PureBytes Links
Trading Reference Links
|
<x-html><!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META content="text/html; charset=iso-8859-1" http-equiv=Content-Type>
<META content="MSHTML 5.00.2314.1000" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999>Ton</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999></SPAN></FONT> </DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN class=780561304-28071999>I have
password protected all of my drives with passwords for read-only as well as
read-write access. I'm still finding 'visitors' in my network
neighborhood. I assume they can't get at anything. When I installed
the passwords, I disconnected my PC from the network (and the Internet) and
installed all of the passwords, etc. Then hooked everything back
up.</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999></SPAN></FONT> </DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN class=780561304-28071999>I
tried to locate poledit.exe and that program isn't anywhere to be found in my
Win95 directory.</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999></SPAN></FONT> </DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999>Regards</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999></SPAN></FONT> </DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999>Guy</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999></SPAN></FONT> </DIV>
<DIV class=OutlookMessageHeader><FONT face="Times New Roman"
size=2>-----Original Message-----<BR><B>From:</B> owner-metastock@xxxxxxxxxxxxx
[mailto:owner-metastock@xxxxxxxxxxxxx]<B>On Behalf Of</B> A.J.
Maas<BR><B>Sent:</B> Tuesday, July 13, 1999 4:12 PM<BR><B>To:</B>
Metastock-List<BR><B>Subject:</B> Re: intruders [Fw: Today's WinInfo: July
12]<BR><BR></FONT></DIV>
<DIV><FONT size=2>To clear some myths..........................</FONT></DIV>
<DIV><FONT size=2></FONT> </DIV>
<DIV><FONT size=2>For as long as you do not "Share" any files, disks,
printers, folders or even Net-adapters, you are save from</FONT></DIV>
<DIV><FONT size=2>anyone entering </FONT><FONT size=2>your PC.</FONT></DIV>
<DIV><FONT size=2>
<DIV><FONT size=2>If you haven't done any of the file, folder, disk,
printer and netadapter </FONT><FONT size=2>sharing (also in the Control Panel's
Nethood/</FONT></DIV>
<DIV><FONT size=2>Networking and the Win95/98 Context Menu's options for
"Sharing", then no-one can intrude onto your PC</FONT></DIV>
<DIV><FONT size=2>with you in command (and as otherwise is described in the
article below).</FONT></DIV></FONT></DIV>
<DIV><FONT size=2>This "Sharing", apart from the Control Panel's Nethood and the
Win95/98 Context Menu's options,</FONT></DIV>
<DIV><FONT size=2>are privaleges you can also set for any of the "Users"
of your PC's Windows sessions. </FONT><FONT size=2>The program to do
so</FONT></DIV>
<DIV><FONT size=2>is "C:\Windows\Poledit.exe".</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>The above is for Win95/98 only, for as WIN-NT4/2000 requires a
top secret "NTconfig.pol" file stored on server for</FONT></DIV>
<DIV><FONT size=2>setting the "Sharing of the Network's NetHood, Server
and WKS's </FONT><FONT size=2>files, folders, printers and
disks".</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>Regards,<BR>Ton Maas<BR><A
href="mailto:ms-irb@xxxxxxxxxxxxx">ms-irb@xxxxxxxxxxxxx</A><BR>Dismiss the
".nospam" bit (including the dot) when replying.<BR><BR><BR></FONT><FONT
size=3>___________________________________________________________________________<BR><BR>WinInfo:
Windows news and information -- Copyright (c) 1995-9 Paul Thurrott<BR>Visit
WinInfo on the Web at WUGNET: <A
href="http://www.wugnet.com/wininfo">http://www.wugnet.com/wininfo</A><BR>___________________________________________________________________________<BR><BR>Today's
WinInfo:<BR> Microsoft challenges BackOrifice myths<BR> Microsoft
bringing USB hardware to the Macintosh<BR><BR><BR>Microsoft challenges
BackOrifice myths<BR><BR>With the release this week of Windows NT hacking tool
"BackOrifice 2000,"<BR>Microsoft has launched an informational campaign of its
own, designed to<BR>derail myths about the malicious program. According to a
report on<BR>Microsoft's Security Advisor Web site, BackOrifice 2000 is a remote
control<BR>application that must be stealthily installed so that attackers can
take<BR>over a Windows NT-based network. The program enables remote hackers to
do<BR>anything they could do were they to be logged onto the machine locally:
Run<BR>programs, delete files, and the like.<BR><BR>"BackOrifice 2000 is a
remote-access tool that was developed with the intent<BR>of harming users," says
Jason Garms, the lead product manager for Windows NT<BR>security at Microsoft.
