Monday, June 8, 2009

2 GREAT VOLUME POPS TO START THE WEEK

[Mon Jun 08_11:07:54 EDT 2009] Muddy: CYTR pop .60
[Mon Jun 08_11:09:57 EDT 2009] Muddy: CYTR got jig,vol (respect the jig,peeps)
[Mon Jun 08_11:18:54 EDT 2009] Muddy: CYTR triple vol in mins

Hit hod .86..in on .60 out at .83 for 38%

[Mon Jun 08_12:24:48 EDT 2009] giantseaturtle: MDTL spike
Mon Jun 08_12:26:13 EDT 2009] Muddy: vol yes MDTL
Mon Jun 08_12:29:21 EDT 2009] Muddy: .32
[Mon Jun 08_12:33:28 EDT 2009] Muddy: MDTL nice vol play

In on .30 still in on .78 close for 160%!!!!!

Many other great calls in chat,just gets better

4 comments:

klynn55 said...

how would you have played CYTR in detail,the volume spikes are there but what next, how would you deal with the red candles, did you get out? did you stay till 4 oclock.

klynn55 said...

same with MDTL, would you have stayed in or got out at the dips, and why, thanks, kerry

Anonymous said...

Kerry as I mentioned in the post...

CYTR,in on .60 out at .83 for 38%
MDTL,In on .30 still in on .78 close for 160%!!!!!

As for the red candles,I do not use intraday charts so never saw them,I use the quote box action on Scott to guide me,the way many use level 2 I suppose.

As far as MDTL I would have sold very near eod but I fell asleep about 15 minutes before close

Anonymous said...



☑️☑️COMPOSITE CYBER SECURITY SPECIALISTS ☑️☑️

•• Are you Seeking for the Best Legit Professional Hackers online?
Congratulations Your search ends right here with us. •• ⚡️⚡️

☑️☑️For Years Now We have Been helping companies secure their Infrastructures against malicious Attacks, however private individuals have been making use of our services to provide Optimum solutions to their cyber and Hacking related Issues by providing them unlimited Access to their desired informations from their Target such as Phone Hack (Which enables them to monitor their kids/wife/husband/boyfriend/girlfriend, by gaining access to everything they are doing on their phone without their notice), Credit Card Mishaps, Website Hacking, Funds Recoveries And Every Other Cyber Related Issues That has to Do With HACKING.

☑️☑️COMPOSITE CYBER SECURITY SPECIALISTS is a vibrant squad of dedicated online hackers maintaining the highest standards and unparalleled professionalism in every aspect.
We Are One Of The Leading Hack Teams In The United States With So Much Accolades From The Deep Web And IT Companies. ••
••We Offer Varieties Of LEGIT Hacking Services With the Help Of Our Root HackTools, Special HackTools and Our Technical Hacking Strategies Which Surpasses All Other Hackers.

☑️ Below Is A Full List Of Our Services:
▪️ FUNDS RECOVERY ON BITCOIN SCAM, INVESTMENTS, BINARY OPTIONS TRADING, LOANS and ALL TYPES OF SCAMS.
▪️ WEBSITE AND DATABASE HACKING πŸ’»
▪️ CREDIT REPAIR. πŸ’³
▪️ PHONE HACKING & CLONING (giving you πŸ“± Unnoticeable access to everything Happening on the Target’s Phone)
▪️ CLEARING OF CRIMINAL RECORDS ❌
▪️ SOCIAL MEDIA ACCOUNTS HACKING πŸ“±
▪️RECOVERY OF DELETED FILES πŸ“€
▪️LOCATION TRACKING πŸ“Œ
▪️BITCOIN MINING ⛏ And lot More.


☑️We have a team of seasoned PROFESSIONALS under various skillsets when it comes to online hacking services. Our company in fact houses a separate group of specialists who are productively focussed and established authorities in different platforms. They hail from a proven track record and have cracked even the toughest of barriers to intrude and capture all relevant data needed by our Clients. Some Of These Specialist Includes ⭐️ DAWID CZAGAN⭐️ JACK CABLE ⭐️ SEAN MELIA ⭐️ ARNE SWINNEN ⭐️And More. All you Need To do is To Write us a Mail Then We’ll Assign any of These Hackers To You Instantly.

☑️COMPOSITE CYBER SECURITY SPECIALISTS is available for customer care 24/7. Feel Free to Place your Requests.

☑️☑️CONTACT:
••• Email:
composite.cybersecurity@protonmail.com

πŸ”˜2020 © composite cybersecurity specialists
πŸ”˜Want faster service? Contact us!
πŸ”˜All Rights Reserved ®️.