Jump to content

scorpionidain

Members
  • Posts

    199
  • Joined

  • Last visited

  • Days Won

    35

Posts posted by scorpionidain

  1. Scorpionidain,

     

    Thanks for the files. Do you have any information how to use this setup, maybe vendor website or any other information?

     

    After a quick search, this is what I could find. Fr@nk Ocho@ Piv0t B0ss

     

    Secrets of a Pivot Boss book PDF link: https://[email protected]/file/c5otrc

     

    Youtube video:

     

    Still don't know if these are related though.

     

    Yes. They are related

     

    https://pivotboss.com/

     

    All his courses are shared on this website. Search this site.

     

    his master class is shared here

    https://indo-investasi.com/showthread.php/32621-REQ-PivotBoss-M-ster-Training?highlight=pivotboss

  2. Hi Jane,

    This is AcmeTrend ported for nt8.

     

    https://www.sendspace.com/file/x0ez85 .

     

    Try to import it. It should work. If not extract the files. copy them in C:\Users\xxxxxx\Documents\NinjaTrader 8\bin\Custom\Indicators and compile one of the indicators.

     

    This is volume pressure

    https://www.sendspace.com/file/1sx3bw

     

    Extract the files. copy them in C:\Users\xxxxxx\Documents\NinjaTrader 8\bin\Custom\Indicators and compile one of the indicators.

     

    I have not tested this as I don't have real time data as markets are closed. Please try it out.

    Thanks

  3. "Just using the IP address

    Learn what an IP address is and how it is assigned"

     

    This explains nothing. This is your attempt to further hide. Learn what is IP ihihihih. great answer because you don't want to say how you got it. what else do you got.

     

    I'm on to you!

     

    The dll may be calling home to run or not. As a part of that connection, he is getting the client's IP addresses.

     

    There is a sample scan on the magicthing.dll somebody has done. https://www.hybrid-analysis.com/sample/a9be43a18a3e22995803ad2abea981c4e6f336df16d71017c2f98ff690a06884?environmentId=120 . There are 4 suspicious activities in this. May be he can explain that. One them is "Installs hooks/patches the running process" .

     

    "rundll32.exe" wrote bytes "7111c3017a3bc201ab8b02007f950200fc8c0200729602006cc805001ecdbf017d26bf01" to virtual address "0x755707E4" (part of module "USER32.DLL") . What is this?

×
×
  • Create New...