[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: intruders [Fw: Today's WinInfo: July 12]



PureBytes Links

Trading Reference Links

<x-html><!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META content="text/html; charset=iso-8859-1" http-equiv=Content-Type>
<META content="MSHTML 5.00.2314.1000" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=410321022-30071999>Ton</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=410321022-30071999></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN class=410321022-30071999>I 
tried 'Find' and it couldn't find it, but maybe it doesn't search through all of 
the cabinets as I have the whole Win95 CD-ROM stored on my D: 
drive.</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=410321022-30071999></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=410321022-30071999>Regards</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=410321022-30071999></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=410321022-30071999>Guy</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=410321022-30071999></SPAN></FONT>&nbsp;</DIV>
<DIV class=OutlookMessageHeader><FONT face="Times New Roman" 
size=2>-----Original Message-----<BR><B>From:</B> owner-metastock@xxxxxxxxxxxxx 
[mailto:owner-metastock@xxxxxxxxxxxxx]<B>On Behalf Of</B> A.J. 
Maas<BR><B>Sent:</B> Friday, July 30, 1999 11:32 AM<BR><B>To:</B> 
metastock@xxxxxxxxxxxxx<BR><B>Subject:</B> Re: intruders [Fw: Today's WinInfo: 
July 12]<BR><BR></FONT></DIV>
<DIV><FONT size=2>Its in one of the CAB-files in the W95-CdRom's 
"Win95"-folder.<BR>(I have got all CAB's contents listed, so I can have a look 
for it if you like).</FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT size=2>Share can only be set to enabled and unabled (eg active or not 
active). This gives the utmost</FONT></DIV>
<DIV><FONT size=2>best protection.</FONT></DIV>
<DIV><FONT size=2>If however, you have shared any disk- or hardware parts, and 
protected it via a Password, then</FONT></DIV>
<DIV><FONT size=2>the software-manufacturer's quality for its known 
savety-encryption power will be the answer as</FONT></DIV>
<DIV><FONT size=2>for&nbsp;</FONT><FONT size=2>how much your Share's are 
safe(What men can make, men can also undo).</FONT></DIV>
<DIV><FONT size=2>Also, i</FONT><FONT size=2>f you have set the required 
arrangements via Share, then you will not need the PoleEditor</FONT></DIV>
<DIV><FONT size=2>program, eg unless </FONT><FONT size=2>you want to further 
fine-tune&nbsp;any&nbsp;User-settings.&nbsp; </FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT size=2>Note too, that your connection to the Internet is also 
"accessing a network (by itself)", and as such</FONT></DIV>
<DIV><FONT size=2>many search-engines are always actively searching 
for&nbsp;sites that comply to "their to be searched for word",</FONT></DIV>
<DIV><FONT size=2>as such </FONT><FONT size=2>will most likely ping&nbsp;search 
your&nbsp;ISP's unique IP-number (server), as well as your own</FONT></DIV>
<DIV><FONT size=2>PC's unique </FONT><FONT size=2>number.</FONT></DIV>
<DIV><FONT size=2></FONT>&nbsp;</DIV>
<DIV><FONT size=2>E</FONT><FONT size=2>xample:</FONT></DIV>
<DIV><FONT size=2>Say that in IE5 I type&nbsp;"AV HardCopy", then Alta Vista 
will search any sites on the entire Internet containing</FONT></DIV>
<DIV><FONT size=2>the word HardCopy.</FONT></DIV>
<DIV><FONT size=2>Since one of my homepage's articles is about 
