The best filters for forex. Flat filter indicators: the best technical forex tools. Filter indicators as the basis of a trading system

Some time ago, while looking for a topic for a new post, I was browsing various forums and blogs and came across one very interesting resource. I wanted to copy some of the text I liked from it (it was an instruction for auditing the site), but, to my surprise, I could not do this. I did not stop there, and opened the page of this site with the help of "Ctrl + U" and was able to take the section of text I needed through the source code of the page. But, I liked this method and I took note of it. Now I will tell you how to protect content from copying different methods, including the one I stumbled upon in the story I told.

It is almost impossible to protect the site from technically trained users, but if we make it difficult to copy, then the majority of those who like to use other people's texts will no longer want to mess around and they will switch to those sites where it is easier to do it.

Why do you need to protect texts?

Imagine this scenario - you have just published a new post and are waiting for it to be indexed as soon as possible and get into the search results. And, at the same time, some rogue webmaster is watching and copying your new text, and publishing it on his resource, the indexing speed of which is higher than yours. Search engine speedbots find your article first on his site. In this case, his article becomes and the authorship belongs to him, and you are a thief in the eyes of the search engines.

It turns out that not only will you not get traffic for your efforts, since the article on the fraudster’s website will be higher in the search results, but the reputation of your blog in the eyes of Yandex and Google will also fall.

How to protect blog content from being copied?

There are many protection options, but they differ only in the implementation of the same principles. In this article, I will show 4 options on how to protect website content from copying and from theft.

  1. Notification of search engines about authorship before the publication of the article.
  2. Hidden links in the text to the author's site.
  3. Use of special plugins.
  4. Careful announcement of new articles.

Well, now, let's talk about each method of protection in more detail.

1. Search Engine Alert

One of the ways to protect your content from theft is the notification method when a new original and unique article is published. You can do this by going to the webmaster tools of the Yandex search engine - webmaster.yandex.ru. To use this tool, your site must be added to this service and the rights to it must be confirmed. Choose the site you need, find the section on the left "Site Content" - and in it the paragraph - "Original texts".

Previously, it was possible to add texts only for sites with a TIC equal to or greater than 10, but then this restriction was removed. Now you just need to insert the text into a special form (limit 32 thousand characters) and click on the “Add” button.

From now on, the text will be fixed on your resource. But, it is worth noting that this service is perceived by the search engine as a recommendation and does not give a 100% guarantee.

2. Protection of content with hidden links in the text

The next option to protect the text of an article from copying, which we will consider, is the introduction of a hidden link into the text. Of course, you can calculate it for one or two, but few people think that the post contains such a “toad”. The author, if the link is not noticed, receives an additional link to his resource (I sometimes see such links to my site in Yandex Webmaster - people take my articles and do not delete the links).

There are 3 ways to protect content this way.

1) The simplest option is the usual internal linking, but such links are immediately visible and are almost always deleted. But you need to do this in any case, since linking is no longer needed for protection, but to promote the site for low and midrange requests.

2) In order for the links not to be found the first time, they should be hidden. I sometimes make a reference to some point or comma in the article. With a cursory glance at such material, the link is not visible; in order to find it, you need to open the source code of the page, which not everyone does.

3) Automatic insertion of a link into the copied text using a script. Whatever piece of text is copied from your site, a link to the original source will be added to it, in addition, the script will count the number of attempts to steal your content.

In order to place such a link, you need to go to the Tynt.com service and register there following the instructions. At the very end, you will receive a script that needs to be posted on the blog. For WordPress there is detailed instructions by inserting the code, it is recommended to place it in a file, but I would recommend not to hang scripts at the top of the code, it is better to add it to the footer.php file.

3. Protecting content with the Wp-CopyProtect plugin

The third way to protect text from copying is to use a special Wp-CopyProtect plugin. It is able to prevent a potential "thief" from using the right mouse button and the "Copy" command. Also, the Wp-CopyProtect plugin can leave a hidden link to the author's blog at the end of the post.

