statistic

statistic math money forex

Photobucket

12/16/2007

Download a Free Trial Copy of NCSS. Comprehensive and User-Friendly. Integrated Excel Add-In Statistical tests and diagrams

12/18/2007

Over 50 years of accurate, speedy, and affordable metal analysis. Dedicated Analytical Solutions for chemical analysis from Foss

12/16/2007

Mini-Gold spot trading, 24 hour 200:1 leverage, No Commissions. Two "Backdoor" Plays Ready to Soar. Get Your Free Investment Report.

12/16/2007

Ironman punya keunikan dalam warna dan tampilan. Beda dengan Robocop jauh lebih canggih dan lebih berfantasy... Saya mau koleksi…

12/14/2007

Gambar 1/2 manusia 1/2 kucing ditambah tatoo diseluruh badan menjadikan dia benar-benar 1/2 gila. Gigi manusia ini sudah berbentuk…

12/14/2007

Coba tebak berapa ukuran babi raksasa ini? berapa kilogram beratnya? Ukuran kepalanya saja mungkin sudah seberat 5 manusia. Babi…

12/18/2007

Serangan Jantung dan kebiasaan Minum Air Panas / hangat.... Artikel ini berguna untuk semua. Bukan saja anjuran meminum air…

12/16/2007

Foto wanita tercantik tercantik sejagat planet dan woowww... coba perhatikan!!.. Tapi kenyataannya dia memang menang dalam kompetisi.. Woow... So cute…

12/16/2007

Artis sinetron punya keunikan dalam warna dan tampilan. Beda dengan penyanyi jauh lebih canggih dan lebih berfantasy... Saya mau koleksi…

12/16/2007

Gambar atau foto ini adalah gambar helm Ironman dalam versi 3D. Film akan diputar pada pertengahan tahun depan (2008).…

12/14/2007

Gambar 1/2 manusia 1/2 kucing ditambah tatoo diseluruh badan menjadikan dia benar-benar 1/2 gila. Gigi manusia ini sudah berbentuk…

12/14/2007

Coba tebak berapa ukuran babi raksasa ini? berapa kilogram beratnya? Ukuran kepalanya saja mungkin sudah seberat 5 manusia. Babi…

12/18/2007

Serangan panas dan sembriwing.... Artikel ini berguna untuk semua. Bukan saja anjuran meminum air…

12/16/2007

Gambar cewe tercantik sejagat Asia Raya menurut saya sih.. Tapi kenyataannya dia memang menang dalam kompetisi.. Woow... So cute…

12/16/2007

Ironman punya keunikan dalam warna dan tampilan. Beda dengan Robocop jauh lebih canggih dan lebih berfantasy... Saya mau koleksi…

12/16/2007

Gambar atau foto ini adalah gambar helm Ironman dalam versi 3D. Film akan diputar pada pertengahan tahun depan (2008).…

12/14/2007

Gambar 1/2 manusia 1/2 kucing ditambah tatoo diseluruh badan menjadikan dia benar-benar 1/2 gila. Gigi manusia ini sudah berbentuk…

12/14/2007

Coba tebak berapa ukuran babi raksasa ini? berapa kilogram beratnya? Ukuran kepalanya saja mungkin sudah seberat 5 manusia. Babi…

12/18/2007

Serangan Jantung dan kebiasaan Minum Air Panas / hangat.... Artikel ini berguna untuk semua. Bukan saja anjuran meminum air…

12/16/2007

Gambar cewe tercantik sejagat Asia Raya menurut saya sih.. Hot..hot.. wow..wow... gila..busett.... Woow... So cute…

12/16/2007

Fantastic 4 punya keunikan dalam warna dan tampilan. Beda dengan girl powernya fs jauh lebih canggih dan lebih berfantasy... Saya mau koleksi…

12/16/2007

Gambar atau foto ini adalah gambar helm Ironman dalam versi 3D. Film akan diputar pada pertengahan tahun depan (2008).…

12/14/2007

Gambar 1/2 manusia 1/2 kucing ditambah tatoo diseluruh badan menjadikan dia benar-benar 1/2 gila. Gigi manusia ini sudah berbentuk…

12/14/2007

Coba tebak berapa ukuran babi raksasa ini? berapa kilogram beratnya? Ukuran kepalanya saja mungkin sudah seberat 5 manusia. Babi…

Jumat, 18 Januari 2008

LAWMA ON DUTY

When many are sleeping soundly in their homes, Popoola and his colleagues are in the cold, dark night battling the elements and the risk of being knocked down by careless and drunken drivers to clean up the Lagos metropolis, which has the reputation of being among the dirtiest in the world.

