PureBytes Links
Trading Reference Links
|
<x-html><!DOCTYPE HTML PUBLIC "-//W3C//DTD W3 HTML//EN">
<HTML>
<HEAD>
<META content=text/html;charset=iso-8859-1 http-equiv=Content-Type><!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<META content='"MSHTML 4.72.3110.7"' name=GENERATOR>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT color=#000000 size=2>Thanks Guy.</FONT></DIV>
<DIV><FONT color=#000000 size=2></FONT> </DIV>
<DIV><FONT size=2>Augie</FONT></DIV>
<BLOCKQUOTE
style="BORDER-LEFT: #000000 solid 2px; MARGIN-LEFT: 5px; PADDING-LEFT: 5px">
<DIV><FONT face=Arial size=2><B>-----Original Message-----</B><BR><B>From:
</B>Guy Tann <<A
href="mailto:grt@xxxxxxxxxxxx">grt@xxxxxxxxxxxx</A>><BR><B>To: </B><A
href="mailto:metastock@xxxxxxxxxxxxx">metastock@xxxxxxxxxxxxx</A> <<A
href="mailto:metastock@xxxxxxxxxxxxx">metastock@xxxxxxxxxxxxx</A>><BR><B>Date:
</B>Wednesday, July 28, 1999 3:08 PM<BR><B>Subject: </B>RE: OFF TOPIC
intruders [Fw: Today's WinInfo: July 12]<BR><BR></DIV></FONT>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=10154019-28071999>Augie</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=10154019-28071999></SPAN></FONT> </DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN class=10154019-28071999>I
have Sharing allowed through my Network setup. Then
g</SPAN></FONT><FONT color=#0000ff face=Arial size=2><SPAN
class=10154019-28071999>o to Control Panel. Double click on each
drive, click on sharing and set up your passwords. I set up 2
different ones. One for read only and one for read/write. I also
password protected my CD-ROM (read only) and set my floppy up as not being
shared.</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=10154019-28071999></SPAN></FONT> </DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN class=10154019-28071999>My
printers are on my network, so I'm not sure how you would protect these if
they're on your system. I did this for all 3 of our
computers.</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=10154019-28071999></SPAN></FONT> </DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=10154019-28071999>It's all Windows stuff.</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=10154019-28071999></SPAN></FONT> </DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=10154019-28071999>Guy</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=10154019-28071999></SPAN></FONT> </DIV>
<DIV class=OutlookMessageHeader><FONT face="Times New Roman"
size=2>-----Original Message-----<BR><B>From:</B>
owner-metastock@xxxxxxxxxxxxx [mailto:owner-metastock@xxxxxxxxxxxxx]<B>On
Behalf Of</B> George Ashton<BR><B>Sent:</B> Wednesday, July 28, 1999 3:58
AM<BR><B>To:</B> metastock@xxxxxxxxxxxxx<BR><B>Subject:</B> OFF TOPIC
intruders [Fw: Today's WinInfo: July 12]<BR><BR></FONT></DIV>At 23:21
27/07/99 -0600, you wrote:<BR><FONT size=2>
<BLOCKQUOTE type = cite cite>Guy,</FONT><BR><BR><FONT size=2>How do I
password protect my hard drives ? Is it a Windows feature or is it
achieved via special software ?</FONT><BR><BR><FONT
size=2>Thanks.</FONT><BR><BR><FONT size=2>Augie</FONT><BR><FONT
face=arial size=2><B>
<BLOCKQUOTE type = cite cite>-----Original
Message-----</B><BR>From:</B> Guy Tann <<A
href="mailto:grt@xxxxxxxxxxxx">grt@xxxxxxxxxxxx</A>><BR><B>To:
</B><A
href="mailto:metastock@xxxxxxxxxxxxx">metastock@xxxxxxxxxxxxx</A>
<<A
href="mailto:metastock@xxxxxxxxxxxxx">metastock@xxxxxxxxxxxxx</A>><BR><B>Date:
</B>Tuesday, July 27, 1999 11:13 PM<BR><B>Subject: </B>RE: intruders
[Fw: Today's WinInfo: July 12]<BR><BR></FONT><FONT color=#0000ff
face=arial size=2>Ton</FONT><BR><BR><FONT color=#0000ff face=arial
size=2>I have password protected all of my drives with passwords for
