[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: intruders [Fw: Today's WinInfo: July 12]



PureBytes Links

Trading Reference Links

<x-html><!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META content="text/html; charset=iso-8859-1" http-equiv=Content-Type>
<META content="MSHTML 5.00.2314.1000" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=780561304-28071999>Ton</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=780561304-28071999></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN class=780561304-28071999>I have 
password protected all of my drives with passwords for read-only as well as 
read-write access.&nbsp; I'm still finding 'visitors' in my network 
neighborhood.&nbsp; I assume they can't get at anything.&nbsp; When I installed 
the passwords, I disconnected my PC from the network (and the Internet) and 
installed all of the passwords, etc.&nbsp; Then hooked everything back 
up.</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=780561304-28071999></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN class=780561304-28071999>I 
tried to locate poledit.exe and that program isn't anywhere to be found in my 
Win95 directory.</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=780561304-28071999></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=780561304-28071999>Regards</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=780561304-28071999></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=780561304-28071999>Guy</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=780561304-28071999></SPAN></FONT>&nbsp;</DIV>
<DIV class=OutlookMessageHeader><FONT face="Times New Roman" 
size=2>-----Original Message-----<BR><B>From:</B> owner-metastock@xxxxxxxxxxxxx 
[mailto:owner-metastock@xxxxxxxxxxxxx]<B>On Behalf Of</B> A.J. 
Maas<BR><B>Sent:</B> Tuesday, July 13, 1999 4:12 PM<BR><B>To:</B> 
Metastock-List<BR><B>Subject:</B> Re: intruders [Fw: Today's WinInfo: July 
12]<BR><BR></FONT></DIV>
<DIV><FONT size=2>To clear some myths..........................</FONT></DIV>
<DIV><FONT size=2></FONT>&nbsp;</DIV>
<DIV><FONT size=2>For as long as you do not "Share" any files, disks, 
printers,&nbsp;folders or even Net-adapters, you are save from</FONT></DIV>
<DIV><FONT size=2>anyone entering </FONT><FONT size=2>your PC.</FONT></DIV>
<DIV><FONT size=2>
<DIV><FONT size=2>If you haven't done any of the&nbsp;file, folder, disk, 
printer and netadapter </FONT><FONT size=2>sharing (also in the Control Panel's 
Nethood/</FONT></DIV>
<DIV><FONT size=2>Networking and the Win95/98 Context Menu's options for 
"Sharing", then no-one can intrude onto your PC</FONT></DIV>
<DIV><FONT size=2>with you in command (and as otherwise is described in the 
article below).</FONT></DIV></FONT></DIV>
<DIV><FONT size=2>This "Sharing", apart from the Control Panel's Nethood and the 
Win95/98 Context Menu's options,</FONT></DIV>
<DIV><FONT size=2>are privaleges you can also set for any of the "Users" 
of&nbsp;your PC's Windows sessions. </FONT><FONT size=2>The program&nbsp;to do 
so</FONT></DIV>
<DIV><FONT size=2>is "C:\Windows\Poledit.exe".</FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT size=2>The above is for Win95/98 only, for as WIN-NT4/2000 requires a 
top secret "NTconfig.pol" file stored on server for</FONT></DIV>
<DIV><FONT size=2>setting the&nbsp;"Sharing of the Network's NetHood, Server 
and&nbsp;WKS's </FONT><FONT size=2>files, folders, printers and 
disks".</FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT size=2>Regards,<BR>Ton Maas<BR><A 
href="mailto:ms-irb@xxxxxxxxxxxxx";>ms-irb@xxxxxxxxxxxxx</A><BR>Dismiss the 
".nospam" bit (including the dot) when replying.<BR><BR><BR></FONT><FONT 
size=3>___________________________________________________________________________<BR><BR>WinInfo: 
Windows news and information -- Copyright (c) 1995-9 Paul Thurrott<BR>Visit 
WinInfo on the Web at WUGNET: <A 
href="http://www.wugnet.com/wininfo";>http://www.wugnet.com/wininfo</A><BR>___________________________________________________________________________<BR><BR>Today's 
WinInfo:<BR>&nbsp; Microsoft challenges BackOrifice myths<BR>&nbsp; Microsoft 
bringing USB hardware to the Macintosh<BR><BR><BR>Microsoft challenges 
BackOrifice myths<BR><BR>With the release this week of Windows NT hacking tool 
"BackOrifice 2000,"<BR>Microsoft has launched an informational campaign of its 
own, designed to<BR>derail myths about the malicious program. According to a 
report on<BR>Microsoft's Security Advisor Web site, BackOrifice 2000 is a remote 
control<BR>application that must be stealthily installed so that attackers can 
take<BR>over a Windows NT-based network. The program enables remote hackers to 
do<BR>anything they could do were they to be logged onto the machine locally: 
Run<BR>programs, delete files, and the like.<BR><BR>"BackOrifice 2000 is a 
remote-access tool that was developed with the intent<BR>of harming users," says 
Jason Garms, the lead product manager for Windows NT<BR>security at Microsoft. 
"It is a tool that has no legitimate purpose other<BR>than exposing users' 
machines to people on the Internet. Users who are<BR>tricked into getting this 
thing installed on their system are vulnerable to<BR>the attacker, who can then 
do anything that the victim can do--move the<BR>mouse, open files, run programs, 
etc.--which is little different from what<BR>legitimate remote-control software 
can do. Back Orifice, however, is<BR>designed to be stealthy and evade detection 
by the user."<BR><BR>For BackOrifice to find its way onto your system the hacker 
must have<BR>physical access to the machine with a valid login or you must be 