HardCopy,&nbsp;then naturaly my homepage will be found as well</FONT></DIV>
<DIV><FONT size=2>as many others (sites and/or homepages). This happens because 
my ISP's IP-number will then be "pinged"</FONT></DIV>
<DIV><FONT size=2>searched for, as well as </FONT><FONT size=2>that many other 
</FONT><FONT size=2>ISP's IP-numbers will be "pinged" searched for, </FONT><FONT 
size=2>eg if not all ISP's</FONT></DIV>
<DIV><FONT size=2>on this planet.</FONT></DIV>
<DIV><FONT size=2>Note than also from the above, that this doesn't make me or 
Alta Vista an intruder, </FONT><FONT size=2>eg all "we" did was 
perform</FONT></DIV>
<DIV><FONT size=2>a search</FONT><FONT size=2> (action) and from such a search, 
many (lots of) IP-addresses will get "pinged" searched for the 
existance</FONT></DIV>
<DIV><FONT size=2>of the word Hardcopy, </FONT><FONT size=2>and </FONT><FONT 
size=2>thus this will&nbsp;also include (many of) your ISP (servers) and your 
ISP's subscribers</FONT></DIV>
<DIV><FONT size=2>(eg their PC's as server's </FONT><FONT size=2>own&nbsp;unique 
IP numbers).</FONT></DIV>
<DIV><FONT size=2>My own PC is not linked to my homepage (as that page is stored 
on my ISP's server), and therefore will not be</FONT></DIV>
<DIV><FONT size=2>included in the above search action. </FONT><FONT size=2>It 
can also always be search-pinged, like any one else's IP-number,</FONT></DIV>
<DIV><FONT size=2>once I am on &lt;on-line&gt; on the Internet. This will not 
</FONT><FONT size=2>harm me, my PC or my PC's contents, tho.</FONT></DIV>
<DIV><FONT size=2>(see further my previous mail).</FONT></DIV>
<DIV><BR>Regards,<BR>Ton Maas<BR><A 
href="mailto:ms-irb@xxxxxxxxxxxxx";>ms-irb@xxxxxxxxxxxxx</A><BR>Dismiss the 
".nospam" bit (including the dot) when replying.</DIV>
<DIV>&nbsp;</DIV>
<DIV>&nbsp;</DIV>
<BLOCKQUOTE 
style="BORDER-LEFT: #000000 2px solid; MARGIN-LEFT: 5px; MARGIN-RIGHT: 0px; PADDING-LEFT: 5px; PADDING-RIGHT: 0px">
  <DIV style="FONT: 10pt arial">----- Original Message ----- </DIV>
  <DIV 
  style="BACKGROUND: #e4e4e4; FONT: 10pt arial; font-color: black"><B>From:</B> 
  Guy Tann </DIV>
  <DIV style="FONT: 10pt arial"><B>To:</B> <A 
  href="mailto:metastock@xxxxxxxxxxxxx"; 
  title=metastock@xxxxxxxxxxxxx>metastock@xxxxxxxxxxxxx</A> </DIV>
  <DIV style="FONT: 10pt arial"><B>Sent:</B> woensdag 28 juli 1999 6:16</DIV>
  <DIV style="FONT: 10pt arial"><B>Subject:</B> RE: intruders [Fw: Today's 
  WinInfo: July 12]</DIV>
  <DIV><BR></DIV>
  <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
  class=780561304-28071999>Ton</SPAN></FONT></DIV>
  <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
  class=780561304-28071999></SPAN></FONT>&nbsp;</DIV>
  <DIV><FONT color=#0000ff face=Arial size=2><SPAN class=780561304-28071999>I 
  have password protected all of my drives with passwords for read-only as well 
  as read-write access.&nbsp; I'm still finding 'visitors' in my network 
  neighborhood.&nbsp; I assume they can't get at anything.&nbsp; When I 
  installed the passwords, I disconnected my PC from the network (and the 
  Internet) and installed all of the passwords, etc.&nbsp; Then hooked 
  everything back up.</SPAN></FONT></DIV>
  <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
  class=780561304-28071999></SPAN></FONT>&nbsp;</DIV>
  <DIV><FONT color=#0000ff face=Arial size=2><SPAN class=780561304-28071999>I 
  tried to locate poledit.exe and that program isn't anywhere to be found in my 
