PureBytes Links
Trading Reference Links
|
<x-html><!DOCTYPE HTML PUBLIC "-//W3C//DTD W3 HTML//EN">
<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=Content-Type content="text/html; charset=windows-1252">
<meta name=ProgId content=Word.Document>
<meta name=Generator content="Microsoft Word 9">
<meta name=Originator content="Microsoft Word 9">
<link rel=File-List href="cid:filelist.xml@xxxxxxxxxxxxxxxxx">
<!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:DoNotRelyOnCSS/>
</o:OfficeDocumentSettings>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:WordDocument>
<w:Zoom>0</w:Zoom>
<w:DocumentKind>DocumentEmail</w:DocumentKind>
<w:EnvelopeVis/>
<w:Compatibility>
<w:ForgetLastTabAlignment/>
<w:DoNotUseHTMLParagraphAutoSpacing/>
</w:Compatibility>
</w:WordDocument>
</xml><![endif]-->
<style>
<!--
/* Font Definitions */
@font-face
{font-family:Tahoma;
panose-1:2 11 6 4 3 5 4 4 2 4;
mso-font-charset:0;
mso-generic-font-family:swiss;
mso-font-pitch:variable;
mso-font-signature:16792199 0 0 0 65791 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{mso-style-parent:"";
margin:0in;
margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:12.0pt;
font-family:"Times New Roman";
mso-fareast-font-family:"Times New Roman";}
a:link, span.MsoHyperlink
{color:blue;
text-decoration:underline;
text-underline:single;}
a:visited, span.MsoHyperlinkFollowed
{color:blue;
text-decoration:underline;
text-underline:single;}
p.MsoAutoSig, li.MsoAutoSig, div.MsoAutoSig
{margin:0in;
margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:12.0pt;
font-family:"Times New Roman";
mso-fareast-font-family:"Times New Roman";}
span.EmailStyle17
{mso-style-type:personal-reply;
mso-ansi-font-size:10.0pt;
mso-ascii-font-family:Arial;
mso-hansi-font-family:Arial;
mso-bidi-font-family:Arial;
color:navy;}
@page Section1
{size:8.5in 11.0in;
margin:1.0in 1.25in 1.0in 1.25in;
mso-header-margin:.5in;
mso-footer-margin:.5in;
mso-paper-source:0;}
div.Section1
{page:Section1;}
-->
</style>
<!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1027"/>
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1"/>
</o:shapelayout></xml><![endif]-->
<!doctype HTML PUBLIC>
</head>
<body bgcolor=white lang=EN-US link=blue vlink=blue style='tab-interval:.5in'>
<div class=Section1>
<p class=MsoNormal><span class=EmailStyle17><font size=2 color=navy face=Arial><span
style='font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Arial'>Augie<o:p></o:p></span></font></span></p>
<p class=MsoNormal><span class=EmailStyle17><font size=2 color=navy face=Arial><span
style='font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Arial'><![if !supportEmptyParas]> <![endif]><o:p></o:p></span></font></span></p>
<p class=MsoNormal><span class=EmailStyle17><font size=2 color=navy face=Arial><span
style='font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Arial'>Sorry, but
I just found your email buried in my in box.<span style="mso-spacerun: yes">
</span>Have you found the info on password protecting your hard drives
yet?<span style="mso-spacerun: yes"> </span>If not, double click My Computer
on the desktop.<span style="mso-spacerun: yes"> </span>Right click your drive
and select sharing.<span style="mso-spacerun: yes"> </span>This is where you
set up your passwords.<o:p></o:p></span></font></span></p>
<p class=MsoNormal><span class=EmailStyle17><font size=2 color=navy face=Arial><span
style='font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Arial'><![if !supportEmptyParas]> <![endif]><o:p></o:p></span></font></span></p>
<p class=MsoNormal><span class=EmailStyle17><font size=2 color=navy face=Arial><span
style='font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Arial'>Guy<o:p></o:p></span></font></span></p>
<p class=MsoNormal><span class=EmailStyle17><font size=2 color=navy face=Arial><span
style='font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Arial'><![if !supportEmptyParas]> <![endif]><o:p></o:p></span></font></span></p>
<p class=MsoNormal><span class=EmailStyle17><font size=2 color=navy face=Arial><span
style='font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Arial'><![if !supportEmptyParas]> <![endif]><o:p></o:p></span></font></span></p>
