[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: OFF TOPIC intruders [Fw: Today's WinInfo: July 12]



PureBytes Links

Trading Reference Links

<x-html><!DOCTYPE HTML PUBLIC "-//W3C//DTD W3 HTML//EN">
<HTML>
<HEAD>

<META content=text/html;charset=iso-8859-1 http-equiv=Content-Type><!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<META content='"MSHTML 4.72.3110.7"' name=GENERATOR>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT color=#000000 size=2>Thanks Guy.</FONT></DIV>
<DIV><FONT color=#000000 size=2></FONT>&nbsp;</DIV>
<DIV><FONT size=2>Augie</FONT></DIV>
<BLOCKQUOTE 
style="BORDER-LEFT: #000000 solid 2px; MARGIN-LEFT: 5px; PADDING-LEFT: 5px">
    <DIV><FONT face=Arial size=2><B>-----Original Message-----</B><BR><B>From: 
    </B>Guy Tann &lt;<A 
    href="mailto:grt@xxxxxxxxxxxx";>grt@xxxxxxxxxxxx</A>&gt;<BR><B>To: </B><A 
    href="mailto:metastock@xxxxxxxxxxxxx";>metastock@xxxxxxxxxxxxx</A> &lt;<A 
    href="mailto:metastock@xxxxxxxxxxxxx";>metastock@xxxxxxxxxxxxx</A>&gt;<BR><B>Date: 
    </B>Wednesday, July 28, 1999 3:08 PM<BR><B>Subject: </B>RE: OFF TOPIC 
    intruders [Fw: Today's WinInfo: July 12]<BR><BR></DIV></FONT>
    <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
    class=10154019-28071999>Augie</SPAN></FONT></DIV>
    <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
    class=10154019-28071999></SPAN></FONT>&nbsp;</DIV>
    <DIV><FONT color=#0000ff face=Arial size=2><SPAN class=10154019-28071999>I 
    have Sharing allowed through my Network setup.&nbsp; Then 
    g</SPAN></FONT><FONT color=#0000ff face=Arial size=2><SPAN 
    class=10154019-28071999>o to Control Panel.&nbsp; Double click on each 
    drive, click on sharing and set up your passwords.&nbsp; I set up 2 
    different ones.&nbsp; One for read only and one for read/write.&nbsp; I also 
    password protected my CD-ROM (read only) and set my floppy up as not being 
    shared.</SPAN></FONT></DIV>
    <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
    class=10154019-28071999></SPAN></FONT>&nbsp;</DIV>
    <DIV><FONT color=#0000ff face=Arial size=2><SPAN class=10154019-28071999>My 
    printers are on my network, so I'm not sure how you would protect these if 
    they're on your system.&nbsp; I did this for all 3 of our 
    computers.</SPAN></FONT></DIV>
    <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
    class=10154019-28071999></SPAN></FONT>&nbsp;</DIV>
    <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
    class=10154019-28071999>It's all Windows stuff.</SPAN></FONT></DIV>
    <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
    class=10154019-28071999></SPAN></FONT>&nbsp;</DIV>
    <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
    class=10154019-28071999>Guy</SPAN></FONT></DIV>
    <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
    class=10154019-28071999></SPAN></FONT>&nbsp;</DIV>
    <DIV class=OutlookMessageHeader><FONT face="Times New Roman" 
    size=2>-----Original Message-----<BR><B>From:</B> 
    owner-metastock@xxxxxxxxxxxxx [mailto:owner-metastock@xxxxxxxxxxxxx]<B>On 
    Behalf Of</B> George Ashton<BR><B>Sent:</B> Wednesday, July 28, 1999 3:58 
    AM<BR><B>To:</B> metastock@xxxxxxxxxxxxx<BR><B>Subject:</B> OFF TOPIC 
    intruders [Fw: Today's WinInfo: July 12]<BR><BR></FONT></DIV>At 23:21 
    27/07/99 -0600, you wrote:<BR><FONT size=2>
    <BLOCKQUOTE type = cite cite>Guy,</FONT><BR><BR><FONT size=2>How do I 
        password protect my hard drives ?&nbsp; Is it a Windows feature or is it 
        achieved via special software ?</FONT><BR><BR><FONT 
        size=2>Thanks.</FONT><BR><BR><FONT size=2>Augie</FONT><BR><FONT 
        face=arial size=2><B>
        <BLOCKQUOTE type = cite cite>-----Original 
            Message-----</B><BR>From:</B> Guy Tann &lt;<A 
            href="mailto:grt@xxxxxxxxxxxx";>grt@xxxxxxxxxxxx</A>&gt;<BR><B>To: 
            </B><A 
            href="mailto:metastock@xxxxxxxxxxxxx";>metastock@xxxxxxxxxxxxx</A> 
            &lt;<A 
            href="mailto:metastock@xxxxxxxxxxxxx";>metastock@xxxxxxxxxxxxx</A>&gt;<BR><B>Date: 
            </B>Tuesday, July 27, 1999 11:13 PM<BR><B>Subject: </B>RE: intruders 
            [Fw: Today's WinInfo: July 12]<BR><BR></FONT><FONT color=#0000ff 
            face=arial size=2>Ton</FONT><BR><BR><FONT color=#0000ff face=arial 
            size=2>I have password protected all of my drives with passwords for 
            read-only as well as read-write access.&nbsp; I'm still finding 
            'visitors' in my network neighborhood.&nbsp; I assume they can't get 
            at anything.&nbsp; When I installed the passwords, I disconnected my 
            PC from the network (and the Internet) and installed all of the 
            passwords, etc.&nbsp; Then hooked everything back 
            up.</FONT><BR><BR><FONT color=#0000ff face=arial size=2>I tried to 
            locate poledit.exe and that program isn't anywhere to be found in my 
            Win95 directory.</FONT><BR><BR><FONT color=#0000ff face=arial 
            size=2>Regards</FONT><BR><BR><FONT color=#0000ff face=arial 
            size=2>Guy</FONT><BR><BR><FONT face="Times New Roman, Times" 
            size=2>-----Original Message-----<BR><B>From:</B> 
            owner-metastock@xxxxxxxxxxxxx [<A 