  Win95 directory.</SPAN></FONT></DIV>
  <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
  class=780561304-28071999></SPAN></FONT>&nbsp;</DIV>
  <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
  class=780561304-28071999>Regards</SPAN></FONT></DIV>
  <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
  class=780561304-28071999></SPAN></FONT>&nbsp;</DIV>
  <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
  class=780561304-28071999>Guy</SPAN></FONT></DIV>
  <DIV><FONT color=#0000ff face=Arial size=2><SPAN 
  class=780561304-28071999></SPAN></FONT>&nbsp;</DIV>
  <DIV class=OutlookMessageHeader><FONT face="Times New Roman" 
  size=2>-----Original Message-----<BR><B>From:</B> 
  owner-metastock@xxxxxxxxxxxxx [mailto:owner-metastock@xxxxxxxxxxxxx]<B>On 
  Behalf Of</B> A.J. Maas<BR><B>Sent:</B> Tuesday, July 13, 1999 4:12 
  PM<BR><B>To:</B> Metastock-List<BR><B>Subject:</B> Re: intruders [Fw: Today's 
  WinInfo: July 12]<BR><BR></FONT></DIV>
  <DIV><FONT size=2>To clear some myths..........................</FONT></DIV>
  <DIV><FONT size=2></FONT>&nbsp;</DIV>
  <DIV><FONT size=2>For as long as you do not "Share" any files, disks, 
  printers,&nbsp;folders or even Net-adapters, you are save from</FONT></DIV>
  <DIV><FONT size=2>anyone entering </FONT><FONT size=2>your PC.</FONT></DIV>
  <DIV><FONT size=2>
  <DIV><FONT size=2>If you haven't done any of the&nbsp;file, folder, disk, 
  printer and netadapter </FONT><FONT size=2>sharing (also in the Control 
  Panel's Nethood/</FONT></DIV>
  <DIV><FONT size=2>Networking and the Win95/98 Context Menu's options for 
  "Sharing", then no-one can intrude onto your PC</FONT></DIV>
  <DIV><FONT size=2>with you in command (and as otherwise is described in the 
  article below).</FONT></DIV></FONT></DIV>
  <DIV><FONT size=2>This "Sharing", apart from the Control Panel's Nethood and 
  the Win95/98 Context Menu's options,</FONT></DIV>
  <DIV><FONT size=2>are privaleges you can also set for any of the "Users" 
  of&nbsp;your PC's Windows sessions. </FONT><FONT size=2>The program&nbsp;to do 
  so</FONT></DIV>
  <DIV><FONT size=2>is "C:\Windows\Poledit.exe".</FONT></DIV>
  <DIV>&nbsp;</DIV>
  <DIV><FONT size=2>The above is for Win95/98 only, for as WIN-NT4/2000 requires 
  a top secret "NTconfig.pol" file stored on server for</FONT></DIV>
  <DIV><FONT size=2>setting the&nbsp;"Sharing of the Network's NetHood, Server 
  and&nbsp;WKS's </FONT><FONT size=2>files, folders, printers and 
  disks".</FONT></DIV>
  <DIV>&nbsp;</DIV>
  <DIV><FONT size=2>Regards,<BR>Ton Maas<BR><A 
  href="mailto:ms-irb@xxxxxxxxxxxxx";>ms-irb@xxxxxxxxxxxxx</A><BR>Dismiss the 
  ".nospam" bit (including the dot) when replying.<BR><BR><BR></FONT><FONT 
  size=3>___________________________________________________________________________<BR><BR>WinInfo: 
  Windows news and information -- Copyright (c) 1995-9 Paul Thurrott<BR>Visit 
  WinInfo on the Web at WUGNET: <A 
  href="http://www.wugnet.com/wininfo";>http://www.wugnet.com/wininfo</A><BR>___________________________________________________________________________<BR><BR>Today's 
  WinInfo:<BR>&nbsp; Microsoft challenges BackOrifice myths<BR>&nbsp; Microsoft 
  bringing USB hardware to the Macintosh<BR><BR><BR>Microsoft challenges 
  BackOrifice myths<BR><BR>With the release this week of Windows NT hacking tool 
  "BackOrifice 2000,"<BR>Microsoft has launched an informational campaign of its 
