PureBytes Links
Trading Reference Links
|
<x-html><!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META content="text/html; charset=iso-8859-1" http-equiv=Content-Type>
<META content="MSHTML 5.00.2614.3500" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT face=Arial size=2>The dongles that are used by Omega, and others, can
be cracked. On other newsgroups I have seen ads for cracked software, like
tradestation, that will run without a dongle. The USB interface will slow
thieves down a bit, it wont stop them</FONT></DIV>
<DIV>Lionel Issen<BR><A
href="mailto:lissen@xxxxxxxxx">lissen@xxxxxxxxx</A></DIV>
<BLOCKQUOTE
style="BORDER-LEFT: #000000 2px solid; MARGIN-LEFT: 5px; MARGIN-RIGHT: 0px; PADDING-LEFT: 5px; PADDING-RIGHT: 0px">
<DIV style="FONT: 10pt arial">----- Original Message ----- </DIV>
<DIV
style="BACKGROUND: #e4e4e4; FONT: 10pt arial; font-color: black"><B>From:</B>
Daniel Martinez
</DIV>
<DIV style="FONT: 10pt arial"><B>To:</B> <A
href="mailto:metastock@xxxxxxxxxxxxx"
title=metastock@xxxxxxxxxxxxx>metastock@xxxxxxxxxxxxx</A> </DIV>
<DIV style="FONT: 10pt arial"><B>Sent:</B> Monday, March 13, 2000 1:46
AM</DIV>
<DIV style="FONT: 10pt arial"><B>Subject:</B> Re: MS 7.0 EOD Upgrade Screen.
New Features?</DIV>
<DIV><BR></DIV>With their CD verification, Equis has already taken the first
step. Whether or not they decide to increase their security procedures
is up to them. Whatever they do, we won't have a choice. It is,
after all, their software and their company. In the future, with the
acceptance of the USB interface, it will be far more difficult to illegally
copy software. Software companies will use a module which plugs into the
USB port, similar to what Omega Research already has for the parallel port.
<P>Software companies are tired of getting ripped off, particularly
overseas. Don't expect the situation to remain the same forever.
<P>Daniel. <BR> <BR>
<P>Lionel Issen wrote:
<BLOCKQUOTE TYPE="CITE"><FONT face=Arial><FONT size=-1>Ray:You said it
straight. I hope, but don't expect, Equis to pay attention.Copy
protection schemes are much less secure (relatively speaking) than
unbreakable ciphers. The 'unbreakable' trapdoor codes were broken, within a
few months of their announcement, by 2 researchers using an Apple 2e ( at
that time the 386 was on the market). As programs like CopyPC and CopyCat
showed, copy protection schemes for floppies are useless. This also applies
to CDs.</FONT></FONT>Lionel Issen <BR><A
href="mailto:lissen@xxxxxxxxx">lissen@xxxxxxxxx</A>
<BLOCKQUOTE
style="BORDER-LEFT: #000000 2px solid; MARGIN-LEFT: 5px; MARGIN-RIGHT: 0px; PADDING-LEFT: 5px; PADDING-RIGHT: 0px">
<DIV style="FONT: 10pt arial">----- Original Message -----</DIV>
<DIV
style="BACKGROUND: #e4e4e4; FONT: 10pt arial; font-color: black"><B>From:</B><A
href="mailto:rphodge@xxxxxxxxxxx" title=rphodge@xxxxxxxxxxx>Raymond
Hodge</A></DIV>
<DIV style="FONT: 10pt arial"><B>To:</B> <A
href="mailto:metastock@xxxxxxxxxxxxx"
title=metastock@xxxxxxxxxxxxx>metastock@xxxxxxxxxxxxx</A></DIV>
<DIV style="FONT: 10pt arial"><B>Sent:</B> Sunday, March 12, 2000 7:23
PM</DIV>
<DIV style="FONT: 10pt arial"><B>Subject:</B> Re: MS 7.0 EOD Upgrade
Screen. New Features?</DIV> Yes thank you, I remember the copy
protection schemes of the 80s. They were totally useless in stopping
dishonest people from making illegal copies. As I recall, apps, which were
only useful for getting around those schemes, were as hot a business back
then as virus apps and security apps appear to be now. Remember CopyIIPC?
They even had a special board you could put in your machine to run the
protected disks through to undo the protection scheme.
<P>The whole thing was a bad joke. All those silly schemes did was manage
to inconvenience and anger those of us foolish enough to be honest and buy
and run the copy protected versions.
<P>Dishonest people are going to get around what ever scheme they apply to
this problem - other than continual and vigorous law enforcement. That's
why we have Cops (God bless them). To prosecute people who break the law.
<P>Don't make your customers angry because people in Asia (as you say) are
stealing from you. Get our politicians to negotiate the Asian politicians
into passing laws that stops those activities, and then get them to
enforce them. Isn't that why we pay and put up with politicians?
