Many people read my public posts but have missed out on my private reports.
Is it possible that you are missing out on something that could add insight to your trading by adding my reports to your trading style? Could you possibly even make that money back ( $37.95 / month) on your next trade?
To answer that, I am going to show you what we at CHARTFREAK focused on over the past few months. AMONG other set ups-
1. Many were afraid during the oil sell off Aug through Jan. I was reading everywhere in Jan that you should be SHORTING OIL to the low $30’s. I am a contrarian during certain times and I found Many reasons to be one then. This is what I was telling my readers in late JAN.
“BUY OIL / ENERGY STOCKS ABOVE the 20sma. It has NOT been there in a while.” I was buying certain Energy stocks at the end of Jan while Most others shorted these lows.
I recommended these energy stocks on JAN 23 , knowing they were crushed to ridiculous levels and could explode higher. Reasons were pointed out in my reports. Many have since moved up 50 -100 + % or more. (Its not easy buying at lows, but my reports detailed the many reasons why)
REXX JAN 23 – 1 of 3 REXX charts I posted then.
REXX NOW- that was the lows.
EXXI– Jan 26, at $2.60 . Double bottom lows . 1 of 3 charts that I posted on EXXI – I thought we were looking at a great opportunity if one could be brave and then be patient. 100% 300% Gains over time?
EXXI – ran to $5 ( 100%) and dropped in March. This week was back well above $4, almost hitting $5 again so far , on April 15. I think there is more upside for the patient investor. I personally traded this one in & out with stops.
Again, many called to go short OIL on the MARCH DIP. There was fear of that break down to $30’s or $20’s everywhere. I declared it a shake out in real time and BUY! I pointed out the many reasons why and what I was looking at . This chart days later was to encourage readers that what we saw was indeed that shake out, NOT a break down.
2. Recently I was focused on NATGAS, also looking for a Double bottom low (Not a break down as I’ve been hearing . Many are in fear of the surplus , etc, but my charts called for a low).
I mentioned CHK, XCO and a few other stocks to take advantage of this ahead of time. As NATGAS broke down below recent lows, I was more bullish and I was looking for this break out too.
NATGAS Posted APRIL 27 – double low in place. Buy or wait for this break out to be safe/ conservative .
NATGAS 4-30 (2 days later) Some trader took UGAZ @ $1.80. It is now $2.43 , up 35% in 2 days. ( See also CHK)
We’ve also looked at trades in the equity markets , Commodities like STEEL, Uranium ( Honestly, I didnt want to chase & I missed most of that first move up in Uraniums and Rare Earth), SOLARS, etc VALE, CLF, FCX, were mentioned. The markets have been quite volatile lately , so some work out and some havent in the equity markets. The commodities, Energy , and Solars have been a bit more reliable.
3. What are we focused on at CHARTFREAK NOW? The moves in the GOLD/SILVER / MINERS Sector have had my attention again since March.
Today I hear many say , “GOLD is breaking April support, thus it will break March lows soon. The plunge in GOLD yesterday & Today is just the start, and todays follow through will plunge us down to $1000.” Yes, that could happen, it could look like this …
At this point I am looking at things differently again. ANYTHING is possible, but what am I seeing? I had reports this week discussing Precious Metals, and I posted an important update this morning too. My weekend report will likely be very much devoted to trying to see through the hazy guess work and find a solid understanding of where we are in this GOLD/SILVER sector.
So for less than the cost of a cup of coffee per day at Starbux or Dunkin’s you can read any past report, including my thinking in this mornings important Gold/SILVER/MINERS update. Your next trade may make that money back for you quickly.
You can cancel anytime ( no refund for the 1st month) if you aren’t satisfied. I will elaborate on my thinking about the precious metals in this weekends report that comes out by Monday morning. If you cannot join us at this time, please feel free to sign up for the email alerts to these public posts, which I send out from time to time.
Happy Trading and have a great weekend!
EDIT: I just finished my weekend report Sunday evening , it has about 40 Charts . Mostly focused on GOLD/SILVER/MINERS.
