[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Switching To Ensign



PureBytes Links

Trading Reference Links

<x-html><!DOCTYPE HTML PUBLIC "-//W3C//DTD W3 HTML//EN">
<HTML>
<HEAD>

<META content=text/html;charset=iso-8859-1 http-equiv=Content-Type>
<META content='"MSHTML 4.72.2106.6"' name=GENERATOR>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT color=#000000 size=2>Glenn:</FONT></DIV>
<DIV><FONT color=#000000 size=2></FONT>&nbsp;</DIV>
<DIV><FONT size=2>I wonder if Ensign has the same ability as TS regards 
programmability and</FONT></DIV>
<DIV><FONT size=2>availability of existing indicators and systems.&nbsp; That is 
to say, pehaps there</FONT></DIV>
<DIV><FONT size=2>are features in TS that can't be transferred to Ensign?&nbsp; 
Thanks for everyone's</FONT></DIV>
<DIV><FONT size=2>feedback on this issue.</FONT></DIV>
<DIV><FONT size=2></FONT>&nbsp;</DIV>
<DIV><FONT size=2>Charles</FONT></DIV>
<BLOCKQUOTE 
style="BORDER-LEFT: #000000 solid 2px; MARGIN-LEFT: 5px; PADDING-LEFT: 5px">
    <DIV><FONT face=Arial size=2><B>-----Original Message-----</B><BR><B>From: 
    </B>Glenn Pederson &lt;<A 
    href="mailto:gpeder@xxxxxxxxx";>gpeder@xxxxxxxxx</A>&gt;<BR><B>To: </B><A 
    href="mailto:realtraders@xxxxxxxxxxxx";>realtraders@xxxxxxxxxxxx</A> &lt;<A 
    href="mailto:realtraders@xxxxxxxxxxxx";>realtraders@xxxxxxxxxxxx</A>&gt;<BR><B>Date: 
    </B>Friday, July 30, 1999 10:41 PM<BR><B>Subject: </B>Switching To 
    Ensign<BR><BR></DIV></FONT>I plan on moving from TradeStation 3.5 to Ensign 
    for Windows. Any <BR>comments concerning Ensign? From reading Ensign's web 
    site, it <BR>seems like a fairly well thought out 
    program.<BR><BR>Thanks,<BR><BR><PRE>Glenn Pederson
gpeder@xxxxxxxxx</PRE></BLOCKQUOTE></BODY></HTML>
</x-html>From ???@??? Sat Jul 31 07:16:37 1999
Return-Path: <owner-realtraders@xxxxxxxxxxxx>
Received: from ml.nw.verio.net (ml.nw.verio.net [204.202.220.47])
	by purebytes.com (8.8.7/8.8.7) with ESMTP id HAA21062
	for <neal@xxxxxxxxxxxxx>; Sat, 31 Jul 1999 07:04:22 -0700
Received: (from majordom@xxxxxxxxx)
	by ml.nw.verio.net (970819888) id FAA06009
	for realtraders-sendemout; Sat, 31 Jul 1999 05:43:57 -0700 (PDT)
Received: from mail1.nwnet.net (mail1.nwnet.net [192.220.251.8])
	by ml.nw.verio.net (970819888) with ESMTP id FAA06005
	for <realtraders@xxxxxxxxxxxxxxx>; Sat, 31 Jul 1999 05:43:53 -0700 (PDT)
Received: from mail.airmail.net (mail.airmail.net [206.66.12.40])
	by mail1.nwnet.net (970819888) with SMTP id FAA11797
	for <realtraders@xxxxxxxxxxxx>; Sat, 31 Jul 1999 05:43:52 -0700 (PDT)
Received: from d4944 from [207.71.36.185] by mail.airmail.net 
	(/\##/\ Smail3.1.30.16 #30.402) with smtp for <realtraders@xxxxxxxxxxxx> sender: <d4944@xxxxxxxxxxx>
	id <mR/11AYUQ-0007wUR@xxxxxxxxxxxxxxxx>; Sat, 31 Jul 99 07:43:50 -0500 (CDT)
Message-ID: <37A2EEBB.6252@xxxxxxxxxxx>
Date: Sat, 31 Jul 1999 07:40:27 -0500
From: "D. Sieler" <d4944@xxxxxxxxxxx>
Reply-To: d4944@xxxxxxxxxxx
Organization: none
X-Mailer: Mozilla 3.0 (Win95; I)
MIME-Version: 1.0
To: realtraders@xxxxxxxxxxxx
Subject: GEN: Microsoft and Compaq Admit Vulnerability to Security Flaws
Content-Type: multipart/mixed; boundary="------------5E287CD16886"
Sender: owner-realtraders@xxxxxxxxxxxx
Precedence: bulk
Status:   

