
You are missing trading opportunities:
- Free trading apps
- Over 8,000 signals for copying
- Economic news for exploring financial markets
Registration
Log in
You agree to website policy and terms of use
If you do not have an account, please register
Ayrat, that sounds more like evidence of paranoia than hacking.
+100
Rashid, thank you for your understanding and the information you provided.
I wonder what about the understanding on your part ?
1. You accused a man of burglary without any good reason.
2. The alleged evidence you presented, excuse me, but it's childish nonsense.
3. If you know the copyright law so well, once again I suggest you read it. Screenshots, photocopies are not proof, unless they are notarized.
4. Ridiculous statements that "I am the author of the article", but the article has not been published anywhere, a bunch of drafts on your computer is not proof of authorship.
In view of the above and the screenshots of Rashid, I demand as you said.
I suggest one of two things for the offender to choose from:
1. We accept YOUR explicit and public apology in this case;
2. demand an explanation of how you could steal the avatar of an article. After all, your publication is later than 22.03, so it's more likely that YOU are the hacker.
My article was published on 27.03.2009:
Concept of AIS Series Software Development for MetaTrader 4 Client Terminal
Ultimate Certainty: Automatic Trading Concept of AIS Series Software
This is a proof of my authorship.
My article was published on 27.03.2009:
'AIS3 Trading Robot Template'.
AIS2 Trading Robot'.
This is proof of my authorship.
For your information. An article and an advisor (indicator, script) are two different things.
An article may be claimed as authorship. The software is not. Under Russian law, the algorithm cannot be patented, so it is impossible to prove its authorship.
Incidentally, there is such a case in USA too.
The US court recognized that the abstract ideas, objective laws of nature, mathematical formulas and algorithms can not be patented
Z.U. But it still does not cancel your attack on the man and your false accusations against him. Integer has a date of 19.03 which is earlier than yours. Or don't you already believe Rashid's screenshots?
I have already explained the origin of the thumbnails.
They show my code.
Such line sequences are found in every program of the AIS series.
There are 10 of them published, including 23 foreign publications.
Only 3 of 25 publications of MQL4 code of this person contain the word "#define".
All of them are the same program located in different parts of the Code Base:
'ind_HotKeys_v1'
'ind_HotKeys_v1'
'ind_HotKeys_v1'
Most likely, these lines were written by another programmer.
The sequences of lines shown in the sketch are missing in his published programs.
I have already explained the origin of the thumbnails.
They show my code.
Such line sequences are found in every program of the AIS series.
There are 10 of them published, including 23 foreign publications.
Only 3 of 25 publications of MQL4 code of this person contain the word "#define".
All of them are the same program located in different parts of the Code Base:
'ind_HotKeys_v1'
'ind_HotKeys_v1'
'ind_HotKeys_v1'
Most likely, these lines were written by another programmer.
The sequences of lines shown in the sketch are missing in his published programs.
You can find this kind of code in almost any developer.
But everyone has his own style of writing. But for that you have to compare the source code already.
Can anyone really hack Ais ? It's impossible...
The easiest thing to do is to write him a suitable email with a Trojan, 90% of the time the recipient will launch the Trojan if there is interesting content in the email.