"It is a tool that has no legitimate purpose other<BR>than exposing users'
machines to people on the Internet. Users who are<BR>tricked into getting this
thing installed on their system are vulnerable to<BR>the attacker, who can then
do anything that the victim can do--move the<BR>mouse, open files, run programs,
etc.--which is little different from what<BR>legitimate remote-control software
can do. Back Orifice, however, is<BR>designed to be stealthy and evade detection
by the user."<BR><BR>For BackOrifice to find its way onto your system the hacker
must have<BR>physical access to the machine with a valid login or you must be
tricked<BR>into installing it; typically this is accomplished by sending users
the<BR>program as an email attachment that must be executed. To prevent
this<BR>program from taking over your system, just use common sense: Always run
an<BR>anti-virus program with up-to-date virus definitions and don't let
anyone<BR>gain unauthorized physical access to your machine. Perhaps most
importantly,<BR>don't execute email attachments from unknown people.<BR><BR>One
of the biggest myths perpetrated by the makers of BackOrifice is that<BR>program
takes advantage of security inadequacies that are inherent in<BR>Windows and
Windows NT. This is simply not true: BackOrifice could have been<BR>written to
attack *any* kind of computer system. The hackers that wrote it<BR>simply
decided to attack Windows, which is the most popular computing<BR>platform by
far. In fact, as Microsoft notes, BackOrifice doesn't actually<BR>target Windows
per se at all: It targets users, who often don't understand<BR>security issues
well enough to not execute email attachments from
unknown<BR>sources.<BR><BR>Another common myth centers on the goal for
BackOrifice: In an attempt to<BR>protect themselves from legal problems, the
creators of BackOrifice are<BR>pretending that it is a legitimate remote control
application. However, this<BR>is not the case: BackOrifice is designed to escape
detection and exceeds the<BR>needs of remote control software. And it doesn't
prompt the user when it<BR>installs on the system.<BR><BR>"The creators [of
BackOrifice] claim that this is a useful administration<BR>tool, but it doesn't
even prompt people when it installs itself on the<BR>system. It doesn't warn
them that it's getting installed. And, once it's<BR>installed, it makes the
system available to other people on the Internet.<BR>That is a malicious act,"
says Garms. "I am personally unaware of any major<BR>customers of ours who
consider this to be a remote administration tool as<BR>the folks who created it
claim. Quite the contrary, they consider it a piece<BR>of malicious code.
Unfortunately, there are some users who were duped by the<BR>press releases from
the organization that released the software, and did<BR>install it on their
systems."<BR><BR>For more information about Microsoft's response to BackOrifice
2000, please<BR>visit the Microsoft Security Advisor Web site:<BR> <A
href="http://www.microsoft.com/security/bulletins/bo2k.asp">http://www.microsoft.com/security/bulletins/bo2k.asp</A><BR><BR><BR><BR><BR>Microsoft
bringing USB hardware to the Macintosh<BR><BR>Microsoft Corporation will
announce the availability of its first USB<BR>hardware for the Macintosh, the
IntelliMouse Explorer, a "no ball" mouse<BR>that the company will release this
fall for Windows as well. According to<BR>rumors, Microsoft will also be porting
other USB hardware to the Macintosh,<BR>including possibly all of the company's
joystick/entertainment hardware,<BR>such as the FreeStyle Pro GamePad and the
Sidewinder Precision Pro joystick.<BR><BR>Expect an official announcement from
Microsoft at MacWorld New York
next<BR>week.<BR><BR>___________________________________________________________________________<BR><BR>Visit
WinInfo on the Web at WUGNET: <A
href="http://www.wugnet.com/wininfo">http://www.wugnet.com/wininfo</A><BR><BR>To
unsubscribe from the WinInfo list, simply send an E-mail message to<BR><A
href="mailto:listserv@xxxxxxxxxxxxxxxxxxxx">listserv@xxxxxxxxxxxxxxxxxxxx</A>
with the phrase "unsubscribe wininfo" (no<BR>quotes) in the body. If you are
having problems unsubscribing or any other<BR>problems with the list, please
write Keith Furman at <A
href="mailto:listadmin@xxxxxxxxxx">listadmin@xxxxxxxxxx</A>.<BR>___________________________________________________________________________<BR></DIV></FONT></BODY></HTML>
</x-html>From ???@??? Tue Jul 27 23:45:14 1999
Return-Path: <majordom@xxxxxxxxxxxxxxxxxx>
Received: from listserv.equis.com (listserv.equis.com [204.246.137.2])
by purebytes.com (8.8.7/8.8.7) with ESMTP id WAA14155
for <neal@xxxxxxxxxxxxx>; Tue, 27 Jul 1999 22:54:08 -0700
Received: (from majordom@xxxxxxxxx)
by listserv.equis.com (8.8.7/8.8.7) id NAA28319
for metastock-outgoing; Wed, 28 Jul 1999 13:43:30 -0600
X-Authentication-Warning: listserv.equis.com: majordom set sender to owner-metastock@xxxxxxxxxxxxx using -f
Received: from freeze.metastock.com (freeze.metastock.com [204.246.137.5])
by listserv.equis.com (8.8.7/8.8.7) with ESMTP id NAA28315
for <metastock@xxxxxxxxxxxxxxxxxx>; Wed, 28 Jul 1999 13:43:27 -0600
Received: from tellab5.tellabs.com (tellab5.tellabs.com [138.111.243.28])
by freeze.metastock.com (8.8.5/8.8.5) with SMTP id XAA13006
for <metastock@xxxxxxxxxxxxx>; Tue, 27 Jul 1999 23:31:18 -0600 (MDT)
Received: from sunx317.tellabs.com by tellab5.tellabs.com with smtp
(Smail3.1.29.1 #4) id m119M68-0005qDC; Wed, 28 Jul 99 00:17 CDT
Received: from tellabs.com by sunx317.tellabs.com (8.8.8+Sun/1.9)
id AAA13101; Wed, 28 Jul 1999 00:17:48 -0500 (CDT)
Message-ID: <379E927C.982B4E6@xxxxxxxxxxx>
Date: Wed, 28 Jul 1999 00:17:48 -0500
From: Mario Fortier <mfortier@xxxxxxxxxxx>
Organization: Tellabs
X-Mailer: Mozilla 4.04 [en] (X11; I; SunOS 5.6 sun4u)
MIME-Version: 1.0
To: metastock@xxxxxxxxxxxxx
Subject: Re: Avoid problem new PC
References: <LMBBKJCLKIJIBBJLAEIJMECKCHAA.nkormanik@xxxxxxxxxx> <379DC4FA.858C5574@xxxxxxxxxx>
Content-Type: multipart/alternative; boundary="------------CB90D414A21CB0FD60F67949"
Sender: owner-metastock@xxxxxxxxxxxxx
Precedence: bulk
Reply-To: metastock@xxxxxxxxxxxxx
Status:
<x-html><HTML>
Daniel Martinez wrote:<<text removed>>
<BLOCKQUOTE TYPE=CITE>3. <B><FONT COLOR="#CC0000">If you want to
do the absolute fastest stock database searches you possibly can</FONT></B>,
then there is only 1 hard drive solution for you: SCSI/UW2.