http://www.nytimes.com/library/tech/99/07/biztech/articles/31soft.html

Reported today in the Times.
---
DS
<x-html><BASE HREF="http://www.nytimes.com/library/tech/99/07/biztech/articles/31soft.html";>

<html>
<head>
<title>Microsoft and Compaq Admit Vulnerability to Security Flaws</title>
<meta name="slug"   content="BC-COMPUTER-SECURITY-ART-2NDLD-WRITETHRU-425&ADD-NYT">
<meta name="date" content="19990730">
<meta name="length" content="1160">
<meta name="byline" content="By JOHN MARKOFF and SARA ROBINSON">
<meta name="headline" content="Microsoft and Compaq Admit Vulnerability to Security Flaws">
</head>
<NYT_HEADER version="1.0" type="main">
<body bgcolor="#ffffff" vlink=#444464 link=#000066 background=http://graphics.nytimes.com/images/back.c.gif>

<table border=0 cellpadding=0 cellspacing=0>
<tr><td align=left width=600 valign=top>
<img src="http://graphics.nytimes.com/images/pixel.gif"; border=0 WIDTH=600 HEIGHT=1>

<table border=0 cellpadding=0 cellspacing=0>
<td align=left valign=top width=60><br></td>
<td align=left valign=top width=480>
<NYT_BANNER version="1.0" type="main">
<img src="http://graphics.nytimes.com/images/1bannewfi.gif"; border="0" WIDTH="468" HEIGHT="40" alt="banner">

</NYT_BANNER>
<br clear=all>
<NYT_TOOLBARMAP version="1.0" type="main">
<map name="maintoolbar2"> 
<area shape="rect" coords="0,0,75,16" href="/yr/mo/day/"
onMouseOver="window.status='Click to go to the Home Page';return true">
<area shape="rect" coords="76,0,154,16" href="/info/contents/siteindex.html"
onMouseOver="window.status='Click to see site contents';return true">
<area shape="rect" coords="155,0,233,16" href="/search/daily/"
onMouseOver="window.status='Click to search the current site';return true">
<area shape="rect" coords="234,0,312,16" href="/comment/"
onMouseOver="window.status='Click for discussion in the Forums';return true">
<area shape="rect" coords="313,0,391,16" href="/archives/"
onMouseOver="window.status='Click to search the archives';return true">
<area shape="rect" coords="392,0,468,16" href="/marketplace/"
onMouseOver="window.status='Click to visit the Marketplace';return true">
</map>

</NYT_TOOLBARMAP>
<NYT_TOOLBAR version="1.0" type="main">
<a href="/images/maintoolbar2.map"> 
<img src="http://graphics.nytimes.com/images/maintoolbar2.gif"; border="0" alt="toolbar" ismap usemap=#maintoolbar2 width="468" height="16"></a>

</NYT_TOOLBAR>
<br><NYT_AD version="1.0" location="top">



</NYT_AD>
</td></table>

</NYT_HEADER>
<BLOCKQUOTE><BLOCKQUOTE>
<NYT_DATE version="1.0" type=" ">
<!--ELEMENT DATE-->
<H5>July 31, 1999</H5><br>

</NYT_DATE>
<NYT_HEADLINE version="1.0" type=" ">
<!--ELEMENT HEADLINE-->
<H2>Microsoft and Compaq Admit Vulnerability to Security Flaws</H2>

</NYT_HEADLINE>
<NYT_BYLINE version="1.0" type=" ">
<!--ELEMENT BYLINE-->
<h5>By JOHN MARKOFF and SARA ROBINSON</h5>

