July 2004Trading Tip:
Straddle-Strangle-Swap by Bill Hatch
One of the common strategies for options trading is the 'Iron
Condor'. In the case of a short condor, the trader goes long
on the greatest strike in a vertical call spread and the lowest
strike in a vertical put spread. The trader then shorts on the
middle strikes for both the call and the put. This is a Bear
call spread and a Bull put spread. The maximum gain is reached
when the options expire in the center of the short options.
The trader keeps the total of the premiums received.
As an example, XYZ Iron Condor would be:
- Long $70
call Note:
Legs 1 and 4 are 'buying a strangle'.
- Short $65 call
Note: Legs 2 and 3 are 'selling a straddle'.
- Short $60 put
- Long $55 put
Historically, this has been a successful trading strategy for
stocks that do not move much. In effect, you sell time.
The passage of time is the one absolute certainty in the
market. Iron Condors are good for stocks expensive enough to
warrant a $5 strike increment.
Tom Sawsnaw of http://www.thinkorswim.com/
taught me a variation of the condor that has worked well.
(That really means Tom came up with the idea, I claim no
credit. Tom told me that his clients using this strategy make
money routinely. He likes that because he gets more
commissions.) The steps are:
- Find a stock that does not move much, but has a $2.50 strike
increment.
- Buy a 'strangle' with a life span of several
months.
--Buy a higher
Call (leg 1) and buy a lower Put (leg 4).
- Sell a 'straddle' for the current
month.
--Sell a
middle Call (leg 2) and sell a middle Put (leg 3).
- If the market moves against the straddle, you have your
insurance, and will not loose more than the $2.50 minus premiums
received for the straddle.
- Re-sell the straddle monthly. This is an important key
to making a profit.
- The optimum action is to buy back the leg that threatens an
exercise.
- The easiest way to buy back the straddle leg is to sell a
calendar spread. I personally like to sell both legs to
eliminate any possibility of a last minute exercise. I was
once exercised on Home Depot with $0.03 difference between the
strike and the price of the stock.
I call this a 'Straddle-Strangle-Swap'. The name describes
the process, but here is an example of how it works from my own
experience:
- After May Expiration, I bought a November $32.50/$37.50
strangle for Dell for $2.05.
--Long a
Call @ $37.50 and Long a Put @ $32.50.
- I immediately sold a June $35 straddle for
$1.50.
--Short a Call @ $35 and Short
a Put @ $35.
- As June expiration approached, I sold calendar spreads for
both the $35.00 call and put for a total of
$1.45.
--Bought back the June Call and Put and replaced them by selling a
July Call and Put.
- Yesterday morning, I sold the same calendar spreads for
$1.70. I probably could have waited to get another nickel,
but 'pigs get
slaughtered'.
--Bought back the July Call and Put and replaced them by selling
an August Call and Put.
I still have August through November to do the same thing, and
when November does come, I will have a classic Condor. So far,
with $2.05, my net is + $4.65 ( = $1.50 + $1.45 +
$1.70). I still have four more months to collect. AND, I
have the asset of the strangle. If the market repeats
history, I will net over 500% on the initial expense of the
strangle. Optimally, as November expiration nears, I will buy
a LEAP calendar spread on the two strangle legs and continue the
same process.
I have been successful using this strategy with Dell,
Home Depot, Office Depot, AMD and Disney. My bad month with
Disney was the single month covering the Roy Disney retirement, the
litigation against their CEO, Michael Eisner, and the Disney/Pixar
estrangement.
I have found that it is usually a good practice to wait until
expiration week to do any trading out of the leg that moves against
me. Most traders will not exercise while there is still
extrinsic time value. Within the last week, Dell lost almost
two dollars to come back down to the $35.00 strike
neighborhood. I saved my profit by being patient.
Question: 'I have a question for Bill Hatch who
wrote the article. I understand the technique as presented,
you explained it quite well. However, I'd like to know what
you might suggest if the price of the underlying goes up or down
during the time period of the strangle. Example: Let's assume
the scenario that you presented in the newsletter with Dell
stock. But what if Dell rises above the original strangle at
the time of the front month straddle expiration? What if Dell
were to rise to $38.50 putting the long back month Call in the
money? Would you go flat on both the strangle and straddle and
start all over again at a higher mid-price? Or, would you hold
onto the back month strangle and adjust the new front month straddle
strike? Or, would you still be using a $35 straddle
strike? Thanks again for the very intriguing article, I
believe I'll be trying this strategy quite soon to see how it works
out for me. I really appreciate any input you might
have.' -S. Miller 07-28-2004
Answer: 'Going beyond the strangle has happened to
me on two occasions. In both I waited until early on
expiration week and sold a calendar spread; ie bought an August call
and sold a September Call. I was still able to take advantage
of the time value in the option and reduce the potential loss.