<P>IMO, CD verification is another dumb idea that wastes the users time,
the programmers time (which would be much better spent cleaning out bugs
and making this app more robust) and in the end likely won't even do what
it is intended to do.
<P>MetaStock has been a source of much income for me. I want only the best
for them. I've always bought every upgrade - whatever - even if I didn't
need it - just to try and contribute to their profits. I just don't want
to see them continuing down the CompuTrac road (ignoring customers, know
it all, ever more corporate) to oblivion.
<P>IMO, they improved the Reuters download thing considerably. That proves
that they have it in them. But they won't fix a broken wheel that doesn't
squeak. And it doesn't help to pretend that the emperor has a lovely suite
of clothes on when he's actually buck naked (and ugly).
<P>Thanks for reminding me, <BR>Ray <BR> <BR>
<BLOCKQUOTE type="cite" cite>*I think Equis is doing this to prevent
people, who didn't buy v6.52 EOD, from receiving the upgrade
price. I assume this is also why they require you verify you have
the MetaStock CD. Apparently, Equis (or Reuters) is concerned
about illegal copying. I can't really blame them. There's a
LOT of illegal copying taking place in the Eastern European block
nations, in Russia, and particularly in Asia. MicroSoft recently
sued a company in China but the Chinese court ruled in favor of the
company saying there was "no proof" any copying occurred.
Right. If this activity continues, expect American software
companies to take more drastic measures to protect themselves.
This will include setting up "regions" similar to the DVD video
market. They may even revive the copy protection schemes which
were used during the 80's.
<P>D.M.</P></BLOCKQUOTE></BLOCKQUOTE></BLOCKQUOTE></BLOCKQUOTE></BODY></HTML>
</x-html>From ???@??? Mon Mar 13 09:28:23 2000
Return-Path: <majordom@xxxxxxxxxxxxxxxxxx>
Received: from listserv.equis.com (listserv.equis.com [204.246.137.2])
by purebytes.com (8.9.3/8.9.3) with ESMTP id JAA09043
for <neal@xxxxxxxxxxxxx>; Mon, 13 Mar 2000 09:13:40 -0800
Received: (from majordom@xxxxxxxxx)
by listserv.equis.com (8.8.7/8.8.7) id AAA00096
for metastock-outgoing; Tue, 14 Mar 2000 00:47:24 -0700
X-Authentication-Warning: listserv.equis.com: majordom set sender to owner-metastock@xxxxxxxxxxxxx using -f
Received: from freeze.metastock.com (freeze.metastock.com [204.246.137.5])
by listserv.equis.com (8.8.7/8.8.7) with ESMTP id AAA00093
for <metastock@xxxxxxxxxxxxxxxxxx>; Tue, 14 Mar 2000 00:47:21 -0700
Received: from smtp10.atl.mindspring.net (smtp10.atl.mindspring.net [207.69.200.246])
by freeze.metastock.com (8.8.5/8.8.5) with ESMTP id JAA05518
for <metastock@xxxxxxxxxxxxx>; Mon, 13 Mar 2000 09:19:18 -0700 (MST)
Received: from sprynet.com (user-2iveaac.dialup.mindspring.com [165.247.41.76])
by smtp10.atl.mindspring.net (8.9.3/8.8.5) with ESMTP id LAA06765
for <metastock@xxxxxxxxxxxxx>; Mon, 13 Mar 2000 11:03:30 -0500 (EST)
Message-ID: <38CD112B.19813DA6@xxxxxxxxxxx>
Date: Mon, 13 Mar 2000 11:02:52 -0500
From: Philip <pschmi02@xxxxxxxxxxx>
X-Mailer: Mozilla 4.7 [en] (Win98; I)
X-Accept-Language: en,pdf
MIME-Version: 1.0
To: metastock@xxxxxxxxxxxxx
Subject: Re: A "Hierarchy" of Trendiness
References: <20000309021105.22353.qmail@xxxxxxxxxxx> <38C70C5B.3CB59106@xxxxxxxxxxx> <000701bf8b0e$cf8d2500$2d55fea9@xxxxx> <38CAA106.80F3E36@xxxxxxxxxxx> <38CCAC2D.B74AE98D@xxxxxxxxxxxxxxxxx>
Content-Type: multipart/alternative;
boundary="------------735ACB58A2F3480E7CA00E9B"
Sender: owner-metastock@xxxxxxxxxxxxx
Precedence: bulk
Reply-To: metastock@xxxxxxxxxxxxx
Status:
<x-html><!doctype html public "-//w3c//dtd html 4.0 transitional//en">
<html>
Jan,
<blockquote TYPE=CITE>I just think that ADX / ADXR is way too slow to be
of use if you're trading short term.</blockquote>
No question about it, and indeed, you've added another valid question to
the mix. Strength of trend "in what time frame?"