tricked<BR>into installing it; typically this is accomplished by sending users 
the<BR>program as an email attachment that must be executed. To prevent 
this<BR>program from taking over your system, just use common sense: Always run 
an<BR>anti-virus program with up-to-date virus definitions and don't let 
anyone<BR>gain unauthorized physical access to your machine. Perhaps most 
importantly,<BR>don't execute email attachments from unknown people.<BR><BR>One 
of the biggest myths perpetrated by the makers of BackOrifice is that<BR>program 
takes advantage of security inadequacies that are inherent in<BR>Windows and 
Windows NT. This is simply not true: BackOrifice could have been<BR>written to 
attack *any* kind of computer system. The hackers that wrote it<BR>simply 
decided to attack Windows, which is the most popular computing<BR>platform by 
far. In fact, as Microsoft notes, BackOrifice doesn't actually<BR>target Windows 
per se at all: It targets users, who often don't understand<BR>security issues 
well enough to not execute email attachments from 
unknown<BR>sources.<BR><BR>Another common myth centers on the goal for 
BackOrifice: In an attempt to<BR>protect themselves from legal problems, the 
creators of BackOrifice are<BR>pretending that it is a legitimate remote control 
application. However, this<BR>is not the case: BackOrifice is designed to escape 
detection and exceeds the<BR>needs of remote control software. And it doesn't 
prompt the user when it<BR>installs on the system.<BR><BR>"The creators [of 
BackOrifice] claim that this is a useful administration<BR>tool, but it doesn't 
even prompt people when it installs itself on the<BR>system. It doesn't warn 
them that it's getting installed. And, once it's<BR>installed, it makes the 
system available to other people on the Internet.<BR>That is a malicious act," 
says Garms. "I am personally unaware of any major<BR>customers of ours who 
consider this to be a remote administration tool as<BR>the folks who created it 
claim. Quite the contrary, they consider it a piece<BR>of malicious code. 
Unfortunately, there are some users who were duped by the<BR>press releases from 
the organization that released the software, and did<BR>install it on their 
systems."<BR><BR>For more information about Microsoft's response to BackOrifice 
2000, please<BR>visit the Microsoft Security Advisor Web site:<BR>&nbsp; <A 
href="http://www.microsoft.com/security/bulletins/bo2k.asp";>http://www.microsoft.com/security/bulletins/bo2k.asp</A><BR><BR><BR><BR><BR>Microsoft 
bringing USB hardware to the Macintosh<BR><BR>Microsoft Corporation will 
announce the availability of its first USB<BR>hardware for the Macintosh, the 
IntelliMouse Explorer, a "no ball" mouse<BR>that the company will release this 
fall for Windows as well. According to<BR>rumors, Microsoft will also be porting 
other USB hardware to the Macintosh,<BR>including possibly all of the company's 
joystick/entertainment hardware,<BR>such as the FreeStyle Pro GamePad and the 
Sidewinder Precision Pro joystick.<BR><BR>Expect an official announcement from 
Microsoft at MacWorld New York 
next<BR>week.<BR><BR>___________________________________________________________________________<BR><BR>Visit 
WinInfo on the Web at WUGNET: <A 
href="http://www.wugnet.com/wininfo";>http://www.wugnet.com/wininfo</A><BR><BR>To 
unsubscribe from the WinInfo list, simply send an E-mail message to<BR><A 
href="mailto:listserv@xxxxxxxxxxxxxxxxxxxx";>listserv@xxxxxxxxxxxxxxxxxxxx</A> 
with the phrase "unsubscribe wininfo" (no<BR>quotes) in the body. If you are 
having problems unsubscribing or any other<BR>problems with the list, please 
write Keith Furman at <A 
href="mailto:listadmin@xxxxxxxxxx";>listadmin@xxxxxxxxxx</A>.<BR>___________________________________________________________________________<BR></DIV></FONT></BODY></HTML>
</x-html>From ???@??? Tue Jul 27 23:45:14 1999
Return-Path: <majordom@xxxxxxxxxxxxxxxxxx>
Received: from listserv.equis.com (listserv.equis.com [204.246.137.2])
	by purebytes.com (8.8.7/8.8.7) with ESMTP id WAA14155
	for <neal@xxxxxxxxxxxxx>; Tue, 27 Jul 1999 22:54:08 -0700
Received: (from majordom@xxxxxxxxx)
	by listserv.equis.com (8.8.7/8.8.7) id NAA28319
	for metastock-outgoing; Wed, 28 Jul 1999 13:43:30 -0600
X-Authentication-Warning: listserv.equis.com: majordom set sender to owner-metastock@xxxxxxxxxxxxx using -f
Received: from freeze.metastock.com (freeze.metastock.com [204.246.137.5])
	by listserv.equis.com (8.8.7/8.8.7) with ESMTP id NAA28315
	for <metastock@xxxxxxxxxxxxxxxxxx>; Wed, 28 Jul 1999 13:43:27 -0600
Received: from tellab5.tellabs.com (tellab5.tellabs.com [138.111.243.28])
	by freeze.metastock.com (8.8.5/8.8.5) with SMTP id XAA13006
	for <metastock@xxxxxxxxxxxxx>; Tue, 27 Jul 1999 23:31:18 -0600 (MDT)
Received: from sunx317.tellabs.com by tellab5.tellabs.com with smtp
	(Smail3.1.29.1 #4) id m119M68-0005qDC; Wed, 28 Jul 99 00:17 CDT
Received: from tellabs.com by sunx317.tellabs.com (8.8.8+Sun/1.9)
	id AAA13101; Wed, 28 Jul 1999 00:17:48 -0500 (CDT)
Message-ID: <379E927C.982B4E6@xxxxxxxxxxx>
Date: Wed, 28 Jul 1999 00:17:48 -0500
From: Mario Fortier <mfortier@xxxxxxxxxxx>
Organization: Tellabs
X-Mailer: Mozilla 4.04 [en] (X11; I; SunOS 5.6 sun4u)
MIME-Version: 1.0
To: metastock@xxxxxxxxxxxxx
Subject: Re: Avoid problem new PC
References: <LMBBKJCLKIJIBBJLAEIJMECKCHAA.nkormanik@xxxxxxxxxx> <379DC4FA.858C5574@xxxxxxxxxx>
Content-Type: multipart/alternative; boundary="------------CB90D414A21CB0FD60F67949"
Sender: owner-metastock@xxxxxxxxxxxxx
Precedence: bulk
Reply-To: metastock@xxxxxxxxxxxxx
Status:   

