FindOwnerSearch
Brands and Their Owners
| Cybersoft, Inc. contact information is shown below | |
| Owner: | CYBERSOFT, INC. |
|---|---|
| Owner Address: | Suite 100 1958 Butler Pike Conshohocken PA 19428 |
| Owner Web Site | |
| Owner Phone | |
| Owner Toll Free | |
| Owner Fax |
| Brand: |
CIT |
|---|---|
| Description: | Computer software which detects virus, hacker, sabotage and baseline configuration violations, from any source, using cryptographic, change detection; |
| Category: | COMPUTER SOFTWARE WHICH DETECTS VIRUS |
| Brand: |
CVDL |
|---|---|
| Description: | Computer operating program, namely, a computer virus description program for use in a data modeling system; |
| Category: | COMPUTER OPERATING PROGRAM |
| Brand: |
CYBER.COM |
|---|---|
| Description: | computer software for use in computer security;providing information about computer software security via a global computer network; |
| Category: | COMPUTER SOFTWARE USE |
| Brand: |
CYBERSOFT |
|---|---|
| Description: | Pre-Recorded Computer Programs on Tapes, Cards and Discs for Use in Micro Computers; |
| Category: | PRE RECORDED COMPUTER PROGRAMS ON TAPES |
| Brand: |
CYBERSOFT |
|---|---|
| Description: | COMPUTER SOFTWARE FOR SCANNING VIRUSES AND FOR MAINTAINING NETWORK SECURITY AND CRYPTOGRAPHIC INTEGITY;CYBER SOFT; |
| Category: | COMPUTER SOFTWARE SCANNING VIRUSES |
| Brand: |
CYBERSOFT |
|---|---|
| Description: | [Computer consultation services in the field of security and utility applications; Computer software consultation services in the field of security and utility software; ] Consulting services in the field of design, selection, implementation and use of computer software systems for others in the field of security and utility software; Technical support services, namely, troubleshooting of computer software problems in the field of security, forensics and utility software; |
| Category: | COMPUTER CONSULTATION SERVICES |
| Brand: |
CYBERSOFT |
|---|---|
| Description: | Providing on-line newsletters, research reports, magazines and white papers in the field of security and utility software, computer security and forensics; Educational services, namely, conducting on-line video training in the operation and use of security and utility software; Training in the use and operation of security and utility software; Educational services, namely, providing courses relating to the use of security and utility software;Multimedia training software recorded on CD-ROM in the field of security and utility software;CYBER SOFT;providing on-line information and news in the field of computer security and utility software, computer security and forensics; |
| Category: | PROVIDING ON LINE NEWSLETTERS |
| Brand: |
CYBERSOFT COMPUTING SOLUTIONS |
|---|---|
| Description: | Distributorships in the field of computer software including security software, forensics software, systems management software, utility software, operating system programs and utility programs for messaging and file sharing; On-line retail store services featuring computer software including security software, forensics software, systems management software, utility software, operating system programs and utility programs for messaging and file sharing; Retail store services in the field of computer software including security software, forensics software, systems management software, utility software, operating system programs and utility programs for messaging and file sharing; Retail services by direct solicitation by sales agents in the field of computer software including security software, forensics software, systems management software, utility software, operating system programs and utility programs for messaging and file sharing;COMPUTING SOLUTIONS;Computer consultation services in the fields including security and utility applications, forensics software, systems management programs, operating system programs and utility programs for messaging and file sharing; Computer software consultation services in the fields including security and utility applications, forensics applications, systems management programs, operating system programs and utility programs for messaging and file sharing; Consulting services in the fields of design, selection, implementation and use of computer software systems for others in the fields including security and utility applications, forensics applications, systems management programs, operating system programs and utility programs for messaging and file sharing; Technical support services, namely, troubleshooting of computer software problems in the fields including security, forensics and utility software, systems management programs, operating system programs and utility programs for messaging and file sharing; Maintenance of computer software in the fields including security and utility applications, forensics applications, systems management programs, operating system programs and utility programs for messaging and file sharing; Integration of computer systems and networks in the fields including security and utility applications, forensics applications, systems management programs, operating system programs and utility programs for messaging and file sharing; Consultation services in the field of forensics; Forensic investigation services relating to computers and security; |
| Category: | DISTRIBUTORSHIPS FIELD |
| Brand: |
CYBERSOFT INTERNATIONAL |
|---|---|