Installing the Wp-CopyProtect plugin is easy. It is in the WordPress plugins directory and is added to the site directly from the admin area. Read how to install plugins. After installation, you will need to make settings. The line WP Copy Protect will appear in the left panel, go to this section. The following should be configured:

If the text copy prohibition function does not work, then write the following line in the footer.php template file (it should be in a normally laid-out template):

The action of this plugin can be replaced by a script that performs the same functions. Setting up the plugin is easier, since you don’t need to interfere with the site files (if you don’t understand HTML, this is a weighty argument). If you are not afraid to dig into the codes, then replace the Wp-CopyProtect plugin with the following script:

4. Magic code to protect content

I called this method of dealing with thieves magical because it is simple to implement and very effective. A small piece of code, which is not even a code, but an attribute to the body tag, does not allow you to copy anything from the pages of the site. At the same time, it does not swear, does not prohibit selection and does not block any mouse buttons. People can select text, copy it using the keyboard or mouse, but when they try to paste what they copied, a void will be issued - there will be no data in the buffer.

To implement it, you need to open your site in a text editor and find the opening tag (in WordPress it is in the header.php file). And add an attribute to this tag, it should look like this:

On the blog, the design may look a little more complicated, since there may be some more parameters there. On one of my sites it looks like this:

5. Protection of content from copying by competent announcement

After you have a new post on your blog, do not rush to publish the article on social bookmarks and services of dubious quality. Search engines are rarely there, and thieves are often.

Leave announcements only where search bots are frequent - twitter, facebook, vkontakte (you can - this will attract more attention of robots) so that the article gets into the search engine index faster.

In no case do not broadcast the full version of the article in the RSS feed, only the announcement. And where you publish announcements manually, make them unique so that your articles are not even partially copied.

And make it a habit to update your blog regularly, then search engines they will get used to and will often come to you, which will lead to a quick hit of new posts in the index. And what is already indexed is assigned to your site as an author.

6. Legal protection

All content that we create falls under the definition of intellectual property and is subject to all laws in this area. The problem with sites is that the procedure for obtaining rights to an article is very cumbersome. You need to go to a notary and certify every page of your site there - this is also money.

Only upon receipt of a notarized document confirming your rights to the articles will you be able to punish the thieves - to force them to remove the stolen content and even pay you compensation.

Without such documents, it is almost impossible to prove something to someone. I had an experience of correspondence with the hoster of one of the sites that stole my content. The maximum that I could achieve was the hoster's promise to send a letter to the owner in which my claim would be stated. They will not take any punitive actions without a court decision.

This despite the fact that I showed them the date of the first indexation of my article in Yandex and compared it with the date the copy was posted on the thief's site. There it was obvious that he had it a few years later. In addition, he still had links to my blog in his articles and he uploaded pictures from my hosting - still nothing was achieved.

So, if you think that your texts are really worth going to the notary with them - go, so you will be 100% protected, but in most cases, the game is not worth the candle.

I'll start with the bad news. There is no absolute insurance against theft on the Internet.

Elena Nemets

There are technical means that somewhat complicate it, but do not exclude it.

I have been running a travel blog for ten years now, and I also moderate the travel blogging community on Facebook. The topic of theft comes up all the time. If you blog, sooner or later you will find your texts and photos on other people's sites. So the question is more correct to put like this: how to minimize the risk of copying content and how to strengthen your position if you have to go to court.

If you are a beginner blogger, it is worth making an effort now to be fully equipped when you have to beat out compensation from those who want to use your works for free. Here are six simple steps to take.

Briefly - how to protect your blog from content theft

Blog protected by law

Both texts and photographs are objects of copyright, which are protected by law. Article 1255 of the Civil Code states that the exclusive right to a work and the right to publication belongs to the author.

So even if the material is in open access on the Internet, this does not mean that anyone can take it and use it without asking. But if the case goes to court, authorship will have to be proven. And for this it is worth making sure in advance.

Real name

Under the article. If you're blogging, sign each article with your real name. By law, whoever is listed as the author on the original work is automatically considered to be its author, unless challenged in court.

If you use a pseudonym, you can play it safe with the old-fashioned method: send yourself a paper letter with the text of the article, which is signed by a pseudonym and a real name. When the letter arrives, you do not need to open the envelope. Mail stamps will record the date the text was written.

On the website of the hosting provider. Fill in the domain administrator information for the blog. This can usually be done in the control panel on the provider's website. This will help prove that the blog is yours. If you are blogging in in social networks, proof that it belongs to you is a login, password and binding to mail or personal phone.


You can check the details of the domain owner on whois.com

Copyright sign

The absence of a warning and a copyright sign does not mean that the article is not protected by copyright. That is, technically, the copyright sign can be omitted. But when it stands, it will be much more difficult for the thief to prove to the court that he did not know that this text has an author, and the rights are protected.