<p class=MsoNormal style='margin-left:.5in'><font size=2 color=black
face=Tahoma><span style='font-size:10.0pt;font-family:Tahoma;color:black'>-----Original
Message-----<br>
<b><span style='font-weight:bold'>From:</span></b>
owner-metastock@xxxxxxxxxxxxx [mailto:owner-metastock@xxxxxxxxxxxxx]<b><span
style='font-weight:bold'>On Behalf Of </span></b>AWong<br>
<b><span style='font-weight:bold'>Sent:</span></b> Tuesday, July 27, 1999 10:22
PM<br>
<b><span style='font-weight:bold'>To:</span></b> metastock@xxxxxxxxxxxxx<br>
<b><span style='font-weight:bold'>Subject:</span></b> Re: intruders [Fw:
Today's WinInfo: July 12]</span></font></p>
<p class=MsoNormal style='margin-left:.5in'><font size=3 face="Times New Roman"><span
style='font-size:12.0pt'><![if !supportEmptyParas]> <![endif]><o:p></o:p></span></font></p>
<p class=MsoNormal style='margin-left:.5in'><font size=2 color=black
face="Times New Roman"><span style='font-size:10.0pt;color:black'>Guy,</span></font><font
color=black><span style='color:black;mso-color-alt:windowtext'><o:p></o:p></span></font></p>
<p class=MsoNormal style='margin-left:.5in'><font size=3 color=black
face="Times New Roman"><span style='font-size:12.0pt;color:black'> </span></font><font
color=black><span style='color:black;mso-color-alt:windowtext'><o:p></o:p></span></font></p>
<p class=MsoNormal style='margin-left:.5in'><font size=2 color=black
face="Times New Roman"><span style='font-size:10.0pt;color:black'>How do I
password protect my hard drives ? Is it a Windows feature or is it
achieved via special software ?</span></font><font color=black><span
style='color:black;mso-color-alt:windowtext'><o:p></o:p></span></font></p>
<p class=MsoNormal style='margin-left:.5in'><font size=3 color=black
face="Times New Roman"><span style='font-size:12.0pt;color:black'> </span></font><font
color=black><span style='color:black;mso-color-alt:windowtext'><o:p></o:p></span></font></p>
<p class=MsoNormal style='margin-left:.5in'><font size=2 color=black
face="Times New Roman"><span style='font-size:10.0pt;color:black'>Thanks.</span></font><font
color=black><span style='color:black;mso-color-alt:windowtext'><o:p></o:p></span></font></p>
<p class=MsoNormal style='margin-left:.5in'><font size=3 color=black
face="Times New Roman"><span style='font-size:12.0pt;color:black'> </span></font><font
color=black><span style='color:black;mso-color-alt:windowtext'><o:p></o:p></span></font></p>
<p class=MsoNormal style='margin-left:.5in'><font size=2 color=black
face="Times New Roman"><span style='font-size:10.0pt;color:black'>Augie</span></font><font
color=black><span style='color:black;mso-color-alt:windowtext'><o:p></o:p></span></font></p>
<div style='border:none;border-left:solid black 1.5pt;padding:0in 0in 0in 4.0pt'>
<p class=MsoNormal style='margin-right:.5in;mso-margin-top-alt:auto;margin-bottom:
12.0pt;margin-left:39.75pt;border:none;mso-border-left-alt:solid black 1.5pt;
padding:0in;mso-padding-alt:0in 0in 0in 4.0pt'><b><font size=2 color=black
face=Arial><span style='font-size:10.0pt;font-family:Arial;color:black;
font-weight:bold'>-----Original Message-----</span></font></b><font size=2
color=black face=Arial><span style='font-size:10.0pt;font-family:Arial;
color:black'><br>
<b><span style='font-weight:bold'>From: </span></b>Guy Tann <<a
href="mailto:grt@xxxxxxxxxxxx">grt@xxxxxxxxxxxx</a>><br>
<b><span style='font-weight:bold'>To: </span></b><a
href="mailto:metastock@xxxxxxxxxxxxx">metastock@xxxxxxxxxxxxx</a> <<a
href="mailto:metastock@xxxxxxxxxxxxx">metastock@xxxxxxxxxxxxx</a>><br>
<b><span style='font-weight:bold'>Date: </span></b>Tuesday, July 27, 1999 11:13
PM<br>
<b><span style='font-weight:bold'>Subject: </span></b>RE: intruders [Fw:
Today's WinInfo: July 12]</span></font><font size=2 color=black face=Arial><span
style='font-size:10.0pt;font-family:Arial;color:black;mso-color-alt:windowtext'><o:p></o:p></span></font></p>
<p class=MsoNormal style='margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:
auto;margin-left:39.75pt;border:none;mso-border-left-alt:solid black 1.5pt;