They are equally at the mercy of street urchins popularly called ‘area boys’ and armed robbers, who sometimes mistake them for security agents. Yet, they are undaunted by the many risks.

An Ordinary National Diploma certificate holder, Popoola carries out his job with a bright face. Every evening at around 8.00pm, he and his other colleagues gather at a designated point to be briefed by their manager on how the night’s operation would be conducted.

Minggu, 06 Januari 2008

Which agencies are best? Join AARG to find out!

CONFIDENTIAL MEMBERSHIP SURVEY
==============================
(Return to: Agency_Research@yahoo.com)


1. In which city and state do you live?



2. In what INDUSTRIES do you AND your spouse/partner work?



3. Where have you adopted from previously? What is the name of the
agencies or attorneys you used?



4. Currently, from which countries are you thinking about adopting? Any
agencies in mind?



5. Why do you want to join this Group?



6. READ THIS CAREFULLY. You must respond YES or NO to this question.
Respond YES if you or your family members are NOT involved in the Adoption
Industry; respond NO if you or your family members ARE involved, and
explain HOW you are involved:
    Do you CERTIFY that neither you, your spouse (if applicable), your adult
children (if applicable), your employer, nor any other member or employer of
your immediate family is engaged in any aspect of the Adoption Industry,
either voluntarily or on a paid basis, with a domestic and/or international
adoption agency, adoption facilitator or facilitation service, adoption
referral service, adoption advertiser, foster/adopt program, adoption home
study provider, adoption attorney, care or counseling of birth parents, or
any other group or organization, for profit or not, involved in the
placement of children for money or which advocates on behalf of adoption
agencies (i.e., FOA or JCICS)?

    Your Response: 


Never miss a thing. Make Yahoo your homepage.

Jumat, 04 Januari 2008

Please reactivate your Yahoo! Groups email address

Dear Yahoo! Groups member,

You belong to one or more email groups provided by Yahoo! Groups
(groups.yahoo.com).

Recently, messages sent to you from Yahoo! Groups have been
returned to us as undeliverable. As a result, we have temporarily
turned off message delivery to this email address.

If you are reading this message, the delivery problem appears to
be fixed. To start receiving your groups messages by email again and
turn your account back on, please visit:

http://groups.yahoo.com/unbounce?adj=333147644,76956&p=1199259387


(You can also copy and paste this link into your browser, and hit the
'Return' key.)

Once you reactivate your Yahoo! Groups account by clicking the
link above, you will receive messages from your group(s) again.

Tip: You can read messages you might have missed while delivery was
turned off by visiting your groups here:

http://groups.yahoo.com/mygroups

Thank you for using Yahoo! Groups!

Yahoo! Groups Customer Care

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/

Please reactivate your Yahoo! Groups email address

Dear Yahoo! Groups member,

You belong to one or more email groups provided by Yahoo! Groups
(groups.yahoo.com).

Recently, messages sent to you from Yahoo! Groups have been
returned to us as undeliverable. As a result, we have temporarily
turned off message delivery to this email address.

If you are reading this message, the delivery problem appears to
be fixed. To start receiving your groups messages by email again and
turn your account back on, please visit:

http://groups.yahoo.com/unbounce?adj=333147644,76956&p=1199259387


(You can also copy and paste this link into your browser, and hit the
'Return' key.)

Once you reactivate your Yahoo! Groups account by clicking the
link above, you will receive messages from your group(s) again.

Tip: You can read messages you might have missed while delivery was
turned off by visiting your groups here:

http://groups.yahoo.com/mygroups

Thank you for using Yahoo! Groups!

Yahoo! Groups Customer Care

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/

Kamis, 03 Januari 2008

File - Unsubscribe Letter

If you are receiving this message then that means you have unsubscribed from the LiveScannerAudio Yahoo Group.

There is only 2 step's to this.

1) Your reading this message. You've done your part. You've Unsubscribed.
2) BE PATIENT!!!!! Yahoo Groups is slow at times but will process your request to be unsubscribed. It will take anywhere from up to 48 hrs to 3 day's before you will stop receiving group email from us. Again, please be PATIENT. It take's time, but eventually they'll stop. PLEASE DO NOT EMAIL THE GROUP TO BE UNSUBSCRIBED. It only starts flaming.

