"What Google's chief executive, Eric Schmidt, has to fear more than anything else is that he'll awake one day to learn that the Google search engine suddenly doesn't work on any Windows computers: something happened overnight and what worked yesterday doesn't work today. It would have to be an act of deliberate sabotage on Microsoft's part and blatantly illegal, but that doesn't mean it couldn't happen. Microsoft would claim ignorance and innocence and take days, weeks or months to reverse the effect, during which time Google would have lost billions."
–The New York Times, "Chrome vs. Bing vs. You and Me", July 12, 2009
Remote-Anything (RA) was small (100 KB), portable, easier to use and to deploy, faster, much safer and more stable than SYMANTEC pcAnywhere (53% of the market). RA did so well (in 138 countries) that SYMANTEC Norton Antivirus (87% of the market at the time) started to delete RA, claiming that it was an unfortunate (but constant) string of "accidental false-alerts".
TWD responded with the Directory Server (DS), which allowed people to deploy (with a simple mouse click) RA on a WAN (Wide Area Network) without having to configure any PC, LAN IP address, firewall or router, and adding to RA WAN-management features found only in very expensive (and complex to deploy) suites like "Intel LAN Manager". By waving the costs of large-scale deployments, RA became uniquely useful to very important Windows users.
More than 280 millions of Remote-Anything (RA) licenses have been deployed globally until MICROSOFT "Windows Defender" and the MICROSOFT VIA (Virus Information Alliance) deleted it, stating that "RA is not a virus" [1, 2].
TWD sued for anti-competitive practices five US companies selling 'Enterprise Network Management' products competing with the RA/DS they were sabotaging. The Department of "Justice" fined TWD, deciding that it was legitimate for these companies to automatically and silently eradicate a competing European product relying on a patented technology making RA naturally immune to network scanning and attacks [3, 4, 5] – a desirable feature for end-users, but apparently not for the MICROSOFT Windows security ecosystem.
In 2009, as it was no longer possible to sell the RA and DS products automatically deleted by MICROSOFT Windows, TWD released G-WAN, a Windows application server that was several orders of magnitude faster in user-mode than IIS in the Windows kernel - on the top of supporting 18 scripted programming languages... and having zero vulnerability (yet another exclusivity).
To discuss the acquisition of a G-WAN source code license, MICROSOFT organized a conference call with 5 top-level executive directors. Having just spent $7.5Bn to upgrade IIS v5 to v7 (4 times slower than G-WAN), the director of the IIS division killed the deal.
The same week, G-WAN was deleted by Trend Micro, a founding member of the MICROSOFT VIA. So G-WAN was ported to Linux, a free operating system which does not need antivirus software and proved to be faster and more scalable than MICROSOFT Windows.
G-WAN was initially designed for Global-WAN (2010), a distributed Level-2 VPN based on governments-audited "post-quantum" security (expected to be resistant to quantum-computers) or "unconditional" security (in academic jargon, mathematically-proven as "unbreakable"). At least three governments have launched clandestine operations to sabotage licensing deals (two of which agreed for USD 900+ million – that would have been perfectly fine of they offered to buy it themselves instead of blocking every possible way to market it, both for civil and military users).
In 2020, TWD shipped SLIMalloc, the first and only memory allocator able to make the 50-year old C programming language "memory safe" by detecting and blocking in real-time the same "70% of the root causes of all vulnerabilities" that Apple, Microsoft and Google reported as "unfixable"   .
In July 2022, after TWD weekly LinkedIn posts were showing to 18,000 connections (most C-Level executives) how SLIMalloc was blocking zero-days then documented by TheHackerNews.com, the LinkedIn "professional network" owned by Microsoft has "suspended" the accounts of TWD and its staff, and the same day all the related contents disappeared from all search engines and Wikipedia (where a DARPA/DoD/GAFAM Cyber-Security contractor eradicated it repeatedly under the cover of several fake accounts).
In November 2022, the NSA publicly documented on its website:
"Malicious cyber actors can exploit poor memory management issues to access sensitive information, promulgate unauthorized code execution, and cause other negative impacts."
"Memory management issues have been exploited for decades and are still entirely too common today," said Neal Ziring, Cybersecurity Technical Director. "We have to consistently use memory safe languages and other protections when developing software to eliminate these weaknesses from malicious cyber actors."
"Microsoft and Google have each stated that software memory safety issues are behind around 70 percent of their vulnerabilities. Poor memory management can lead to technical issues as well, such as incorrect program results, degradation of the program's performance over time, and program crashes."
"NSA recommends that organizations use memory safe languages when possible and bolster protection through code-hardening defenses such as compiler options, tool options, and operating system configurations."