padding:0in;mso-padding-alt:0in 0in 0in 4.0pt'><font size=2 color=blue
face=Arial><span style='font-size:10.0pt;font-family:Arial;color:blue'>Ton</span></font><font
color=black><span style='color:black;mso-color-alt:windowtext'><o:p></o:p></span></font></p>
<p class=MsoNormal style='margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:
auto;margin-left:39.75pt;border:none;mso-border-left-alt:solid black 1.5pt;
padding:0in;mso-padding-alt:0in 0in 0in 4.0pt'><font size=3 color=black
face="Times New Roman"><span style='font-size:12.0pt;color:black'> </span></font><font
color=black><span style='color:black;mso-color-alt:windowtext'><o:p></o:p></span></font></p>
<p class=MsoNormal style='margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:
auto;margin-left:39.75pt;border:none;mso-border-left-alt:solid black 1.5pt;
padding:0in;mso-padding-alt:0in 0in 0in 4.0pt'><font size=2 color=blue
face=Arial><span style='font-size:10.0pt;font-family:Arial;color:blue'>I have
password protected all of my drives with passwords for read-only as well as
read-write access. I'm still finding 'visitors' in my network
neighborhood. I assume they can't get at anything. When I installed
the passwords, I disconnected my PC from the network (and the Internet) and
installed all of the passwords, etc. Then hooked everything back up.</span></font><font
color=black><span style='color:black;mso-color-alt:windowtext'><o:p></o:p></span></font></p>
<p class=MsoNormal style='margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:
auto;margin-left:39.75pt;border:none;mso-border-left-alt:solid black 1.5pt;
padding:0in;mso-padding-alt:0in 0in 0in 4.0pt'><font size=3 color=black
face="Times New Roman"><span style='font-size:12.0pt;color:black'> </span></font><font
color=black><span style='color:black;mso-color-alt:windowtext'><o:p></o:p></span></font></p>
<p class=MsoNormal style='margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:
auto;margin-left:39.75pt;border:none;mso-border-left-alt:solid black 1.5pt;
padding:0in;mso-padding-alt:0in 0in 0in 4.0pt'><font size=2 color=blue
face=Arial><span style='font-size:10.0pt;font-family:Arial;color:blue'>I tried
to locate poledit.exe and that program isn't anywhere to be found in my Win95
directory.</span></font><font color=black><span style='color:black;mso-color-alt:
windowtext'><o:p></o:p></span></font></p>
<p class=MsoNormal style='margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:
auto;margin-left:39.75pt;border:none;mso-border-left-alt:solid black 1.5pt;
padding:0in;mso-padding-alt:0in 0in 0in 4.0pt'><font size=3 color=black
face="Times New Roman"><span style='font-size:12.0pt;color:black'> </span></font><font
color=black><span style='color:black;mso-color-alt:windowtext'><o:p></o:p></span></font></p>
<p class=MsoNormal style='margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:
auto;margin-left:39.75pt;border:none;mso-border-left-alt:solid black 1.5pt;
padding:0in;mso-padding-alt:0in 0in 0in 4.0pt'><font size=2 color=blue
face=Arial><span style='font-size:10.0pt;font-family:Arial;color:blue'>Regards</span></font><font
color=black><span style='color:black;mso-color-alt:windowtext'><o:p></o:p></span></font></p>
<p class=MsoNormal style='margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:
auto;margin-left:39.75pt;border:none;mso-border-left-alt:solid black 1.5pt;
padding:0in;mso-padding-alt:0in 0in 0in 4.0pt'><font size=3 color=black
face="Times New Roman"><span style='font-size:12.0pt;color:black'> </span></font><font
color=black><span style='color:black;mso-color-alt:windowtext'><o:p></o:p></span></font></p>
<p class=MsoNormal style='margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:
auto;margin-left:39.75pt;border:none;mso-border-left-alt:solid black 1.5pt;
padding:0in;mso-padding-alt:0in 0in 0in 4.0pt'><font size=2 color=blue
face=Arial><span style='font-size:10.0pt;font-family:Arial;color:blue'>Guy</span></font><font
color=black><span style='color:black;mso-color-alt:windowtext'><o:p></o:p></span></font></p>
<p class=MsoNormal style='margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:
auto;margin-left:39.75pt;border:none;mso-border-left-alt:solid black 1.5pt;
padding:0in;mso-padding-alt:0in 0in 0in 4.0pt'><font size=3 color=black
face="Times New Roman"><span style='font-size:12.0pt;color:black'> </span></font><font
color=black><span style='color:black;mso-color-alt:windowtext'><o:p></o:p></span></font></p>
<p class=MsoNormal style='margin-right:.5in;mso-margin-top-alt:auto;margin-bottom:
12.0pt;margin-left:39.75pt;border:none;mso-border-left-alt:solid black 1.5pt;
padding:0in;mso-padding-alt:0in 0in 0in 4.0pt'><font size=2 color=black
face="Times New Roman"><span style='font-size:10.0pt;color:black'>-----Original
Message-----<br>
<b><span style='font-weight:bold'>From:</span></b> owner-metastock@xxxxxxxxxxxxx
[mailto:owner-metastock@xxxxxxxxxxxxx]<b><span style='font-weight:bold'>On
Behalf Of</span></b> A.J. Maas<br>
<b><span style='font-weight:bold'>Sent:</span></b> Tuesday, July 13, 1999 4:12
PM<br>
<b><span style='font-weight:bold'>To:</span></b> Metastock-List<br>
<b><span style='font-weight:bold'>Subject:</span></b> Re: intruders [Fw:
Today's WinInfo: July 12]</span></font><font color=black><span
style='color:black;mso-color-alt:windowtext'><o:p></o:p></span></font></p>
<p class=MsoNormal style='margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:
auto;margin-left:39.75pt;border:none;mso-border-left-alt:solid black 1.5pt;
padding:0in;mso-padding-alt:0in 0in 0in 4.0pt'><font size=2 color=black
face="Times New Roman"><span style='font-size:10.0pt;color:black'>To clear some
myths..........................</span></font><font color=black><span
style='color:black;mso-color-alt:windowtext'><o:p></o:p></span></font></p>
<p class=MsoNormal style='margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:
auto;margin-left:39.75pt;border:none;mso-border-left-alt:solid black 1.5pt;
padding:0in;mso-padding-alt:0in 0in 0in 4.0pt'><font size=3 color=black
face="Times New Roman"><span style='font-size:12.0pt;color:black'> </span></font><font
color=black><span style='color:black;mso-color-alt:windowtext'><o:p></o:p></span></font></p>
<p class=MsoNormal style='margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:
auto;margin-left:39.75pt;border:none;mso-border-left-alt:solid black 1.5pt;
padding:0in;mso-padding-alt:0in 0in 0in 4.0pt'><font size=2 color=black
face="Times New Roman"><span style='font-size:10.0pt;color:black'>For as long
as you do not "Share" any files, disks, printers, folders or
even Net-adapters, you are save from</span></font><font color=black><span
style='color:black;mso-color-alt:windowtext'><o:p></o:p></span></font></p>
<p class=MsoNormal style='margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:
auto;margin-left:39.75pt;border:none;mso-border-left-alt:solid black 1.5pt;
padding:0in;mso-padding-alt:0in 0in 0in 4.0pt'><font size=2 color=black
face="Times New Roman"><span style='font-size:10.0pt;color:black'>anyone
entering your PC.</span></font><font color=black><span style='color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>
<p class=MsoNormal style='margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:
auto;margin-left:39.75pt;border:none;mso-border-left-alt:solid black 1.5pt;
padding:0in;mso-padding-alt:0in 0in 0in 4.0pt'><font size=2 color=black
face="Times New Roman"><span style='font-size:10.0pt;color:black'>If you
haven't done any of the file, folder, disk, printer and netadapter sharing
(also in the Control Panel's Nethood/</span></font><font size=2 color=black><span
style='font-size:10.0pt;color:black;mso-color-alt:windowtext'><o:p></o:p></span></font></p>
<p class=MsoNormal style='margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:
auto;margin-left:39.75pt;border:none;mso-border-left-alt:solid black 1.5pt;
padding:0in;mso-padding-alt:0in 0in 0in 4.0pt'><font size=2 color=black
face="Times New Roman"><span style='font-size:10.0pt;color:black'>Networking
and the Win95/98 Context Menu's options for "Sharing", then no-one
can intrude onto your PC</span></font><font size=2 color=black><span
style='font-size:10.0pt;color:black;mso-color-alt:windowtext'><o:p></o:p></span></font></p>
<p class=MsoNormal style='margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:
auto;margin-left:39.75pt;border:none;mso-border-left-alt:solid black 1.5pt;
padding:0in;mso-padding-alt:0in 0in 0in 4.0pt'><font size=2 color=black
face="Times New Roman"><span style='font-size:10.0pt;color:black'>with you in
command (and as otherwise is described in the article below).</span></font><font
size=2 color=black><span style='font-size:10.0pt;color:black;mso-color-alt:
windowtext'><o:p></o:p></span></font></p>
<p class=MsoNormal style='margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:
auto;margin-left:39.75pt;border:none;mso-border-left-alt:solid black 1.5pt;
padding:0in;mso-padding-alt:0in 0in 0in 4.0pt'><font size=2 color=black
face="Times New Roman"><span style='font-size:10.0pt;color:black'>This
"Sharing", apart from the Control Panel's Nethood and the Win95/98
Context Menu's options,</span></font><font color=black><span style='color:black;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>
<p class=MsoNormal style='margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:
auto;margin-left:39.75pt;border:none;mso-border-left-alt:solid black 1.5pt;
padding:0in;mso-padding-alt:0in 0in 0in 4.0pt'><font size=2 color=black
face="Times New Roman"><span style='font-size:10.0pt;color:black'>are
privaleges you can also set for any of the "Users" of your PC's
Windows sessions. The program to do so</span></font><font color=black><span
style='color:black;mso-color-alt:windowtext'><o:p></o:p></span></font></p>
<p class=MsoNormal style='margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:
auto;margin-left:39.75pt;border:none;mso-border-left-alt:solid black 1.5pt;
padding:0in;mso-padding-alt:0in 0in 0in 4.0pt'><font size=2 color=black
face="Times New Roman"><span style='font-size:10.0pt;color:black'>is
"C:\Windows\Poledit.exe".</span></font><font color=black><span
style='color:black;mso-color-alt:windowtext'><o:p></o:p></span></font></p>
<p class=MsoNormal style='margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:
auto;margin-left:39.75pt;border:none;mso-border-left-alt:solid black 1.5pt;
padding:0in;mso-padding-alt:0in 0in 0in 4.0pt'><font size=3 color=black
face="Times New Roman"><span style='font-size:12.0pt;color:black'> </span></font><font
color=black><span style='color:black;mso-color-alt:windowtext'><o:p></o:p></span></font></p>
<p class=MsoNormal style='margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:
auto;margin-left:39.75pt;border:none;mso-border-left-alt:solid black 1.5pt;
padding:0in;mso-padding-alt:0in 0in 0in 4.0pt'><font size=2 color=black
face="Times New Roman"><span style='font-size:10.0pt;color:black'>The above is
for Win95/98 only, for as WIN-NT4/2000 requires a top secret
"NTconfig.pol" file stored on server for</span></font><font
color=black><span style='color:black;mso-color-alt:windowtext'><o:p></o:p></span></font></p>
<p class=MsoNormal style='margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:
auto;margin-left:39.75pt;border:none;mso-border-left-alt:solid black 1.5pt;
padding:0in;mso-padding-alt:0in 0in 0in 4.0pt'><font size=2 color=black
face="Times New Roman"><span style='font-size:10.0pt;color:black'>setting
the "Sharing of the Network's NetHood, Server and WKS's files,
folders, printers and disks".</span></font><font color=black><span
style='color:black;mso-color-alt:windowtext'><o:p></o:p></span></font></p>
<p class=MsoNormal style='margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:
auto;margin-left:39.75pt;border:none;mso-border-left-alt:solid black 1.5pt;
padding:0in;mso-padding-alt:0in 0in 0in 4.0pt'><font size=3 color=black
face="Times New Roman"><span style='font-size:12.0pt;color:black'> </span></font><font
color=black><span style='color:black;mso-color-alt:windowtext'><o:p></o:p></span></font></p>
<p class=MsoNormal style='margin-right:.5in;mso-margin-top-alt:auto;mso-margin-bottom-alt:
auto;margin-left:39.75pt;border:none;mso-border-left-alt:solid black 1.5pt;
padding:0in;mso-padding-alt:0in 0in 0in 4.0pt'><font size=2 color=black
face="Times New Roman"><span style='font-size:10.0pt;color:black'>Regards,<br>
Ton Maas<br>
ms-irb@xxxxxxxxxxxxx<br>