</NYT_BYLINE>
<p>   
<p>   <img src="http://graphics.nytimes.com/images/m.gif"; align=left alt=M>icrosoft Corp. and Compaq Computer Corp. on Friday confirmed
the existence of several significant software security flaws that
could enable intruders to gain access to the computers of millions
of customers and to damage their data via e-mail or through
commands sent from a malicious Web site.
<p>   Certain Hewlett-Packard computers are also said by one expert to
be vulnerable, but a spokesman for the company said Friday that the
company would not confirm the security vulnerability.
<p>   The vulnerabilities, which affect computers running Microsoft's
Windows operating system and Internet Explorer browser in
combination with other programs, are invisible to antivirus
programs, illustrating the risks inherent in the growing complexity
of today's personal computer software.
<p>   Consumers who are at the greatest risk are those running
programs shipped as part of Microsoft's Office 97 suite of
productivity programs  --  Word 97 or Excel 97  --  and owners of certain
newer models of computers made by Compaq and Hewlett-Packard that
automatically upgrade the manufacturers' own software over the
Internet.
<p>   A Microsoft official said the company was at work creating a fix
for the the newly discovered security holes.
<p>   "We take security issues very seriously," said Andrew Dixon,
group product manager for Office at Microsoft. "Right now, we are
working on testing a solution and steps for customers to take."
<p>   The new flaws also raise troubling questions about Microsoft's
decision to integrate its Explorer web browser directly into the
Windows operating system. That decision is a key issue in the
company's antitrust battle with the U.S. Justice Department.
<p>   Microsoft has passionately defended the browser integration,
asserting that it offers significant consumer benefits.
<p>   But a number of computer security experts who are familiar with
the newly discovered flaws said that by tightly integrating Web
browsing software with its personal computer operating system,
Microsoft has greatly complicated the challenge of ensuring that
Windows is secure.
<p>   "A single operating system and single provider of tools
dominates the market," said Doug Tygar, a professor of computer
science at the University of California at Berkeley who specializes
in computer security. "Because Microsoft is linking all these
aspects of computing, all the walls that usually prevent such
attacks aren't there."
<p>   Reports of flaws were posted on NTbugtraq, a computer security
mailing list, over the past two days. There is no evidence that the
flaws have been exploited, according to the manufacturers involved.
<p>   
<p>   
<p>   
<p>   The flaws involve two separate interactions of programs with the
Internet Explorer browser.
<p>   The first involves a vulnerability in one version of a "dynamic
link library," or DLL file that is part of Microsoft's Office 97
suite. The flaw is believed not to exist in the newly released
version, Office 2000.
<p>   The office software component, known as JET version 3.5, creates
a security vulnerability because Microsoft has configured its
Internet Explorer program to "trust" Office programs, including
Word, Excel and Powerpoint. These programs can create documents
that are themselves powerful programs and that can act as a Trojan
Horse, carrying malicious code into a personal computer.
<p>   The Jet flaw was first reported by Juan Carlos G. Cuartango, a
programmer who has previously discovered several security holes in
two browsers  --  Microsoft's Internet Explorer and Netscape
Navigator.
<p>   Although the flawed version of Jet was replaced with a newer
version in the last boxes of Office 97 shipped, the original still
resides on the hard drives of millions of personal computers.
<p>   The new flaw does not involve the small programs call "macros"
that have caused Microsoft security headaches in the past. Rather
Jet sends queries to various data bases when the Office programs
request data. The queries can be used to trigger low-level
operating system commands  --  including commands that erase files or
entire hard drives.
<p>   Because of the extensive integration between Office applications
and Windows, such a query can be sent on behalf of a cell in a
spreadsheet, a field in a word document or other interactive
portions of an Office application.
<p>   What makes the new flaw especially serious is that anti-virus
software does not monitor such queries and therefore would not be
effective against an attack.
<p>   Microsoft's Dixon said Friday that the company was considering
giving users a new alert mechanism that would warn them about data
base queries before they were executed.
<p>   The second security flaw has to do with the way software shipped
with computers from Compaq and Hewlett-Packard  --  and possibly other
manufacturers  --  is designed to interact with the Internet Explorer
Web browser. The manufacturers' software, designed to work with the
security controls in Internet Explorer 4.0, would enable an
intruder to execute arbitrary commands on a computer remotely.
<p>   The Compaq security flaw appears particularly serious since it
can be spread to other brands of computers. Compaq's Presario
computers, which are consumer models, are shipped with a tiny Java
program, known as an applet, that has been "digitally signed" a
term that means it has been authenticated by Compaq.
<p>   This applet is designed to enable Compaq to update programs on a
computer over the Internet or other computer networks. But it also
has the power to execute programs  --  and can be directed to do so by
a Web page. The applet can also be sent to other computers via
e-mail.
<p>   While the existence of this program was posted to a European
security mailing list a year ago, a recent bug that exacerbates the
problem was discovered by Richard Smith, the president of Pharlap
Software, in Cambridge, Mass.
<p>   Adding to the problem, Microsoft's integrated Web browser will
run any program digitally signed by Compaq, in some cases without
warning the user.
<p>   While the vulnerable program will run without any warnings only
on certain Compaq Presarios in their default configurations, it can
also be sent to and temporarily stored on any computer running
Windows 95, 98 or NT, according to Smith.
<p>   In this case, the browser will pop open a box saying that the
browser wants to run a program digitally signed by Compaq Corp. If
the user responds by allowing the program to run, it will execute
commands on the computer.
<p>   
<p>   
<p>   