<x-html><HTML>
Daniel Martinez wrote:&lt;&lt;text removed>>
<BLOCKQUOTE TYPE=CITE>3.&nbsp; <B><FONT COLOR="#CC0000">If you want to
do the absolute fastest stock database searches you possibly can</FONT></B>,
then there is only 1 hard drive solution for you:&nbsp; SCSI/UW2.&nbsp;
Buy a motherboard with it built in.&nbsp; The P6SBU
at $320 would be a good choice.&nbsp; For a SCSI/UW2 hard drive, expect
to pay at least $340 USD for an IBM
9.1GB U2W at <A HREF="http://www.storage.ibm.com/hardsoft/diskdrdl/prod/9esprod.htm";>7200
RPM</A> and $600 for <A HREF="http://www.direct.ibm.com/cgi-bin/ncommerce/CategoryDisplay?cgrfnbr=2000202&cgmenbr=1&cntry=840&lang=en_US";>10K
RPM</A>.&nbsp; If you cannot afford the premium, buy the new $330 <A HREF="http://www.wdc.com/products/drives/18000rtl.htm";>Western
Digital 18GB UATA/66 at 66MB/sec and 7200 RPM</A> and a 66MB capable motherboard.&nbsp;
COMPUSA had this HD on sale for $270 with some other free hardware.&nbsp;
The best BX chipset based motherboard is the <A HREF="http://www.abit.com.tw/html/bx6r2.htm";>ABIT
BX6 2.0</A>.&nbsp; It should also be 66MB/sec HDD capable.
<BR>&nbsp;
<BR>&nbsp;</BLOCKQUOTE>
That's a very well documented e-mail Daniel :->

<P>Now, when it comes to the fastest database searches someone may consider
to copy the database in a Virtual RAM Disk...
<BR>A couple of things to keep in mind:

<P>- You have to consider that it takes a while to initially copy the full
database to the RAM disk, but assuming you are making more than one consecutive
search, it is worth the initial setup time.

<P>- Of course, you need plenty of memory or a small database....

<P>- If your database is too large for your physical memory, you may consider
an interesting alternative: VRamDir.
<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
http://www.users.uswest.net/~jzhong/vramdir.htm
<BR>&nbsp;&nbsp;&nbsp; As your needs will vary I suggest to simply experiment
and see by yourself.

<P>I understand that this is not an universal solution, but some may found
that trick practical and applicable to their needs.

<P>\Mario
<BR>&nbsp;</HTML>
</x-html>From ???@??? Tue Jul 27 23:45:16 1999
Return-Path: <majordom@xxxxxxxxxxxxxxxxxx>
Received: from listserv.equis.com (listserv.equis.com [204.246.137.2])
	by purebytes.com (8.8.7/8.8.7) with ESMTP id WAA14177
	for <neal@xxxxxxxxxxxxx>; Tue, 27 Jul 1999 22:56:55 -0700
Received: (from majordom@xxxxxxxxx)
	by listserv.equis.com (8.8.7/8.8.7) id NAA28366
	for metastock-outgoing; Wed, 28 Jul 1999 13:49:47 -0600
X-Authentication-Warning: listserv.equis.com: majordom set sender to owner-metastock@xxxxxxxxxxxxx using -f
Received: from freeze.metastock.com (freeze.metastock.com [204.246.137.5])
	by listserv.equis.com (8.8.7/8.8.7) with ESMTP id NAA28363
	for <metastock@xxxxxxxxxxxxxxxxxx>; Wed, 28 Jul 1999 13:49:44 -0600
Received: from mail4.cadvision.com (mail4.cadvision.com [207.228.64.49])
	by freeze.metastock.com (8.8.5/8.8.5) with ESMTP id XAA13014
	for <metastock@xxxxxxxxxxxxx>; Tue, 27 Jul 1999 23:37:33 -0600 (MDT)
Received: from awong (h-207-148-147-17.dial.cadvision.com [207.148.147.17])
	by mail4.cadvision.com (8.9.1a/8.9.1/CW) with SMTP id XAA32054
	for <metastock@xxxxxxxxxxxxx>; Tue, 27 Jul 1999 23:24:32 -0600
Message-ID: <001a01bed8b9$0e6e1f80$119394cf@xxxxxxxxxxxxxxx>
From: "AWong" <awong@xxxxxxxxxxxxx>
To: <metastock@xxxxxxxxxxxxx>
Subject: Re: intruders [Fw: Today's WinInfo: July 12]
Date: Tue, 27 Jul 1999 23:21:31 -0600
MIME-Version: 1.0
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_0017_01BED886.C2C72180"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 4.72.3110.1
X-MimeOLE: Produced By Microsoft MimeOLE V4.72.3110.3
Sender: owner-metastock@xxxxxxxxxxxxx
Precedence: bulk
Reply-To: metastock@xxxxxxxxxxxxx
Status:   

<x-html><!DOCTYPE HTML PUBLIC "-//W3C//DTD W3 HTML//EN">
<HTML>
<HEAD>

<META content=text/html;charset=iso-8859-1 http-equiv=Content-Type><!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<META content='"MSHTML 4.72.3110.7"' name=GENERATOR>
<STYLE></STYLE>