I mentioned a loss on Disney when I described the strategy. In
the case of Disney, my strangle expired on the following
month and I finally ended up just eating my loss the following
month on Disney. By selling the extra calendar spread, I
minimized and really came out positive because of the previous
months I had been able to sell straddles. In the other
experience, Home Depot moved down to the expected strike of the
straddle and I was able to continue as if nothing had
happened. There was no real downside, but when the stock
price is $2.50 higher than the strike of a Put, a Put
calendar spread has little value, so I was only able to capitalize
on half of my planned straddle sale. I waited until the value
went down a little and got half of the month of extrinsic value by
selling that Put later. I hope this helps.' -Bill Hatch
An example stock option model is shown in the August
Trading Tips issue.
For more information on the definition of a 'strangle' and a
'straddle', read the lesson materials on this web site: http://www.thinkorswim.com/tos/displayPage.tos?webpage=lessonStraddle
Trading Tip:
Forex Trading by Larry
Pesavento
Forex trading is the epitome of liquidity when the major foreign
currencies are included. Price swings are fast and
large! These are ideal conditions for a pattern recognition
swing trader. Swing trading defines price swings from a few
minutes to a few days. Pattern recognition refers to the
probability of certain patterns repeating consistently. Pattern
recognition has always had a strong following among technicians but
a recent book by Dr. Andrew Lo, ‘The Non Random Walk Down Wall
Street’ studied over 30,000 chart patterns over 30 years and found
startling correlations from the standard chart patterns such as head
and shoulders, double tops and bottoms, pennants, flags and island
reversals. The results were so amazing that Business Week
featured Dr. Lo’s work in the April 17, 2000 issue, soon after CNBC
and Bloomberg began increasing the coverage of technical analysis
techniques. Even the “F” word, Fibonacci, is used commonly by
reporters.
My favorite Forex trading vehicles are the Euro currency,
Japanese Yen and British Pound. I do very little cross rate
trading although the patterns I use work quite well in these
markets.
There are no secrets to Forex trading in my opinion. They
are active and liquid and provide pattern recognition swing trading
opportunities. The best place to start learning about Forex
trading is from the 30-minute continuous charts. Find the most
common swing on that chart. From this starting point you can
take every other swing on the 30 minute chart and relate it to one
of five ratios: 0.618, 0.786, 1.00, 1.272 and 1.618. These
five ratios will describe nearly all of the swings you can see on a
30 minute chart.
Next find similar time counts such as four hours up – four hours
down for example. Charts reveal many secrets if you study them
religiously. Also watch for similar time frames between highs
and lows. Printing out the chart and drawing in the price
swings and connecting all swings to all other swings will reveal
patterns you never thought existed.
A word of caution – you can find the best patterns that ever
existed and you will still lose money if you don’t know how to
control risk. Winners focus on how much can be lost and losers
focus on how much they can win! Have you ever seen a slot
machine that says – “I’ve taken in 1 million dollars this year” –
not a chance!
The best exercise you can do for yourself as a trader is to read
3 or 4 pages of Mark Douglas’ book ‘Trading in the Zone’ each day
before you start trading. This will act like an anchor each
day to focus on thinking in probabilities not certainties. At
the end of the year you will have read the entire book twice!
Computer Tip:
Computer Issues by
Mike Lamont
Virus
A virus is a program that attaches itself to another programs and
executes along with its host. The end result is as varying as
its author’s imagination. Many viruses, for the most part, run
unbeknownst to the user and are malicious and destructive, wreaking
havoc on the hosts computer even so far as crashing it an causing
all of the data to be lost.
Viruses can be transmitted through mediums like disks, CD’s,
emails, attachments, web sites, etc. Some viruses are
self-perpetuating. For instance, an email virus may attach
itself to your email and send the virus to every address in your
email phone book.
A good virus detector is suggested and updates of the virus
definitions done at least daily. Currently, my virus detector
has 67,806 viruses it tests for. Many are created each and
every day.
This is a quote from Symantec (authors of Norton
Anti-Virus). The whole article may be found here: http://securityresponse.symantec.com/avcenter/reference/newsletter/Apr04inews.html
As in previous months,
multiple medium- to high-risk worm outbreaks, based on the MyDoom,
Netsky, and Beagle worm families, dominated March and April.