Thank you,
List Moderator's

Rabu, 02 Januari 2008

File - Phishing.txt

***

Please Read this important post first from one of our members...

http://finance.groups.yahoo.com/group/investmentprograms/message/14310


Thx TaS

I thought the following may be of interest. With so many losing their
gold due to hackers, this clever phishing is a very likly cause it is
incredable how they can trick you even when you are on a trusted site.

See or read below:

http://www.theregister.co.uk/2004/11/02/phishing_tabbed_browsers/


Phishing for dummies: hook, line and sinker
By Scott Granneman, SecurityFocus
Published Tuesday 2nd November 2004 14:55 GMT
Recent "phishing" episodes, and two new browser vulnerabilities, show
how the bad guys are tricking people into exposing their passwords
and bank accounts. Couldn't happen to tech-savvy users, right? Unless
you consider how entire nations have been fooled.

The art of faking out opponents in a clever, elegant, beautiful way
is one that I find fascinating, and I cherish examples of that art.
When looking through history for stories illustrating the deliberate
use of distractions to obfuscate an intended purpose, I often return
to World War II, which offers many such tales.

The story of the allies' cracking of the German Enigma machine is one
that everyone in security should know about. Used by the Germans, the
Enigma machine was cracked by the allies using a variety of
techniques. Math played its part, but so did subterfuge. Robert
Morris, former chief scientist at the NSA (and father of the Morris
Worm author), explained during a talk at Blackhat Briefings that the
Americans noticed that German weather ships trawling in the North
Atlantic used Enigma machines to send in weather reports every day.
If the Allies could acquire those machines and their keys, it would
be a major help in decrypting Enigma. Consquently, the Allies sank a
couple of the ships in what seemed like a normal wartime action, but
in reality salvage teams immediately went to work and recovered the
Enigma machines and the required keys. The Germans never suspected
what the real target of the attacks was, and the Allies had another
tool to use in their war.

Several incidents, famous only after the war, occured during the
preparations for the liberation of Europe from the fascists. The
Allies wanted to confuse the Nazis so that the actual locations of
the landings - the beaches of Normandy for D-day in 1944 and Sicily
in the Mediterranean in 1943 - would be secret as long as possible,
so they developed several deceptions that were purposely designed to
be "accidentally" picked up by Nazi operators, including:

Operation Fortitude A fake First Army Group, supposedly commanded by
General George S. Patton, sent fake radio messages confirming that
the Pas de Calais was going to be the epicenter of D-day. In
addition, airfields were created that contained row upon row of
papier-mache planes, designed to fool air surveillance.
Operation Skye Radio traffic out of Scotland intentionally deceived
the Germans into believing that the D-day attack was going to come
out of northern Europe, in either Norway or Denmark.

Operation Mincement (This one is my favorite) This brilliant plan
involved dropping a dead man, wearing a life jacket and supposedly
named "Major William Martin", into the ocean off the coast of Spain
in April 1943. Chained to his wrist was a briefcase containing forged
war plans about the upcoming invasion of Sardinia. Hitler fell for it
completely, diverting Axis defenses to Sardinia and allowing the
Allies much easier access to the island of Sicily, the real target.

In the cases above, the good guys used subterfuge, trickery, even
treachery to fool their enemies into beliving that what they were
seeing and hearing was true, when it fact it was anything but. We're
seeing the same sort of chicanery today on the web, except now its
ordinary users who are being duped by the bad guys, and the good guys
have a heck of a time making the situation any better. I'm referring
to the epidemic of phishing that is currently one of the biggest
problems on the net.

Reaching the point of epidemic
I don't know about you, but I get at least one email every few days
that is supposedly from CitiBank (currently used in 54 per cent of
phishing messages), or PayPal, or eBay, or Amazon, or SunTrust Bank
(who the heck are they?), or or or or or ... the list goes on and on.
The emails always mention that my account needs to be updated, or my
credit card has been charged for some enormous purchase that I never
made and I need to correct this, or that I need to verify some
information the website has on me. Whatever. The goal is always to
get me to believe that a company I use for financial transactions -
and who therefore is trusted by me - needs information, so that I
submit personal data that can be used by criminals to further their
own ends. These messages can look very, very real, as the image
below, taken by blogging pioneer Dave Winer shows. Yes, he uses
Outlook Express for some reason, and received this in his email
(click for a bigger pic):


Keep in mind that phishing is not confined to email, but is also web-
based as well. In fact, those emails wouldn't work without a
corresponding website, designed also to look as realistic as
possible, containing forms for suckers to fill in. But there are also
various tricks that can be played on unsuspecting web users that can
get them in trouble.