</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT color=#000000 size=2>Guy,</FONT></DIV>
<DIV><FONT color=#000000 size=2></FONT>&nbsp;</DIV>
<DIV><FONT size=2>How do I password protect my hard drives ?&nbsp; Is it a 
Windows feature or is it achieved via special software ?</FONT></DIV>
<DIV><FONT size=2></FONT>&nbsp;</DIV>
<DIV><FONT size=2>Thanks.</FONT></DIV>
<DIV><FONT size=2></FONT>&nbsp;</DIV>
<DIV><FONT size=2>Augie</FONT></DIV>
<BLOCKQUOTE 
style="BORDER-LEFT: #000000 solid 2px; MARGIN-LEFT: 5px; PADDING-LEFT: 5px">
    <DIV><FONT face=Arial size=2><B>-----Original Message-----</B><BR><B>From: 
    </B>Guy Tann &lt;<A 
    href="mailto:grt@xxxxxxxxxxxx";>grt@xxxxxxxxxxxx</A>&gt;<BR><B>To: </B><A 
    href="mailto:metastock@xxxxxxxxxxxxx";>metastock@xxxxxxxxxxxxx</A> &lt;<A 
    href="mailto:metastock@xxxxxxxxxxxxx";>metastock@xxxxxxxxxxxxx</A>&gt;<BR><B>Date: 
    </B>Tuesday, July 27, 1999 11:13 PM<BR><B>Subject: </B>RE: intruders [Fw: 
    Today's WinInfo: July 12]<BR><BR></DIV></FONT>
    <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
    class=780561304-28071999>Ton</SPAN></FONT></DIV>
    <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
    class=780561304-28071999></SPAN></FONT>&nbsp;</DIV>
    <DIV><FONT color=#0000ff face=Arial size=2><SPAN class=780561304-28071999>I 
    have password protected all of my drives with passwords for read-only as 
    well as read-write access.&nbsp; I'm still finding 'visitors' in my network 
    neighborhood.&nbsp; I assume they can't get at anything.&nbsp; When I 
    installed the passwords, I disconnected my PC from the network (and the 
    Internet) and installed all of the passwords, etc.&nbsp; Then hooked 
    everything back up.</SPAN></FONT></DIV>
    <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
    class=780561304-28071999></SPAN></FONT>&nbsp;</DIV>
    <DIV><FONT color=#0000ff face=Arial size=2><SPAN class=780561304-28071999>I 
    tried to locate poledit.exe and that program isn't anywhere to be found in 
    my Win95 directory.</SPAN></FONT></DIV>
    <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
    class=780561304-28071999></SPAN></FONT>&nbsp;</DIV>
    <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
    class=780561304-28071999>Regards</SPAN></FONT></DIV>
    <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
    class=780561304-28071999></SPAN></FONT>&nbsp;</DIV>
    <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
    class=780561304-28071999>Guy</SPAN></FONT></DIV>
    <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
    class=780561304-28071999></SPAN></FONT>&nbsp;</DIV>
    <DIV class=OutlookMessageHeader><FONT face="Times New Roman" 
    size=2>-----Original Message-----<BR><B>From:</B> 
    owner-metastock@xxxxxxxxxxxxx [mailto:owner-metastock@xxxxxxxxxxxxx]<B>On 
    Behalf Of</B> A.J. Maas<BR><B>Sent:</B> Tuesday, July 13, 1999 4:12 
    PM<BR><B>To:</B> Metastock-List<BR><B>Subject:</B> Re: intruders [Fw: 
    Today's WinInfo: July 12]<BR><BR></FONT></DIV>
    <DIV><FONT size=2>To clear some myths..........................</FONT></DIV>
    <DIV><FONT size=2></FONT>&nbsp;</DIV>
    <DIV><FONT size=2>For as long as you do not &quot;Share&quot; any files, 
    disks, printers,&nbsp;folders or even Net-adapters, you are save 
    from</FONT></DIV>
    <DIV><FONT size=2>anyone entering </FONT><FONT size=2>your PC.</FONT></DIV>
    <DIV><FONT size=2>
    <DIV><FONT size=2>If you haven't done any of the&nbsp;file, folder, disk, 
    printer and netadapter </FONT><FONT size=2>sharing (also in the Control 
    Panel's Nethood/</FONT></DIV>
    <DIV><FONT size=2>Networking and the Win95/98 Context Menu's options for 
    &quot;Sharing&quot;, then no-one can intrude onto your PC</FONT></DIV>
    <DIV><FONT size=2>with you in command (and as otherwise is described in the 
    article below).</FONT></DIV></FONT></DIV>
    <DIV><FONT size=2>This &quot;Sharing&quot;, apart from the Control Panel's 
    Nethood and the Win95/98 Context Menu's options,</FONT></DIV>
    <DIV><FONT size=2>are privaleges you can also set for any of the 
    &quot;Users&quot; of&nbsp;your PC's Windows sessions. </FONT><FONT 
    size=2>The program&nbsp;to do so</FONT></DIV>
    <DIV><FONT size=2>is &quot;C:\Windows\Poledit.exe&quot;.</FONT></DIV>
    <DIV>&nbsp;</DIV>
    <DIV><FONT size=2>The above is for Win95/98 only, for as WIN-NT4/2000 
    requires a top secret &quot;NTconfig.pol&quot; file stored on server 
    for</FONT></DIV>
    <DIV><FONT size=2>setting the&nbsp;&quot;Sharing of the Network's NetHood, 
    Server and&nbsp;WKS's </FONT><FONT size=2>files, folders, printers and 
    disks&quot;.</FONT></DIV>
    <DIV>&nbsp;</DIV>
    <DIV><FONT size=2>Regards,<BR>Ton Maas<BR><A 
    href="mailto:ms-irb@xxxxxxxxxxxxx";>ms-irb@xxxxxxxxxxxxx</A><BR>Dismiss the 
    &quot;.nospam&quot; bit (including the dot) when 
    replying.<BR><BR><BR></FONT><FONT 
    size=3>___________________________________________________________________________<BR><BR>WinInfo: 
    Windows news and information -- Copyright (c) 1995-9 Paul Thurrott<BR>Visit 
    WinInfo on the Web at WUGNET: <A 
    href="http://www.wugnet.com/wininfo";>http://www.wugnet.com/wininfo</A><BR>___________________________________________________________________________<BR><BR>Today's 
    WinInfo:<BR>&nbsp; Microsoft challenges BackOrifice myths<BR>&nbsp; 
    Microsoft bringing USB hardware to the Macintosh<BR><BR><BR>Microsoft 
    challenges BackOrifice myths<BR><BR>With the release this week of Windows NT 
    hacking tool &quot;BackOrifice 2000,&quot;<BR>Microsoft has launched an 
    informational campaign of its own, designed to<BR>derail myths about the 
    malicious program. According to a report on<BR>Microsoft's Security Advisor 
    Web site, BackOrifice 2000 is a remote control<BR>application that must be 
    stealthily installed so that attackers can take<BR>over a Windows NT-based 
    network. The program enables remote hackers to do<BR>anything they could do 
    were they to be logged onto the machine locally: Run<BR>programs, delete 
    files, and the like.<BR><BR>&quot;BackOrifice 2000 is a remote-access tool 
    that was developed with the intent<BR>of harming users,&quot; says Jason 
    Garms, the lead product manager for Windows NT<BR>security at Microsoft. 
    &quot;It is a tool that has no legitimate purpose other<BR>than exposing 
