Jump to content

Leaderboard


Popular Content

Showing content with the highest reputation on 03/02/2020 in all areas

  1. 1 point
    Many of you might have already heard of the fantastic DAS Dynamic Hotkey (aka Kyle's Hotkeys), which allows you to place trades setting by fixed dollar amount or percentage you want to risk on each trade. These dynamic scripts take a lot of work of your hands and allow the DAS Trader Pro platform to do all the thinking and calculating for you. Saving you time and allowing you to focus on the actual trade, which is far more critical. Kyle is kind enough to host a Success Webinar for us on Wednesday, March 4th at 8:00 pm. The webinar will structure in two parts, the first session will breakdown the latest dynamic hotkeys, how they work, and the expected action. Part two will be a Q&A in regards to these hotkeys. To better prepare, we asked that you post questions you might already have about these hotkeys below so that Kyle can review before his webinar. Thanks! PS: If you are not yet aware of Kyle's hotkeys, below is the post link. https://forums.bearbulltraders.com/topic/716-das-dynamically-calculate-shares-on-risk-or-risk-hot-key-configuration-updated-91019-v21/
  2. 1 point
    This is a very long post, but I believe everyone should read this if you have an account with CMEG. I was hoping that CMEG was going to announce something this morning, but it looks like they wont. TL;DR: CMEG’s website had a DNS hijack deployed against it, and was redirecting users to a fake website in order to capture sensitive information. If you have a new user registration pending, or you attempted to log into the Secure Portal recently, at the least, change your password, and think about locking your credit. Facts • CMEG's DNS server was hijacked. (Look at the image below to understand how that works) • The hijack targeted new user registrations, users who had registrations pending, and users attempting to log into the Secure Portal. • The hijackers could have taken very sensitive information. • If you have logged into CMEG recently, you could be exposed. • This does not mean your deposited money isn't safe. • This was fixed in the late evening Feb 28, 2020. What happened? The hijackers redirected the "Open an Account" button/link and the "Secure Portal" login link to go to different URLs. Instead of sending users to the real URLs: https://www.cmelitegroup.com/open-an-account https://secure.cmelitegroup.com/login They were sent to the wrong URLs: https://secure.cmelitegreup.com/pro?pthh=repister https://secure.cmelitegreup.com/pro?pthh=login The fake site was designed to look identical to the real Open an Account page and the Secure Portal login page. Although after attempting to log in it Who does this affect? The hijack affects four types of users: 1. Users that attempted to log into the Secure Portal (further, users that also used the same password for the Secure Portal as they used for their new Account Management account. 2. Users that had a new account registration pending 3. Users that attempted to sign up for a new account (Only your name, email and attempted password could have been taken) What could they have taken? If you either, a) had a registration pending or b) attempted to log into the Secure Portal while the hijack was active they could see this information if your password hasn't been changed: • Name • Tax Return • Social Security Number • Bank Statements • Passport • Drivers License • Messages between you and CMEG One note about the Secure Portal - it is not the same place where you can go to see your account balance, trades, or instigate a withdrawal. These things are in the Account Management page, and use a different login (assuming you didn't use the same password). Additional thoughts This was not a DNS hijack targeting me alone. CMEG didn’t believe me (as the hijack was being hidden on their network - they couldn’t see that their URLs were changed). I verified it by getting different people around the country to test and see that the URL was changed for them too. If you used the same password when signing up for an account (the Secure Portal) as you did when creating a login for the Account Manager, they could log in and see your trades and account size. While I think people's money is safe, unfortunately the withdrawal request is simply a PDF document; the hijackers would have all the information needed to request a withdrawal. That being said, I believe it would not work because: 1. CMEG does require KYC (Know Your Customer) documentation. So the name on the bank account would have to be yours (although they could set up a new bank account in your name with all the information they could have taken). 2. Hopefully they would see the bank information wouldn't match the original deposit method. 3. CMEG would see that the request was coming from a different email address (but maybe they could spoof that too). I do not know how long CMEG's DNS server was hijacked for. So I can't tell you if you're safe if you haven't logged in for the past 1 day, 1 month or 1 year. My belief is that the hijackers would want the lowest hanging fruit: your email. For the sole purpose of trying to send you phishing emails.
  3. 1 point
    3-2-2020 Alright, got a few trades in today which all worked out pretty well for me. Trades 1 & 2 $CCL- Got stopped out on my first trade. Saw a potential reverse ABCD and what appeared to be a test near VWAP. I took the trade short and got stopped out above the VWAP. Evidentally, it was not done testing the VWAP. Shortly after that, I got back into the trade near the same spot I entered the first time. Set my stop just above VWAP and got about 2R out of it. Trade 3 $NVAX- Saw it was very bearish at the open. Saw a gradual climb to VWAP. It broke through and was rejected and then consolidated right at VWAP. Waited for a break of the 9/50EMA on the 1 minute and took it short then rode it down. Trade 4 $ZM- I was waiting for a bounce off VWAP, but saw it got rejected at the 50MA on the 1 minute. I figured it was probably not going to make it completely all the way to VWAP so I took it short. Stop loss at VWAP, didn't completely hit my target, took my first partial at around 1.5R and then I saw that bullish candle break those moving averages so I got completely out. EDIT: Forgot to put my 1st trade with $AMD on here.. $AMD- Saw a three-bar play on the 1 minute chart. Saw the first bearish candle. Second created an equal bottom and only retracted roughly 50% of the preceding candle. Took it short on the third candle at the break.
  4. 1 point
    Monday 03/02/2020 I had a well-being score of 5/10 this morning. A bit under the weather. I took 3 live trades this morning with CCL, AAPL and AMD. My watchlist: AMD, AAPL, JD, TSLA, TWTR, and CCL. CCL was forming a nice ABCD in PM with resistance level at 32.33. The price broke with a L2 signal and I went long with $33 as my target and a tight stop at 32.20. After 5 minutes I took a partial then 2 minutes later the volume completely stopped and I was spooked out of the trade. I should have just reduced my share size instead. I did miss the pop to almost my target, but Ok with the trade. I need to be cautious in the PM. AAPL was being squeezed right before the open near a daily level. I went long, with a small share size, when it bounce from the support. The plan was to buy more at the break of the resistance level around 282. It broke that level and I instinctively took a partial. Then I gathered my senses and added in. Target was the HOPM (orange dash line) with a stop at 281.50. Right before the open I took a partial just incase the price dropped at the open. The price popped up and I took a large partial what I though was near the $284 and thought I was done for the day. Then saw my fill was over a dollar lower. Then I exited, luckily at B/E, due to wild price variations. AMD made a nice hammer on large volume at the open. I went long at the break of the 47.34 daily level. I took a partial at the 47.50 PM level and then another partial at the candle high. Then set my stop at B/E where I exited with a little slippage. Very soon after it looked like a good short, but I was already at my 3 trade max. What did I do good today? Good risk management. I took risky trades but was very cautious with them. What I am grateful from today? Though my three winners were all small they added up to an OK day. Updated my DAS platform. I like how they showed their order like Etrade Pro does with a line at the price. Before I would get an open triangle not remotely near the order price.
  5. 1 point
    2-28-20 AIS 0815, 5.5 hours, 6/10 PAT: Over-trading ..... Execute setup when ready but do not jump the gun Bad day, I over-traded on both tickers and took too much size on both. This could have easily turned into a HULK day but talking it out helped me get out. AMD -1.4R TVIX I was way over-trading and was taking too much share size causing me to have bad trade management. -7.6R Cons: over-trading .... did not respect daily stop and once an in-trade stop Pros: did recognize my over-trading before I went complete HULK Rs: -9R
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.