How big is that trouble? Enormous, and growing. According to a
Gartner Group study from May of this year, at least 1.8m consumers
have been tricked by phishing attacks into revealing sensitive
information - and the majority of that 1.8m occured within the year
prior to that report. In just the last six months, phishing emails
have increased by 4000 per cent. On average, a consumer loses $1200
when his bank account is taken over, and the vast majority of such
takeovers are from phishing. Think about those numbers for a second.
1.8m people affected. 4000 per cent increase. $1200 average loss per
person.

This is escalating into such a problem for banks that many of them
are now refusing to protect their customers and, as The Boston Herald
reports, are now choosing instead to "litigate, fight and force
consumers to settle for lower amounts". If you were fooled through
phishing, your bank very well may refuse to reimburse you. Most
consumers know that if they get screwed using a credit card, they're
only liable for $50. Not so with bank accounts, evidently. Some of
you might think, as I did, that FDIC protections safeguard those of
us who live in the US, at least up to $100,000 (which is far, far
more coverage that this columnist needs!) Nope. Those only apply if
the bank declares bankruptcy, not if an Eastern European cracker
employed by the mob tricks me into revealing my PayPal password and
then cleans out my bank account.

Browser Problems
So phishing is a large, serious, and growing, problem. That's bad.
And then within the last few weeks we received even worse news: many
of our favorite (and some not-so-favorite) web browsers were
vulnerable to phishing using a particularly clever attack vector: the
tabs that many of us have come to know, love, and depend upon.

Secunia issued a security report detailing how most major web
browsers with the tabbed browsing feature were vulnerable to two
different vulnerabilities.

First, the browsers. Recognize any you use?

Mozilla 1.7.3
Mozilla Firefox 0.10.1
Camino 0.8
Opera 7.54
Konqueror 3.2.2-6
Netscape 7.2
Avant Browser 9.02 build 101 and 10.0 build 029
Maxthon (MyIE2) 1.1.039
That list contains several that I use on a daily basis: Firefox,
Opera, Konqueror, even Mozilla. In many cases, these are the very
latest versions of these browsers (not counting nightly builds, of
course). A cross-section of browser rendering engines - Gecko, KHTML,
Trident, Presto, and more - is represented. The major operating
systems, Linux, Mac OS X, and Windows, are represented as well.
Microsoft's Internet Explorer - at least an un-enhanced IE, since
Avant and Maxthon are just feature-laden shells wrapped around IE's
Trident rendering engine - is unaffected, but only because IE by
itself is so lacking in modern features that it doesn't even support
tabs (hey, maybe that's why Microsoft hasn't ever included support
for tabs in IE - 'cause they're concerned about security!).

Now, the vulnerabilities. One of them is pretty clever, and one of
them, I think, is a bit overstated, but I'll explain that in a second.

You have a couple of different websites open in a couple of tabs. You
open another tab and head over to a trusted website, like PayPal's.
You're on the PayPal site, when suddenly a dialog box opens,
apparently from PayPal, and asks you to enter your password and your
credit card info, "for verification purposes". You do so and keep
using the PayPal site, never realizing that it was not the PayPal tab
that spawned that dialog box, but a web site on a different, inactive
tab. To see what I'm talking about, open the demo site at Secunia
with an affected browser and follow the instructions. Very clever.
There are two problems here. First, the browser doesn't easily keep
the user informed as to which tab is responsible for the dialog box.
That's an easy fix. Second, the browser shouldn't allow inactive tabs
to spawn dialog boxes in the first place. Another easy fix. But
still - not good. Clearly, none of the organizations creating these
browsers ever envisioned such an attack. Of course, this attack will
only work if you're already on a shady web site to begin with, and if
that site knows you've gone to a site that it knows you trust, like
PayPal. As Secunia itself points out, for this sneaky stunt to work
it would "normally require that a user is tricked into opening a link
from a malicious web site to a trusted web site in a new tab".
Clearly, the likelihood of that string of events is pretty small. But
it's still clever, and it would undoubtedly get a lot of folks in
trouble if they somehow had both the "bad" and the "good" sites open
at the same time in separate tabs.