    users' machines to people on the Internet. Users who are<BR>tricked into 
    getting this thing installed on their system are vulnerable to<BR>the 
    attacker, who can then do anything that the victim can do--move 
    the<BR>mouse, open files, run programs, etc.--which is little different from 
    what<BR>legitimate remote-control software can do. Back Orifice, however, 
    is<BR>designed to be stealthy and evade detection by the 
    user.&quot;<BR><BR>For BackOrifice to find its way onto your system the 
    hacker must have<BR>physical access to the machine with a valid login or you 
    must be tricked<BR>into installing it; typically this is accomplished by 
    sending users the<BR>program as an email attachment that must be executed. 
    To prevent this<BR>program from taking over your system, just use common 
    sense: Always run an<BR>anti-virus program with up-to-date virus definitions 
    and don't let anyone<BR>gain unauthorized physical access to your machine. 
    Perhaps most importantly,<BR>don't execute email attachments from unknown 
    people.<BR><BR>One of the biggest myths perpetrated by the makers of 
    BackOrifice is that<BR>program takes advantage of security inadequacies that 
    are inherent in<BR>Windows and Windows NT. This is simply not true: 
    BackOrifice could have been<BR>written to attack *any* kind of computer 
    system. The hackers that wrote it<BR>simply decided to attack Windows, which 
    is the most popular computing<BR>platform by far. In fact, as Microsoft 
    notes, BackOrifice doesn't actually<BR>target Windows per se at all: It 
    targets users, who often don't understand<BR>security issues well enough to 
    not execute email attachments from unknown<BR>sources.<BR><BR>Another common 
    myth centers on the goal for BackOrifice: In an attempt to<BR>protect 
    themselves from legal problems, the creators of BackOrifice 
    are<BR>pretending that it is a legitimate remote control application. 
    However, this<BR>is not the case: BackOrifice is designed to escape 
    detection and exceeds the<BR>needs of remote control software. And it 
    doesn't prompt the user when it<BR>installs on the system.<BR><BR>&quot;The 
    creators [of BackOrifice] claim that this is a useful 
    administration<BR>tool, but it doesn't even prompt people when it installs 
    itself on the<BR>system. It doesn't warn them that it's getting installed. 
    And, once it's<BR>installed, it makes the system available to other people 
    on the Internet.<BR>That is a malicious act,&quot; says Garms. &quot;I am 
    personally unaware of any major<BR>customers of ours who consider this to be 
    a remote administration tool as<BR>the folks who created it claim. Quite the 
    contrary, they consider it a piece<BR>of malicious code. Unfortunately, 
    there are some users who were duped by the<BR>press releases from the 
    organization that released the software, and did<BR>install it on their 
    systems.&quot;<BR><BR>For more information about Microsoft's response to 
    BackOrifice 2000, please<BR>visit the Microsoft Security Advisor Web 
    site:<BR>&nbsp; <A 
    href="http://www.microsoft.com/security/bulletins/bo2k.asp";>http://www.microsoft.com/security/bulletins/bo2k.asp</A><BR><BR><BR><BR><BR>Microsoft 
    bringing USB hardware to the Macintosh<BR><BR>Microsoft Corporation will 
    announce the availability of its first USB<BR>hardware for the Macintosh, 
    the IntelliMouse Explorer, a &quot;no ball&quot; mouse<BR>that the company 
    will release this fall for Windows as well. According to<BR>rumors, 
    Microsoft will also be porting other USB hardware to the 
    Macintosh,<BR>including possibly all of the company's joystick/entertainment 
    hardware,<BR>such as the FreeStyle Pro GamePad and the Sidewinder Precision 
    Pro joystick.<BR><BR>Expect an official announcement from Microsoft at 
    MacWorld New York 
    next<BR>week.<BR><BR>___________________________________________________________________________<BR><BR>Visit 
    WinInfo on the Web at WUGNET: <A 
    href="http://www.wugnet.com/wininfo";>http://www.wugnet.com/wininfo</A><BR><BR>To 
    unsubscribe from the WinInfo list, simply send an E-mail message to<BR><A 
    href="mailto:listserv@xxxxxxxxxxxxxxxxxxxx";>listserv@xxxxxxxxxxxxxxxxxxxx</A> 
    with the phrase &quot;unsubscribe wininfo&quot; (no<BR>quotes) in the body. 
    If you are having problems unsubscribing or any other<BR>problems with the 
    list, please write Keith Furman at <A 
    href="mailto:listadmin@xxxxxxxxxx";>listadmin@xxxxxxxxxx</A>.<BR>___________________________________________________________________________<BR></DIV></FONT></BLOCKQUOTE></BODY></HTML>
</x-html>From ???@??? Tue Jul 27 23:45:25 1999
Return-Path: <majordom@xxxxxxxxxxxxxxxxxx>
Received: from listserv.equis.com (listserv.equis.com [204.246.137.2])
	by purebytes.com (8.8.7/8.8.7) with ESMTP id XAA14286
	for <neal@xxxxxxxxxxxxx>; Tue, 27 Jul 1999 23:10:49 -0700
Received: (from majordom@xxxxxxxxx)
	by listserv.equis.com (8.8.7/8.8.7) id NAA28449
	for metastock-outgoing; Wed, 28 Jul 1999 13:55:14 -0600
X-Authentication-Warning: listserv.equis.com: majordom set sender to owner-metastock@xxxxxxxxxxxxx using -f
Received: from freeze.metastock.com (freeze.metastock.com [204.246.137.5])
	by listserv.equis.com (8.8.7/8.8.7) with ESMTP id NAA28446
	for <metastock@xxxxxxxxxxxxxxxxxx>; Wed, 28 Jul 1999 13:55:12 -0600
Received: from smtp4.mindspring.com (smtp4.mindspring.com [207.69.200.64])
	by freeze.metastock.com (8.8.5/8.8.5) with ESMTP id XAA13027
	for <metastock@xxxxxxxxxxxxx>; Tue, 27 Jul 1999 23:43:01 -0600 (MDT)
Received: from RSI5 (user-38lcav8.dialup.mindspring.com [209.86.43.232])
	by smtp4.mindspring.com (8.8.5/8.8.5) with SMTP id BAA00339
	for <metastock@xxxxxxxxxxxxx>; Wed, 28 Jul 1999 01:29:58 -0400 (EDT)
Message-ID: <002501bed8ba$177060b0$020101c0@xxxx>
From: "Kent Rollins" <kentr@xxxxxxxxxxxxxx>
To: <metastock@xxxxxxxxxxxxx>
Subject: Re: intruders [Fw: Today's WinInfo: July 12]
Date: Wed, 28 Jul 1999 01:28:56 -0400
MIME-Version: 1.0
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_0022_01BED898.8F85ECE0"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 4.72.2106.4
X-MimeOLE: Produced By Microsoft MimeOLE V4.72.2106.4
Sender: owner-metastock@xxxxxxxxxxxxx
Precedence: bulk
Reply-To: metastock@xxxxxxxxxxxxx
Status:   