            href="mailto:owner-metastock@xxxxxxxxxxxxx%5DOn"; eudora = 
            autourl>mailto:owner-metastock@xxxxxxxxxxxxx]</A><A 
            href="mailto:owner-metastock@xxxxxxxxxxxxx%5DOn"; eudora = 
            autourl><B>On</A> Behalf Of</B> A.J. Maas<BR><B>Sent:</B> Tuesday, 
            July 13, 1999 4:12 PM<BR><B>To:</B> 
            Metastock-List<BR><B>Subject:</B> Re: intruders [Fw: Today's 
            WinInfo: July 12]<BR><BR></FONT>To clear some 
            myths..........................<BR><BR><FONT size=2>For as long as 
            you do not &quot;Share&quot; any files, disks, printers, folders or 
            even Net-adapters, you are save from</FONT><BR>anyone entering your 
            PC.<BR>If you haven't done any of the file, folder, disk, printer 
            and netadapter sharing (also in the Control Panel's 
            Nethood/<BR>Networking and the Win95/98 Context Menu's options for 
            &quot;Sharing&quot;, then no-one can intrude onto your PC<BR>with 
            you in command (and as otherwise is described in the article 
            below).<BR>This &quot;Sharing&quot;, apart from the Control Panel's 
            Nethood and the Win95/98 Context Menu's options,<BR>are privaleges 
            you can also set for any of the &quot;Users&quot; of your PC's 
            Windows sessions. The program to do so<BR>is 
            &quot;C:\Windows\Poledit.exe&quot;.<BR><BR><FONT size=2>The above is 
            for Win95/98 only, for as WIN-NT4/2000 requires a top secret 
            &quot;NTconfig.pol&quot; file stored on server for</FONT><BR>setting 
            the &quot;Sharing of the Network's NetHood, Server and WKS's files, 
            folders, printers and disks&quot;.<BR><BR><FONT 
            size=2>Regards,<BR>Ton Maas<BR><A 
            href="mailto:ms-irb@xxxxxxxxxxxxx";>ms-irb@xxxxxxxxxxxxx</A><BR>Dismiss 
            the &quot;.nospam&quot; bit (including the dot) when 
            replying.<BR><BR><BR></FONT>___________________________________________________________________________<BR><BR>WinInfo: 
            Windows news and information -- Copyright (c) 1995-9 Paul 
            Thurrott<BR>Visit WinInfo on the Web at WUGNET: <A 
            href="http://www.wugnet.com/wininfo";>http://www.wugnet.com/wininfo</A><BR>___________________________________________________________________________<BR><BR>Today's 
            WinInfo:<BR>&nbsp; Microsoft challenges BackOrifice myths<BR>&nbsp; 
            Microsoft bringing USB hardware to the 
            Macintosh<BR><BR><BR>Microsoft challenges BackOrifice 
            myths<BR><BR>With the release this week of Windows NT hacking tool 
            &quot;BackOrifice 2000,&quot;<BR>Microsoft has launched an 
            informational campaign of its own, designed to<BR>derail myths about 
            the malicious program. According to a report on<BR>Microsoft's 
            Security Advisor Web site, BackOrifice 2000 is a remote 
            control<BR>application that must be stealthily installed so that 
            attackers can take<BR>over a Windows NT-based network. The program 
            enables remote hackers to do<BR>anything they could do were they to 
            be logged onto the machine locally: Run<BR>programs, delete files, 
            and the like.<BR><BR>&quot;BackOrifice 2000 is a remote-access tool 
            that was developed with the intent<BR>of harming users,&quot; says 
            Jason Garms, the lead product manager for Windows NT<BR>security at 
            Microsoft. &quot;It is a tool that has no legitimate purpose 
            other<BR>than exposing users' machines to people on the Internet. 
            Users who are<BR>tricked into getting this thing installed on their 
            system are vulnerable to<BR>the attacker, who can then do anything 
            that the victim can do--move the<BR>mouse, open files, run programs, 
            etc.--which is little different from what<BR>legitimate 
            remote-control software can do. Back Orifice, however, 
            is<BR>designed to be stealthy and evade detection by the 
            user.&quot;<BR><BR>For BackOrifice to find its way onto your system 
            the hacker must have<BR>physical access to the machine with a valid 
            login or you must be tricked<BR>into installing it; typically this 
            is accomplished by sending users the<BR>program as an email 
            attachment that must be executed. To prevent this<BR>program from 
            taking over your system, just use common sense: Always run 
            an<BR>anti-virus program with up-to-date virus definitions and don't 
            let anyone<BR>gain unauthorized physical access to your machine. 
            Perhaps most importantly,<BR>don't execute email attachments from 
            unknown people.<BR><BR>One of the biggest myths perpetrated by the 
            makers of BackOrifice is that<BR>program takes advantage of security 
            inadequacies that are inherent in<BR>Windows and Windows NT. This is 
            simply not true: BackOrifice could have been<BR>written to attack 
            *any* kind of computer system. The hackers that wrote it<BR>simply 
            decided to attack Windows, which is the most popular 
