Malware Secure Computers

  Malware Detection Software not needed or used  


Based on a New Class of Computer Components, developed in house


ROATI  Technologies  Inc.

August 18, 2019


In Short :     

Our discovery will allow us to build Malware Secure Computers, which does not need to use Malware Detection Software such as McAfee or Norton in order to safely visit Malware infected web sites, watch Malware infested video streaming; open, edit, save and share Malware infected emails and Malware infected user data file attachments, as they will be no longer Malware infected by the time they enter the main body of our computers.  For us "it is perfectly safe to have a Malware located in our input stage".

The reason we are able to accomplish this high a level of Malware security, is primarily due to our development of a New Class of Computer Components (NCoCC) which enabled us to radically redesign the architecture of the input section of our computers.  The result is the new way which our computers safely process incoming information, Malware infected or not.

The discovery of our NCoCC will also have a significant impact on the Malware secure usage of:  1/ desk top computers,  2/ enterprise systems,  3/ PLC,  4/  IOT,  5/ IIOT,  6/ SCADA,  7/ process control,  8/ critical infrastructure,  9/ and other applications currently under investigation.

Despite the fact that it is perfectly safe to have a Malware temporarily resident in our input stage, our discovery has shown it to be 100% impossible for that Malware to be able to infect the BIOS or Hard Drive of the first stage of our system and to be passed on to the rest of the system.  This may be contrary to intuitive thinking for you, but is absolutely true.   The core principle of our discovery has been proven in our lab.

Once funded, our discovery will lead to the development of a multi-billion dollar industry for Canada.  This discovery and new industry will firmly establish Canada as a world leader in Cyber Security innovation and the manufacture of specialized computer based products, for years to into the future.


Bank Funding Made Available,  if We Can Demonstrate,   but cannot obtain help :

I was extremely lucky to have had the fortuitous opportunity to have a meeting with a president of a major Canadian bank, where I described my discovery.   Before leaving that meeting, that president offered to sit down with me to seriously discuss that bank funding my commercial product development, for a small equity stake.  This offer is contingent upon my Proof of Concept (PoC) sever performing as I described; which I know it will, as the core principle has already been proven in my lab.

However, the cost of custom components for prototyping, circuit board design, specialized technical hardware design work and some software development are beyond our ability to self-fund, therefore we are now facing the need for government assistance.

Over the past three years, I have proven the core principle of my discovery, confirmed availability of critical custom components, self-funded our R&D to date, Yet despite my best efforts I just can not afford to self-finance our PoC server in order to obtain the funding offered by this president of a major Canadian Bank.

When we first proved the core principal of my NCoCC and new computer design in our lab, we needed to manually move files through the various stages of our system in a specific pattern.  Where we need help is to computer automate the process in order to demonstrate our PoC server.


My Background :

My name is Ralph Kachur, I have over 30 years of experience in Canada, Europe and the USA; in electronic component technical sales, sales management, project management and as an SME business consultant;  I was instrumental in the supply of components used in three satellites circling the globe, have held Canadian military security clearance for a special project, am a C++ programmer and have been privy to many electronic instrumentation design, marketing and business launch projects.

My exposure to a breadth of technologies over 30 years has led me to this very important discovery.


Our Mission:

To develop within the Ontario Technology Corridor, an industry supporting our Canadian designed and manufactured Malware safe computers, computer based products and software to the world.


The following is basically the above with more detail and additional background, including a brief section on what we can and cannot do.


History, Problem and Resolution :

The problem lies in the need to use "detection software" to detect the presence of a "known malware", before it infects the BIOS or hard drive of your computer.

The proof, is in the thousands of "yet to be discovered" new malware which are being unleashed every week, which can and do regularly bypass existing detection software companies such as McAfee or Norton.  Detection software companies simply cannot keep up to the tidal wave of new Malware coming at them, as is demonstrated by the many Cyber Attacks caused by a Malware intrusion regularly announced in the news.

When a "yet to be discovered" malware hits the cyber sphere, one can only wish for a very slow spreading of that malware on its journey toward your computer.

Currently one can only hope for:

  • a timely discovery of that new malware,
  • the detection software company you selected can find a quick and effective patch,

  • a prompt update is made available to their customers,

  • a timely update to protect the computer you are using to read this document.

All this does not occur instantly.

Cyber attacks are reportedly costing the economies of the world over a Trillion dollars annually, of which Malware is the most common method used for cyber attacks and is forecasted to grow even larger in 2020 - 2022. Our newly developed technology will put a significant dent into that forecasted cyber mayhem.

Although the current thinking is to detect the presence of a malware, I have felt for several years, there just had to be a better way.