Buy a motherboard with it built in. The P6SBU
at $320 would be a good choice. For a SCSI/UW2 hard drive, expect
to pay at least $340 USD for an IBM
9.1GB U2W at <A HREF="http://www.storage.ibm.com/hardsoft/diskdrdl/prod/9esprod.htm">7200
RPM</A> and $600 for <A HREF="http://www.direct.ibm.com/cgi-bin/ncommerce/CategoryDisplay?cgrfnbr=2000202&cgmenbr=1&cntry=840&lang=en_US">10K
RPM</A>. If you cannot afford the premium, buy the new $330 <A HREF="http://www.wdc.com/products/drives/18000rtl.htm">Western
Digital 18GB UATA/66 at 66MB/sec and 7200 RPM</A> and a 66MB capable motherboard.
COMPUSA had this HD on sale for $270 with some other free hardware.
The best BX chipset based motherboard is the <A HREF="http://www.abit.com.tw/html/bx6r2.htm">ABIT
BX6 2.0</A>. It should also be 66MB/sec HDD capable.
<BR>
<BR> </BLOCKQUOTE>
That's a very well documented e-mail Daniel :->
<P>Now, when it comes to the fastest database searches someone may consider
to copy the database in a Virtual RAM Disk...
<BR>A couple of things to keep in mind:
<P>- You have to consider that it takes a while to initially copy the full
database to the RAM disk, but assuming you are making more than one consecutive
search, it is worth the initial setup time.
<P>- Of course, you need plenty of memory or a small database....
<P>- If your database is too large for your physical memory, you may consider
an interesting alternative: VRamDir.
<BR>
http://www.users.uswest.net/~jzhong/vramdir.htm
<BR> As your needs will vary I suggest to simply experiment
and see by yourself.
<P>I understand that this is not an universal solution, but some may found
that trick practical and applicable to their needs.
<P>\Mario
<BR> </HTML>
</x-html>From ???@??? Tue Jul 27 23:45:16 1999
Return-Path: <majordom@xxxxxxxxxxxxxxxxxx>
Received: from listserv.equis.com (listserv.equis.com [204.246.137.2])
by purebytes.com (8.8.7/8.8.7) with ESMTP id WAA14177
for <neal@xxxxxxxxxxxxx>; Tue, 27 Jul 1999 22:56:55 -0700
Received: (from majordom@xxxxxxxxx)
by listserv.equis.com (8.8.7/8.8.7) id NAA28366
for metastock-outgoing; Wed, 28 Jul 1999 13:49:47 -0600
X-Authentication-Warning: listserv.equis.com: majordom set sender to owner-metastock@xxxxxxxxxxxxx using -f
Received: from freeze.metastock.com (freeze.metastock.com [204.246.137.5])
by listserv.equis.com (8.8.7/8.8.7) with ESMTP id NAA28363
for <metastock@xxxxxxxxxxxxxxxxxx>; Wed, 28 Jul 1999 13:49:44 -0600
Received: from mail4.cadvision.com (mail4.cadvision.com [207.228.64.49])
by freeze.metastock.com (8.8.5/8.8.5) with ESMTP id XAA13014
for <metastock@xxxxxxxxxxxxx>; Tue, 27 Jul 1999 23:37:33 -0600 (MDT)
Received: from awong (h-207-148-147-17.dial.cadvision.com [207.148.147.17])
by mail4.cadvision.com (8.9.1a/8.9.1/CW) with SMTP id XAA32054
for <metastock@xxxxxxxxxxxxx>; Tue, 27 Jul 1999 23:24:32 -0600
Message-ID: <001a01bed8b9$0e6e1f80$119394cf@xxxxxxxxxxxxxxx>
From: "AWong" <awong@xxxxxxxxxxxxx>
To: <metastock@xxxxxxxxxxxxx>
Subject: Re: intruders [Fw: Today's WinInfo: July 12]
Date: Tue, 27 Jul 1999 23:21:31 -0600
MIME-Version: 1.0
Content-Type: multipart/alternative;
boundary="----=_NextPart_000_0017_01BED886.C2C72180"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 4.72.3110.1
X-MimeOLE: Produced By Microsoft MimeOLE V4.72.3110.3
Sender: owner-metastock@xxxxxxxxxxxxx
Precedence: bulk
Reply-To: metastock@xxxxxxxxxxxxx
Status:
<x-html><!DOCTYPE HTML PUBLIC "-//W3C//DTD W3 HTML//EN">
<HTML>
<HEAD>
<META content=text/html;charset=iso-8859-1 http-equiv=Content-Type><!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<META content='"MSHTML 4.72.3110.7"' name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT color=#000000 size=2>Guy,</FONT></DIV>
<DIV><FONT color=#000000 size=2></FONT> </DIV>
<DIV><FONT size=2>How do I password protect my hard drives ? Is it a
Windows feature or is it achieved via special software ?</FONT></DIV>
<DIV><FONT size=2></FONT> </DIV>
<DIV><FONT size=2>Thanks.</FONT></DIV>
<DIV><FONT size=2></FONT> </DIV>
<DIV><FONT size=2>Augie</FONT></DIV>
<BLOCKQUOTE
style="BORDER-LEFT: #000000 solid 2px; MARGIN-LEFT: 5px; PADDING-LEFT: 5px">
<DIV><FONT face=Arial size=2><B>-----Original Message-----</B><BR><B>From:
</B>Guy Tann <<A
href="mailto:grt@xxxxxxxxxxxx">grt@xxxxxxxxxxxx</A>><BR><B>To: </B><A
href="mailto:metastock@xxxxxxxxxxxxx">metastock@xxxxxxxxxxxxx</A> <<A
href="mailto:metastock@xxxxxxxxxxxxx">metastock@xxxxxxxxxxxxx</A>><BR><B>Date:
</B>Tuesday, July 27, 1999 11:13 PM<BR><B>Subject: </B>RE: intruders [Fw:
Today's WinInfo: July 12]<BR><BR></DIV></FONT>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999>Ton</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999></SPAN></FONT> </DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN class=780561304-28071999>I
have password protected all of my drives with passwords for read-only as
well as read-write access. I'm still finding 'visitors' in my network
neighborhood. I assume they can't get at anything. When I
installed the passwords, I disconnected my PC from the network (and the
Internet) and installed all of the passwords, etc. Then hooked
everything back up.</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999></SPAN></FONT> </DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN class=780561304-28071999>I
tried to locate poledit.exe and that program isn't anywhere to be found in
my Win95 directory.</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999></SPAN></FONT> </DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999>Regards</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999></SPAN></FONT> </DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999>Guy</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999></SPAN></FONT> </DIV>
<DIV class=OutlookMessageHeader><FONT face="Times New Roman"
size=2>-----Original Message-----<BR><B>From:</B>
owner-metastock@xxxxxxxxxxxxx [mailto:owner-metastock@xxxxxxxxxxxxx]<B>On
Behalf Of</B> A.J. Maas<BR><B>Sent:</B> Tuesday, July 13, 1999 4:12
PM<BR><B>To:</B> Metastock-List<BR><B>Subject:</B> Re: intruders [Fw:
Today's WinInfo: July 12]<BR><BR></FONT></DIV>
<DIV><FONT size=2>To clear some myths..........................</FONT></DIV>
<DIV><FONT size=2></FONT> </DIV>
<DIV><FONT size=2>For as long as you do not "Share" any files,
disks, printers, folders or even Net-adapters, you are save
from</FONT></DIV>
<DIV><FONT size=2>anyone entering </FONT><FONT size=2>your PC.</FONT></DIV>
<DIV><FONT size=2>
<DIV><FONT size=2>If you haven't done any of the file, folder, disk,
printer and netadapter </FONT><FONT size=2>sharing (also in the Control
Panel's Nethood/</FONT></DIV>
<DIV><FONT size=2>Networking and the Win95/98 Context Menu's options for
"Sharing", then no-one can intrude onto your PC</FONT></DIV>
<DIV><FONT size=2>with you in command (and as otherwise is described in the
article below).</FONT></DIV></FONT></DIV>
<DIV><FONT size=2>This "Sharing", apart from the Control Panel's
Nethood and the Win95/98 Context Menu's options,</FONT></DIV>
<DIV><FONT size=2>are privaleges you can also set for any of the
"Users" of your PC's Windows sessions. </FONT><FONT
size=2>The program to do so</FONT></DIV>
<DIV><FONT size=2>is "C:\Windows\Poledit.exe".</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>The above is for Win95/98 only, for as WIN-NT4/2000
requires a top secret "NTconfig.pol" file stored on server
for</FONT></DIV>
<DIV><FONT size=2>setting the "Sharing of the Network's NetHood,
Server and WKS's </FONT><FONT size=2>files, folders, printers and
disks".</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>Regards,<BR>Ton Maas<BR><A
href="mailto:ms-irb@xxxxxxxxxxxxx">ms-irb@xxxxxxxxxxxxx</A><BR>Dismiss the
".nospam" bit (including the dot) when
replying.<BR><BR><BR></FONT><FONT
size=3>___________________________________________________________________________<BR><BR>WinInfo:
Windows news and information -- Copyright (c) 1995-9 Paul Thurrott<BR>Visit
WinInfo on the Web at WUGNET: <A
href="http://www.wugnet.com/wininfo">http://www.wugnet.com/wininfo</A><BR>___________________________________________________________________________<BR><BR>Today's
WinInfo:<BR> Microsoft challenges BackOrifice myths<BR>
Microsoft bringing USB hardware to the Macintosh<BR><BR><BR>Microsoft
challenges BackOrifice myths<BR><BR>With the release this week of Windows NT
hacking tool "BackOrifice 2000,"<BR>Microsoft has launched an
informational campaign of its own, designed to<BR>derail myths about the
malicious program. According to a report on<BR>Microsoft's Security Advisor
Web site, BackOrifice 2000 is a remote control<BR>application that must be
stealthily installed so that attackers can take<BR>over a Windows NT-based
network. The program enables remote hackers to do<BR>anything they could do
were they to be logged onto the machine locally: Run<BR>programs, delete
files, and the like.<BR><BR>"BackOrifice 2000 is a remote-access tool
that was developed with the intent<BR>of harming users," says Jason
Garms, the lead product manager for Windows NT<BR>security at Microsoft.