            computing<BR>platform by far. In fact, as Microsoft notes, 
            BackOrifice doesn't actually<BR>target Windows per se at all: It 
            targets users, who often don't understand<BR>security issues well 
            enough to not execute email attachments from 
            unknown<BR>sources.<BR><BR>Another common myth centers on the goal 
            for BackOrifice: In an attempt to<BR>protect themselves from legal 
            problems, the creators of BackOrifice are<BR>pretending that it is a 
            legitimate remote control application. However, this<BR>is not the 
            case: BackOrifice is designed to escape detection and exceeds 
            the<BR>needs of remote control software. And it doesn't prompt the 
            user when it<BR>installs on the system.<BR><BR>&quot;The creators 
            [of BackOrifice] claim that this is a useful administration<BR>tool, 
            but it doesn't even prompt people when it installs itself on 
            the<BR>system. It doesn't warn them that it's getting installed. 
            And, once it's<BR>installed, it makes the system available to other 
            people on the Internet.<BR>That is a malicious act,&quot; says 
            Garms. &quot;I am personally unaware of any major<BR>customers of 
            ours who consider this to be a remote administration tool as<BR>the 
            folks who created it claim. Quite the contrary, they consider it a 
            piece<BR>of malicious code. Unfortunately, there are some users who 
            were duped by the<BR>press releases from the organization that 
            released the software, and did<BR>install it on their 
            systems.&quot;<BR><BR>For more information about Microsoft's 
            response to BackOrifice 2000, please<BR>visit the Microsoft Security 
            Advisor Web site:<BR>&nbsp; <A 
            href="http://www.microsoft.com/security/bulletins/bo2k.asp";>http://www.microsoft.com/security/bulletins/bo2k.asp</A><BR><BR><BR><BR><BR>Microsoft 
            bringing USB hardware to the Macintosh<BR><BR>Microsoft Corporation 
            will announce the availability of its first USB<BR>hardware for the 
            Macintosh, the IntelliMouse Explorer, a &quot;no ball&quot; 
            mouse<BR>that the company will release this fall for Windows as 
            well. According to<BR>rumors, Microsoft will also be porting other 
            USB hardware to the Macintosh,<BR>including possibly all of the 
            company's joystick/entertainment hardware,<BR>such as the FreeStyle 
            Pro GamePad and the Sidewinder Precision Pro joystick.<BR><BR>Expect 
            an official announcement from Microsoft at MacWorld New York 
            next<BR>week.<BR><BR>___________________________________________________________________________<BR><BR>Visit 
            WinInfo on the Web at WUGNET: <A 
            href="http://www.wugnet.com/wininfo";>http://www.wugnet.com/wininfo</A><BR><BR>To 
            unsubscribe from the WinInfo list, simply send an E-mail message 
            to<BR><A 
            href="mailto:listserv@xxxxxxxxxxxxxxxxxxxx";>listserv@xxxxxxxxxxxxxxxxxxxx</A> 
            with the phrase &quot;unsubscribe wininfo&quot; (no<BR>quotes) in 
            the body. If you are having problems unsubscribing or any 
            other<BR>problems with the list, please write Keith Furman at <A 
            href="mailto:listadmin@xxxxxxxxxx";>listadmin@xxxxxxxxxx</A>.<BR>___________________________________________________________________________</BLOCKQUOTE></BLOCKQUOTE><BR></BLOCKQUOTE></BODY></HTML>
</x-html>From ???@??? Fri Jul 30 06:30:40 1999
Return-Path: <majordom@xxxxxxxxxxxxxxxxxx>
Received: from listserv.equis.com (listserv.equis.com [204.246.137.2])
	by purebytes.com (8.8.7/8.8.7) with ESMTP id XAA29001
	for <neal@xxxxxxxxxxxxx>; Thu, 29 Jul 1999 23:15:15 -0700
Received: (from majordom@xxxxxxxxx)
	by listserv.equis.com (8.8.7/8.8.7) id OAA11860
	for metastock-outgoing; Fri, 30 Jul 1999 14:00:54 -0600
X-Authentication-Warning: listserv.equis.com: majordom set sender to owner-metastock@xxxxxxxxxxxxx using -f
Received: from freeze.metastock.com (freeze.metastock.com [204.246.137.5])
	by listserv.equis.com (8.8.7/8.8.7) with ESMTP id OAA11857
	for <metastock@xxxxxxxxxxxxxxxxxx>; Fri, 30 Jul 1999 14:00:51 -0600
Received: from cypher.turbonet.com (cypher.turbonet.com [204.188.48.1])
	by freeze.metastock.com (8.8.5/8.8.5) with ESMTP id XAA14608
	for <metastock@xxxxxxxxxxxxx>; Thu, 29 Jul 1999 23:48:52 -0600 (MDT)
Received: from [204.188.49.139] by cypher.turbonet.com (NTMail 4.30.0012/NT0409.00.61d4ce09) with ESMTP id vkqqaaaa for <metastock@xxxxxxxxxxxxx>; Thu, 29 Jul 1999 22:39:12 -0700
From: "Steve Karnish" <kernish@xxxxxxxxxxxx>
To: <metastock@xxxxxxxxxxxxx>, <realtraders@xxxxxxxxxxxxxxx>
Subject: Norman and sugar
Date: Thu, 29 Jul 1999 22:35:37 -0700
X-MSMail-Priority: Normal
X-Priority: 3
X-Mailer: Microsoft Internet Mail 4.70.1162
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="----=_NextPart_000_01BEDA12.AE255020"
Content-Transfer-Encoding: 7bit
Message-Id: <05391276515501@xxxxxxxxxxxx>
Sender: owner-metastock@xxxxxxxxxxxxx
Precedence: bulk
Reply-To: metastock@xxxxxxxxxxxxx
Status:   

