[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re:GEN:Kent Calhoun's methods



PureBytes Links

Trading Reference Links

<x-html><!DOCTYPE HTML PUBLIC "-//W3C//DTD W3 HTML//EN">
<HTML>
<HEAD>

<META content=text/html;charset=iso-8859-1 http-equiv=Content-Type>
<META content='"MSHTML 4.72.3110.7"' name=GENERATOR>
</HEAD>
<BODY bgColor=#ffffff>
<DIV>
<DIV><FONT color=#000000>Greetings to eveyone,</FONT></DIV>
<DIV><FONT color=#000000></FONT>&nbsp;</DIV>
<DIV><FONT 
color=#000000>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
Does anybody have any experience with &quot;Kent Calhoun&quot;-the </FONT></DIV>
<DIV><FONT color=#000000>self proclaimed greatest trader in the world,and has 
anybody attended one of his seminars,or used his 5 VBTP system,again proclaimed 
by him to be the best trading</FONT></DIV>
<DIV><FONT color=#000000>sytem along.Any comments or experiences with Kent 
Calhoun and his sofware</FONT></DIV>
<DIV><FONT color=#000000>would be highly appreciated.</FONT></DIV>
<DIV><FONT color=#000000></FONT>&nbsp;</DIV>
<DIV><FONT 
color=#000000>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
In the June 1998 issue of TASC,Kent Calhoun has a one page advertisement in 
which he really makes some tall claims.One of his statements </FONT></DIV>
<DIV><FONT color=#000000>is-&quot;Robert Krausz learned to swing trade 5 VBTP's 
on multiple time frames-2 years </FONT></DIV>
<DIV><FONT color=#000000>later he was a market wizard&quot;.</FONT></DIV>
<DIV><FONT color=#000000></FONT>&nbsp;</DIV>
<DIV><FONT 
color=#000000>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
Amongst the people supportedly endorsing his techniques are:</FONT></DIV>
<DIV><FONT color=#000000></FONT>&nbsp;</DIV>
<DIV><FONT color=#000000>1.One of the founders of CompuTrac who says 
:&quot;Excellent,tremendous teaching techniques.Very Original.Aproven mechanical 
approach to making money.I have never</FONT></DIV>
<DIV><FONT color=#000000>been to a seminar where people said it was the best 
seminar they have ever attended&quot;end of quote attributed to James Jones-Tx 
and</FONT></DIV>
<DIV><FONT color=#000000></FONT>&nbsp;</DIV>
<DIV><FONT color=#000000>2.The CEO Bank of Liechtenstein has been quoted as 
having said the following-&quot; I</FONT></DIV>
<DIV><FONT color=#000000>made substantial money using your 5 VBTP 
method.Especially in currencies and interest rates,but also coffee and 
bellies.The 5 VBTP method is an ingenious discovery,and is unbeleivable how 
precisely this pattern indicates the turn of the market against all fundamental 
and technical odds&quot; end of quote,as ascribed to having een said by Dr.Anton 
Schwaiger.</FONT></DIV>
<DIV><FONT color=#000000></FONT>&nbsp;</DIV>
<DIV><FONT color=#000000></FONT>&nbsp;</DIV>
<DIV><FONT size=4>Also,could anybody give me his URL,if he has a web 
page.</FONT></DIV>
<DIV><FONT size=4></FONT>&nbsp;</DIV>
<DIV><FONT face="" size=3>Thanks in advance for any information that anybody 
could share about Kent Calhoun.</FONT></DIV>
<DIV><FONT face="" size=3></FONT>&nbsp;</DIV>
<DIV><FONT face="" size=3>Thanking You,</FONT></DIV>
<DIV><FONT face="" size=3>Yours sincerely,</FONT></DIV>
<DIV><FONT face="" size=3>Sanjay</FONT></DIV>
<DIV><FONT face="" size=3>Dr.Sanjay P.Lulla,M.D.</FONT></DIV>
<DIV><FONT face="" size=3>Email address : <A 
href="mailto:clayidus@xxxxxxxxxxxxxxxx";>clayidus@xxxxxxxxxxxxxxxx</A></FONT></DIV></DIV></BODY></HTML>
</x-html>From ???@??? Mon Sep 27 21:51:08 1999
Return-Path: <owner-realtraders@xxxxxxxxxxxx>
Received: from ml.nw.verio.net (ml.nw.verio.net [204.202.220.47])
	by purebytes.com (8.8.7/8.8.7) with ESMTP id VAA28052
	for <neal@xxxxxxxxxxxxx>; Mon, 27 Sep 1999 21:27:39 -0700
Received: (from majordom@xxxxxxxxx)
	by ml.nw.verio.net (970819888) id VAA09892
	for realtraders-sendemout; Mon, 27 Sep 1999 21:00:20 -0700 (PDT)
Received: from mail1.nwnet.net (mail1.nwnet.net [192.220.251.8])
	by ml.nw.verio.net (970819888) with ESMTP id VAA09875
	for <realtraders@xxxxxxxxxxxxxxx>; Mon, 27 Sep 1999 21:00:14 -0700 (PDT)
Received: from hotmail.com (f134.law3.hotmail.com [209.185.241.134])
	by mail1.nwnet.net (970819888) with SMTP id VAA20499
	for <realtraders@xxxxxxxxxxxx>; Mon, 27 Sep 1999 21:00:12 -0700 (PDT)
Received: (qmail 14095 invoked by uid 0); 28 Sep 1999 04:00:12 -0000
Message-ID: <19990928040012.14094.qmail@xxxxxxxxxxx>
Received: from 207.136.8.4 by www.hotmail.com with HTTP;
	Mon, 27 Sep 1999 21:00:10 PDT
X-Originating-IP: [207.136.8.4]
From: "Jerrel Peters" <jerrelpeters@xxxxxxxxxxx>
To: JerrelPeters@xxxxxxxxxxx
Subject: Does anybody use Ensign?
Date: Mon, 27 Sep 1999 23:00:10 CDT
Mime-Version: 1.0
Content-Type: text/plain; format=flowed
Sender: owner-realtraders@xxxxxxxxxxxx
Precedence: bulk
Status:   