This caused my multiyear journey into researching why and how the various the parts of a computer communicate with each other and how a malware enters a system.  It was when I discovered a new computer principle, which rapidly lead to our in house development of our New Class of Computer Components, which in turn started us on our path to develop our line of malware secure computers and computer based products for the Malware protection of the manufacturing plant environment.


How it works :

The basic ROATI Technologies system consists of three isolated and independent computers working in tandem, all contained within one housing.  The various stages communicate with each other through a New Class of Computer Components (NCoCC) which we developed in house.

   The first stage
is the input stage where all incoming user data files and internet activity are received "Malware infected or not".  Once received they may be presented for second stage processing, for saving to our third stage.

Under normal operating conditions the first stage is configured to 100% prevent "any" Malware from entering the main BIOS or hard drive of our first stage.

It is in this first stage where we made a major redesign of the computers architecture and is one of several reasons for the high level of Malware security we are able to achieve.

   The second stage
is where all information files are passed through our NCoCC.  It is here where internet activity, video streaming, emails and user data file are all securely transferred to the third stage as "no-longer-infected", even if that file was or was not originally Malware infected, all files are processed the same.  The core secret of this stage will be revealed once our patent protection has been secured.

   The third stage
may be thought of as what one would consider an existing design for a PC or server, but is considerably different.  It is similar in that it is in this stage where most of our general computer processing and long term storage media are located.

For this stage we have added new security features, which includes a design to prevent an external storage media, such as a USB or CD, to introduce a malware, by a: 1/ a malicious employee,  2/ the un-intentioned but detrimental activity of a good employee doing work at home on their "yet-to-be-discovered Malware" infected computer  or  3/ the on premises introduction of a malware by an outside hacker.

   For all stages
the obtaining, loading or updating of, "malware safe software", will be controlled via our new method of obtaining "malware secure software".  Details will be released once our patent and copyright protections have been secured or will more likely be revealed as part of our product launch.  Once trained on our new methods, IT professionals and security aware users will be able to confidently load "malware safe software and updates" and not have to worry about using the Malware infested internet.


Our plan:

We need to demonstrate proof of our new technology in order to obtain funding for commercial product development, but we first need government support to build a very basic Proof of Concept email server.

There are four main steps:

   1/   Disclose the core secret to a trusted government employee.
Due to my need to obtain government support and because my statements are likely hard to believe, I will need to disclose the core secrets of the technology and the basics of my business plan, to a trusted government employee.  Once disclosed, the accuracy of my statements about this new technology and the considerable economic benefit for Canada will become abundantly obvious.

I am very cautions as to who I will disclose this to, mainly because of the temptation to another to gain great personal wealth and my concern for the potential loss to the Canadian economy if my secrets are improperly disclosed.  Therefore, I would prefer to only disclose my secrets to a person I have met and I am totally confident that my secrets will not be disclosed to any other.  However, that person needs to be of such stature, within the government, that others will believe what that person has to say about my discoveries and innovations.   I trust you, the reader, will appreciate my caution.  However, my position is open for discussion, especially if it means moving this project forward.

   2/   Determine if the hardware can be built.

I have spent the good part of the first two years researching our component variations with Silicone Valley giants and international suppliers from India to Germany.  This has been quite the challenge as we are a new, unknown and unproven company.

It was difficult to break through their customer service firewalls in order to obtain access to senior design engineers.  However, we were finally able to get through to all the important senior engineers we needed to talk to and were able to obtain confirmation for our unique component designs.

    3/   Build a Proof of Concept server.
Some standard components have been purchased.  Certain solvable computer PCB design challenges need specialized technical design advice.

I have to date:

  • proven the core principle in my lab,

  • confirmed standard and custom components,

  • self-funded our research and development to date,

  • plus, I have attempted to self-finance our Proof of Concept server.

However, the cost of custom components for prototyping, circuit board design and some software development are beyond our ability to self-fund, therefore we are now facing the need for government assistance.

    4/   Demonstrate technology.
I have an independent ethical hacker who will do aggressive malware penetration testing and will document their findings on line.  Also I will request government cyber security specialists to do aggressive malware penetration testing.  Likely I will approach the Canadian Center for Cyber Security branch of the Communications Security Establishment.

As we will then be armed with their "documented proof" that malware protection was actually accomplished without the need or use of virus or malware detection software, it will become obvious to all the very high level of malware protection we will be able to provide to Canada, the world and the considerable economic benefit for Canada which our computer innovation represents.  It is at this point, that I will then make application to funding agencies for commercial product development and or sit down with the president of a major Canadian bank mentioned at the beginning of this article.



Anywhere a malicious malware infection can infect a computers BIOS or hard drive, destroy data, ransom data, cause costly data misinformation or the release of sensitive corporate or personal information.

In short, anywhere in the world where the exchange of information data needs to be Malware Safe.