Realtraders & MSers,

For two months this spring, I promised myself everyday if sugar dipped
below 4 cents that I would buy two contracts. If it proceeded to dip below
3 cents, I would buy two additional contracts and was prepared to pick up a
couple more below 2 cents.  On 4/28 I filled at 3.98 and 4.06 in July.  The
following day affected a number of technical indicators.  The candles
signaled a nice variation of a three day "morning star" pattern (with a
nice hammer in the middle).  I monitor about eight momentum indicators and
even the slow moving (but, quite directional) Coppock Curve turned up.  On
4/30, after staying up to midnight calling anyone who would listen, I
bought July contracts all during the session, filling between 4.36 and
4.52.  I rolled to October contracts when volume started to exceed Julys'.

For the more agressive traders, I sold between 6.20 and 6.50 and bought
back in the 5.40 to 5.50 range.  The majority of my folks want to ride this
one into the sunset.  I guess when you get people all whipped up about
sunspots, La Nina and 50 and 70 cent sugar, it's hard to get them to cover
their long positons.  Norman makes a great point:  how much risk does one
have with 4 cent sugar?   Also, use all the tools in the toolbox.  Candles,
momentum oscillators, fib retracements, and common sense (and if throwin'
the bones helped, I'd be doin' it) go a long way to make this one of those
memorable position trades.  I'm mostly a "holy grail" mechanical swing
trader and I'm seldom in a position for more than 5 days...but there are
times when the risk to reward calls for position trading:  crude in
December, unleaded in February, sugar in April, ... wheat in August (is it
really going to two bucks)? 

Steve Karnish
CCT
Attachment Converted: "c:\eudora\attach\sbn.gif"

Attachment Converted: "c:\eudora\attach\sbv.gif"