Share008資訊科技公司

我是資深的電腦資訊從業員,曾於 Motorola 及 Philips 等跨國大型公司管理層工作十多年,具各類ERP資源管理系統及其它應用系統經驗,如QAD之MFG/PRO、SAP、Ufida(用友)、Kingdee(金蝶)、Microsoft's Dynamic、Wonderware's In-Track (SFC)、Webplan (SCM)、Hyperion (business intelligence)、Informatics (Data Warehouse)...等等。另外,我精於廠房車間之電腦資訊運作,擁有 CISSP 及 ITIL 認證,能提供日常資訊運作之檢測及審查,以提高操作效率。 本人誠意為各類大中小型廠房提供資訊審計、支援及意見,歡迎聯絡,電郵為 au8788@gmail.com

「ERP資源管理系統」已是現今廠房管理必不可少的工具,提高它的效能,絕對能改善公司之盈利,請多多留意。

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

提供香港股票價位歷史數據

我想很多人會對"香港股票價位的歷史數據"有興趣,我已下載成Microsoft Access database version 2000 的文檔,資料由2008/1/1至2009/12/2,zip壓縮後也有11M,若索取請留你的PM我 。

祝願各瀏覽者股壇威威!

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

2014年4月9日

Email Server Problem of

Incident:
From Block list checker: http://www.spamhaus.org/lookup/

CBL Lookup Utility

Automated/scripted bulk lookups are forbidden. Upon detection, automated scripts will be denied access, and the source IP may be listed in the CBL.
Enter an IP address:

IP Address xxx.xxx.xxx.xxx is listed in the CBL. It appears to be infected with a spam sending trojan, proxy or some other form of botnet.
It was last detected at 2014-04-04 17:00 GMT (+/- 30 minutes), approximately 4 days, 14 hours, 30 minutes ago.
It has been relisted following a previous removal at 2014-04-03 03:42 GMT (6 days, 3 hours, 20 minutes ago)
This IP is infected (or NATting for a computer that is infected) with the Conficker botnet.

Solution: Using nmap to scan problem computer
 Example Usage

# Run the scripts against host(s) that appear to be Windows
nmap --script p2p-conficker,smb-os-discovery,smb-check-vulns --script-args=safe=1 -T4 -vv -p445 <host>
sudo nmap -sU -sS --script p2p-conficker,smb-os-discovery,smb-check-vulns --script-args=safe=1 -vv -T4 -p U:137,T:139 <host>

# Run the scripts against all active hosts (recommended)
nmap -p139,445 -vv --script p2p-conficker,smb-os-discovery,smb-check-vulns --script-args=checkconficker=1,safe=1 -T4 <host>

# Run scripts against all 65535 ports (slow)
nmap --script p2p-conficker,smb-os-discovery,smb-check-vulns -p- --script-args=checkall=1,safe=1 -vv -T4 <host>

# Base checks on a different ip address (NATed)
nmap --script p2p-conficker,smb-os-discovery -p445 --script-args=realip=\"192.168.1.65\" -vv -T4 <host>

Script Output


Clean machine (results printed only if extra verbosity ("-vv")is specified):
Host script results:
|  p2p-conficker: Checking for Conficker.C or higher...
|  | Check 1 (port 44329/tcp): CLEAN (Couldn't connect)
|  | Check 2 (port 33824/tcp): CLEAN (Couldn't connect)
|  | Check 3 (port 31380/udp): CLEAN (Failed to receive data)
|  | Check 4 (port 52600/udp): CLEAN (Failed to receive data)
|_ |_ 0/4 checks: Host is CLEAN or ports are blocked

Infected machine (results always printed):
Host script results:
|  p2p-conficker: Checking for Conficker.C or higher...
|  | Check 1 (port 18707/tcp): INFECTED (Received valid data)
|  | Check 2 (port 65273/tcp): INFECTED (Received valid data)
|  | Check 3 (port 11722/udp): INFECTED (Received valid data)
|  | Check 4 (port 12690/udp): INFECTED (Received valid data)
|_ |_ 4/4 checks: Host is likely INFECTED

Source info from http://nmap.org/nsedoc/scripts/p2p-conficker.html

沒有留言:

張貼留言