PureBytes Links
Trading Reference Links
|
<x-html><!DOCTYPE HTML PUBLIC "-//W3C//DTD W3 HTML//EN">
<HTML>
<HEAD>
<META content=text/html;charset=iso-8859-1 http-equiv=Content-Type>
<META content='"MSHTML 4.72.3110.7"' name=GENERATOR>
</HEAD>
<BODY bgColor=#ffffff>
<DIV>
<DIV><FONT color=#000000>Greetings to eveyone,</FONT></DIV>
<DIV><FONT color=#000000></FONT> </DIV>
<DIV><FONT
color=#000000>
Does anybody have any experience with "Kent Calhoun"-the </FONT></DIV>
<DIV><FONT color=#000000>self proclaimed greatest trader in the world,and has
anybody attended one of his seminars,or used his 5 VBTP system,again proclaimed
by him to be the best trading</FONT></DIV>
<DIV><FONT color=#000000>sytem along.Any comments or experiences with Kent
Calhoun and his sofware</FONT></DIV>
<DIV><FONT color=#000000>would be highly appreciated.</FONT></DIV>
<DIV><FONT color=#000000></FONT> </DIV>
<DIV><FONT
color=#000000>
In the June 1998 issue of TASC,Kent Calhoun has a one page advertisement in
which he really makes some tall claims.One of his statements </FONT></DIV>
<DIV><FONT color=#000000>is-"Robert Krausz learned to swing trade 5 VBTP's
on multiple time frames-2 years </FONT></DIV>
<DIV><FONT color=#000000>later he was a market wizard".</FONT></DIV>
<DIV><FONT color=#000000></FONT> </DIV>
<DIV><FONT
color=#000000>
Amongst the people supportedly endorsing his techniques are:</FONT></DIV>
<DIV><FONT color=#000000></FONT> </DIV>
<DIV><FONT color=#000000>1.One of the founders of CompuTrac who says
:"Excellent,tremendous teaching techniques.Very Original.Aproven mechanical
approach to making money.I have never</FONT></DIV>
<DIV><FONT color=#000000>been to a seminar where people said it was the best
seminar they have ever attended"end of quote attributed to James Jones-Tx
and</FONT></DIV>
<DIV><FONT color=#000000></FONT> </DIV>
<DIV><FONT color=#000000>2.The CEO Bank of Liechtenstein has been quoted as
having said the following-" I</FONT></DIV>
<DIV><FONT color=#000000>made substantial money using your 5 VBTP
method.Especially in currencies and interest rates,but also coffee and
bellies.The 5 VBTP method is an ingenious discovery,and is unbeleivable how
precisely this pattern indicates the turn of the market against all fundamental
and technical odds" end of quote,as ascribed to having een said by Dr.Anton
Schwaiger.</FONT></DIV>
<DIV><FONT color=#000000></FONT> </DIV>
<DIV><FONT color=#000000></FONT> </DIV>
<DIV><FONT size=4>Also,could anybody give me his URL,if he has a web
page.</FONT></DIV>
<DIV><FONT size=4></FONT> </DIV>
<DIV><FONT face="" size=3>Thanks in advance for any information that anybody
could share about Kent Calhoun.</FONT></DIV>
<DIV><FONT face="" size=3></FONT> </DIV>
<DIV><FONT face="" size=3>Thanking You,</FONT></DIV>
<DIV><FONT face="" size=3>Yours sincerely,</FONT></DIV>
<DIV><FONT face="" size=3>Sanjay</FONT></DIV>
<DIV><FONT face="" size=3>Dr.Sanjay P.Lulla,M.D.</FONT></DIV>
<DIV><FONT face="" size=3>Email address : <A
href="mailto:clayidus@xxxxxxxxxxxxxxxx">clayidus@xxxxxxxxxxxxxxxx</A></FONT></DIV></DIV></BODY></HTML>
</x-html>From ???@??? Mon Sep 27 21:51:08 1999
Return-Path: <owner-realtraders@xxxxxxxxxxxx>
Received: from ml.nw.verio.net (ml.nw.verio.net [204.202.220.47])
by purebytes.com (8.8.7/8.8.7) with ESMTP id VAA28052
for <neal@xxxxxxxxxxxxx>; Mon, 27 Sep 1999 21:27:39 -0700
Received: (from majordom@xxxxxxxxx)
by ml.nw.verio.net (970819888) id VAA09892
for realtraders-sendemout; Mon, 27 Sep 1999 21:00:20 -0700 (PDT)
Received: from mail1.nwnet.net (mail1.nwnet.net [192.220.251.8])
by ml.nw.verio.net (970819888) with ESMTP id VAA09875
for <realtraders@xxxxxxxxxxxxxxx>; Mon, 27 Sep 1999 21:00:14 -0700 (PDT)
Received: from hotmail.com (f134.law3.hotmail.com [209.185.241.134])
by mail1.nwnet.net (970819888) with SMTP id VAA20499
for <realtraders@xxxxxxxxxxxx>; Mon, 27 Sep 1999 21:00:12 -0700 (PDT)
Received: (qmail 14095 invoked by uid 0); 28 Sep 1999 04:00:12 -0000
Message-ID: <19990928040012.14094.qmail@xxxxxxxxxxx>
Received: from 207.136.8.4 by www.hotmail.com with HTTP;
Mon, 27 Sep 1999 21:00:10 PDT
X-Originating-IP: [207.136.8.4]
From: "Jerrel Peters" <jerrelpeters@xxxxxxxxxxx>
To: JerrelPeters@xxxxxxxxxxx
Subject: Does anybody use Ensign?