read-only as well as read-write access. I'm still finding
'visitors' in my network neighborhood. I assume they can't get
at anything. When I installed the passwords, I disconnected my
PC from the network (and the Internet) and installed all of the
passwords, etc. Then hooked everything back
up.</FONT><BR><BR><FONT color=#0000ff face=arial size=2>I tried to
locate poledit.exe and that program isn't anywhere to be found in my
Win95 directory.</FONT><BR><BR><FONT color=#0000ff face=arial
size=2>Regards</FONT><BR><BR><FONT color=#0000ff face=arial
size=2>Guy</FONT><BR><BR><FONT face="Times New Roman, Times"
size=2>-----Original Message-----<BR><B>From:</B>
owner-metastock@xxxxxxxxxxxxx [<A
href="mailto:owner-metastock@xxxxxxxxxxxxx%5DOn" eudora =
autourl>mailto:owner-metastock@xxxxxxxxxxxxx]</A><A
href="mailto:owner-metastock@xxxxxxxxxxxxx%5DOn" eudora =
autourl><B>On</A> Behalf Of</B> A.J. Maas<BR><B>Sent:</B> Tuesday,
July 13, 1999 4:12 PM<BR><B>To:</B>
Metastock-List<BR><B>Subject:</B> Re: intruders [Fw: Today's
WinInfo: July 12]<BR><BR></FONT>To clear some
myths..........................<BR><BR><FONT size=2>For as long as
you do not "Share" any files, disks, printers, folders or
even Net-adapters, you are save from</FONT><BR>anyone entering your
PC.<BR>If you haven't done any of the file, folder, disk, printer
and netadapter sharing (also in the Control Panel's
Nethood/<BR>Networking and the Win95/98 Context Menu's options for
"Sharing", then no-one can intrude onto your PC<BR>with
you in command (and as otherwise is described in the article
below).<BR>This "Sharing", apart from the Control Panel's
Nethood and the Win95/98 Context Menu's options,<BR>are privaleges
you can also set for any of the "Users" of your PC's
Windows sessions. The program to do so<BR>is
"C:\Windows\Poledit.exe".<BR><BR><FONT size=2>The above is
for Win95/98 only, for as WIN-NT4/2000 requires a top secret
"NTconfig.pol" file stored on server for</FONT><BR>setting
the "Sharing of the Network's NetHood, Server and WKS's files,
folders, printers and disks".<BR><BR><FONT
size=2>Regards,<BR>Ton Maas<BR><A
href="mailto:ms-irb@xxxxxxxxxxxxx">ms-irb@xxxxxxxxxxxxx</A><BR>Dismiss
the ".nospam" bit (including the dot) when
replying.<BR><BR><BR></FONT>___________________________________________________________________________<BR><BR>WinInfo:
Windows news and information -- Copyright (c) 1995-9 Paul
Thurrott<BR>Visit WinInfo on the Web at WUGNET: <A
href="http://www.wugnet.com/wininfo">http://www.wugnet.com/wininfo</A><BR>___________________________________________________________________________<BR><BR>Today's
WinInfo:<BR> Microsoft challenges BackOrifice myths<BR>
Microsoft bringing USB hardware to the
Macintosh<BR><BR><BR>Microsoft challenges BackOrifice
myths<BR><BR>With the release this week of Windows NT hacking tool
"BackOrifice 2000,"<BR>Microsoft has launched an
informational campaign of its own, designed to<BR>derail myths about
the malicious program. According to a report on<BR>Microsoft's
Security Advisor Web site, BackOrifice 2000 is a remote
control<BR>application that must be stealthily installed so that
attackers can take<BR>over a Windows NT-based network. The program
enables remote hackers to do<BR>anything they could do were they to
be logged onto the machine locally: Run<BR>programs, delete files,
and the like.<BR><BR>"BackOrifice 2000 is a remote-access tool
that was developed with the intent<BR>of harming users," says
Jason Garms, the lead product manager for Windows NT<BR>security at
Microsoft. "It is a tool that has no legitimate purpose
other<BR>than exposing users' machines to people on the Internet.