Therefore, it is better to add a copyright sign and the date to the signature: © Masha Ivanova, 2018.

In law, a copyright mark is called a copyright mark. It is intended for notification of authorship. The date will help prove the primacy of the publication.

Even on the page where you post texts, it makes sense to put a copyright warning. For example: "The use of materials from the site konfetka90.ru is permitted only with the written consent of the author." You can choose not to use the content at all, or give clear instructions on what needs to be done in order to reprint your text or post a photo. For example, give a link to the original publication, indicate your full name and give a link to the blog and social networks.


Water marks

Always watermark your published photos. This is especially true for photographers and bloggers on Instagram. Even if the photo is found on Google using pictures, it will have information about the author.

Watermark - effective method scaring off thieves. It is always easier for them to find another picture, without a watermark, than to suffer with its removal.

If a photograph has been cropped or a watermark has been retouched on it, this is a separate violation under Article 1266 of the Civil Code of the Russian Federation - the right to the inviolability of the work and protection of the work from distortion. If your photo was not only stolen, but also changed, you can demand higher compensation in court.

Ideally, the author's name should be on the watermark. The website, email, or alias will require additional steps to prove that the photo is yours. First you will need to prove that the site, mail and pseudonym belong to you.


Photo sources

The original photographs are reliable proof of authorship for the court. It can be RAW or raw JPEG, depending on what you are shooting on.

Never share the original photos with anyone. If the recipient abuses them, such as signing photos with their name or adding a watermark, you will lose a powerful argument in your favor.

Always keep an archive of photos and make regular backups.

Author data in camera settings

Digital photography is more than just a picture. Each file stores metadata in EXIF ​​- Exchangeable Image File Format. This is a standard that allows you to add information to photos about when, how and by whom they were taken.

Part of the data is read from the camera automatically, such as the date of shooting and frame settings. Modern cameras allow you to automatically put the name of the author in the metadata when shooting or saving files to disk. In Fuji mirrorless cameras, this is done inside the settings menu on the camera, and in Canon cameras, through the EOS Utility program. Tools for editing metadata are available in Photoshop and Lightroom.

EXIF stores and serial number cameras. If the warranty card with the number or the original box from the camera is kept, this will be additional evidence for the court that it was you who took the photo. And the camera itself is also proof of authorship.


Fix the authorship of the text

The most effective, albeit unpopular, method is to record the authorship of the text in an independent depository. This, for example, is the "Bank of Copyrights" - reliable, but not cheap. The first five objects are registered for free, and for each next one you will have to pay 100 rubles.

Yandex Webmaster offers the Original Texts tool for sites that are registered with Yandex. Before publishing each text, you must first submit it to the "Original Texts". the main objective of this tool - an increase in the search results of sites with original content and, conversely, a decrease in the rating of copy-paste sites. But to confirm authorship, it also works.


Copyright protection in practice

If your rights have been violated, you have two options: negotiate with the violator or take him to court. To agree, in most cases it is enough to write and ask to remove the material taken from you from the site. Serial offenders and copy pasters understand that the truth is on your side and you can easily prove authorship in court, and the offender will have to pay substantial compensation and legal costs. Therefore, competent copy-pasters delete everything at the first request.

If the copypaste is illiterate, he can be sued. But it's not as easy as it seems.

You can't sue just like that, against someone. We need data of a specific defendant: an organization or a person. The data is needed up to the registration address at which the court will contact the violator. Finding the address is possible, but not always easy.

If your pictures or texts were stolen by the media, you will find information about them in the imprint. If your pictures appeared on the company's website, it will be the defendant.

And if just some anonymous goner decided to steal your text, you will have to deanonymize it. To begin with, it is worth looking at the site owner through the "Whois-service" - most likely, he will say that the site owner is anonymous, but he will tell you who registered his site.

Then we take a lawyer with a crust and ask him to draw up a lawyer's request to the company that registered this site. If you do not want to contact a lawyer, you can make a request yourself, but then you need to prove to the registrar that you are the copyright holder. They tell more about this in the reg.ru directory - most likely, you will deal with them.

When the defendant is identified, it will be necessary to record the facts of the violation, collect evidence of authorship, formulate statement of claim and submit documents to the court. You can do it yourself, but it is better to contact a lawyer or a lawyer. About this - another time.