However, the DeepSight Threat Analyst Team released a Threat Alert
in March on W32.Witty.Worm. This worm exploits the Internet Security
Systems Protocol Analysis Module ICQ Parsing Overflow vulnerability,
also released that month. W32.Witty.Worm is entirely memory resident
- no files are created or dropped. Its payload is especially
destructive, since it writes random data to physical disks, causing
data corruption on the hard drives of the infected computer.
On April 13th, Microsoft released three Security Bulletins, which
address 18 new vulnerabilities and included updates for three
existing vulnerabilities:
- MS04-011 provides a Security Update for Windows that rectifies
14 new vulnerabilities, many of which are highly critical.
- MS04-012 is a Cumulative Update for Microsoft RPC/DCOM
Security and details 3 new vulnerabilities and 1 previously known
vulnerability.
- MS04-013 provides a cumulative patch for Microsoft Outlook
Express that addresses two new vulnerabilities.
April 30th saw the release of the first version of the Sasser
worm. W32.Sasser.Worm is a blended threat that attempts to exploit
the LSASS vulnerability, described in Microsoft Security Bulletin
MS04-011. It spreads by scanning randomly selected IP addresses for
vulnerable systems. This worm and its variants are estimated to have
infected millions of PCs worldwide. See later in the Newsletter for
more details on the worm and the LSASS vulnerability.
Worm
A worm is specific type of virus. One big difference is a worm
propagates itself as it "bores" its way through computers and
networks. These copies then branch off and continue the
destructive propagate and destroy process. Recently some worms
crashed parts of the Internet or brought it to a sluggish
crawl. Many virus detectors can detect many worms depending on
the way they infect your computer. Many, however, bypass virus
detectors all together.
The best way to keep worms out is keeping your operating system
up-to-date. Many worms exploit weaknesses in communication
protocols and become available for worm infections.
Another way to protect against worms is a firewall. This
will keep all unwanted activity from leaving or entering your
computer (as long as your operating system is up-to-date).
Macro
Macros are mini script programs that are run in host programs to
simplify and augment functionality. However, malicious macros are
viruses that can do anything an author’s devious mind comes up with.
Many macro viruses come in email attachments. It is best to
not open any email attachment unless you are absolutely certain of
its validity.
Make sure you have a good virus detector and that it is capable
of detecting macro viruses.
Trojan Horse
These are aptly named. They appear to be one thing,
harmless and normal, but actually are deceptive and dangerous.
They are meant to obtain and deliver information from your computer
to the developer. Many Trojan Horses can actually send keyboard
input as well as mouse-clicks. This means, when you log on to
your on-line banking and type in your username and password, this
information can be transmitted to the author and they can then log
into you bank account if they wish. This is only one example
of the very serious threat these Trojan Horses are.
Virus Detectors and Firewalls are the best means of
protection.
SpyWare
These are currently legal Trojan Horses. These are
meant to help advertisers in obtaining your Internet activity
to how to send advertisements (eg. Popups, spam, etc.) to you.
My wife shops online for kids clothes, shoes, etc. She would
receive popups and spam from these types of companies I, on the
other hand, browse for programming code, drivers, dll’s, etc.
I would receive popups from those types of companies. For
SpyWare companies, this information is invaluable as you can
see. Why would my wife want spam on new companies with TCP/IP
drivers? This begs the question, why would anybody of any
semblance of sanity want any spam to begin with?
The best protection of these types of programs is SpyWare
killers. We use AdAware from LavaSoft:
http://www.lavasoftusa.com/
This does not get all of them, but for our purposes, it is
sufficient.
Windows Updates
It is imperative to keep your windows updated. They are
free and easy. In fact, I have mine set to automatically check
download and install the updates. Many fixes and critical
updates are security breaches that worms have honed in on. By
staying current, you are staying as safe as you can be. To
manually update windows, you can:
- Click on Start | Windows Update
- Go to http://www.microsoft.com/ and
click Windows Update (on the left of the screen)
- Set your system to automatically check and install updates
Virus Detector
A program that runs real-time and checks incoming email
attachments, file downloads, file installs, files on you computer,
etc. If a virus is detected, many times it is simply
deleted. Sometimes more serious efforts are needed, depending
on the virus. It is suggested that the virus detection table is
updated often (at least once a day) as many new viruses are detected
each day.