"It is a tool that has no legitimate purpose other<BR>than exposing
users' machines to people on the Internet. Users who are<BR>tricked into
getting this thing installed on their system are vulnerable to<BR>the
attacker, who can then do anything that the victim can do--move
the<BR>mouse, open files, run programs, etc.--which is little different from
what<BR>legitimate remote-control software can do. Back Orifice, however,
is<BR>designed to be stealthy and evade detection by the
user."<BR><BR>For BackOrifice to find its way onto your system the
hacker must have<BR>physical access to the machine with a valid login or you
must be tricked<BR>into installing it; typically this is accomplished by
sending users the<BR>program as an email attachment that must be executed.
To prevent this<BR>program from taking over your system, just use common
sense: Always run an<BR>anti-virus program with up-to-date virus definitions
and don't let anyone<BR>gain unauthorized physical access to your machine.
Perhaps most importantly,<BR>don't execute email attachments from unknown
people.<BR><BR>One of the biggest myths perpetrated by the makers of
BackOrifice is that<BR>program takes advantage of security inadequacies that
are inherent in<BR>Windows and Windows NT. This is simply not true:
BackOrifice could have been<BR>written to attack *any* kind of computer
system. The hackers that wrote it<BR>simply decided to attack Windows, which
is the most popular computing<BR>platform by far. In fact, as Microsoft
notes, BackOrifice doesn't actually<BR>target Windows per se at all: It
targets users, who often don't understand<BR>security issues well enough to
not execute email attachments from unknown<BR>sources.<BR><BR>Another common
myth centers on the goal for BackOrifice: In an attempt to<BR>protect
themselves from legal problems, the creators of BackOrifice
are<BR>pretending that it is a legitimate remote control application.
However, this<BR>is not the case: BackOrifice is designed to escape
detection and exceeds the<BR>needs of remote control software. And it
doesn't prompt the user when it<BR>installs on the system.<BR><BR>"The
creators [of BackOrifice] claim that this is a useful
administration<BR>tool, but it doesn't even prompt people when it installs
itself on the<BR>system. It doesn't warn them that it's getting installed.
And, once it's<BR>installed, it makes the system available to other people
on the Internet.<BR>That is a malicious act," says Garms. "I am
personally unaware of any major<BR>customers of ours who consider this to be
a remote administration tool as<BR>the folks who created it claim. Quite the
contrary, they consider it a piece<BR>of malicious code. Unfortunately,
there are some users who were duped by the<BR>press releases from the
organization that released the software, and did<BR>install it on their
systems."<BR><BR>For more information about Microsoft's response to
BackOrifice 2000, please<BR>visit the Microsoft Security Advisor Web
site:<BR> <A
href="http://www.microsoft.com/security/bulletins/bo2k.asp">http://www.microsoft.com/security/bulletins/bo2k.asp</A><BR><BR><BR><BR><BR>Microsoft
bringing USB hardware to the Macintosh<BR><BR>Microsoft Corporation will
announce the availability of its first USB<BR>hardware for the Macintosh,
the IntelliMouse Explorer, a "no ball" mouse<BR>that the company
will release this fall for Windows as well. According to<BR>rumors,
Microsoft will also be porting other USB hardware to the
Macintosh,<BR>including possibly all of the company's joystick/entertainment
hardware,<BR>such as the FreeStyle Pro GamePad and the Sidewinder Precision
Pro joystick.<BR><BR>Expect an official announcement from Microsoft at
MacWorld New York
next<BR>week.<BR><BR>___________________________________________________________________________<BR><BR>Visit
WinInfo on the Web at WUGNET: <A
href="http://www.wugnet.com/wininfo">http://www.wugnet.com/wininfo</A><BR><BR>To
unsubscribe from the WinInfo list, simply send an E-mail message to<BR><A
href="mailto:listserv@xxxxxxxxxxxxxxxxxxxx">listserv@xxxxxxxxxxxxxxxxxxxx</A>
with the phrase "unsubscribe wininfo" (no<BR>quotes) in the body.