<x-html><!DOCTYPE HTML PUBLIC "-//W3C//DTD W3 HTML//EN">
<HTML>
<HEAD>

<META content=text/html;charset=iso-8859-1 http-equiv=Content-Type><!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<META content='"MSHTML 4.72.2106.6"' name=GENERATOR>
<STYLE></STYLE>

</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT color=#000000 size=2>Guy</FONT></DIV>
<DIV><FONT color=#000000 size=2></FONT>&nbsp;</DIV>
<DIV><FONT size=2>You should also make sure you have changed the password for 
your Adminstrator and Guest accounts on any NT systems you have.&nbsp; This is 
one thing that many people forget to do.&nbsp; This can be done from the User 
Manager.</FONT></DIV>
<DIV><FONT size=2></FONT>&nbsp;</DIV>
<DIV><FONT size=2>Kent</FONT></DIV>
<BLOCKQUOTE 
style="BORDER-LEFT: #000000 solid 2px; MARGIN-LEFT: 5px; PADDING-LEFT: 5px">
    <DIV><FONT face=Arial size=2><B>-----Original Message-----</B><BR><B>From: 
    </B>Guy Tann &lt;<A 
    href="mailto:grt@xxxxxxxxxxxx";>grt@xxxxxxxxxxxx</A>&gt;<BR><B>To: </B><A 
    href="mailto:metastock@xxxxxxxxxxxxx";>metastock@xxxxxxxxxxxxx</A> &lt;<A 
    href="mailto:metastock@xxxxxxxxxxxxx";>metastock@xxxxxxxxxxxxx</A>&gt;<BR><B>Date: 
    </B>Wednesday, July 28, 1999 2:41 PM<BR><B>Subject: </B>RE: intruders [Fw: 
    Today's WinInfo: July 12]<BR><BR></DIV></FONT>
    <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
    class=780561304-28071999>Ton</SPAN></FONT></DIV>
    <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
    class=780561304-28071999></SPAN></FONT>&nbsp;</DIV>
    <DIV><FONT color=#0000ff face=Arial size=2><SPAN class=780561304-28071999>I 
    have password protected all of my drives with passwords for read-only as 
    well as read-write access.&nbsp; I'm still finding 'visitors' in my network 
    neighborhood.&nbsp; I assume they can't get at anything.&nbsp; When I 
    installed the passwords, I disconnected my PC from the network (and the 
    Internet) and installed all of the passwords, etc.&nbsp; Then hooked 
    everything back up.</SPAN></FONT></DIV>
    <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
    class=780561304-28071999></SPAN></FONT>&nbsp;</DIV>
    <DIV><FONT color=#0000ff face=Arial size=2><SPAN class=780561304-28071999>I 
    tried to locate poledit.exe and that program isn't anywhere to be found in 
    my Win95 directory.</SPAN></FONT></DIV>
    <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
    class=780561304-28071999></SPAN></FONT>&nbsp;</DIV>
    <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
    class=780561304-28071999>Regards</SPAN></FONT></DIV>
    <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
    class=780561304-28071999></SPAN></FONT>&nbsp;</DIV>
    <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
    class=780561304-28071999>Guy</SPAN></FONT></DIV>
    <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
    class=780561304-28071999></SPAN></FONT>&nbsp;</DIV>
    <DIV class=OutlookMessageHeader><FONT face="Times New Roman" 
    size=2>-----Original Message-----<BR><B>From:</B> 
    owner-metastock@xxxxxxxxxxxxx [mailto:owner-metastock@xxxxxxxxxxxxx]<B>On 
    Behalf Of</B> A.J. Maas<BR><B>Sent:</B> Tuesday, July 13, 1999 4:12 
    PM<BR><B>To:</B> Metastock-List<BR><B>Subject:</B> Re: intruders [Fw: 
    Today's WinInfo: July 12]<BR><BR></FONT></DIV>
    <DIV><FONT size=2>To clear some myths..........................</FONT></DIV>
    <DIV><FONT size=2></FONT>&nbsp;</DIV>
    <DIV><FONT size=2>For as long as you do not &quot;Share&quot; any files, 
    disks, printers,&nbsp;folders or even Net-adapters, you are save 
    from</FONT></DIV>
    <DIV><FONT size=2>anyone entering </FONT><FONT size=2>your PC.</FONT></DIV>
    <DIV><FONT size=2>
    <DIV><FONT size=2>If you haven't done any of the&nbsp;file, folder, disk, 
    printer and netadapter </FONT><FONT size=2>sharing (also in the Control 
    Panel's Nethood/</FONT></DIV>
    <DIV><FONT size=2>Networking and the Win95/98 Context Menu's options for 
    &quot;Sharing&quot;, then no-one can intrude onto your PC</FONT></DIV>
    <DIV><FONT size=2>with you in command (and as otherwise is described in the 
    article below).</FONT></DIV></FONT></DIV>
    <DIV><FONT size=2>This &quot;Sharing&quot;, apart from the Control Panel's 
    Nethood and the Win95/98 Context Menu's options,</FONT></DIV>
    <DIV><FONT size=2>are privaleges you can also set for any of the 
    &quot;Users&quot; of&nbsp;your PC's Windows sessions. </FONT><FONT 
    size=2>The program&nbsp;to do so</FONT></DIV>
    <DIV><FONT size=2>is &quot;C:\Windows\Poledit.exe&quot;.</FONT></DIV>
    <DIV>&nbsp;</DIV>
    <DIV><FONT size=2>The above is for Win95/98 only, for as WIN-NT4/2000 
    requires a top secret &quot;NTconfig.pol&quot; file stored on server 
    for</FONT></DIV>