| Description: | Distributorships in the field of computer security and utility software; On-line retail store services featuring computer security and utility software; Retail store services in the field of computer security and utility software; Retail services by direct solicitation by sales agents in the field of computer security and utility software;INTERNATIONAL; |
| Category: | DISTRIBUTORSHIPS FIELD |
| Brand: |
CYBERSOFT INTERNATIONAL |
|---|---|
| Description: | CYBER SOFT INTERNATIONAL;INTERNATIONAL;Computer consultation services in the field of security and utility applications; Computer software consultation services in the field of security and utility software; Consulting services in the field of design, selection, implementation and use of computer software systems for others in the field of security and utility software; Technical support services, namely, troubleshooting of computer software problems in the field of security, forensics and utility software; |
| Category: | CYBER SOFT INTERNATIONAL |
| Brand: |
CYBERSOFT, INC. |
|---|---|
| Description: | business operating system, a computer program used in a networked setting for point-of-sale applications, and cybersoft serves as a value-added reseller of computer hardware; |
| Category: | BUSINESS OPERATING SYSTEM |
| Brand: |
CYBERSOFT.COM |
|---|---|
| Description: | Providing on-line newsletters, research reports, magazines and white papers in the field of security and utility software, computer security and forensics; Educational services, namely, conducting on-line video training in the operation and use of security and utility software; Training in the use and operation of security and utility software; Educational services, namely, providing courses relating to the use of security and utility software;CYBERSOFT DOT COM; CYBER SOFT DOT COM; |
| Category: | PROVIDING ON LINE NEWSLETTERS |
| Brand: |
DIGITALWAR |
|---|---|
| Description: | Electronic mail services;DIGITAL WAR;Hosting the web sites of others on a computer server for a global computer network; |
| Category: | ELECTRONIC MAIL SERVICES |
| Brand: |
HIGH FLYING FLAG |
|---|---|
| Description: | Providing information on-line relating to history, science, culture, current events and other historical and educational information relating to America and world affairs and events; |
| Category: | PROVIDING INFORMATION ON LINE RELATING |
| Brand: |
INTELLAHAWK |
|---|---|
| Description: | Computer software for network use which detects virus, hacker, sabotage and baseline configuration violations, from any source, using cryptographic change detection;INTELLIGENT HAWK; |
| Category: | COMPUTER SOFTWARE NETWORK USE |
| Brand: |
INTELLAHAWK |
|---|---|
| Description: | Computer software for network use which detects virus, hacker, sabotage and baseline configuration violations, from any source, using cryptographic change detection;INTELLIGENT HAWK; |
| Category: | COMPUTER SOFTWARE NETWORK USE |
| Brand: |
MPSCAN |
|---|---|
| Description: | Computer software that scans e-mail on a non-DOS based computer for either viruses or prohibited words or phrases;MP SCAN; |
| Category: | COMPUTER SOFTWARE THAT SCANS E MAIL |
| Brand: |
NEXGEN |
|---|---|
| Description: | Staple foods, namely, ready to eat cereal derived food bars; granola-based snack bars; toaster pastries; sauces, namely, barbecue sauce, chili sauce, cocktail sauce, hot sauce, soy sauce, steak sauce, teriyaki sauce, Worcester sauce; English muffins; baking mixes, namely, brownie mix, cake mix; pie shells; chocolate chips; bread crumbs; coffee; instant coffee; processed cereal; cookies; crackers; chocolate syrup; refrigerated biscuit dough; refrigerated cinnamon rolls; prepared meals consisting primarily of pasta or rice, namely, cheddar and shells, lasagna dinner, macaroni and cheese, noodles and sauce; flour; frosting; frozen bagels; frozen garlic bread; frozen waffles; processed frozen corn on the cob; processed frozen whole kernel corn; ice cream; ice cream cones; frozen pizza; gelatin, namely flavored sweetened gelatin desserts; pudding; gravy mix; chili sauce mix; cocoa mix; pancake mix; Sloppy Joe seasoning mix; taco seasoning mix; spaghetti sauce mix; stuffing mix containing bread; oatmeal; grits; honey; marshmallows; mayonnaise; salsa; taco shells; tortillas; catsup; mustard; pasta, namely, angel hair pasta, egg noodles, elbow macaroni, penne, rigatoni, rotini, spaghetti, vermicelli, ziti; relish; pizza sauce; microwave popcorn; rice; instant rice; rice cakes; salad dressing; corn chips; cheese flavored snacks, namely, cheese curls; pretzels; nacho chips; spices, namely, black pepper, chili powder, cinnamon, garlic powder, garlic salt, minced onion, oregano, parsley, salt, vanilla extract for flavoring; canned ravioli; canned spaghetti; sugar; sugar substitutes; corn syrup; pancake syrup; tea, namely tea bags and instant tea mix; vinegar; and pierogies; food product, namely, a non-caloric sugar substitute; |
| Category: | STAPLE FOODS |
| Brand: |
THD |
|---|---|
| Description: | COMPUTER SOFTWARE, NAMELY, SOFTWARE FOR USE IN THE DETECTION OF MALICIOUS EMULATION SOFTWARE KNOWN AS TROJAN HORSE PROGRAMS; |
| Category: | COMPUTER SOFTWARE |
| Brand: |
UAD |
|---|---|
| Description: | Computer software which identifies and renders data into its smallest nondivisible parts by examining the contents of the data; |
| Category: | COMPUTER SOFTWARE WHICH IDENTIFIES |
| Brand: |
VFIND |
|---|---|
| Description: | computer programs for hostile algorithm detection and protecting the security of computer systems and computer networks; |
| Category: | COMPUTER PROGRAMS HOSTILE ALGORITHM |
| Brand: |
WAVE |
|---|---|
| Description: | Computer software, namely, software for anti-virus protection; |
| Category: | COMPUTER SOFTWARE |