loader image



Hackers are attacking Small Businesses. Small Businesses are an easy target. With your password and banking information, hackers can and will max out your plastic cards, debit your bank accounts, buy goods for delivery to their place, read your emails and blackmail you, corrupt your system and demand a ransom and otherwise make life uncomfortable for you. And they will get all your customers information and hack them as well! There are businesses failing every day because they have been hacked.

KillNet Switch is cybersecurity hardware that functions independently from your devices or routers. Our revolutionary discovery enabled the product to function throughout the wire – literally. Once you have the hardware, you’ll be safe from every cyber threat that you can think of. KillNet Switch is 100% safe to use, and it guarantees your cyber safety 24/7.

Protecting Your Asset Online

Intelligence on the Wire (IOTW)


And then came the big breakthrough. Instead of putting only a switch on the wire, KillNet added intelligence into the KillNetSwitch. We called this Intelligence on the Wire (IOTW)

The latest KillNetSwitch has a fully configured CPU on the wire
IOTW not only controls and monitors the computer system, but it can control and monitor the routers and other system devices.
IOTW is completely independent of the main computer system
IOTW means that both inwards and outwards traffic can be monitored
IOTW means that other functions can be added
IOTW means that the information can be monitored using AI techniques
IOTW allows the user to scan his systems on demand or regularly
IOTW can be programmed to ‘cut the wire’ immediately if it is attacked
IOTW can be setup to cutoff parts of the computer system and allow others to maintain access

And every step can report to the IT manager by cell phone or by accessing a central KillNet website

All these functions can be monitored and controlled by cell phone

Intelligence on the Wire (IOTW) has turned a simple switch into a very powerful tool

Intelligence on the Wire (IOTW)

Processor: Broadcom BCM2711, quad-core Cortex-A72 (ARM v8) 64-bit SoC 1.5GHz


Memory: 8GB

Connectivity:◎2.4 GHz and 5.0 GHz IEEE 802.11b/g/n/ac wireless; ◎LAN, Bluetooth 5.0, BLE;


◎Gigabit Ethernet; ◎2 × USB 3.0 ports ◎2 × USB 2.0 ports

GPIO: Standard 40-pin GPIO header(fully backwards-compatible with previous boards)


Video & Sound: MIPI DSI display port


Multimedia:◎H.265 (4Kp60 decode); ◎H.264 (1080p60 decode, 1080p30 encode); ◎OpenGL ES, 3.0 graphics

KillNet Switch has been derived from the expertise of technical engineers who have several years of cyber security experience behind them. The KillNet Switch product was constructed to operate on both LAN and WAN internet providers, broadening our scope of protection. Conventional cyber security protection offers you software packages that, if you didn’t know, can just as easily hack your personal information through their firewalls. We predict that KillNet Switch will soon have the capability to protect enormous organizations and conglomerates.

Over and above these incredible features that Killnet offers you, KillNet also sends an alert to all your devices if you have been compromised in any way. It remains our responsibility to prevent hackers from retrieving information from your home. However, KillNet recommends turning off your internet whilst you’re leaving your home or sleeping to avoid hackers and ransomware attacks.

Intelligence on the Wire (IOTW) with  Zeek Network Security Monitoring Tool

One tool which comes as an with your KillNet Solution is the Zeek Network Security Monitoring Tool Zeek analyses the traffic to and from the internet with your router and so with your computer system. Zeek can be used as a network security monitor (NSM) to support investigations of suspicious or malicious activity on your internet link. Zeek also supports a wide range of traffic analysis tasks beyond the security domain, including performance measurement and troubleshooting.


Zeek is more powerful and more far reaching than most network monitors. Not only does Zeek help you find malicious activity, but its other features include semantic misuse detection, anomaly detection, and behavioral analysis.

Zeek operates in near-real-time insights into network usage patterns so you (or your system) can respond almost immediately to a threat.

Furthermore Zeek produces a detailed log of all activities for your information.

The ‘normal’ implementation of Zeek in most sites is that Zeek sits on the router or the computer system which makes it observable and corruptible by hackers.

In your Kill Net implementation of Zeek, it sits on the wire! So Zeek is part of the Kill Net’s Intelligence on the Wire implementation. This makes Zeek itself safe from hackers.

When you subscribe to Zeek with KillNet, we provide you with all the support and advice that you need to ensure you are getting the best benefit from Zeek.

The first benefit a new user derives from Zeek is the extensive set of logs describing network activity. These logs include not only a comprehensive record of every connection seen on the wire, but also application-layer transcripts. These include all HTTP sessions with their requested URIs, key headers, MIME types, and server responses

In addition to the logs, Zeek comes with built-in functionality for a range of analysis and detection tasks, including extracting files from HTTP sessions, detecting malware by interfacing to external registries, reporting vulnerable versions of software seen on the network, identifying popular web applications, detecting SSH brute-forcing, validating SSL certificate chains, and much more

In your KillNet implementation of Zeek, it is part of the IOTW system (Intelligence On The Wire) and actually sits on the wire! 

Zeek has a rich history stretching back to the 1990s. Vern Paxson designed and implemented the initial version in 1995 as a researcher at the Lawrence Berkeley National Laboratory (LBNL). The original software was called “Bro,” as an “Orwellian reminder that monitoring comes hand in hand with the potential for privacy violations”.

LBNL first deployed Zeek in 1996, and the USENIX Security Symposium published Vern’s original paper on Zeek in 1998, and awarded it the Best Paper Award that year He published a refined version of the paper in 1999 as Bro: A System for Detecting Network Intruders in Real-Time.

Our KillNet VPN Technology Connects KillNet to KillNet

VPN stands for Virtual Private Network, and it is a tool that creates a private, secure network connection between your device and the internet. When you connect to the internet through a VPN, your online activities are encrypted and hidden from third parties, including your Internet Service Provider (ISP). This makes it difficult for anyone to track your online activities and steal your personal data.

A Virtual Private Network (VPN) conceals internet data traveling to and from your device. Mobile VPN is the best VPN for android usears.

dVPN sends your data in a scrambled format (that is encryption) If anyone reads your data, they cannot understand it.

Encryption is needed because you send of personal information through the internet — whether you know it or not. This data can include but is not limited 
to: passwords, credit card numbers, bank account numbers, messages, and other sensitive information.

Using a VPN mobile gives you an extra layer of security when accessing the internet from your mobile device. It also makes it more difficult for hackers to gain 
access to your data.

A VPN server is a type of server that enables hosting and delivery of VPN services independent of other websites.

VPN is a combination of VPN hardware and software technologies that provides VPN clients with connectivity to a secure and/or private network, or rather, the VPN.  This means that your computer is operating independently of other websites

We connect your KillNet system through our own VPN server as to maintain complete safety and privacy.

You will have a secure way of sending and receiving information.

VPN is very good for businesses who have branches or more than one location.

How does a VPN work?

By routing your network traffic through the VPN host’s distant server, your true IP address is never revealed. Using a VPN when online makes the VPN server the origin of your data rather than the website you visit. In other words, neither your ISP nor any other parties will be able to monitor your online activity (including the sites you visit and the information you send and receive). Using a virtual private network (VPN) is similar to using a filter that converts all your data into nonsense. If someone did manage to steal your information, it wouldn’t help them much.


Data is encrypted safely, but deciphering it requires a secret key. Without it, a machine attempting a brute-force attack would need millions of years to crack the code. With a virtual private network (VPN), your online actions can be concealed, even when connected to a public network.

Be anywhere, virtually, with VPN server locations spanning 94 countries. Keep your real location to yourself.

Buy Now