Dismiss the ".nospam" bit (including the dot) when replying.<br>
<br>
<br>
</span></font><font color=black><span style='color:black'>___________________________________________________________________________<br>
<br>
WinInfo: Windows news and information -- Copyright (c) 1995-9 Paul Thurrott<br>
Visit WinInfo on the Web at WUGNET: http://www.wugnet.com/wininfo<br>
___________________________________________________________________________<br>
<br>
Today's WinInfo:<br>
Microsoft challenges BackOrifice myths<br>
Microsoft bringing USB hardware to the Macintosh<br>
<br>
<br>
Microsoft challenges BackOrifice myths<br>
<br>
With the release this week of Windows NT hacking tool "BackOrifice
2000,"<br>
Microsoft has launched an informational campaign of its own, designed to<br>
derail myths about the malicious program. According to a report on<br>
Microsoft's Security Advisor Web site, BackOrifice 2000 is a remote control<br>
application that must be stealthily installed so that attackers can take<br>
over a Windows NT-based network. The program enables remote hackers to do<br>
anything they could do were they to be logged onto the machine locally: Run<br>
programs, delete files, and the like.<br>
<br>
"BackOrifice 2000 is a remote-access tool that was developed with the
intent<br>
of harming users," says Jason Garms, the lead product manager for Windows
NT<br>
security at Microsoft. "It is a tool that has no legitimate purpose other<br>
than exposing users' machines to people on the Internet. Users who are<br>
tricked into getting this thing installed on their system are vulnerable to<br>
the attacker, who can then do anything that the victim can do--move the<br>
mouse, open files, run programs, etc.--which is little different from what<br>
legitimate remote-control software can do. Back Orifice, however, is<br>
designed to be stealthy and evade detection by the user."<br>
<br>
For BackOrifice to find its way onto your system the hacker must have<br>
physical access to the machine with a valid login or you must be tricked<br>
into installing it; typically this is accomplished by sending users the<br>
program as an email attachment that must be executed. To prevent this<br>
program from taking over your system, just use common sense: Always run an<br>
anti-virus program with up-to-date virus definitions and don't let anyone<br>
gain unauthorized physical access to your machine. Perhaps most importantly,<br>
don't execute email attachments from unknown people.<br>
<br>
One of the biggest myths perpetrated by the makers of BackOrifice is that<br>
program takes advantage of security inadequacies that are inherent in<br>
Windows and Windows NT. This is simply not true: BackOrifice could have been<br>
written to attack *any* kind of computer system. The hackers that wrote it<br>
simply decided to attack Windows, which is the most popular computing<br>
platform by far. In fact, as Microsoft notes, BackOrifice doesn't actually<br>
target Windows per se at all: It targets users, who often don't understand<br>
security issues well enough to not execute email attachments from unknown<br>
sources.<br>
<br>
Another common myth centers on the goal for BackOrifice: In an attempt to<br>
protect themselves from legal problems, the creators of BackOrifice are<br>
pretending that it is a legitimate remote control application. However, this<br>
is not the case: BackOrifice is designed to escape detection and exceeds the<br>
needs of remote control software. And it doesn't prompt the user when it<br>
installs on the system.<br>
<br>
"The creators [of BackOrifice] claim that this is a useful administration<br>
tool, but it doesn't even prompt people when it installs itself on the<br>
system. It doesn't warn them that it's getting installed. And, once it's<br>
installed, it makes the system available to other people on the Internet.<br>
That is a malicious act," says Garms. "I am personally unaware of any
major<br>
customers of ours who consider this to be a remote administration tool as<br>
the folks who created it claim. Quite the contrary, they consider it a piece<br>