  own, designed to<BR>derail myths about the malicious program. According to a 
  report on<BR>Microsoft's Security Advisor Web site, BackOrifice 2000 is a 
  remote control<BR>application that must be stealthily installed so that 
  attackers can take<BR>over a Windows NT-based network. The program enables 
  remote hackers to do<BR>anything they could do were they to be logged onto the 
  machine locally: Run<BR>programs, delete files, and the 
  like.<BR><BR>"BackOrifice 2000 is a remote-access tool that was developed with 
  the intent<BR>of harming users," says Jason Garms, the lead product manager 
  for Windows NT<BR>security at Microsoft. "It is a tool that has no legitimate 
  purpose other<BR>than exposing users' machines to people on the Internet. 
  Users who are<BR>tricked into getting this thing installed on their system are 
  vulnerable to<BR>the attacker, who can then do anything that the victim can 
  do--move the<BR>mouse, open files, run programs, etc.--which is little 
  different from what<BR>legitimate remote-control software can do. Back 
  Orifice, however, is<BR>designed to be stealthy and evade detection by the 
  user."<BR><BR>For BackOrifice to find its way onto your system the hacker must 
  have<BR>physical access to the machine with a valid login or you must be 
  tricked<BR>into installing it; typically this is accomplished by sending users 
  the<BR>program as an email attachment that must be executed. To prevent 
  this<BR>program from taking over your system, just use common sense: Always 
  run an<BR>anti-virus program with up-to-date virus definitions and don't let 
  anyone<BR>gain unauthorized physical access to your machine. Perhaps most 
  importantly,<BR>don't execute email attachments from unknown 
  people.<BR><BR>One of the biggest myths perpetrated by the makers of 
  BackOrifice is that<BR>program takes advantage of security inadequacies that 
  are inherent in<BR>Windows and Windows NT. This is simply not true: 
  BackOrifice could have been<BR>written to attack *any* kind of computer 
  system. The hackers that wrote it<BR>simply decided to attack Windows, which 
  is the most popular computing<BR>platform by far. In fact, as Microsoft notes, 
  BackOrifice doesn't actually<BR>target Windows per se at all: It targets 
  users, who often don't understand<BR>security issues well enough to not 
  execute email attachments from unknown<BR>sources.<BR><BR>Another common myth 
  centers on the goal for BackOrifice: In an attempt to<BR>protect themselves 
  from legal problems, the creators of BackOrifice are<BR>pretending that it is 
  a legitimate remote control application. However, this<BR>is not the case: 
  BackOrifice is designed to escape detection and exceeds the<BR>needs of remote 
  control software. And it doesn't prompt the user when it<BR>installs on the 
  system.<BR><BR>"The creators [of BackOrifice] claim that this is a useful 
  administration<BR>tool, but it doesn't even prompt people when it installs 
  itself on the<BR>system. It doesn't warn them that it's getting installed. 
  And, once it's<BR>installed, it makes the system available to other people on 
  the Internet.<BR>That is a malicious act," says Garms. "I am personally 
  unaware of any major<BR>customers of ours who consider this to be a remote 
  administration tool as<BR>the folks who created it claim. Quite the contrary, 
  they consider it a piece<BR>of malicious code. Unfortunately, there are some 