Users who are<BR>tricked into getting this thing installed on their
system are vulnerable to<BR>the attacker, who can then do anything
that the victim can do--move the<BR>mouse, open files, run programs,
etc.--which is little different from what<BR>legitimate
remote-control software can do. Back Orifice, however,
is<BR>designed to be stealthy and evade detection by the
user."<BR><BR>For BackOrifice to find its way onto your system
the hacker must have<BR>physical access to the machine with a valid
login or you must be tricked<BR>into installing it; typically this
is accomplished by sending users the<BR>program as an email
attachment that must be executed. To prevent this<BR>program from
taking over your system, just use common sense: Always run
an<BR>anti-virus program with up-to-date virus definitions and don't
let anyone<BR>gain unauthorized physical access to your machine.
Perhaps most importantly,<BR>don't execute email attachments from
unknown people.<BR><BR>One of the biggest myths perpetrated by the
makers of BackOrifice is that<BR>program takes advantage of security
inadequacies that are inherent in<BR>Windows and Windows NT. This is
simply not true: BackOrifice could have been<BR>written to attack
*any* kind of computer system. The hackers that wrote it<BR>simply
decided to attack Windows, which is the most popular
computing<BR>platform by far. In fact, as Microsoft notes,
BackOrifice doesn't actually<BR>target Windows per se at all: It
targets users, who often don't understand<BR>security issues well
enough to not execute email attachments from
unknown<BR>sources.<BR><BR>Another common myth centers on the goal
for BackOrifice: In an attempt to<BR>protect themselves from legal
problems, the creators of BackOrifice are<BR>pretending that it is a
legitimate remote control application. However, this<BR>is not the
case: BackOrifice is designed to escape detection and exceeds
the<BR>needs of remote control software. And it doesn't prompt the
user when it<BR>installs on the system.<BR><BR>"The creators
[of BackOrifice] claim that this is a useful administration<BR>tool,
but it doesn't even prompt people when it installs itself on
the<BR>system. It doesn't warn them that it's getting installed.
And, once it's<BR>installed, it makes the system available to other
people on the Internet.<BR>That is a malicious act," says
Garms. "I am personally unaware of any major<BR>customers of
ours who consider this to be a remote administration tool as<BR>the
folks who created it claim. Quite the contrary, they consider it a
piece<BR>of malicious code. Unfortunately, there are some users who
were duped by the<BR>press releases from the organization that
released the software, and did<BR>install it on their
systems."<BR><BR>For more information about Microsoft's
response to BackOrifice 2000, please<BR>visit the Microsoft Security
Advisor Web site:<BR> <A
href="http://www.microsoft.com/security/bulletins/bo2k.asp">http://www.microsoft.com/security/bulletins/bo2k.asp</A><BR><BR><BR><BR><BR>Microsoft
bringing USB hardware to the Macintosh<BR><BR>Microsoft Corporation
will announce the availability of its first USB<BR>hardware for the
Macintosh, the IntelliMouse Explorer, a "no ball"
mouse<BR>that the company will release this fall for Windows as
well. According to<BR>rumors, Microsoft will also be porting other
USB hardware to the Macintosh,<BR>including possibly all of the
company's joystick/entertainment hardware,<BR>such as the FreeStyle
Pro GamePad and the Sidewinder Precision Pro joystick.<BR><BR>Expect
an official announcement from Microsoft at MacWorld New York
next<BR>week.<BR><BR>___________________________________________________________________________<BR><BR>Visit
WinInfo on the Web at WUGNET: <A
href="http://www.wugnet.com/wininfo">http://www.wugnet.com/wininfo</A><BR><BR>To
unsubscribe from the WinInfo list, simply send an E-mail message
to<BR><A