<p>The information I'm trying to ferret out is this: given any particular
definition of trend (in any time frame) you wish, what implications (if
any) does each definition have on the the type of entry you use?
For example, you've got a market with a rising ADX that's well over 30.
Price is just scorching across the screen. Well, if you wait for
too great a retracement to enter, you'll be left behind. The train
will leave the station without you.
<p>By the same token, if a market is just kinda "tending" higher/lower
and you jump on it every time it wavers or falters, rather than waiting
for a nice "saftiges" retracement, you'll find yourself getting stopped
out or sitting around with large drawdowns. It's not like I've made
some earth shaking discovery here. There's not a trader or serious
market student on this list who hasn't pondered this question and arrived
at some MO that works.
<p>So short term trends are your cup of tea. Well, tell a little
more about how you identify them. What implications does your trend
definition have for getting on board the move? Do you place a stop
above/below the market and wait to be stopped in, say, at a certain set
distance from the close, the high, the low? Do you simply trail a
stop behind each successive high/low? Do you buy/sell the close if
it's sufficiently strong or weak? How about the open the next morning?
<p>I'm not trying to steal the bread off your table, Jan. None of
this stuff is the Holy Grail. Virtually all of it's available right
here on the web. I just thought it would be fun to chat about it.
That goes for <i>anybody</i> with a relevant observation, of course.
<p>Philip</html>
</x-html>From ???@??? Mon Mar 13 09:28:29 2000
Return-Path: <majordom@xxxxxxxxxxxxxxxxxx>
Received: from listserv.equis.com (listserv.equis.com [204.246.137.2])
by purebytes.com (8.9.3/8.9.3) with ESMTP id JAA09899
for <neal@xxxxxxxxxxxxx>; Mon, 13 Mar 2000 09:26:15 -0800
Received: (from majordom@xxxxxxxxx)
by listserv.equis.com (8.8.7/8.8.7) id BAA00854
for metastock-outgoing; Tue, 14 Mar 2000 01:27:48 -0700
X-Authentication-Warning: listserv.equis.com: majordom set sender to owner-metastock@xxxxxxxxxxxxx using -f
Received: from freeze.metastock.com (freeze.metastock.com [204.246.137.5])
by listserv.equis.com (8.8.7/8.8.7) with ESMTP id BAA00850
for <metastock@xxxxxxxxxxxxxxxxxx>; Tue, 14 Mar 2000 01:27:45 -0700
Received: from anchor-post-34.mail.demon.net (anchor-post-34.mail.demon.net [194.217.242.92])
by freeze.metastock.com (8.8.5/8.8.5) with ESMTP id JAA05546
for <metastock@xxxxxxxxxxxxx>; Mon, 13 Mar 2000 09:59:43 -0700 (MST)
Received: from marevic.demon.co.uk ([158.152.195.106])
by anchor-post-34.mail.demon.net with smtp (Exim 2.12 #1)
id 12UXwe-000HNi-0Y
for metastock@xxxxxxxxxxxxx; Mon, 13 Mar 2000 16:43:52 +0000
Message-ID: <rs0KRAAzpRz4Ew2O@xxxxxxxxxxxxxxxxxxx>
Date: Mon, 13 Mar 2000 16:42:27 +0000
To: metastock@xxxxxxxxxxxxx
From: Evelyn Arana <evelyn@xxxxxxxxxxxxxxxxxxx>
Subject: Re: === Family Rubbish
References: <C02FE75A852BD211820A00A0C944C9ACEEC5C9@xxxxxxx>
In-Reply-To: <C02FE75A852BD211820A00A0C944C9ACEEC5C9@xxxxxxx>
MIME-Version: 1.0
X-Mailer: Turnpike (32) Version 4.01 <LEX3LUNAaGiUFJUctgUhpAbJsJ>
Sender: owner-metastock@xxxxxxxxxxxxx
Precedence: bulk
Reply-To: metastock@xxxxxxxxxxxxx
Status:
If you had been following the thread at all, you would have realized
that many members of this list, myself included, find the emails from
Guy, as well as those from JimG, to be very instructive, informative,
entertaining and invaluable as they give an insight into the thought
processes of two very successful traders who have been and hopefully
will continue to be most generous in sharing their methods and systems.
If you don't like the emails, nobody is forcing you to read them. All
you have to do is hit the delete button -- your loss and hopefully not
ours.
As for rubbish, look to your own emails.
Evelyn Arana
>I am at a complete loss as to the value of correspondence between disparate
>members of a given family can be to list Metastock list members.
>
>Can you keep your families' business within your family. ............please!
>
>It is of no value to us whatsoever, and I beg to question the intelligence
>or complete lack of the aforementioned manifest in that particular family.
>
>In fact it is a big miracle that list members have been thus far patient
>with all that rubbish.
>ade Kolade
>Synopsys Limited
|