Is it possible to protect yourself from rewriting?

How to protect your blog from theft

  1. Sign texts and photos with your real name.
  2. Warn subscribers not to use content without your consent or without your terms being met.
  3. All photos should be watermarked and captioned.
  4. Always keep the sources and install a plugin to fix the uniqueness of texts.
  5. If someone stole something, first politely ask to remove it, and then contact the lawyers. The law protects you, you will win the case, but whether you can get the money is unknown.

Even if this does not deter the thief, it will be easier for you to prove authorship and receive compensation. In the next article I will tell you how to do this if the content has already been stolen.

Hello dear traders!

Many of you have probably already heard that each trading strategy should be selected and tailored to the needs of the trader individually. That is, it is not necessary to create a unique system from scratch, develop new indicators or some trading tactics that only you know about. It is enough to take any working strategy and try to change it so that it is convenient and understandable for you to work with it.

One way to do this is to use Forex filters, we will talk about them in detail in today's article.

By the way, this article is a continuation of this topic on filters (you can read part 1). In the 1st part, the filters of the technical part of trading were considered (breakout, amount after the breakdown of the level, filter for exiting trades, etc.), but in this 2nd part, we will talk about fundamental forex filters that will cover the entire trading according to the strategy as a whole (and not its individual elements). So let's get started.

No. 1. The first filter you can apply to your strategy is limitation of trading hours(will be relevant only for intraday traders). Everyone has long known or heard that the most active hours for intraday trading are the European and American periods. This begs the question, should a trader trade during this period of time?

Let's look at the statistics from the international broker FXCM over the past few years for the 5 shown in the figure.

The chart shows the probability of making a profit on an open trade, depending on the time it was opened.

The time in the figure is NY, so if you translate into Moscow, then the most high probability profit on transactions from traders from 22:00 pm to 14:00 pm Moscow time. Agree unexpected and interesting statistics. But since trading at night is not an option (it’s not convenient both physiologically and technically, and even during this period the market is in most cases), then for an intraday trader the optimal time to work is from 10:00 am to 2:00 pm (on MSC).

What are the benefits of such a trading hours limit filter? Firstly, since all important fundamental news is released after 15:00, and the price can behave unpredictably after that, we exclude this period from our trading. Secondly, during the hour interval of the European session indicated by us (from 09:00 to 14:00), as a rule, one-way price movement is observed, which facilitates the analysis of the situation on the market.

The introduction of this simple filter can improve results or even transform your strategy from unprofitable to profitable. Also, using this forex filter, you can additionally check which hours trading according to your strategy brings good results, and which are bad, and as a result, exclude the latter.

No. 2. The next forex filter is seasonal filter. Many people know such a fact that trends in certain currencies can arise at certain periods (seasons) of the year. Let's take a look at how seasonality is displayed in currencies and how you can use it in your trading.

So with that in mind, let's look at the stats again:

Here, seasonality data is presented for futures (for Euro and other currencies), but for currencies this principle will be identical. Data source and detailed information presented Here.

The chart above shows the average price movement for the Euro, which is divided by months, respectively, for 5/10/15 years.

Also on other tabs, you can separately view data for the same:

5 years:

10 years:

Pivot points are displayed on each of the individual charts (circled with squares - bottom, circles - tops), i.e. when the price changed its direction in the opposite direction. Accordingly, if these charts are superimposed one on another, those areas where the pivot points or price movements coincide, we should pay attention to them.

How can it be used? According to these data, if the currency has been growing from March to May for 15 years in a row, then, accordingly, during this period, priority should be placed precisely on the purchase of the Euro currency, and the strategy signals should be filtered by this criterion (optimally suitable for working on daily charts).

I must say right away that this is by no means some kind of golden rule, but it is also stupid not to take it into account, since it is based on many years of statistics.

No. 3. The next and last forex filter that we will consider in this article is volatility filter. I draw your attention to the fact that if you trade intraday, I definitely recommend that you add this filter to your strategy.

As you probably already know, the volatility of a currency pair is how many points, on average, a currency instrument can pass over a certain period (it can be either an hour or a day). Read more about the volatility of currency pairs in the article.

Data on the volatility of any currency pair can be viewed at this site. There you can select the currency instrument you need and it will open data on volatility by hours and by days of the week (I advise you to look at the days).

