PureBytes Links
Trading Reference Links
|
<x-html><!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META content="text/html; charset=iso-8859-1" http-equiv=Content-Type>
<META content="MSHTML 5.00.2614.3401" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT size=2>Its in one of the CAB-files in the W95-CdRom's
"Win95"-folder.<BR>(I have got all CAB's contents listed, so I can have a look
for it if you like).</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>Share can only be set to enabled and unabled (eg active or not
active). This gives the utmost</FONT></DIV>
<DIV><FONT size=2>best protection.</FONT></DIV>
<DIV><FONT size=2>If however, you have shared any disk- or hardware parts, and
protected it via a Password, then</FONT></DIV>
<DIV><FONT size=2>the software-manufacturer's quality for its known
savety-encryption power will be the answer as</FONT></DIV>
<DIV><FONT size=2>for </FONT><FONT size=2>how much your Share's are
safe(What men can make, men can also undo).</FONT></DIV>
<DIV><FONT size=2>Also, i</FONT><FONT size=2>f you have set the required
arrangements via Share, then you will not need the PoleEditor</FONT></DIV>
<DIV><FONT size=2>program, eg unless </FONT><FONT size=2>you want to further
fine-tune any User-settings. </FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>Note too, that your connection to the Internet is also
"accessing a network (by itself)", and as such</FONT></DIV>
<DIV><FONT size=2>many search-engines are always actively searching
for sites that comply to "their to be searched for word",</FONT></DIV>
<DIV><FONT size=2>as such </FONT><FONT size=2>will most likely ping search
your ISP's unique IP-number (server), as well as your own</FONT></DIV>
<DIV><FONT size=2>PC's unique </FONT><FONT size=2>number.</FONT></DIV>
<DIV><FONT size=2></FONT> </DIV>
<DIV><FONT size=2>E</FONT><FONT size=2>xample:</FONT></DIV>
<DIV><FONT size=2>Say that in IE5 I type "AV HardCopy", then Alta Vista
will search any sites on the entire Internet containing</FONT></DIV>
<DIV><FONT size=2>the word HardCopy.</FONT></DIV>
<DIV><FONT size=2>Since one of my homepage's articles is about
HardCopy, then naturaly my homepage will be found as well</FONT></DIV>
<DIV><FONT size=2>as many others (sites and/or homepages). This happens because
my ISP's IP-number will then be "pinged"</FONT></DIV>
<DIV><FONT size=2>searched for, as well as </FONT><FONT size=2>that many other
</FONT><FONT size=2>ISP's IP-numbers will be "pinged" searched for, </FONT><FONT
size=2>eg if not all ISP's</FONT></DIV>
<DIV><FONT size=2>on this planet.</FONT></DIV>
<DIV><FONT size=2>Note than also from the above, that this doesn't make me or
Alta Vista an intruder, </FONT><FONT size=2>eg all "we" did was
perform</FONT></DIV>
<DIV><FONT size=2>a search</FONT><FONT size=2> (action) and from such a search,
many (lots of) IP-addresses will get "pinged" searched for the
existance</FONT></DIV>
<DIV><FONT size=2>of the word Hardcopy, </FONT><FONT size=2>and </FONT><FONT
size=2>thus this will also include (many of) your ISP (servers) and your
ISP's subscribers</FONT></DIV>
<DIV><FONT size=2>(eg their PC's as server's </FONT><FONT size=2>own unique
IP numbers).</FONT></DIV>
<DIV><FONT size=2>My own PC is not linked to my homepage (as that page is stored
on my ISP's server), and therefore will not be</FONT></DIV>
<DIV><FONT size=2>included in the above search action. </FONT><FONT size=2>It
can also always be search-pinged, like any one else's IP-number,</FONT></DIV>
<DIV><FONT size=2>once I am on <on-line> on the Internet. This will not
</FONT><FONT size=2>harm me, my PC or my PC's contents, tho.</FONT></DIV>
<DIV><FONT size=2>(see further my previous mail).</FONT></DIV>
<DIV><BR>Regards,<BR>Ton Maas<BR><A
href="mailto:ms-irb@xxxxxxxxxxxxx">ms-irb@xxxxxxxxxxxxx</A><BR>Dismiss the