Firewall
This is a program, device or other mechanism that protects you
computer from outgoing or incoming data. Imagine a castle with a
mote. Nothing can get into the castle except by the heavily
guarded drawbridge. Anything that the guards deem as unwanted,
they are thrown into the mote with the mote monster. A
firewall does the same type of thing. Any activity (eg. Email,
ping, browse, tcp/ip, etc.) is not allowed unless you tell the
firewall to allow it. Some types of firewalls are:
- Software on your computer (like ZoneAlarm: http://www.zonealarm.com/)
- Router
- Switch
- Hub
- Computer
- Linux Box
- Firewall box
- Proxy Server
Now, say your system has a worm. My ZoneAlarm has caught
one of these. ZoneAlarm will say something to the affect,
"Windows Media Player wants to access the web at: …) and give an
address and a port. Note, the name seems legitimate, but it is
misspelled. Many even are spelled correctly. If I was to
allow this to access the Internet, then I have assisted in its
propagation. Now, this is confusing because the legitimate
Media Player does need to access the Internet. As you can see,
this becomes daunting very quickly. My firewall has "More
Info" and "Help" buttons that gets a good workout when I note
something I am not familiar with.
Whole companies are built on Internet security. This area
can be as easy or as complex as you want it to be.
A good firewall, SpyWare killers and virus detectors have become
as much a necessity as a monitor and keyboard. The amount of
security you apply to your system is up to you. Some simple
steps may be sufficient. The computer is a tool just a wrench
is to a mechanic and a scalpel is to a surgeon. It is expected
that a mechanic know how to use the wrench and the surgeon is
expected to know how to use the scalpel, we need to know how to use
our computer – the tool of our trade. Sure, we plug it in and
it works, but knowing some of these basic ideas will keep you
safer.
Even with good security, it is still possible for these sneaky
culprits to sneak in. When they do, as they have in my case,
downtime is immeasurable. I have been down for as much as one
day to a couple weeks and I find myself focusing on getting the
system back up and all the information I lost rather than my
trade. This brings me to my last item:
Backups
Backing up data is vitally important. Who knows when a hard
drive will decide to crash? Who knows when a lightening strike
or power outage will cause your system to fry? Who knows when
your computer will be stolen? We have a saying in this support
office:
There are four types of people:
- Those that don’t backup.
We talk to people that have
no backups at all. They call us and inform us that their
hard has drive crashed. (Please note that most hard drives
only last 7 to 10 years.) There is absolutely nothing we nor
they can do. I’ve been there. It is a sickening
feeling. Years of work down the drain and not a single thing I
could do.
- Those that don’t backup yet.
Anybody that has not
backed up and crashes, soon become folks that backup.
Unfortunately it takes a terrible crisis to get them to do
this. Hard disks, and other mediums are so cheap now days
that not backing up is just not wise.
- Those that don’t backup often.
Before I do any
programming, I make a backup. As I make milestones in the
programs I work on, I save and backup again (sometimes as many as
ten times a day). When I finish, I make a final
backup. Some folks that call our office have backups from
1993 (true story). What good is that going to do for data
today? Daily, weekly and monthly backups are necessary.
Again, this is the tool of your trade. Make sure you take
proper care of it.
- Those that don’t check their backups.
Checking your
backup is vital. We had a company that made a backup
everyday after we trained them how to do it. A year later,
their computer was stolen. They bought a new one and
installed the software. They took their last backup and it
did not work. They were successful in installing our backup
(thank goodness) from a year ago, but every backup they had done
(over 300) was not good. They were doing it wrong.
They ended up putting in weeks of effort to rebuild their
databases one-by-one. Check your backups.
The following is an ESPL program that will do a backup for you
simply by clicking the Run = 0 button.
- Open your ESPL script Editor (File | Open | ESPL Editor
- Click the New button
- Paste this in the script window
- Click on the ESPL Menu
- Click on Save As
- Type in Backup
- Press the Save button
- Hit the Run button
You will notice a DOS Window icon will appear minimized on your
taskbar. If you wish, you can click on it and notice the
various files being copied.
/********************************************************* Written
by Mike LaMont (7/14/04) The following program does a backup of
the entire Ensign
Folder. **********************************************************/
procedure Backup; var iStatus: integer; begin
iStatus := WinExec('xcopy "' + // Microsoft XCOPY command
sPath
+
// Current Ensign path '*.*" '
+
// All files '"C:\EnsignBackup\'
+ // Make the
Backup Folder FormatDateTime("yyyymmdd", Now) + '" /e /i
/r /y'); if (iStatus <= 31) then ShowMessage("Error
executing backup."); end;
begin if ESPL = 0 then Backup; end;
|