of malicious code. Unfortunately, there are some users who were duped by the<br>
press releases from the organization that released the software, and did<br>
install it on their systems."<br>
<br>
For more information about Microsoft's response to BackOrifice 2000, please<br>
visit the Microsoft Security Advisor Web site:<br>
http://www.microsoft.com/security/bulletins/bo2k.asp<br>
<br>
<br>
<br>
<br>
Microsoft bringing USB hardware to the Macintosh<br>
<br>
Microsoft Corporation will announce the availability of its first USB<br>
hardware for the Macintosh, the IntelliMouse Explorer, a "no ball"
mouse<br>
that the company will release this fall for Windows as well. According to<br>
rumors, Microsoft will also be porting other USB hardware to the Macintosh,<br>
including possibly all of the company's joystick/entertainment hardware,<br>
such as the FreeStyle Pro GamePad and the Sidewinder Precision Pro joystick.<br>
<br>
Expect an official announcement from Microsoft at MacWorld New York next<br>
week.<br>
<br>
___________________________________________________________________________<br>
<br>
Visit WinInfo on the Web at WUGNET: http://www.wugnet.com/wininfo<br>
<br>
To unsubscribe from the WinInfo list, simply send an E-mail message to<br>
listserv@xxxxxxxxxxxxxxxxxxxx
with the phrase "unsubscribe wininfo" (no<br>
quotes) in the body. If you are having problems unsubscribing or any other<br>
problems with the list, please write Keith Furman at <a
href="mailto:listadmin@xxxxxxxxxx">listadmin@xxxxxxxxxx</a>.<br>
___________________________________________________________________________</span></font><font
color=black><span style='color:black;mso-color-alt:windowtext'><o:p></o:p></span></font></p>
</div>
</div>
</body>
</html>
</x-html>From ???@??? Mon Jan 03 09:43:17 2000
Return-Path: <majordom@xxxxxxxxxxxxxxxxxx>
Received: from listserv.equis.com (listserv.equis.com [204.246.137.2])
by purebytes.com (8.8.7/8.8.7) with ESMTP id HAA12732
for <neal@xxxxxxxxxxxxx>; Mon, 3 Jan 2000 07:45:36 -0800
Received: (from majordom@xxxxxxxxx)
by listserv.equis.com (8.8.7/8.8.7) id HAA10674
for metastock-outgoing; Mon, 3 Jan 2000 07:08:08 -0700
X-Authentication-Warning: listserv.equis.com: majordom set sender to owner-metastock@xxxxxxxxxxxxx using -f
Received: from freeze.metastock.com (freeze.metastock.com [204.246.137.5])
by listserv.equis.com (8.8.7/8.8.7) with ESMTP id HAA10671
for <metastock@xxxxxxxxxxxxxxxxxx>; Mon, 3 Jan 2000 07:08:06 -0700
Received: from mailgw01.execpc.com (sendmail@xxxxxxxxxxxxxxxxxxx [169.207.2.78])
by freeze.metastock.com (8.8.5/8.8.5) with ESMTP id HAA22332
for <metastock@xxxxxxxxxxxxx>; Mon, 3 Jan 2000 07:17:49 -0700 (MST)
Received: from Craig (jaresh-2-49.mdm.mdx.execpc.com [169.207.193.177])
by mailgw01.execpc.com (8.9.1) id IAA00841
for <metastock@xxxxxxxxxxxxx>; Mon, 3 Jan 2000 08:02:47 -0600
Message-ID: <011301bf55f3$45b70760$c2d40a18@xxxxx>
From: "Craig Monroe" <cmonroe@xxxxxxxxxx>
To: <metastock@xxxxxxxxxxxxx>
References: <377BA573.CCA510B3@xxxxxxxxx>
Subject: Re: portfolio spreadsheet wanted
Date: Mon, 3 Jan 2000 08:03:11 -0600
MIME-Version: 1.0
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.00.2314.1300
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
Sender: owner-metastock@xxxxxxxxxxxxx
Precedence: bulk
Reply-To: metastock@xxxxxxxxxxxxx
Status:
I did find something just like this about 6 months ago when looking into
this issue but deleted the info. I suggest diligently searching the Internet
with knowledge that what you are looking for does exist. If memory serves me
well here, the fellow was English.
----- Original Message -----
From: Valhalla <scheier@xxxxxxxxx>
To: Metalist <metastock@xxxxxxxxxxxxx>
Sent: Thursday, July 01, 1999 11:29 AM
Subject: portfolio spreadsheet wanted
> I'm wondering if anyone has built a spreadsheet to monitor a portfolio
> of commodity positions mark-to-eod prices. Trying to create such an
> animal that might also track the net profit/loss as a running total, and
> subtotal for each commodity for the life of the system creating the
> trades. Any experience in this out there? Thanks for any help...
>
> Mark Scheier
>
|