The second vulnerability strikes me as even less likely, but perhaps
I'm wrong. Let's say you have a couple of different web sites open in
a couple of tabs. You open another tab and head over to a trusted
website, like PayPal's. You type in your username and password, but
nothing shows up. You type it again. Still nothing. Assuming that
PayPal's site is temporarily borked, you close the tab and continue
on your merry way. Little do you know that everything you typed
actually went into a form on a site found on one of your other tabs.
If you want to see this in action, Secunia has a demo site up for
this one as well.
Now, this one seems quite unlikely to me, even more so that the
first. Secunia justifies the seriousness of the hole by claiming that
it "is escalated a bit by the fact that most people do not look at
the monitor while typing data into a form field", which doesn't jibe
with what I do or what I see. In my experience, most folks - not all,
but most - look at form fields while they're typing, so I think that
they would immediately notice when text isn't appearing. Further, it
doesn't matter if the text you're trying to type is actually entered
into a form field in another tab - you'd have to actually go back to
that tab, not notice that your PayPal password was sitting there in a
field, and then go ahead and press Submit and send that data to the
bad guys. I find this scenario even less likely than the one in the
first vulnerability, but maybe I'm nuts.

So here we have problems in some very popular tabbed browsers.
Secunia's advice is logical: either disable JavaScript (which will
cause problems using a vast number of web sites, so it's not likely),
or avoid opening a trusted web site in a tab when other tabs already
contain untrusted websites. OK. Not bad advice. So if you want to use
PayPal or eBay or your bank, open up a new Firefox window first. No
problem. A fix, of course, would be better.

In the usual open source tradition of fixing flaws quickly, Konqueror
released a version of the browser that was patched against the
vulnerabilities, and Firefox promised that it would be secured by the
time 1.0 is released, sometime in the new few weeks. On the other
hand, Netscape, now owned by AOL, and Avant never bothered to respond
to Secunia when it contacted them. Guess I know which browsers to
avoid.

I'm not trying to discredit Secunia or these vulnerabilities. They
are definitely problems that need to be fixed. It's just that there's
a big difference between the almost torturous series of steps
required to exploit users with these vulnerabilities as compared to
the recent IE exploit that involved simply visiting your bank's
website. However, there are other phishing vulnerabilities out there,
involving Google, for instance, that are far easier to fall for.
Undoubtedly there are many, many others, involving weaknesses in the
web sites and in the web browsers we all use every day, that will be
discovered. We need to be aware of these openings because they remind
us that phishing is not just a matter of receiving an email that's a
doppelganger for a real one from a company we do business with, but
also that phishing is increasingly going to use the vector of the
browser itself as an opening for exploitation. And that, as security
pros undoubtedly know in their bones, is going to be an even bigger
problem than duplicitous emails.

Copyright © 2004,

Scott Granneman is a senior consultant for Bryan Consulting Inc. in
St. Louis. He specializes in Internet Services and developing Web
applications for corporate, educational, and institutional clients.


All the best,

Tony P
http://myhyipworld.com
http://www.myhyipworld.com/AAI.htm
http://finance.groups.yahoo.com/group/investmentprograms
http://www.easyresponders.com/subscribe.aspx?u=1231/1490
http://finance.groups.yahoo.com/group/AAInvestors
http://finance.groups.yahoo.com/group/HYIPGames

***

File - Please READ before you post...

***

This is an automated message sent every 2 weeks...

PLEASE BE ADVISED:

Do not disclose anything from inside our group to any other outside forum or anywhere else "on the net" unless you have specifically asked for permission to do so.

PLEASE BE ADVISED:

Do not disclose anything from inside our group to any other outside forum or anywhere else "on the net" unless you have specifically asked for permission to do so.

This includes the Bad IP list which has been compromised in the past and has now been moved to an autoresponder server here:


http://www.easyresponders.com/subscribe.aspx?u=1231/1314


Simply sign up and read the following automatic email in your inbox to receive the Bad IP List updates.


By all means get your friends and family into "IP" so that they can benefit from the information within the "IP" group.

I will not disclose the copyright issue with you, as you should know what it is.