If you are having problems unsubscribing or any other<BR>problems with the
list, please write Keith Furman at <A
href="mailto:listadmin@xxxxxxxxxx">listadmin@xxxxxxxxxx</A>.<BR>___________________________________________________________________________<BR></DIV></FONT></BLOCKQUOTE></BODY></HTML>
</x-html>From ???@??? Tue Jul 27 23:45:25 1999
Return-Path: <majordom@xxxxxxxxxxxxxxxxxx>
Received: from listserv.equis.com (listserv.equis.com [204.246.137.2])
by purebytes.com (8.8.7/8.8.7) with ESMTP id XAA14286
for <neal@xxxxxxxxxxxxx>; Tue, 27 Jul 1999 23:10:49 -0700
Received: (from majordom@xxxxxxxxx)
by listserv.equis.com (8.8.7/8.8.7) id NAA28449
for metastock-outgoing; Wed, 28 Jul 1999 13:55:14 -0600
X-Authentication-Warning: listserv.equis.com: majordom set sender to owner-metastock@xxxxxxxxxxxxx using -f
Received: from freeze.metastock.com (freeze.metastock.com [204.246.137.5])
by listserv.equis.com (8.8.7/8.8.7) with ESMTP id NAA28446
for <metastock@xxxxxxxxxxxxxxxxxx>; Wed, 28 Jul 1999 13:55:12 -0600
Received: from smtp4.mindspring.com (smtp4.mindspring.com [207.69.200.64])
by freeze.metastock.com (8.8.5/8.8.5) with ESMTP id XAA13027
for <metastock@xxxxxxxxxxxxx>; Tue, 27 Jul 1999 23:43:01 -0600 (MDT)
Received: from RSI5 (user-38lcav8.dialup.mindspring.com [209.86.43.232])
by smtp4.mindspring.com (8.8.5/8.8.5) with SMTP id BAA00339
for <metastock@xxxxxxxxxxxxx>; Wed, 28 Jul 1999 01:29:58 -0400 (EDT)
Message-ID: <002501bed8ba$177060b0$020101c0@xxxx>
From: "Kent Rollins" <kentr@xxxxxxxxxxxxxx>
To: <metastock@xxxxxxxxxxxxx>
Subject: Re: intruders [Fw: Today's WinInfo: July 12]
Date: Wed, 28 Jul 1999 01:28:56 -0400
MIME-Version: 1.0
Content-Type: multipart/alternative;
boundary="----=_NextPart_000_0022_01BED898.8F85ECE0"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 4.72.2106.4
X-MimeOLE: Produced By Microsoft MimeOLE V4.72.2106.4
Sender: owner-metastock@xxxxxxxxxxxxx
Precedence: bulk
Reply-To: metastock@xxxxxxxxxxxxx
Status:
<x-html><!DOCTYPE HTML PUBLIC "-//W3C//DTD W3 HTML//EN">
<HTML>
<HEAD>
<META content=text/html;charset=iso-8859-1 http-equiv=Content-Type><!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<META content='"MSHTML 4.72.2106.6"' name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT color=#000000 size=2>Guy</FONT></DIV>
<DIV><FONT color=#000000 size=2></FONT> </DIV>
<DIV><FONT size=2>You should also make sure you have changed the password for
your Adminstrator and Guest accounts on any NT systems you have. This is
one thing that many people forget to do. This can be done from the User
Manager.</FONT></DIV>
<DIV><FONT size=2></FONT> </DIV>
<DIV><FONT size=2>Kent</FONT></DIV>
<BLOCKQUOTE
style="BORDER-LEFT: #000000 solid 2px; MARGIN-LEFT: 5px; PADDING-LEFT: 5px">
<DIV><FONT face=Arial size=2><B>-----Original Message-----</B><BR><B>From:
</B>Guy Tann <<A
href="mailto:grt@xxxxxxxxxxxx">grt@xxxxxxxxxxxx</A>><BR><B>To: </B><A
href="mailto:metastock@xxxxxxxxxxxxx">metastock@xxxxxxxxxxxxx</A> <<A
href="mailto:metastock@xxxxxxxxxxxxx">metastock@xxxxxxxxxxxxx</A>><BR><B>Date:
</B>Wednesday, July 28, 1999 2:41 PM<BR><B>Subject: </B>RE: intruders [Fw:
Today's WinInfo: July 12]<BR><BR></DIV></FONT>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999>Ton</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999></SPAN></FONT> </DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN class=780561304-28071999>I
have password protected all of my drives with passwords for read-only as
well as read-write access. I'm still finding 'visitors' in my network
neighborhood. I assume they can't get at anything. When I
installed the passwords, I disconnected my PC from the network (and the
Internet) and installed all of the passwords, etc. Then hooked
everything back up.</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999></SPAN></FONT> </DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN class=780561304-28071999>I
tried to locate poledit.exe and that program isn't anywhere to be found in
my Win95 directory.</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999></SPAN></FONT> </DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999>Regards</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999></SPAN></FONT> </DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999>Guy</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999></SPAN></FONT> </DIV>
<DIV class=OutlookMessageHeader><FONT face="Times New Roman"
size=2>-----Original Message-----<BR><B>From:</B>
owner-metastock@xxxxxxxxxxxxx [mailto:owner-metastock@xxxxxxxxxxxxx]<B>On
Behalf Of</B> A.J. Maas<BR><B>Sent:</B> Tuesday, July 13, 1999 4:12
PM<BR><B>To:</B> Metastock-List<BR><B>Subject:</B> Re: intruders [Fw:
Today's WinInfo: July 12]<BR><BR></FONT></DIV>
<DIV><FONT size=2>To clear some myths..........................</FONT></DIV>
<DIV><FONT size=2></FONT> </DIV>
<DIV><FONT size=2>For as long as you do not "Share" any files,
disks, printers, folders or even Net-adapters, you are save
from</FONT></DIV>
