyphered fashon and cannot be viewed without your keys.
AUTO-SECURE LINK PUBLIC KEY SYSTEM
You can automatically link with others with a public key system. Simply hit the lightning bolt ICON and the Android systems will link up in a secure mode with a key size larger than the NSA is requiring for future Quantum computing. No exchange of private keys or passwords. Just click and secure link. The NUNYA 4096 system uses a one time transmission key. Once you're done. Close the NUNYA app and the key is gone. No access to any transmitted data or any saved data in your inbox.

Choctaw
https://play.google.com/store/apps/details?id=com.softwar.choctaw
Choctaw - an email system that provides you with complete security. Fully compatible with the LINUX and Windows versions.
Choctaw sends and receives email with the highest levels of security and provides a nearly seamless method of encoding and decoding messages. Choctaw can use either asymmetric cryptography (public key) or symmetric cryptography (private key) cyphering. Choctaw works with TLS and SSL security automatically with your email service providers.
The real power of Choctaw is in your hands. Choctaw comes with the PDA public key utility and the CYPHER light key utility. Your email messages can be cyphered with password, key file or public key security. You control the keys. Send Public keys or use the ONE TIME PAD feature with private keys made with our revolutionary CYPHER light key TRUE random number generator.

https://play.google.com/store/apps/details?id=com.softwar.silentraven
Silent Raven on Google play store
CONNECTED REAL TIME MESSAGES
RAVEN allows Twitter users to exchange real time secure instant messages using 4096 RSA keys. The keys are stored in memory and are never stored on disk. A new key is made for each session of secure messages. RAVEN also has a built in verification system to ensure defend against unauthorized access during a secure session. RAVEN deletes the messages from the Twitter in/out boxes on your account when you exit the program.
OLM or OFF LINE MESSAGES
The OFF LINE MESSAGE system is handled differently than the "connected" communication sessions. Off line messages are sent and received without a real time scanning connection. OLM allows you to create, post and get a 4096 RSA public key via the message system. This allows you to post and get off line secure messages to other RAVEN users. The private key data and the address book is stored on your system using 256 AES encryption.

LK8 Tracker
https://play.google.com/store/apps/details?id=com.softwar.lk8
LK8 is employee location data. LK8 provides monitoring on deliveries, routes and time spent on working at customer sites. LK8 information can be used for efficiency analysis by mapping out each employee in the progress of their daily work. LK8 is proof of work done by time/date at a contract site.
LK8 is location data for personal safety of those you care about. LK8 provides monitoring data on your relatives and loved ones, whether they are minors or the elderly. You'll know where they are. LK8 can tell you if a loved one arrived safely and provide you with life saving data in case of an emergency.
LK8 is stand-alone and encrypted for your security. Personal and employee location data is valuable and breach of that data may violate labor and/or privacy laws.
LK8 is not linked to a social media site, game site or any site at all. LK8 sends data to you and no one else. There is no loss of privacy to third party vendors or web sites that may get hacked or try to re-sell the location information for marketing and spam.
LK8 is one time. A single fee one-time. No monthly fees. No annual fees.
LK8 server is free - set up for LK8 Tracker

https://www.softwar.net/products.html
Encryption anyone?
windows, android, linux..
Gee it might help keep those pesky busy-bodies out of your data
IonU
https://www.softwar.net/freestuff.html It's FREE SOFTWAR Friday - encrypted messages, secure SMS, file cipher & more Enjoy!

Fake link
https://youtu.be/G13sNRU5h2I
You can have sausage links and you can have PHISH links
How to avoid getting hacked by a Phish attack
Fake link Short Video on email security - fake links and phishing - how to avoid getting hacked

The Cypher
https://youtu.be/G19_F7dNgG8
What does the US gov OPM hack, the Equifax hack and John Podesta have in common? None of them were encrypted
The Cypher US OPM hack 20 million records hacked - Equifax 145 million records hacked - Podesta 30,000 emails hacked ... no crypto!

US pressured North Korea by overwhelming hackers with data traffic
https://www.engadget.com/2017/10/01/us-launched-dos-attack-against-north-korea-hackers/
US pressured North Korea by overwhelming hackers with data traffic
US pressured North Korea by overwhelming hackers with data traffic The US used a months-long denial-of-service attack against North Korea to pressure it into giving up its aggressive strategy.

https://youtu.be/Oe4cnHPmURo
see the full video on youtube
Yeah... We're hardcore
Videos (show all)
Category
Products
-----------------------------
WINDOWS
Choctaw encrypted email
Cypher light based encryption
PDA RSA public key file utility
Silent Raven encrypted instant messager
Morelock pro 256 AES file cipher utility
ANDROID
Choctaw encrypted email
Cypher light based encryption
PDA RSA public key file utility
Silent Raven encrypted instant messager
Morelock pro 256 AES file cipher utility
NUNYA encrypted SMS instant messager
Franklinizer encrypted video/camera utility
George encrypted text notepad
LK8 tracker and command control GPS tracking system
White Rat lost phone tracking utility
LINUX
Choctaw encrypted email
Cypher light based encryption
PDA RSA public key file utility
Silent Raven encrypted instant messager
Morelock pro 256 AES file cipher utility
HARDWARE
USB Camera and software
Contact the business
Telephone
Website
Address
Aylett, VA
12460 W River Road
Aylett, 23009
King William's local Computer Service & repair, plus website design, Google Search SEO, and Facebook
Aylett
Backwoods & beyond is a licensed small business. Est. Feb.2012 we look forward to assisting you.
4155 King William Road
Aylett, 23009
J Spurlock Designs is operated and founded by a freelance drafter with over 23 years experience in A
4915 Richmond Tappahannock Highway, Ste F
Aylett, 23009
Verizon Authorized Retailer - Russell Cellular