".nospam" bit (including the dot) when replying.</DIV>
<DIV> </DIV>
<DIV> </DIV>
<BLOCKQUOTE
style="BORDER-LEFT: #000000 2px solid; MARGIN-LEFT: 5px; MARGIN-RIGHT: 0px; PADDING-LEFT: 5px; PADDING-RIGHT: 0px">
<DIV style="FONT: 10pt arial">----- Original Message ----- </DIV>
<DIV
style="BACKGROUND: #e4e4e4; FONT: 10pt arial; font-color: black"><B>From:</B>
Guy Tann </DIV>
<DIV style="FONT: 10pt arial"><B>To:</B> <A
href="mailto:metastock@xxxxxxxxxxxxx"
title=metastock@xxxxxxxxxxxxx>metastock@xxxxxxxxxxxxx</A> </DIV>
<DIV style="FONT: 10pt arial"><B>Sent:</B> woensdag 28 juli 1999 6:16</DIV>
<DIV style="FONT: 10pt arial"><B>Subject:</B> RE: intruders [Fw: Today's
WinInfo: July 12]</DIV>
<DIV><BR></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999>Ton</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999></SPAN></FONT> </DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN class=780561304-28071999>I
have password protected all of my drives with passwords for read-only as well
as read-write access. I'm still finding 'visitors' in my network
neighborhood. I assume they can't get at anything. When I
installed the passwords, I disconnected my PC from the network (and the
Internet) and installed all of the passwords, etc. Then hooked
everything back up.</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999></SPAN></FONT> </DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN class=780561304-28071999>I
tried to locate poledit.exe and that program isn't anywhere to be found in my
Win95 directory.</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999></SPAN></FONT> </DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999>Regards</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999></SPAN></FONT> </DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999>Guy</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN
class=780561304-28071999></SPAN></FONT> </DIV>
<DIV class=OutlookMessageHeader><FONT face="Times New Roman"
size=2>-----Original Message-----<BR><B>From:</B>
owner-metastock@xxxxxxxxxxxxx [mailto:owner-metastock@xxxxxxxxxxxxx]<B>On
Behalf Of</B> A.J. Maas<BR><B>Sent:</B> Tuesday, July 13, 1999 4:12
PM<BR><B>To:</B> Metastock-List<BR><B>Subject:</B> Re: intruders [Fw: Today's
WinInfo: July 12]<BR><BR></FONT></DIV>
<DIV><FONT size=2>To clear some myths..........................</FONT></DIV>
<DIV><FONT size=2></FONT> </DIV>
<DIV><FONT size=2>For as long as you do not "Share" any files, disks,
printers, folders or even Net-adapters, you are save from</FONT></DIV>
<DIV><FONT size=2>anyone entering </FONT><FONT size=2>your PC.</FONT></DIV>
<DIV><FONT size=2>
<DIV><FONT size=2>If you haven't done any of the file, folder, disk,
printer and netadapter </FONT><FONT size=2>sharing (also in the Control
Panel's Nethood/</FONT></DIV>
<DIV><FONT size=2>Networking and the Win95/98 Context Menu's options for
"Sharing", then no-one can intrude onto your PC</FONT></DIV>
<DIV><FONT size=2>with you in command (and as otherwise is described in the
article below).</FONT></DIV></FONT></DIV>
<DIV><FONT size=2>This "Sharing", apart from the Control Panel's Nethood and
the Win95/98 Context Menu's options,</FONT></DIV>
<DIV><FONT size=2>are privaleges you can also set for any of the "Users"
of your PC's Windows sessions. </FONT><FONT size=2>The program to do
so</FONT></DIV>
<DIV><FONT size=2>is "C:\Windows\Poledit.exe".</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>The above is for Win95/98 only, for as WIN-NT4/2000 requires
a top secret "NTconfig.pol" file stored on server for</FONT></DIV>
<DIV><FONT size=2>setting the "Sharing of the Network's NetHood, Server
and WKS's </FONT><FONT size=2>files, folders, printers and
disks".</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>Regards,<BR>Ton Maas<BR><A