<DIV><FONT size=2>anyone entering </FONT><FONT size=2>your PC.</FONT></DIV>
<DIV><FONT size=2>
<DIV><FONT size=2>If you haven't done any of the file, folder, disk,
printer and netadapter </FONT><FONT size=2>sharing (also in the Control
Panel's Nethood/</FONT></DIV>
<DIV><FONT size=2>Networking and the Win95/98 Context Menu's options for
"Sharing", then no-one can intrude onto your PC</FONT></DIV>
<DIV><FONT size=2>with you in command (and as otherwise is described in the
article below).</FONT></DIV></FONT></DIV>
<DIV><FONT size=2>This "Sharing", apart from the Control Panel's
Nethood and the Win95/98 Context Menu's options,</FONT></DIV>
<DIV><FONT size=2>are privaleges you can also set for any of the
"Users" of your PC's Windows sessions. </FONT><FONT
size=2>The program to do so</FONT></DIV>
<DIV><FONT size=2>is "C:\Windows\Poledit.exe".</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>The above is for Win95/98 only, for as WIN-NT4/2000
requires a top secret "NTconfig.pol" file stored on server
for</FONT></DIV>
<DIV><FONT size=2>setting the "Sharing of the Network's NetHood,
Server and WKS's </FONT><FONT size=2>files, folders, printers and
disks".</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>Regards,<BR>Ton Maas<BR><A
href="mailto:ms-irb@xxxxxxxxxxxxx">ms-irb@xxxxxxxxxxxxx</A><BR>Dismiss the
".nospam" bit (including the dot) when
replying.<BR><BR><BR></FONT><FONT
size=3>___________________________________________________________________________<BR><BR>WinInfo:
Windows news and information -- Copyright (c) 1995-9 Paul Thurrott<BR>Visit
WinInfo on the Web at WUGNET: <A
href="http://www.wugnet.com/wininfo">http://www.wugnet.com/wininfo</A><BR>___________________________________________________________________________<BR><BR>Today's
WinInfo:<BR> Microsoft challenges BackOrifice myths<BR>
Microsoft bringing USB hardware to the Macintosh<BR><BR><BR>Microsoft
challenges BackOrifice myths<BR><BR>With the release this week of Windows NT
hacking tool "BackOrifice 2000,"<BR>Microsoft has launched an
informational campaign of its own, designed to<BR>derail myths about the
malicious program. According to a report on<BR>Microsoft's Security Advisor
Web site, BackOrifice 2000 is a remote control<BR>application that must be
stealthily installed so that attackers can take<BR>over a Windows NT-based
network. The program enables remote hackers to do<BR>anything they could do
were they to be logged onto the machine locally: Run<BR>programs, delete
files, and the like.<BR><BR>"BackOrifice 2000 is a remote-access tool
that was developed with the intent<BR>of harming users," says Jason
Garms, the lead product manager for Windows NT<BR>security at Microsoft.
"It is a tool that has no legitimate purpose other<BR>than exposing
users' machines to people on the Internet. Users who are<BR>tricked into
getting this thing installed on their system are vulnerable to<BR>the
attacker, who can then do anything that the victim can do--move
the<BR>mouse, open files, run programs, etc.--which is little different from
what<BR>legitimate remote-control software can do. Back Orifice, however,
is<BR>designed to be stealthy and evade detection by the
user."<BR><BR>For BackOrifice to find its way onto your system the
hacker must have<BR>physical access to the machine with a valid login or you
must be tricked<BR>into installing it; typically this is accomplished by
sending users the<BR>program as an email attachment that must be executed.
To prevent this<BR>program from taking over your system, just use common
sense: Always run an<BR>anti-virus program with up-to-date virus definitions
and don't let anyone<BR>gain unauthorized physical access to your machine.
Perhaps most importantly,<BR>don't execute email attachments from unknown
people.<BR><BR>One of the biggest myths perpetrated by the makers of
BackOrifice is that<BR>program takes advantage of security inadequacies that
are inherent in<BR>Windows and Windows NT. This is simply not true:
BackOrifice could have been<BR>written to attack *any* kind of computer
system. The hackers that wrote it<BR>simply decided to attack Windows, which
is the most popular computing<BR>platform by far. In fact, as Microsoft
notes, BackOrifice doesn't actually<BR>target Windows per se at all: It
targets users, who often don't understand<BR>security issues well enough to
not execute email attachments from unknown<BR>sources.<BR><BR>Another common
myth centers on the goal for BackOrifice: In an attempt to<BR>protect
themselves from legal problems, the creators of BackOrifice
are<BR>pretending that it is a legitimate remote control application.
However, this<BR>is not the case: BackOrifice is designed to escape
detection and exceeds the<BR>needs of remote control software. And it
doesn't prompt the user when it<BR>installs on the system.<BR><BR>"The
creators [of BackOrifice] claim that this is a useful
administration<BR>tool, but it doesn't even prompt people when it installs
itself on the<BR>system. It doesn't warn them that it's getting installed.