  users who were duped by the<BR>press releases from the organization that 
  released the software, and did<BR>install it on their systems."<BR><BR>For 
  more information about Microsoft's response to BackOrifice 2000, 
  please<BR>visit the Microsoft Security Advisor Web site:<BR>&nbsp; <A 
  href="http://www.microsoft.com/security/bulletins/bo2k.asp";>http://www.microsoft.com/security/bulletins/bo2k.asp</A><BR><BR><BR><BR><BR>Microsoft 
  bringing USB hardware to the Macintosh<BR><BR>Microsoft Corporation will 
  announce the availability of its first USB<BR>hardware for the Macintosh, the 
  IntelliMouse Explorer, a "no ball" mouse<BR>that the company will release this 
  fall for Windows as well. According to<BR>rumors, Microsoft will also be 
  porting other USB hardware to the Macintosh,<BR>including possibly all of the 
  company's joystick/entertainment hardware,<BR>such as the FreeStyle Pro 
  GamePad and the Sidewinder Precision Pro joystick.<BR><BR>Expect an official 
  announcement from Microsoft at MacWorld New York 
  next<BR>week.<BR><BR>___________________________________________________________________________<BR><BR>Visit 
  WinInfo on the Web at WUGNET: <A 
  href="http://www.wugnet.com/wininfo";>http://www.wugnet.com/wininfo</A><BR><BR>To 
  unsubscribe from the WinInfo list, simply send an E-mail message to<BR><A 
  href="mailto:listserv@xxxxxxxxxxxxxxxxxxxx";>listserv@xxxxxxxxxxxxxxxxxxxx</A> 
  with the phrase "unsubscribe wininfo" (no<BR>quotes) in the body. If you are 
  having problems unsubscribing or any other<BR>problems with the list, please 
  write Keith Furman at <A 
  href="mailto:listadmin@xxxxxxxxxx";>listadmin@xxxxxxxxxx</A>.<BR>___________________________________________________________________________<BR></DIV></BLOCKQUOTE></FONT></BODY></HTML>
</x-html>From ???@??? Fri Jul 30 21:46:36 1999
Return-Path: <majordom@xxxxxxxxxxxxxxxxxx>
Received: from listserv.equis.com (listserv.equis.com [204.246.137.2])
	by purebytes.com (8.8.7/8.8.7) with ESMTP id VAA17199
	for <neal@xxxxxxxxxxxxx>; Fri, 30 Jul 1999 21:33:03 -0700
Received: (from majordom@xxxxxxxxx)
	by listserv.equis.com (8.8.7/8.8.7) id MAA16146
	for metastock-outgoing; Sat, 31 Jul 1999 12:10:27 -0600
X-Authentication-Warning: listserv.equis.com: majordom set sender to owner-metastock@xxxxxxxxxxxxx using -f
Received: from freeze.metastock.com (freeze.metastock.com [204.246.137.5])
	by listserv.equis.com (8.8.7/8.8.7) with ESMTP id MAA16142
	for <metastock@xxxxxxxxxxxxxxxxxx>; Sat, 31 Jul 1999 12:10:22 -0600
Received: from smtp02.wxs.nl (smtp02.wxs.nl [195.121.6.60])
	by freeze.metastock.com (8.8.5/8.8.5) with ESMTP id VAA15206
	for <metastock@xxxxxxxxxxxxx>; Fri, 30 Jul 1999 21:58:29 -0600 (MDT)
Received: from escom ([195.121.180.191]) by smtp02.wxs.nl
          (Netscape Messaging Server 3.61)  with SMTP id AAD6FBE
          for <metastock@xxxxxxxxxxxxx>; Sat, 31 Jul 1999 05:44:57 +0200
Message-ID: <001001bedb06$d734c8c0$bfb479c3@xxxxx>
From: "A.J. Maas" <anthmaas@xxxxxx>
To: <metastock@xxxxxxxxxxxxx>
References: <LMBBKJCLKIJIBBJLAEIJAEGOCHAA.nkormanik@xxxxxxxxxx>
Subject: Re: Stochastics discrepancy????
Date: Sat, 31 Jul 1999 05:43:16 +0200
Organization: Ms-IRB
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.00.2014.211
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2014.211
Sender: owner-metastock@xxxxxxxxxxxxx
Precedence: bulk
Reply-To: metastock@xxxxxxxxxxxxx
Status:   

