[ARCHIVE]Any rookie question, so as not to clutter up the forum. Professionals, don't pass it by. Can't go anywhere without you - 5. - page 240

 
alega:

Wisdom in counseling.(Bible)

If there is a lively curiosity, then the brain is alive. I envy children sometimes in this respect...
 
gyfto:

If there is a lively curiosity, it means that the brain is alive. I envy children sometimes in this respect...

Professionals are like parents: "Do not disturb me, I am busy" (The Bible).


And thanks for the detailed reply. (They can be dangerous, they are executable files. But at virustotal.com there is an online multi-antivirus, you upload the dll there and see who found what, then conclude. In other words, it checks all known antiviruses online. If someone has once checked the file (service will not look at the name, but the content of the file), the service will show you what kind of file and what was found. )

I honestly did not understand that answer. (There are, look for hands v.2.0. Seesergeev:)

 

Can you tell me if I don't use dll libraries in EAs, but the "Allow DLL imports " box is checked, is there any danger or danger.

 
alega:

Can you tell me if I do not use dll libraries in EAs, but "Allow DLL imports" is checked, is there any danger or danger.

If DLLs are prohibited, all MQL4 programs that use legitimate system DLLs will not work.

You can check the module yourself. The main thing is that it does not leak any information to the Internet. This can be checked with firewall. If it does not leak to the Internet, everything is OK.

 
Zhunko:

If DLLs are banned, all MQL4 programs that use legal system DLLs will not work.

You can check the module yourself. The main thing is not to leak information to the Internet. This can be checked with firewall. If it does not leak to the Internet, everything is OK.

(sighs) Thanks. Now I get it.
 
alega:

I honestly didn't understand that answer.(Yes, look for hands v.2.0. Seesergeev:)

I mean your hands, 2 pcs. When they ask for a good robot, experienced traders usually answer something like "search a few pages ago, a guy there has posted a good robot called @MOZG2013@". If they do not get it right away, they go and look for it. The same goes for when a newcomer is immediately asked "do you have a grail?", and if the answer is "I have a head", then the newcomer is obviously not a beginner at all. Professional sarcasm).

alega:

Can you tell me if I do not use in EAs the dll libraries, but check the box "Allow import of DLL" is checked, is there a threat or a danger of any.


Let's look at it through the eyes of a cracker. If you have open source code, you as a victim can look at the headers in an editor, look at the dlls and check them at virustotal. If you have only compiled ones, they may only use WinAPI, unless you additionally bundle standalone dlls (which you will check for sure, which the cracker can't do). So, it will only use WinAPI. Through WinAPI, i.e. system32, I can only imagine interception through Hook's user32.dll and further passing to third parties via network through wininet.dll, i.e. spyware. This can be checked with decompiler (paid hack lying on traders' forums), and traffic can be traced, and then firewall can be set up. But I know there are ways to bypass firewall, I don't know what they are. What else can be done through WinAPI, I can't think of.

 
solnce600:

Gentlemen! Good afternoon!

Could you please tell me

The only difference between the two codes is one function.

The first code contains the function if ((MathAbs(NormalizeDouble (Bid - S, Digits))<= 0.5*Point)) in the condition header.

If I understand correctly, if Bid(0.83401) < S(0.84401) despite the fact that the result of calculation is a negative number - 0.0010 this function will convert this number into a positive number, i.e. it returns a negative sign.

The second code is the same as the first one but the MathAbs function is missing in the header above.

The problem.

The second code opens orders in the tester and prints the result of the PRINT function in the journal

The first code does not open ordersin the Strategy Testerand does not print the result of the PRINT function's work to the journal.

In both cases, the charts and data (Hourly timeframe for 12 months of the year 2000) are identical. The settings in the Expert Advisor windows are identical.

Don't you want to take part in finding the answers?

No one has seriously looked into your code, or else you would have been warned that the declaration of libraries must be performed outside the function (I've already told you about it).

If you're lazy yourself / can not know another reason - there are tools that allow you to compare files by contents (Total Commander, for example, has such a feature). And the comparison would show the difference in the line (apart from already mentioned):

if( (NormalizeDouble (Bid-massiv[S],Digits) <=0.5))
P.S. Just out of curiosity, "What is your profession? And by job title?
 
gyfto:



Let's look at it through the eyes of the cracker. If you have open source code, you as a victim can look at the headers in an editor, use them to reach the dll and check them for virustotal. If you have only compiled ones, they may only use WinAPI, unless you additionally bundle standalone dlls (which you will check for sure, which the cracker can't do). So, it will only use WinAPI. Through WinAPI, i.e. system32, I can only imagine hijacking through Hook's user32.dll and further passing to third parties via network through wininet.dll, i.e. spyware. This can be checked with decompiler (paid hack lying on traders' forums), and traffic can be traced, and then firewall can be set up. But I know there are ways to bypass firewall, I don't know what they are. What else can be done through WinAPI, I can't think of.


Thank you!
 
alega:

I've been thinking... If WinAPI spyware is embedded in the dll, then the cracker could be an investor as well as a managing trader. Accordingly, if you know the person from whom you receive the indicator, he has not written you a custom-made file in ex4 and you are successful or investor, it makes sense to check for virustotal or trace the file's accesses, there is no need to decompile here, in principle. These are programs like Filemon. But even for targeted surveillance these are already extreme methods, this is not how people are probed. And to catch an infection on WinAPI in a free download - I don't know, you first have to be a convinced vandal for that...

 

How can I get around to creating a class or structure? In mql4. Maybe if you refer to memory cells... How to do this?