The list was created for the members in "IP". What is said and disclosed in "IP" should stay in "IP"

PLEASE ALSO RE-READ OUR "TERMS FOR JOINING THIS GROUP. ALL ADVERTISED REFERRAL LINKS FOR PROGRAMS WILL RESULT IN YOU BEING MODERATED AND REPEAT OFFENDERS WILL BE BANNED FROM THIS GROUP". I hope you understand...


***
BY JOINING OUR GROUP YOU ARE BOUND BY THE "TERMS OF JOINING" AS ADVERTISED BELOW.
***

This group is a RESTRICTED members only group.

What is said in "IP" STAYS in here...FULL STOP...

***

TERMS OF JOINING...

NO YAHOO ID = CANNOT JOIN

Posts regarding anything other than a relation to HYIP / AUTOSURFING / FOREX or of a "Related Nature" will be rejected.

REFERRAL LINKS = DELETED POSTS and Moderated with a possible BAN

SIGNATURES ARE ALLOWED - Providing they do not contain Referral Links

DOUBLERS AND QUICK MONEY MAKERS = DELETED POSTS and Moderated with a possible BAN

SPAM = AUTOMATIC BAN

HARD BOUNCING EMAILS = YOU WILL BE REMOVED FROM THE GROUP

SOFT BOUNCING EMAILS will be REMOVED after 1 months

STRONG/ABBREVIATED/ABUSIVE LANGUAGE or ANYTHING I consider as DEROGATORY in ANY Posts or towards MEMBERS = AUTOMATIC BAN ...Please keep it civil.

IF you have been banned the ONLY way to rejoin if you wish is to use another Yahoo ID and email address.

I WILL NOT RESTORE YOUR OLD ID or email address.


*****************

So what do we do?

*****************

We are a group of Investors that help each other find the Paying programs and SCAMS in AUTOSURFERS FOREX & HYIP.

If you have been scammed in the past, then this is definately the place to join.

ALL of our members CAN and ARE advised to post their problems.

This groups POSTINGS are UNMODERATED.
Only new members are moderated for the first couple of posts.


WHEN YOU JOIN you will receive a number of AUTOMATED EMAILS, they are for your benefit so please read them


***


Please also post your NON Paying programs to this group.


Talk or Enquire about any HYIP / AUTOSURFER / FOREX or RELATED TOPIC, but please refrain from using referral links.

This group is for finding SCAMS and PAYING programs only, NOT for free advertising...

All the best,

Tony P
http://finance.groups.yahoo.com/group/investmentprograms
***


If you have any questions please do not hesitate to ask them...


If you do not wish to belong to our group anymore, you may easily unsubscribe by sending an email to...

investmentprograms-unsubscribe@yahoogroups.com


And please remember....NO referral links....


***

If you are posting about a particular program, then please try to use the URL as the subject heading. This helps us all to find out what you are enquiring about and also aids when searching the archive folder...

***

REF LINKS...


Ref links are designated like this.............

http://myhyipworld.com is NOT a ref link it is a stepping stone to another
webpage. I do not force people to click one link and then automatically get
a referral for it. People, if they want to go to my website and if they
like anything they see then they will click on it. I do not force this
link on anybody .... If they click a link after viewing the contents ...
THEN IT BECOMES A REF LINK.

Direct links like http://www.gold.com/refid=you is a ref link. People
will go to that site and automatically the cookies take over your computer
and remember the IP and machine. Should that person not decide to join then
they will go somewhere else. If they decide to join at a later date then
the cookie is stored and the ref link becomes active again.

If people go to my site and do not click anything but come back at a later
date there is no cookie stored and if they clicked
http://www.joinme.com/ref=tony it would all depend if they were invited
from someone else and that person would get the ref link instead of me.

People can remove these links as they see fit... but I do not have a direct
link to a website that will earn a fee from it.

I hope this makes sense?

I absolutely hate banning members but many people have been testing my
patience recently...

If you are unsure then please re-read the rules on the home page...
http://finance.groups.yahoo.com/group/investmentprograms


My sincere apologies go out to ALL those who uphold the groups rules...
You are the greatest!!


All the best,

Tony P
http://myhyipworld.com
http://www.myhyipworld.com/AAI.htm
http://finance.groups.yahoo.com/group/investmentprograms
http://www.easyresponders.com/subscribe.aspx?u=1231/1490
http://finance.groups.yahoo.com/group/HYIPGames

***