    <DIV><FONT size=2>setting the&nbsp;&quot;Sharing of the Network's NetHood, 
    Server and&nbsp;WKS's </FONT><FONT size=2>files, folders, printers and 
    disks&quot;.</FONT></DIV>
    <DIV>&nbsp;</DIV>
    <DIV><FONT size=2>Regards,<BR>Ton Maas<BR><A 
    href="mailto:ms-irb@xxxxxxxxxxxxx";>ms-irb@xxxxxxxxxxxxx</A><BR>Dismiss the 
    &quot;.nospam&quot; bit (including the dot) when 
    replying.<BR><BR><BR></FONT><FONT 
    size=3>___________________________________________________________________________<BR><BR>WinInfo: 
    Windows news and information -- Copyright (c) 1995-9 Paul Thurrott<BR>Visit 
    WinInfo on the Web at WUGNET: <A 
    href="http://www.wugnet.com/wininfo";>http://www.wugnet.com/wininfo</A><BR>___________________________________________________________________________<BR><BR>Today's 
    WinInfo:<BR>&nbsp; Microsoft challenges BackOrifice myths<BR>&nbsp; 
    Microsoft bringing USB hardware to the Macintosh<BR><BR><BR>Microsoft 
    challenges BackOrifice myths<BR><BR>With the release this week of Windows NT 
    hacking tool &quot;BackOrifice 2000,&quot;<BR>Microsoft has launched an 
    informational campaign of its own, designed to<BR>derail myths about the 
    malicious program. According to a report on<BR>Microsoft's Security Advisor 
    Web site, BackOrifice 2000 is a remote control<BR>application that must be 
    stealthily installed so that attackers can take<BR>over a Windows NT-based 
    network. The program enables remote hackers to do<BR>anything they could do 
    were they to be logged onto the machine locally: Run<BR>programs, delete 
    files, and the like.<BR><BR>&quot;BackOrifice 2000 is a remote-access tool 
    that was developed with the intent<BR>of harming users,&quot; says Jason 
    Garms, the lead product manager for Windows NT<BR>security at Microsoft. 
    &quot;It is a tool that has no legitimate purpose other<BR>than exposing 
    users' machines to people on the Internet. Users who are<BR>tricked into 
    getting this thing installed on their system are vulnerable to<BR>the 
    attacker, who can then do anything that the victim can do--move 
    the<BR>mouse, open files, run programs, etc.--which is little different from 
    what<BR>legitimate remote-control software can do. Back Orifice, however, 
    is<BR>designed to be stealthy and evade detection by the 
    user.&quot;<BR><BR>For BackOrifice to find its way onto your system the 
    hacker must have<BR>physical access to the machine with a valid login or you 
    must be tricked<BR>into installing it; typically this is accomplished by 
    sending users the<BR>program as an email attachment that must be executed. 
    To prevent this<BR>program from taking over your system, just use common 
    sense: Always run an<BR>anti-virus program with up-to-date virus definitions 
    and don't let anyone<BR>gain unauthorized physical access to your machine. 
    Perhaps most importantly,<BR>don't execute email attachments from unknown 
    people.<BR><BR>One of the biggest myths perpetrated by the makers of 
    BackOrifice is that<BR>program takes advantage of security inadequacies that 
    are inherent in<BR>Windows and Windows NT. This is simply not true: 
    BackOrifice could have been<BR>written to attack *any* kind of computer 
    system. The hackers that wrote it<BR>simply decided to attack Windows, which 
    is the most popular computing<BR>platform by far. In fact, as Microsoft 
    notes, BackOrifice doesn't actually<BR>target Windows per se at all: It 
    targets users, who often don't understand<BR>security issues well enough to 
    not execute email attachments from unknown<BR>sources.<BR><BR>Another common 
    myth centers on the goal for BackOrifice: In an attempt to<BR>protect 
    themselves from legal problems, the creators of BackOrifice 
    are<BR>pretending that it is a legitimate remote control application. 
    However, this<BR>is not the case: BackOrifice is designed to escape 
    detection and exceeds the<BR>needs of remote control software. And it 
    doesn't prompt the user when it<BR>installs on the system.<BR><BR>&quot;The 
    creators [of BackOrifice] claim that this is a useful 
    administration<BR>tool, but it doesn't even prompt people when it installs 
    itself on the<BR>system. It doesn't warn them that it's getting installed. 
    And, once it's<BR>installed, it makes the system available to other people 
    on the Internet.<BR>That is a malicious act,&quot; says Garms. &quot;I am 
    personally unaware of any major<BR>customers of ours who consider this to be 
    a remote administration tool as<BR>the folks who created it claim. Quite the 
    contrary, they consider it a piece<BR>of malicious code. Unfortunately, 
    there are some users who were duped by the<BR>press releases from the 
    organization that released the software, and did<BR>install it on their 
