"What Google's chief executive, Eric Schmidt, has to fear more than anything else is that he'll awake one day to learn that the Google search engine suddenly doesn't work on any Windows computers: something happened overnight and what worked yesterday doesn't work today. It would have to be an act of deliberate sabotage on Microsoft's part and blatantly illegal, but that doesn't mean it couldn't happen. Microsoft would claim ignorance and innocence and take days, weeks or months to reverse the effect, during which time Google would have lost billions."
–The New York Times, "Chrome vs. Bing vs. You and Me", July 12, 2009
Remote-Anything (RA) was small (100 KB), portable, easier to use and to deploy, faster, much safer and more stable than SYMANTEC pcAnywhere (53% of the market).
After 6 months, RA was doing so well that SYMANTEC Norton Antivirus (87% of the market at the time) started to delete RA, claiming that it was an unfortunate (but constant) string of "accidental false-alerts".
TWD responded with the Directory Server (DS), which allowed people to deploy (with a simple mouse click) RA on a WAN (Wide Area Network) without having to configure any PC, LAN IP address, firewall or router, and adding to RA WAN-management features found only in very expensive (and complex
to deploy) suites like "Intel LAN Manager". By waving the costs of large-scale deployments, RA became uniquely useful to very important Windows users.
More than 280 millions of Remote-Anything (RA) licenses have been deployed (in 138 countries) until MICROSOFT "Windows Defender" and the MICROSOFT VIA (Virus Information Alliance) deleted it, stating that "RA is not a virus" [1, 2].
TWD sued for anti-competitive practices five US companies selling 'Enterprise Network Management' products competing with the RA/DS they were sabotaging. The Department of "Justice" fined TWD, deciding that it was legitimate for these companies to automatically and silently eradicate a competing European product relying on a patented technology making RA naturally immune to network scanning and attacks
[3,
4,
5] – a desirable feature for end-users, but apparently not for the MICROSOFT Windows security ecosystem.
Late 2008, after most users had migrated to the most recent version of Windows, it was no longer possible to sell the RA and DS products automatically (and silently) deleted by MICROSOFT Windows "Defender".
In 2009, TWD published G-WAN, a Windows application server that was several orders of magnitude faster in user-mode than IIS in the Windows kernel - on the top of supporting 18 scripted programming languages... and having zero vulnerability since its publiscation (yet another exclusivity).
To discuss the acquisition of a G-WAN source code license, MICROSOFT organized a conference call with 5 top-level executive directors. Having just spent $7.5Bn to upgrade IIS v5 to v7 (4 times slower than G-WAN), the director of the IIS division killed the deal.
The same week, G-WAN was deleted by Trend Micro, a founding member of the MICROSOFT VIA. So G-WAN was ported to Linux, a free operating system which does not need antivirus software and proved to be faster and more scalable than MICROSOFT Windows.
Had they stopped there, History would have qualified these events are mere accidental. But if the illegally-inflicted damage is systematic, covered by the "Justice" department of all affiliated countries, and never repaired, then this is obviously a strategy (striving thanks to the impunity of a very few).
G-WAN was initially designed for Global-WAN (2010), a distributed Level-2 VPN based on governments-audited "post-quantum" security (expected to be resistant to quantum-computers) or "unconditional" security (in academic jargon, mathematically-proven as "unbreakable").
At least three governments have launched clandestine operations to sabotage licensing deals (two of which agreed for USD 900+ million). That would have been perfectly legal if the saboteurs had bought the technology themselves instead of blocking every possible way to market it, both for civilian and military users.
After serious performance, encryption and secure networking, what remained to be fixed was the Mother of All Backdoors:
In 2020, TWD shipped SLIMalloc, the first (and so far only one) memory allocator able to make the 50-year old C programming language "memory safe" by detecting and blocking in real-time the same "70% of the root causes of all vulnerabilities" that Apple, Microsoft and Google reported as "unfixable" [1] [2] [3].
In July 2022, after TWD weekly LinkedIn posts were showing to 18,000 connections (mostly C-Level executives) how SLIMalloc was blocking zero-days then documented by TheHackerNews.com, the LinkedIn "professional network" owned by Microsoft has "suspended" the accounts of TWD's staff, and the same day all the related contents disappeared from all search engines and Wikipedia (where a DARPA/DoD/GAFAM Cyber-Security contractor eradicated it repeatedly under the cover of several fake accounts).
In November 2022, the NSA publicly documented on its website:
"Malicious cyber actors can exploit poor memory management issues to access sensitive information, promulgate unauthorized code execution, and cause other negative impacts."
"Memory management issues have been exploited for decades and are still entirely too common today," said Neal Ziring, Cybersecurity Technical Director. "We have to consistently use memory safe languages and other protections when developing software to eliminate these weaknesses from malicious cyber actors."
"Microsoft and Google have each stated that software memory safety issues are behind around 70 percent of their vulnerabilities. Poor memory management can lead to technical issues as well, such as incorrect program results, degradation of the program's performance over time, and program crashes."
"NSA recommends that organizations use memory safe languages when possible and bolster protection through code-hardening defenses such as compiler options, tool options, and operating system configurations."
Beyond the obvious detrimental consequences for all end-users and the critical infrastructure (hacked, spied, sabotaged, ransomed – courtesy of an industry paid to generate vulnerabilities), that's a canonical illustration of the so-called "Free and Open Markets" and their legendary ability to self-regulate themselves for the sake of the now legendary "common-good":
"President Obama approved a previously undisclosed covert measure that authorized planting Cyber weapons in Russia's infrastructure, the digital equivalent of bombs that could be detonated if the United States found itself in an escalating exchange with Moscow." – The Washington Post (June 23, 2017)