<NYT_FOOTER version="1.0">
</BLOCKQUOTE></BLOCKQUOTE>
<br>
<table border=0 cellpadding=0 cellspacing=0>
<td align=left valign=top width=60><br></td>
<td align=center valign=top width=468>
<NYT_AD version="1.0" location="bottom">



</NYT_AD>
<hr size=1>
<P>
<font size=-1>
<NYT_TOOLBAR version="1.0" type="main">
<B>Home</B> | 
<B>Site Index</B> | 
<B>Site Search</B>  | 
<B>Forums</B>  | 
<B>Archives</B> | 
<B>Marketplace</B>
<P>
Quick News  | 
Page One Plus  | 
International  | 
National/N.Y.   | 
Business   | 
Technology  | 
Science   | 
Sports   | 
Weather  | 
Editorial    | 
Op-Ed | 
Arts   | 
Automobiles   | 
Books  | 
Diversions   | 
Job Market   | 
Real Estate  | 
Travel 
<P>
Help/Feedback  | 
Classifieds   | 
Services   | 
New York Today 

</NYT_TOOLBAR>
<NYT_COPYRIGHT version="1.0" type="main">
<P>
<B>Copyright 1999 The New York Times Company</B>
<P>

</NYT_COPYRIGHT>
</font>
</td></table>
</td>
<td align=left width=14 valign=top>
<img src="http://graphics.nytimes.com/images/pixel.gif"; border=0 WIDTH=14 HEIGHT=1></td>
<td align=center width=140 valign=top>
<img src="http://graphics.nytimes.com/images/pixel.gif"; border=0 WIDTH=140 HEIGHT=2>

<table width="140" border="1" cellspacing="0" cellpadding="10" align="LEFT" bgcolor=ffffff>
<tr bgcolor=003366><td><img src="http://graphics.nytimes.com/ads/nytoday/findout.gif";></td></tr>
<tr bgcolor=336699><td align=left>
</td>
</tr>
<tr>
<td>
<font face="Arial,Helvetica,Sans-Serif" size="2">
<font color="#CC6600">
<b>ENTERTAINMENT</b><br>
</font>
Restaurants<br>
Movies<br>
Music<br>
Theater & Dance<br>
Bars & Nightlife<br>
<!--
Dance<br>
-->
Art & Museums<br>
Books & Talks<br>
Sports<br>
Getaways
<br>

<p>
<font color="#CC6600">
<b>SHOPPING</b><br>
</font>
Sales<br>
Events<br>
Coupons<br>
Yellow Pages

<p>
<font color="#CC6600">
<b>CLASSIFIEDS</b><br>
</font>
Real Estate<br>
Autos<br>
Jobs