Date: Mon, 27 Sep 1999 23:00:10 CDT
Mime-Version: 1.0
Content-Type: text/plain; format=flowed
Sender: owner-realtraders@xxxxxxxxxxxx
Precedence: bulk
Status:
Has anybody heard about Ensign allowing 3rd party developers??? I just got
this from their listbot and thought others might find it interesting.
>>>>>>>>>>
EnsignList - http://www.ensignsoftware.com
Hi,
Ensign Software has 3rd party developers that want to write their tools for
Ensign Windows using our ESPL programming language. These developers want
to distribute an encrypted file so others cannot discover the logic of their
proprietary work. The next version that is uploaded will support automatic
encryption of library files for the developers purposes.
Example:
procedure RunButton
begin
writeln('This is a proprietary routine');
end;
Suppose the above script is proprietary, and needs to be distributed as an
encrypted file. On the Script Editor, click the menu Script | Save As and
enter the filename to use. To save the file in an encrypted format, you
must provide an extension of .LIB by typing the filename with the .LIB
extension. All encrypted files will have an .LIB extension and be saved in
the C:\Ensign\Macro folder.
To use the encrypted file in a script, it must be referenced with the
{$Include filename} compiler directive, as illustrated in this example,
assuming we have an encrypted file named TEST.LIB.
{$I Test.lib}
begin
if who=0 then RunButton;
end;
This little script can use all the code in the TEST.LIB file, which in our
simple example contains the RunButton procedure. There is no harm nor any
value in the user seeing this portion which calls the encrypted TEST library
file. But what the user cannot see nor can they edit is the TEST library
file because it is encrypted. To see and edit the contents of Test, one
would need to have the original TEST.SPT file which was encrypted to create
the TEST.LIB file.
So, how does this differ from the previous use of the {$I ....} directive.
The difference is in the presence or absence of the .LIB extension in the
filename on the $I directive.
{$I Test} This will include a filename TEST.SPT which is not
encrypted. SPT files are ASCII text files saved by the Script Editor.
They can be loaded, edited, and saved by the Script Editor.
{$I Test.lib} The extension indicates the TEST.LIB file is encrypted and
will be treated as such when it is processed by the ESPL engine. If you try
to view an encrypted file, you will see what look like random garbage. Thus
the developers proprietary work is protected. It cannot be viewed nor
edited by end-users. Only the developer can make changes, by working with
the SPT original and resaving to a LIB file.
Developers can put their sensitive code in encrypted files by saving them
using filenames with the .LIB extension. A filename with the .SPT
extension will automatically be saved at the same time. Developers will
distribute the LIB file, and keep the SPT file for file maintenance
purposes.
Access to all distributed encrypted files will be through the use of the
{$Include ...} compiler directive from a main script that is not encrypted.
This is the correct way to proceed because end-users will want to add
purchased libraries to scripts they are developing. End-users can include
the encrypted libraries in the non-encrypted scripts they are editing and
running.
Some typical uses of this encryption capability are:
- Hide proprietary formulas, studies, and technical analysis
- Prevent modification and tampering with original work
- Prevent removal of copyright notices, names and addresses
- Hide details of security authorization and prevent security mechanisms
from being removed.
______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com
|