href="mailto:listserv@xxxxxxxxxxxxxxxxxxxx">listserv@xxxxxxxxxxxxxxxxxxxx</A>
with the phrase "unsubscribe wininfo" (no<BR>quotes) in
the body. If you are having problems unsubscribing or any
other<BR>problems with the list, please write Keith Furman at <A
href="mailto:listadmin@xxxxxxxxxx">listadmin@xxxxxxxxxx</A>.<BR>___________________________________________________________________________</BLOCKQUOTE></BLOCKQUOTE><BR></BLOCKQUOTE></BODY></HTML>
</x-html>From ???@??? Fri Jul 30 06:30:40 1999
Return-Path: <majordom@xxxxxxxxxxxxxxxxxx>
Received: from listserv.equis.com (listserv.equis.com [204.246.137.2])
by purebytes.com (8.8.7/8.8.7) with ESMTP id XAA29001
for <neal@xxxxxxxxxxxxx>; Thu, 29 Jul 1999 23:15:15 -0700
Received: (from majordom@xxxxxxxxx)
by listserv.equis.com (8.8.7/8.8.7) id OAA11860
for metastock-outgoing; Fri, 30 Jul 1999 14:00:54 -0600
X-Authentication-Warning: listserv.equis.com: majordom set sender to owner-metastock@xxxxxxxxxxxxx using -f
Received: from freeze.metastock.com (freeze.metastock.com [204.246.137.5])
by listserv.equis.com (8.8.7/8.8.7) with ESMTP id OAA11857
for <metastock@xxxxxxxxxxxxxxxxxx>; Fri, 30 Jul 1999 14:00:51 -0600
Received: from cypher.turbonet.com (cypher.turbonet.com [204.188.48.1])
by freeze.metastock.com (8.8.5/8.8.5) with ESMTP id XAA14608
for <metastock@xxxxxxxxxxxxx>; Thu, 29 Jul 1999 23:48:52 -0600 (MDT)
Received: from [204.188.49.139] by cypher.turbonet.com (NTMail 4.30.0012/NT0409.00.61d4ce09) with ESMTP id vkqqaaaa for <metastock@xxxxxxxxxxxxx>; Thu, 29 Jul 1999 22:39:12 -0700
From: "Steve Karnish" <kernish@xxxxxxxxxxxx>
To: <metastock@xxxxxxxxxxxxx>, <realtraders@xxxxxxxxxxxxxxx>
Subject: Norman and sugar
Date: Thu, 29 Jul 1999 22:35:37 -0700
X-MSMail-Priority: Normal
X-Priority: 3
X-Mailer: Microsoft Internet Mail 4.70.1162
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="----=_NextPart_000_01BEDA12.AE255020"
Content-Transfer-Encoding: 7bit
Message-Id: <05391276515501@xxxxxxxxxxxx>
Sender: owner-metastock@xxxxxxxxxxxxx
Precedence: bulk
Reply-To: metastock@xxxxxxxxxxxxx
Status:
Realtraders & MSers,
For two months this spring, I promised myself everyday if sugar dipped
below 4 cents that I would buy two contracts. If it proceeded to dip below
3 cents, I would buy two additional contracts and was prepared to pick up a
couple more below 2 cents. On 4/28 I filled at 3.98 and 4.06 in July. The
following day affected a number of technical indicators. The candles
signaled a nice variation of a three day "morning star" pattern (with a
nice hammer in the middle). I monitor about eight momentum indicators and
even the slow moving (but, quite directional) Coppock Curve turned up. On
4/30, after staying up to midnight calling anyone who would listen, I
bought July contracts all during the session, filling between 4.36 and
4.52. I rolled to October contracts when volume started to exceed Julys'.
For the more agressive traders, I sold between 6.20 and 6.50 and bought
back in the 5.40 to 5.50 range. The majority of my folks want to ride this
one into the sunset. I guess when you get people all whipped up about
sunspots, La Nina and 50 and 70 cent sugar, it's hard to get them to cover
their long positons. Norman makes a great point: how much risk does one
have with 4 cent sugar? Also, use all the tools in the toolbox. Candles,
momentum oscillators, fib retracements, and common sense (and if throwin'
the bones helped, I'd be doin' it) go a long way to make this one of those
memorable position trades. I'm mostly a "holy grail" mechanical swing
trader and I'm seldom in a position for more than 5 days...but there are
times when the risk to reward calls for position trading: crude in
December, unleaded in February, sugar in April, ... wheat in August (is it
really going to two bucks)?
Steve Karnish
CCT
Attachment Converted: "c:\eudora\attach\sbn.gif"
Attachment Converted: "c:\eudora\attach\sbv.gif"
|