Quick update for readers here on Gold & Silver.Read More
Latest Blog Posts
Computer host access control is the first level to ensure network security. It is to limit whether and whether the subject has access to the computer IoT network, what operations are allowed to be performed on the computer IoT network, and to effectively prevent the security of the computer IoT network from being disrupted Behavior to ensure that the information in the computer IoT network is used by legitimate users. Unauthorized access includes the method of computer IoT by illegal users, the illegal use of network method resources by legitimate users, and the use, disclosure, tampering, and destruction of information without authorization. The occurrence of these problems is also related to the existence of loopholes in the current network management system. At this stage, all enterprises and government departments should pay attention to the problem of computer network security and actively study effective precautions and solutions. Regarding the threats caused by identity authentication, the improvement of third-party authentication systems can be used as a basis to build more diverse authentication methods. http://www.itcertlearn.com It is important to understand who constitutes the threat, and prohibiting Practice internally initiated connections means that a connection to a host may be a potential threat. Mobile phone text messages and emails were originally the same way CISA exam questions and answers pdf people communicated. The malware infections we know are also the biggest examples of end-system security vulnerabilities. Once an attacker breaks a perceived terminal or Practice Note node, they can use simple tools to analyze the confidential information stored in the terminal or node. Trojan horses and viruses also use vulnerabilities in the perceived terminal or node to attack. Responsibility and patience are at the core of teacher morals. Responsibility and patience are inescapable for anyone, especially for teachers. Database technology is one of the more critical technologies in information technology systems. It mainly manages computer data systematically. The main Cert research content in database technology is how to better organize and store data and how to better. To obtain and process related data, it can design and store the structure of the database through relevant methods, and analyze these theoretical data. Paying close attention to network security and improving your awareness of network security can provide strong support in the process of computer network security maintenance, and it is also necessary to repair computer vulnerabilities with the help of professionals. At present, Video Course computer technology has penetrated into all areas of production and life. Therefore, computer education occupies an C_TSCM52_66 Dumps important position at all stages of education. Cultivating students' innovative ability in computer education can maximize the comprehensive quality of students and cultivate innovative ability. , And can fully guide students to develop independent thinking and analytical ability to solve problems. Among them, the "dual system" in Germany and the "new apprenticeship" in Australia have a far-reaching impact. On August 25, 2014, the "Opinions of the Ministry of Education on the Pilot Work of Modern Apprenticeship" proposed that "localities should choose majors suitable for the development of modern apprenticeship training, and guide vocational colleges and cooperative enterprises to follow the growth laws and job positions of technical and skilled personnel. To meet the actual needs, jointly develop talent training programs, develop courses and teaching materials, design and implement teaching, organize assessment and Past Questions evaluation, and conduct teaching research. Only by choosing Exam Book a teaching method suitable for this can we truly and effectively improve the knowledge ability and ideological level of the teaching object and promote its healthy and upward development. Teachers' own quality and driving ability are directly related to whether the chosen teaching method can play its due role. With the development of society and the advancement of science and technology, trade has extended from reality to virtuality, and the market has expanded from tangible to intangible, constantly enriching and improving. The students did not perform the actual operation in time after learning the theoretical knowledge. The learned knowledge points are easily forgotten. When the next machine class is taken, the theoretical knowledge has basically been forgotten. The ICGB Free pdf teacher will spend time explaining the theoretical knowledge and Few students have fewer opportunities to do it. In addition, we found that due to the relatively short PMI-RMP certification development time of network information technology, many users have not paid enough attention to network information security. To put it plainly, there is a lack of awareness of network security. For example, it is necessary to set a secure password. We found that the vast majority of users specifically save trouble when setting up. It is just a simple setting. In this way, it is very easy to find that the user account is stolen and the password is stolen, which seriously threatens the computer network information security. The teaching process has also changed from "fill-in-duck" teaching to students' active exploration in the learning environment created by the school. For example, in August 2018, a domestic new media marketing listed company suspected of illegally hijacking operator traffic was cracked by police, and as many as 3 billion user data was stolen from 96 Internet companies in China. In view of this, this article first describes the network security management technology, summarizes the structure of the network security management technology, and finally proposes effective strategies to achieve network security management. The basic principles of the Cyber ??Security Law are the basic norms that guide and regulate the legislation, law enforcement activities of Dump cyber security law, regulate the legal relationship of cyber security, and the handling of related disputes. Introduce the competence requirements and business level standards of programmer positions in the database application development competition as the main points of the competition evaluation.