To illustrate, let's look at an example:

The figure shows data on volatility. On Tuesday, it has one of the highest volatility (150-160 points on average over the past 10 weeks).

How can you use this in your trading? Let's say we trade on Tuesday for this currency pair, and two situations may arise here.

  1. If the pair is rising on the chart, and we received a signal to buy Buy according to our system, but at the same time the pair has already passed from the Low point by about 50 points (and as we already know, the average volatility on this day is about 160 points), then theoretically we still we can count on 100 points for the price to move up and boldly open a deal (according to the rules of the strategy).
  2. And the situation is opposite, if on this day the pair has already passed its 160 points, then when the same buy signal arrives, it makes no sense to implement it, since the pair has already exhausted the potential of its movement for this day. Accordingly, it is better to ignore the entry into the transaction.

Thus, the volatility filter serves as a kind of confirmation signal (or permission) to open a trade on an intraday strategy (it is optimal to use timeframes up to H4 inclusive).

Well, fellow traders, today you have received useful bonuses to improve your trading results. I recommend that you think about how they can be applied in your trading, tested on history, and implemented in your own.

That's all for today, I think the information was useful for you, if there are any additions on this topic from your side, please write in the comments.

Order flow is a really powerful tool that allows most traders to see through the market.

Ability to recognize major player and the volume of his application, understanding who is really attacking the market, namely bulls or bears, always allows you to get a general understanding of the future direction of price movement.

However, as with trading with any instrument, there are always false signals that need to be filtered out correctly. In the forex market as such, you will not be able to see the flow of orders, with the exception of information that is shared by the dealing centers themselves, however, the topic of the universal filter for cutting off false signals is relevant, no matter what style you trade.

Entering a position as a trade filter

Each trader, at the time of receiving a signal, has his own trading strategy there are two options for entering a position, namely to enter at the current price of the asset or wait for the candle to close, and only after that enter the position.

If we enter a position at the current price, then as a rule the market is prone to sharp changes, and the strategy signal can be easily canceled by a sudden price jump in the opposite direction. Therefore, as a rule, the principle of entering a position by a closed candle is increasingly used.

However, this principle is also quite aggressive, so I would like to introduce you to more conservative entries that will allow you to cut off a lot of false signals.

Breakout of the signal bar

Unlike an aggressive classic entry on a closed candle, opening a position on a breakout of a signal bar is more conservative. Its essence lies in the fact that a position is entered not by a closed bar, but by breaking through the high or low of the signal candle.

To summarize, when a buy signal occurs, a position is entered when the price breaks through the high of the signal candle, and when a sell signal occurs, when the low of the signal candle is broken.

Perhaps you will say that the entry is belated, but it is this method that allows you to cut off a lot of false signals. For example, I propose to consider a typical false signal of the RSI indicator and simulate the situation if you entered a position on a closed candle. See an example in the image:

The example clearly shows that if you entered a position at a closed bar or at the current price at the time of receiving the signal, you would be 100% thrown out of the market by a stop order and you would have received losses. And now let's look at the same signal in case of entering the breakdown of the minimum of the signal candle:

The image clearly shows that if we applied the entry into the position on the breakdown of the signal candle, then the signal should have been ignored, since the price did not break through the low of this candle. There is also an even more conservative method of entering a position, which is called "Confirmation of the second candle".

Unlike the previous considered option, to enter a buy or sell position, in addition to breaking through the minimum or maximum of the signal candle, you must wait for the second candle to close. If the price breaks the low of the signal candle, and the second candle closes below this low, then you can safely enter a sell position.

To filter a buy signal, the price must break the high of the signal candle, and the next candle must close above this high. However, this filter is relevant only for traders who use trend-following strategies and hold their positions for a long time.

Using this filter, you find only strong signals, but at the same time you lose at least the size of one candlestick in points, so this method is not relevant for scalping and pipsing tactics.

Conclusion

In general, the proposed trade entry options are relevant not only for trading using the order flow, but also for any trading strategy. It is worth noting that many traders add various candlestick patterns as a filter. So, for example, if a buy signal occurs during a bearish pin bar, this signal should be ignored.

If a sell signal appears on a bullish pin bar, it should also be cut off. In general, there are many various options to create a filter from a false signal according to your trading strategy, and as you can see in the example, this does not have to be some kind of indicator, but rather a simple pattern of price movement.

Share