Has anybody heard about Ensign allowing 3rd party developers??? I just got 
this from their listbot and thought others might find it interesting.

>>>>>>>>>>

EnsignList - http://www.ensignsoftware.com

Hi,

Ensign Software has 3rd party developers that want to write their tools for 
Ensign Windows using our ESPL programming language.   These developers want 
to distribute an encrypted file so others cannot discover the logic of their 
proprietary work.   The next version that is uploaded will support automatic 
encryption of library files for the developers purposes.

Example:

procedure  RunButton
begin
    writeln('This is a proprietary routine');
end;


Suppose the above script is proprietary, and needs to be distributed as an 
encrypted file.   On the Script Editor, click the menu Script | Save As and 
enter the filename to use.   To save the file in an encrypted format, you 
must provide an extension of  .LIB   by typing the filename with the .LIB 
extension.   All encrypted files will have an .LIB extension and be saved in 
the C:\Ensign\Macro folder.

To use the encrypted file in a script, it must be referenced with the 
{$Include filename} compiler directive, as illustrated in this example, 
assuming we have an encrypted file named   TEST.LIB.

{$I Test.lib}

begin
    if who=0 then RunButton;
end;

This little script can use all the code in the TEST.LIB file, which in our 
simple example contains the RunButton procedure.   There is no harm nor any 
value in the user seeing this portion which calls the encrypted TEST library 
file.   But what the user cannot see nor can they edit is the TEST library 
file because it is encrypted.   To see and edit the contents of Test, one 
would need to have the original TEST.SPT file which was encrypted to create 
the TEST.LIB file.

So, how does this differ from the previous use of the {$I ....} directive.   
The difference is in the presence or absence of the .LIB extension in the 
filename on the $I directive.

{$I Test}        This will include a filename  TEST.SPT  which is not 
encrypted.   SPT files are ASCII text files saved by the Script Editor.   
They can be loaded, edited, and saved by the Script Editor.

{$I Test.lib}    The extension indicates the TEST.LIB file is encrypted and 
will be treated as such when it is processed by the ESPL engine.  If you try 
to view an encrypted file, you will see what look like random garbage.  Thus 
the developers proprietary work is protected.   It cannot be viewed nor 
edited by end-users.   Only the developer can make changes, by working with 
the SPT original and resaving to a LIB file.

Developers can put their sensitive code in encrypted files by saving them 
using filenames with the .LIB extension.   A filename with the .SPT 
extension will automatically be saved at the same time.   Developers will 
distribute the LIB file, and keep the SPT file for file maintenance 
purposes.

Access to all distributed encrypted files will be through the use of the 
{$Include ...} compiler directive from a main script that is not encrypted.  
  This is the correct way to proceed because end-users will want to add 
purchased libraries to scripts they are developing.  End-users can include 
the encrypted libraries in the non-encrypted scripts they are editing and 
running.

Some typical uses of this encryption capability are:

    - Hide proprietary formulas, studies, and technical analysis
    - Prevent modification and tampering with original work
    - Prevent removal of copyright notices, names and addresses
    - Hide details of security authorization and prevent security mechanisms 
from being removed.

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com