<p>
<font color="#CC6600">
<b>COMMUNITY</b><br>
</font>
About Community<br>
Join a Group<br>
Create a Group<br>
Update a Group<br>

<p>
<font color="#CC6600">
<b>LIFE</b><br>
</font>
Food<br>
Home<br>
Fashion & Style<br>
Health & Fitness<br>
<!-- a href="http://www.nytoday.com/scripts/staticpage.dll?only=y&spage=AE/community/category_community.html&ck=15802239&version=562687&ccity=Washington&cstate=NJ&adrVer=919451724&ver=cg2.1";>Community</a><br -->
How to New York

<p>
<font color="#CC6600">
<b>NEIGHBORHOODS</b><br>
</font>
Near My Home<br>
Near My Work<br>
Other Areas

</center>

<p>
<img src="http://graphics.nytimes.com/ads/nytoday/nytodaylogo.gif";>
<p><center>
<img src="http://graphics.nytimes.com/ads/nytoday/advertisement.gif"; width="66" height="7" alt="advertisement"></center>

</td>
</tr>
</table>


 


 

 
 

 
  


</td></tr></table>

</NYT_FOOTER>

</body>
</html>
</x-html>From ???@??? Sat Jul 31 07:34:53 1999
Return-Path: <owner-realtraders@xxxxxxxxxxxx>
Received: from ml.nw.verio.net (ml.nw.verio.net [204.202.220.47])
	by purebytes.com (8.8.7/8.8.7) with ESMTP id HAA21319
	for <neal@xxxxxxxxxxxxx>; Sat, 31 Jul 1999 07:30:00 -0700
Received: (from majordom@xxxxxxxxx)
	by ml.nw.verio.net (970819888) id FAA06054
	for realtraders-sendemout; Sat, 31 Jul 1999 05:55:39 -0700 (PDT)
Received: from mail1.nwnet.net (mail1.nwnet.net [192.220.251.8])
	by ml.nw.verio.net (970819888) with ESMTP id FAA06050
	for <realtraders@xxxxxxxxxxxxxxx>; Sat, 31 Jul 1999 05:55:35 -0700 (PDT)
Received: from bednorz.get2net.dk (bednorz.get2net.dk [130.227.3.2])
	by mail1.nwnet.net (970819888) with ESMTP id FAA11871
	for <realtraders@xxxxxxxxxxxx>; Sat, 31 Jul 1999 05:55:32 -0700 (PDT)
Received: from sas-hjemme-pc (p415-120.ppp.get2net.dk [195.82.219.120]) 
          by bednorz.get2net.dk (8.8.8/8.8.8) with SMTP 
          id OAA03950 for <realtraders@xxxxxxxxxxxx>; 
          Sat, 31 Jul 1999 14:55:11 +0200 (MET DST)
Message-ID: <007401bedb54$4860ecc0$d2c78e81@xxxxxxxxxxxxx>
From: "Stig O" <olausson@xxxxxxxxxx>
To: <realtraders@xxxxxxxxxxxx>
Subject: Time gif
Date: Sat, 31 Jul 1999 14:44:50 +0200
MIME-Version: 1.0
Content-Type: multipart/mixed;
	boundary="----=_NextPart_000_003B_01BEDB63.3FF022E0"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 4.72.3110.5
X-MimeOLE: Produced By Microsoft MimeOLE V4.72.3110.3
Sender: owner-realtraders@xxxxxxxxxxxx
Precedence: bulk
Status:   

<x-html><!DOCTYPE HTML PUBLIC "-//W3C//DTD W3 HTML//EN">
<HTML>
<HEAD>

<META content=text/html;charset=iso-8859-1 http-equiv=Content-Type>
<META content='"MSHTML 4.72.3110.7"' name=GENERATOR>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT color=#000000 size=2>This longtermchart shows how many tops/bottoms 
are dynamically and fib connected, thus indicating that there is ahigh 
probabillity for a trendchenge of longterm proportions.</FONT></DIV>
<DIV><FONT color=#000000 size=2>Stig</FONT></DIV></BODY></HTML>
</x-html>
Attachment Converted: "c:\eudora\attach\Time4.gif"