There are formula differences:
----------------------------------------- 

            For starters, that "cf00039.html" page formula returns a 3-day slowing result
            (=mov ave) of the 14-day %K Stochastics Oscillator, but <now> as a custom
            version.

Mov( ( ( ( C - LLV( L,14 ) ) / ( HHV( H,14 ) - LLV( L,14 ) ) ) * 100 ) ,3 ,S )

           This (14,3) %K slowing version can also be written as: (see MS65-man p.246)

Stoch( 14, 3 )

           and can also be written as: (see MS65-man p.276)

(  Sum( C - LLV( L,14 ) ,3 ) / Sum( HHV ( H,14 ) - LLV( L,14 ) ,3 )   ) * 100

          The Sum-function here is explained as follows: (see MS65-man p. 246)
                   The formula Sum( C, 14 ) returns the sum of the preceding 14 closing prices.
                   A 14-period simple move ave(SMA) could be written Sum( C,14 ) / 14.
          Thus:
                   The formula Sum( C - LLV( L,14), 3) returns the sum of the preceding 3 results
                          of the closing price minus the preceding 14 day lowest LOW.
                   The formula Sum( HHV ( H,14 ) - LLV( L,14 ) ,3) returns the sum of the preceding
                          3 results of the preceding 14 day highest HIGH minus the preceding 14-day
                          lowest LOW. 

The above 1st given formula("cf00039.html") calculates a 3 SMA over the main formula's
total results only and also does so right at the end of calculating this main formula multiplied
by 100 first, where the 3td formula calculates a 3 SMA first of (eg of part 1 of the main formula),
before proceeding calculating the 3 SMA (of part 2 of the main formula) and then proceeding
with calculating the main formula (part 1 divided by part 2) and then the main formula's results
to be multiplied by 100 "only". 

A first look at the above, also does not give that much of an "optical" difference here, but when
calculated by the in these formulas implemented "part's ranking and calculating preferences"
(the nested bits first, or placed in a different nesting setup) then can make all of the "real"
difference here.
I have not checked/tested it, the above, for any further results, tho.

Also, I do not know if the program does different jobs with "rounding-the-figures", eg to certain
places after/right of the comma, and then these possible differences in roundings and then
also added over the years, can make the difference as well. (eg rounding figure's differences
over the years and the difference when using built-in indicators or when using custom indicators).

Looking at your chart, the custom seems to be "faster" then the build-in, eg as though it is
one(1) day ahead at times (eg the very volatile trending times).  

Regards,
Ton Maas
ms-irb@xxxxxxxxxxxxx
Dismiss the ".nospam" bit (including the dot) when replying.


----- Original Message ----- 
From: Nicholas Kormanik <nkormanik@xxxxxxxxxx>
To: <metastock@xxxxxxxxxxxxx>
Sent: vrijdag 30 juli 1999 7:47
Subject: Stochastics discrepancy????


> 
> 
> I see a discrepancy in the charts between the following two supposedly
> identical indicators:
> 
> 1)  The ***built-in*** MS Win 6.5 Stochastic Oscillator (excluding the
> moving average line),
> 
> say for 13-8;
> 
> 2)  The ***formula*** for Stochastic Oscillator provided at the Equis web
> 
> site (http://www.equis.com/customer/support/formulas/cf00039.html).
> 
> That formula is:
> 
> Mov( ( ( ( C - LLV( L,13 ) ) /( HHV( H,13 ) - LLV( L,13 ) ) ) * 100 ) ,8
> ,S )
> 
> 
> Could any of you please suggest a reason why there might be this
> discrepancy?
> 
> Thanks very much,
> Nicholas
> 
> 
> 
> 
>