href="mailto:ms-irb@xxxxxxxxxxxxx">ms-irb@xxxxxxxxxxxxx</A><BR>Dismiss the
".nospam" bit (including the dot) when replying.<BR><BR><BR></FONT><FONT
size=3>___________________________________________________________________________<BR><BR>WinInfo:
Windows news and information -- Copyright (c) 1995-9 Paul Thurrott<BR>Visit
WinInfo on the Web at WUGNET: <A
href="http://www.wugnet.com/wininfo">http://www.wugnet.com/wininfo</A><BR>___________________________________________________________________________<BR><BR>Today's
WinInfo:<BR> Microsoft challenges BackOrifice myths<BR> Microsoft
bringing USB hardware to the Macintosh<BR><BR><BR>Microsoft challenges
BackOrifice myths<BR><BR>With the release this week of Windows NT hacking tool
"BackOrifice 2000,"<BR>Microsoft has launched an informational campaign of its
own, designed to<BR>derail myths about the malicious program. According to a
report on<BR>Microsoft's Security Advisor Web site, BackOrifice 2000 is a
remote control<BR>application that must be stealthily installed so that
attackers can take<BR>over a Windows NT-based network. The program enables
remote hackers to do<BR>anything they could do were they to be logged onto the
machine locally: Run<BR>programs, delete files, and the
like.<BR><BR>"BackOrifice 2000 is a remote-access tool that was developed with
the intent<BR>of harming users," says Jason Garms, the lead product manager
for Windows NT<BR>security at Microsoft. "It is a tool that has no legitimate
purpose other<BR>than exposing users' machines to people on the Internet.
Users who are<BR>tricked into getting this thing installed on their system are
vulnerable to<BR>the attacker, who can then do anything that the victim can
do--move the<BR>mouse, open files, run programs, etc.--which is little
different from what<BR>legitimate remote-control software can do. Back
Orifice, however, is<BR>designed to be stealthy and evade detection by the
user."<BR><BR>For BackOrifice to find its way onto your system the hacker must
have<BR>physical access to the machine with a valid login or you must be
tricked<BR>into installing it; typically this is accomplished by sending users
the<BR>program as an email attachment that must be executed. To prevent
this<BR>program from taking over your system, just use common sense: Always
run an<BR>anti-virus program with up-to-date virus definitions and don't let
anyone<BR>gain unauthorized physical access to your machine. Perhaps most
importantly,<BR>don't execute email attachments from unknown
people.<BR><BR>One of the biggest myths perpetrated by the makers of
BackOrifice is that<BR>program takes advantage of security inadequacies that
are inherent in<BR>Windows and Windows NT. This is simply not true:
BackOrifice could have been<BR>written to attack *any* kind of computer
system. The hackers that wrote it<BR>simply decided to attack Windows, which
is the most popular computing<BR>platform by far. In fact, as Microsoft notes,
BackOrifice doesn't actually<BR>target Windows per se at all: It targets
users, who often don't understand<BR>security issues well enough to not
execute email attachments from unknown<BR>sources.<BR><BR>Another common myth
centers on the goal for BackOrifice: In an attempt to<BR>protect themselves
from legal problems, the creators of BackOrifice are<BR>pretending that it is
a legitimate remote control application. However, this<BR>is not the case:
BackOrifice is designed to escape detection and exceeds the<BR>needs of remote
control software. And it doesn't prompt the user when it<BR>installs on the
system.<BR><BR>"The creators [of BackOrifice] claim that this is a useful
administration<BR>tool, but it doesn't even prompt people when it installs
itself on the<BR>system. It doesn't warn them that it's getting installed.