And, once it's<BR>installed, it makes the system available to other people
on the Internet.<BR>That is a malicious act," says Garms. "I am
personally unaware of any major<BR>customers of ours who consider this to be
a remote administration tool as<BR>the folks who created it claim. Quite the
contrary, they consider it a piece<BR>of malicious code. Unfortunately,
there are some users who were duped by the<BR>press releases from the
organization that released the software, and did<BR>install it on their
systems."<BR><BR>For more information about Microsoft's response to
BackOrifice 2000, please<BR>visit the Microsoft Security Advisor Web
site:<BR> <A
href="http://www.microsoft.com/security/bulletins/bo2k.asp">http://www.microsoft.com/security/bulletins/bo2k.asp</A><BR><BR><BR><BR><BR>Microsoft
bringing USB hardware to the Macintosh<BR><BR>Microsoft Corporation will
announce the availability of its first USB<BR>hardware for the Macintosh,
the IntelliMouse Explorer, a "no ball" mouse<BR>that the company
will release this fall for Windows as well. According to<BR>rumors,
Microsoft will also be porting other USB hardware to the
Macintosh,<BR>including possibly all of the company's joystick/entertainment
hardware,<BR>such as the FreeStyle Pro GamePad and the Sidewinder Precision
Pro joystick.<BR><BR>Expect an official announcement from Microsoft at
MacWorld New York
next<BR>week.<BR><BR>___________________________________________________________________________<BR><BR>Visit
WinInfo on the Web at WUGNET: <A
href="http://www.wugnet.com/wininfo">http://www.wugnet.com/wininfo</A><BR><BR>To
unsubscribe from the WinInfo list, simply send an E-mail message to<BR><A
href="mailto:listserv@xxxxxxxxxxxxxxxxxxxx">listserv@xxxxxxxxxxxxxxxxxxxx</A>
with the phrase "unsubscribe wininfo" (no<BR>quotes) in the body.
If you are having problems unsubscribing or any other<BR>problems with the
list, please write Keith Furman at <A
href="mailto:listadmin@xxxxxxxxxx">listadmin@xxxxxxxxxx</A>.<BR>___________________________________________________________________________<BR></DIV></FONT></BLOCKQUOTE></BODY></HTML>
</x-html>From ???@??? Wed Jul 28 00:46:20 1999
Return-Path: <majordom@xxxxxxxxxxxxxxxxxx>
Received: from listserv.equis.com (listserv.equis.com [204.246.137.2])
by purebytes.com (8.8.7/8.8.7) with ESMTP id AAA14867
for <neal@xxxxxxxxxxxxx>; Wed, 28 Jul 1999 00:34:31 -0700
Received: (from majordom@xxxxxxxxx)
by listserv.equis.com (8.8.7/8.8.7) id PAA29559
for metastock-outgoing; Wed, 28 Jul 1999 15:08:43 -0600
X-Authentication-Warning: listserv.equis.com: majordom set sender to owner-metastock@xxxxxxxxxxxxx using -f
Received: from freeze.metastock.com (freeze.metastock.com [204.246.137.5])
by listserv.equis.com (8.8.7/8.8.7) with ESMTP id PAA29556
for <metastock@xxxxxxxxxxxxxxxxxx>; Wed, 28 Jul 1999 15:08:40 -0600
Received: from dec.ciemat.es (dec.ciemat.es [130.206.11.6])
by freeze.metastock.com (8.8.5/8.8.5) with ESMTP id AAA13112
for <metastock@xxxxxxxxxxxxx>; Wed, 28 Jul 1999 00:56:29 -0600 (MDT)
Received: from ciemat.es (mat2.ciemat.es [130.206.40.52])
by dec.ciemat.es (PMDF V5.2-31 #38885)
with ESMTP id <01JE3BDUW3KM0009L3@xxxxxxxxxxxxx> for metastock@xxxxxxxxxxxxx;
Wed, 28 Jul 1999 08:42:40 GMT
Date: Wed, 28 Jul 1999 08:47:12 +0200
From: Angel Ibarra <ibarra@xxxxxxxxx>
Subject: Re: Optimal f and system optimization
To: metastock@xxxxxxxxxxxxx
Message-id: <379EA6DB.576CC0A5@xxxxxxxxx>
MIME-version: 1.0
X-Mailer: Mozilla 4.5 (Macintosh; I; PPC)
Content-type: text/plain; x-mac-creator=4D4F5353; x-mac-type=54455854;
charset=us-ascii
Content-transfer-encoding: 7BIT
X-Accept-Language: en
References: <37919bc4.8775155@xxxxxxxxxxx>
<009b01bed20d$c9f902e0$5f1c4118@xxxxxxxxxxxxxxxxxxxxxx>
<37a0ae2d.2004349@xxxxxxxxxxx>
<010b01bed861$f7c40a80$5f1c4118@xxxxxxxxxxxxxxxxxxxxxx>
Sender: owner-metastock@xxxxxxxxxxxxx
Precedence: bulk
Reply-To: metastock@xxxxxxxxxxxxx
Status:
How do you test the system optimization? Did you apply the results to "future"
data? Do you check how the parameters of the optimizacion evolve with time? I
have made something in this line (just one system -cross of the price with a
mean-) and I was very surprised with the results...
To make this type of complex optimizations, I think the only way is to write
our own program. I have made my calculations with a program writen in fortran
(coupled with excel)
Regards
Angel Ibarra
Glen Wallace wrote:
> > My conclusion: f is *not* an independent parameter that can be
> > optimized separately. So f should be included into the list of
> > parameters for system optimization to take care of the inherent
> > dependencies.
>
> I agree, Rudolph. In fact, I suspect that by including money management
> parameters (like optimal f) in system design and testing, one will find that
> many mediocre systems we have long since dismissed because of poor win/loss
> ratios (or whatever other inadequate yardsticks we currently use to measure
> a system), would actually be ideal candidates for trading.
>
> Including money management in system testing is certainly beyond MetaStock's
> capabilities and beyond my present skills. Do you have any suggestions?
|