Other Malware Security uses for our NCoCC :

Other markets currently under investigation for our NCoCC include: use in laptop computers, tablets, cell phones, instrumentation applications and others.  The major obstacle for entering these markets is the high cost for R&D to miniaturizing our NCoCC into a hybrid circuit, which is needed for high volume production and lower cost.  We just cannot afford the high cost of hybrid R & D at this very early stage of our corporate development, but is certainly part of our long term objectives and business plan.


Enterprise Systems:  (a special market)

The enterprise market for our NCoCC is broken down into several sub categories.  Here are a few:

Air-Gap and non Air-Gap closed loop systems, will be able to use our computers as secure terminals for external input/output and or secure internet activity, which previously for security reasons was not done.

Smaller enterprise systems of 5 - 500 computers, where Malware intrusion via internet searching or emails is a major concern.

In critical infrastructure protection of communication lines in areas such as an electrical power grid.

Financial and Insurance Institutions, where customer internet input is needed and the concern for their customers data information to be secure.

Our computers and our NCoCC manufactured in Canada by ROATI Technologies Inc., will significantly reduce the level of Malware infestations inflicted upon enterprise systems, therefore significantly reducing the direct high financial costs of mitigating the damage from and actual attack plus the indirect cost due to the loss of corporate reputation due to the public announcements of an attack because of the requirements of GDPR.


What we Can and Cannot do:


"We cannot" prevent access to our system because of poorly designed software.

"We cannot" prevent password stupidity.  However, "that hacker will have access to only what that single user has access permission for".  By the very nature of our design, a destructive Malware just cannot get in.


" WE  CAN " provide systems which:

  • absolutely prevent a Malware from entering the BIOS or Hard Drive of our systems first stage,

  • allow for safe internet activity, including video streaming,

  • allow for the safe opening, using, editing, saving or sharing of an incoming Malware infected  1/ email, as no longer infected,  2/  email attachment such as Word or PDF, as no longer infected,  3/ user data file or an information data stream as no longer infected,

  • securely process only desirable text based scripts, while preventing undesirable text based script attacks,

  • prevent the unauthorized access and introduction of a malware to our processing and internal storage media areas with the use of a malware infected storage media such as a USB or CD,

  • while doing off site work and becoming malware infected with a new and yet-to-be-discovered Malware, which would normally bypass detection software like McAfee or Norton, that now Malware infected work may be confidently uploaded back onto our systems, without the fear of that yet-to-be-discovered Malware being uploaded with that work,

  • if a hacker obtains a user password, that hacker will only have access to what that user has access permission to.  Any attempt for a Malware entry will be prevented, resulting in protection against a system wide Malware attack.  This feature has important application in enterprise systems,

  • protect data communications for most PLC, SCADA, IOT, IIOT, process control and critical infrastructure applications.

  • reliably do all the above, without the need or use of Virus or Malware detection software,

  • provide a secure commercial service for internationally distributing "Malware safe" software & updates, instead of using the Malware infested internet.



Since we federally incorporated September 21, 2016, it has taken us a considerable amount of perseverance to reach the stage which we have been able to achieve to date.

We are on the precipice of an evolutionary shift in cyber security, all we need is a feather of help to tilt us over the edge and to turn our discoveries into a significant economic benefit for Canada.

With pride, I quote Winston Churchill, "we have accomplish so much, with so little".

Here is a final thought for you, while we are slow to market, because of our limited financial resourcesmuch of Canada and the worlds' Cyber space remains under -  preventable attack.

I "most sincerely invite you"  to contact me, to challenge or question the above statements or to make any suggestions you may have to offer.


Safe Computing,
Ralph Kachur, 
ROATI Technologies Inc.

Protecting Electronic Information

with a Hardware Based solution

Proudly designed, manufactured & supported by Canadians.


I am often asked:

How can you develop this when thousands of computer professionals
have not?

My answer is:

Gravity has been around since the very beginning of time.
It took Isaac Newton, over 300 years ago to see
the obvious.

For me the knowledge and experience gained in over
30 years of electronic component technical sales,
was helpful.

The above are our declared objectives, of which we are heavily invested in attempting to achieve.  However, we would not be so heavily invested for as long as we have been, unless we felt the above to be possible and achievable; for much has already been achieved.   We now need help to turn our discoveries into a commercial reality for Canada.

As we are in the development stage, no decision of any kind should be based on the above and is subject to change without notice.

ROATI  Technologies  Inc.

1216 - 64 Bramalea Road
Brampton, Ontario, L6T 2W8

(905) 846-1233 EST,  -5  GMT
(800) 458-3089 USA  &  Canada

Phones answered

8:00 am - 9:00 pm Eastern Standard Time,  7 days / week
2:00 am - 3:00 pm Hawaii time zone, 7 days / week

≥ 1 hour all time zones.