And, once it's<BR>installed, it makes the system available to other people on
the Internet.<BR>That is a malicious act," says Garms. "I am personally
unaware of any major<BR>customers of ours who consider this to be a remote
administration tool as<BR>the folks who created it claim. Quite the contrary,
they consider it a piece<BR>of malicious code. Unfortunately, there are some
users who were duped by the<BR>press releases from the organization that
released the software, and did<BR>install it on their systems."<BR><BR>For
more information about Microsoft's response to BackOrifice 2000,
please<BR>visit the Microsoft Security Advisor Web site:<BR> <A
href="http://www.microsoft.com/security/bulletins/bo2k.asp">http://www.microsoft.com/security/bulletins/bo2k.asp</A><BR><BR><BR><BR><BR>Microsoft
bringing USB hardware to the Macintosh<BR><BR>Microsoft Corporation will
announce the availability of its first USB<BR>hardware for the Macintosh, the
IntelliMouse Explorer, a "no ball" mouse<BR>that the company will release this
fall for Windows as well. According to<BR>rumors, Microsoft will also be
porting other USB hardware to the Macintosh,<BR>including possibly all of the
company's joystick/entertainment hardware,<BR>such as the FreeStyle Pro
GamePad and the Sidewinder Precision Pro joystick.<BR><BR>Expect an official
announcement from Microsoft at MacWorld New York
next<BR>week.<BR><BR>___________________________________________________________________________<BR><BR>Visit
WinInfo on the Web at WUGNET: <A
href="http://www.wugnet.com/wininfo">http://www.wugnet.com/wininfo</A><BR><BR>To
unsubscribe from the WinInfo list, simply send an E-mail message to<BR><A
href="mailto:listserv@xxxxxxxxxxxxxxxxxxxx">listserv@xxxxxxxxxxxxxxxxxxxx</A>
with the phrase "unsubscribe wininfo" (no<BR>quotes) in the body. If you are
having problems unsubscribing or any other<BR>problems with the list, please
write Keith Furman at <A
href="mailto:listadmin@xxxxxxxxxx">listadmin@xxxxxxxxxx</A>.<BR>___________________________________________________________________________<BR></DIV></BLOCKQUOTE></FONT></BODY></HTML>
</x-html>From ???@??? Fri Jul 30 21:46:32 1999
Return-Path: <majordom@xxxxxxxxxxxxxxxxxx>
Received: from listserv.equis.com (listserv.equis.com [204.246.137.2])
by purebytes.com (8.8.7/8.8.7) with ESMTP id VAA17157
for <neal@xxxxxxxxxxxxx>; Fri, 30 Jul 1999 21:29:41 -0700
Received: (from majordom@xxxxxxxxx)
by listserv.equis.com (8.8.7/8.8.7) id MAA16140
for metastock-outgoing; Sat, 31 Jul 1999 12:10:23 -0600
X-Authentication-Warning: listserv.equis.com: majordom set sender to owner-metastock@xxxxxxxxxxxxx using -f
Received: from freeze.metastock.com (freeze.metastock.com [204.246.137.5])
by listserv.equis.com (8.8.7/8.8.7) with ESMTP id MAA16133
for <metastock@xxxxxxxxxxxxxxxxxx>; Sat, 31 Jul 1999 12:10:20 -0600
Received: from smtp02.wxs.nl (smtp02.wxs.nl [195.121.6.60])
by freeze.metastock.com (8.8.5/8.8.5) with ESMTP id VAA15202
for <metastock@xxxxxxxxxxxxx>; Fri, 30 Jul 1999 21:58:26 -0600 (MDT)
Received: from escom ([195.121.180.191]) by smtp02.wxs.nl
(Netscape Messaging Server 3.61) with SMTP id AAB6FBE
for <metastock@xxxxxxxxxxxxx>; Sat, 31 Jul 1999 05:44:55 +0200
Message-ID: <000e01bedb06$d5dbef80$bfb479c3@xxxxx>
From: "A.J. Maas" <anthmaas@xxxxxx>
To: <metastock@xxxxxxxxxxxxx>
References: <000b01beda64$3a6a91c0$53cba2d0@xxxxxx>
Subject: Re: EOD zip file quotes via email providers
Date: Fri, 30 Jul 1999 23:49:01 +0200
Organization: Ms-IRB
MIME-Version: 1.0
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.00.2014.211
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2014.211
Sender: owner-metastock@xxxxxxxxxxxxx
Precedence: bulk
Reply-To: metastock@xxxxxxxxxxxxx
Status:
www.quote.com
(last that I know of) you can receive via email as well as also
download from their (protected) FTP-site.
Regards,
Ton Maas
ms-irb@xxxxxxxxxxxxx
Dismiss the ".nospam" bit (including the dot) when replying.
----- Original Message -----
From: Raidak <raidak@xxxxxxxxx>
To: Metastock List <metastock@xxxxxxxxxxxxx>
Sent: vrijdag 30 juli 1999 10:18
Subject: EOD zip file quotes via email providers
> Hi
>
> I am looking for a good eod provider who can email direct zip file of all active stocks.
> I did some search but i couldn't find any such service.
> is there anyone know of such providers
>
> thanks
>
> raidak
>
>
>
|