    systems.&quot;<BR><BR>For more information about Microsoft's response to 
    BackOrifice 2000, please<BR>visit the Microsoft Security Advisor Web 
    site:<BR>&nbsp; <A 
    href="http://www.microsoft.com/security/bulletins/bo2k.asp";>http://www.microsoft.com/security/bulletins/bo2k.asp</A><BR><BR><BR><BR><BR>Microsoft 
    bringing USB hardware to the Macintosh<BR><BR>Microsoft Corporation will 
    announce the availability of its first USB<BR>hardware for the Macintosh, 
    the IntelliMouse Explorer, a &quot;no ball&quot; mouse<BR>that the company 
    will release this fall for Windows as well. According to<BR>rumors, 
    Microsoft will also be porting other USB hardware to the 
    Macintosh,<BR>including possibly all of the company's joystick/entertainment 
    hardware,<BR>such as the FreeStyle Pro GamePad and the Sidewinder Precision 
    Pro joystick.<BR><BR>Expect an official announcement from Microsoft at 
    MacWorld New York 
    next<BR>week.<BR><BR>___________________________________________________________________________<BR><BR>Visit 
    WinInfo on the Web at WUGNET: <A 
    href="http://www.wugnet.com/wininfo";>http://www.wugnet.com/wininfo</A><BR><BR>To 
    unsubscribe from the WinInfo list, simply send an E-mail message to<BR><A 
    href="mailto:listserv@xxxxxxxxxxxxxxxxxxxx";>listserv@xxxxxxxxxxxxxxxxxxxx</A> 
    with the phrase &quot;unsubscribe wininfo&quot; (no<BR>quotes) in the body. 
    If you are having problems unsubscribing or any other<BR>problems with the 
    list, please write Keith Furman at <A 
    href="mailto:listadmin@xxxxxxxxxx";>listadmin@xxxxxxxxxx</A>.<BR>___________________________________________________________________________<BR></DIV></FONT></BLOCKQUOTE></BODY></HTML>
</x-html>From ???@??? Wed Jul 28 00:46:20 1999
Return-Path: <majordom@xxxxxxxxxxxxxxxxxx>
Received: from listserv.equis.com (listserv.equis.com [204.246.137.2])
	by purebytes.com (8.8.7/8.8.7) with ESMTP id AAA14867
	for <neal@xxxxxxxxxxxxx>; Wed, 28 Jul 1999 00:34:31 -0700
Received: (from majordom@xxxxxxxxx)
	by listserv.equis.com (8.8.7/8.8.7) id PAA29559
	for metastock-outgoing; Wed, 28 Jul 1999 15:08:43 -0600
X-Authentication-Warning: listserv.equis.com: majordom set sender to owner-metastock@xxxxxxxxxxxxx using -f
Received: from freeze.metastock.com (freeze.metastock.com [204.246.137.5])
	by listserv.equis.com (8.8.7/8.8.7) with ESMTP id PAA29556
	for <metastock@xxxxxxxxxxxxxxxxxx>; Wed, 28 Jul 1999 15:08:40 -0600
Received: from dec.ciemat.es (dec.ciemat.es [130.206.11.6])
	by freeze.metastock.com (8.8.5/8.8.5) with ESMTP id AAA13112
	for <metastock@xxxxxxxxxxxxx>; Wed, 28 Jul 1999 00:56:29 -0600 (MDT)
Received: from ciemat.es (mat2.ciemat.es [130.206.40.52])
 by dec.ciemat.es (PMDF V5.2-31 #38885)
 with ESMTP id <01JE3BDUW3KM0009L3@xxxxxxxxxxxxx> for metastock@xxxxxxxxxxxxx;
 Wed, 28 Jul 1999 08:42:40 GMT
Date: Wed, 28 Jul 1999 08:47:12 +0200
From: Angel Ibarra <ibarra@xxxxxxxxx>
Subject: Re: Optimal f and system optimization
To: metastock@xxxxxxxxxxxxx
Message-id: <379EA6DB.576CC0A5@xxxxxxxxx>
MIME-version: 1.0
X-Mailer: Mozilla 4.5 (Macintosh; I; PPC)
Content-type: text/plain; x-mac-creator=4D4F5353; x-mac-type=54455854;
 charset=us-ascii
Content-transfer-encoding: 7BIT
X-Accept-Language: en
References: <37919bc4.8775155@xxxxxxxxxxx>
 <009b01bed20d$c9f902e0$5f1c4118@xxxxxxxxxxxxxxxxxxxxxx>
 <37a0ae2d.2004349@xxxxxxxxxxx>
 <010b01bed861$f7c40a80$5f1c4118@xxxxxxxxxxxxxxxxxxxxxx>
Sender: owner-metastock@xxxxxxxxxxxxx
Precedence: bulk
Reply-To: metastock@xxxxxxxxxxxxx
Status:   

How do you test the system optimization? Did you apply the results to "future"
data? Do you check how the parameters of the optimizacion evolve with time? I
have made something in this line (just one system -cross of the price with a
mean-) and I was very surprised with the results...
To make this type of complex optimizations, I think the only way is to write
our own program. I have made my calculations with a program writen in fortran
(coupled with excel)
Regards
Angel Ibarra

Glen Wallace wrote:

> > My conclusion: f is *not* an independent parameter that can be
> > optimized separately. So f should be included into the list of
> > parameters for system optimization to take care of the inherent
> > dependencies.
>
> I agree, Rudolph.  In fact, I suspect that by including money management
> parameters (like optimal f) in system design and testing, one will find that
> many mediocre systems we have long since dismissed because of poor win/loss
> ratios (or whatever other inadequate yardsticks we currently use to measure
> a system), would actually be ideal candidates for trading.
>
> Including money management in system testing is certainly beyond MetaStock's
> capabilities and beyond my present skills.  Do you have any suggestions?