Share008資訊科技公司

我是資深的電腦資訊從業員,曾於 Motorola 及 Philips 等跨國大型公司管理層工作十多年,具各類ERP資源管理系統及其它應用系統經驗,如QAD之MFG/PRO、SAP、Ufida(用友)、Kingdee(金蝶)、Microsoft's Dynamic、Wonderware's In-Track (SFC)、Webplan (SCM)、Hyperion (business intelligence)、Informatics (Data Warehouse)...等等。另外,我精於廠房車間之電腦資訊運作,擁有 CISSP 及 ITIL 認證,能提供日常資訊運作之檢測及審查,以提高操作效率。 本人誠意為各類大中小型廠房提供資訊審計、支援及意見,歡迎聯絡,電郵為 au8788@gmail.com

「ERP資源管理系統」已是現今廠房管理必不可少的工具,提高它的效能,絕對能改善公司之盈利,請多多留意。

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

提供香港股票價位歷史數據

我想很多人會對"香港股票價位的歷史數據"有興趣,我已下載成Microsoft Access database version 2000 的文檔,資料由2008/1/1至2009/12/2,zip壓縮後也有11M,若索取請留你的PM我 。

祝願各瀏覽者股壇威威!

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

2015年4月28日

PacketFence WiFi Access Control

Information Source: http://www.packetfence.org/

What is PacketFence ?

PacketFence is a fully supportedtrusted, Free and Open Source network access control (NAC) solution. Boasting an impressive feature set including a captive-portal for registration and remediation, centralized wired and wireless management, powerful BYOD management options, 802.1X support, layer-2 isolation of problematic devices; PacketFence can be used to effectively secure networks small to very large heterogeneous networks. Among the different markets are :
  • banks
  • colleges and universities
  • engineering companies
  • convention and exhibition centers
  • hospitals and medical centers
  • hotels
  • manufacturing businesses
  • school boards (K-12)
  • telecommunications companies

Why do I need PacketFence ?

Do you want to efficiently handle guests on your network? Is your network a breeding ground for computer worms and viruses? Can anyone connect to your network without your knowledge? If so, PacketFence is for you.

What you can do with PacketFence :

  • BYOD - LET PEOPLE BRING THEIR OWN DEVICES
  • PROVIDE GUEST ACCESS
  • ROLE-BASED ACCESS CONTROL
  • PERFORM COMPLIANCE CHECKS
  • ELIMINATE MALWARE
  • SIMPLIFY NETWORK MANAGEMENT
  • WIFI OFFLOAD / HOTSPOT

How to set up public Wi-Fi at your business

Info Source: http://www.pcworld.com/article/2031443/how-to-set-up-public-wi-fi-at-your-business.html

Offering wireless Internet access for guests can open new doors for your business. For a cafe or restaurant, customers are more likely to stay longer, purchase more items, and return knowing they can use a Wi-Fi connection. For motels and hotels, Wi-Fi is one of travelers' deciding factors when selecting where to stay. Offering guest wireless access from an otherwise private office can be beneficial too, as it provides outside associates, contractors, and other visitors with a reliable Internet connection.
Although mobile carriers have covered much of the nation’s more-populated areas withwireless 4G Internet access, Wi-Fi connections can provide faster speeds and usually aren’t subject to usage limits. Plus Wi-Fi can be offered where 4G access isn’t available—as well as for laptops, tablets, and other mobile devices that aren’t4G- equipped.

Protecting your private network

Wi-Fi n
The simplest way you might think to offer public or guest Wi-Fi access is to let people on an existing Wi-Fi network used by the business, but this isn’t secure. Allowing outsiders on the private network could open your company up to hacking and data theft.
Private wireless networks should be encrypted with WPA2-Personal security, at least, to keep others from connecting and eavesdropping on your network traffic. Businesses with more than a handful of Wi-Fi users should consider using WPA2-Enterprise security, requiring a RADIUS server or service, to better secure and manage Wi-Fi access. For more on that, here are 8 Wi-Fi security tips to protect your small business.

Using existing equipment

Businesses with existing private Wi-Fi network might be able to offer public or guest access safely without purchasing additional hardware. Some consumer and small-office wireless routers offer a guest access feature. When guest access is enabled, users will see another network name (known as an SSID) in the list of available networks on their Wi-Fi devices, and its access will be separated from the main network.
Business-class routers and access points (APs) typically offer multiple SSID and virtual LAN (VLAN) features. When these features are set up properly, multiple wireless network names (SSIDs) can be broadcasted with varying levels of security, one of which could be a  guest network safely segregated from your private network.

Using hotspot equipment for better features

FLICKR: WESLEY FRYER
Purchasing or setting up wireless hardware specifically designed for offering Wi-Fi hotspot access provides some useful features that most traditional routers and APs lack. For instance, for legal purposes you may want to require users to accept Terms of Service (ToS) before accessing the Internet. When shopping around for hotspot equipment, this feature is called a captive portal. You may also want to impose time and bandwidth limits, or even charge for the Wi-Fi access. For features like these you’ll likely have to purchase or set up additional hardware specifically designed for Wi-Fi hotspots.
Private and guest Wi-Fi networks
If you’re a do-it-yourselfer, you could upgrade a Linksys or other compatible wireless router with free third-party firmware, which replaces the router’s software to add additional features. TheCoovaAP firmware includes a captive portal to require end users to accept ToS. It can also require that they log in via either self-registration or with access codes you create. CoovaAP's firmware also offers traffic shaping controls that let you limit bandwidth for guests.
The DD-WRT firmware offers many general Wi-Fi features and customizations in addition to hotspot features. It includes a simple integrated captive portal and supports third-party servers and services for more complex hotspot setups.
However, keep in mind that neither the CoovaAP nor DD-WRT firmware offers an easy way to segregate access to your private network. So, unless you’re comfortable making customizations, you’d probably need to connect the router to a separate Internet connection, or to a guest VLAN if your existing equipment supports it.
Open Mesh access pointsOPEN MESH
Open Mesh access points
If you want more of a quick, plug-and-play hotspot setup, consider purchasing the Fonera Simpl router fromFon. It offers simultaneous private and public Wi-Fi signals, so it’s best to replace it with any existing router you have. On the public signal, visitors are given one hour of daily Wi-Fi access. After that, revenue from additional time visitors purchase is split 50/50 between your company and Fon. However, users must sign up and log in with Fon in order to access the Internet. This could help increase the safety of your hotspot, but it can annoy visitors wanting quick, free access.
To offer public or private Wi-Fi access over a larger area that a single wireless router doesn’t cover, one economical option is Open Mesh. It’s designed to provide both private and public wireless access easily, with hotspot features including a captive portal and speed limits. Plus, it uses the wireless mesh technique, which means that not all the wireless APs have to be wired back to the router or switch, making installation easier.
Another option is to purchase and use a hotspot gateway, basically a router specifically designed for offering hotspot access. These generally include the most hotspot features and functionality, and are especially useful for large deployments like at large hotels or venues. There are many vendors to choose from, including ZyXEL,Intellinet4ipnet, andHandlink.

Taking the final steps


Remember, always ensure that your private network is kept separate from any public networks, and encrypted with WPA2 security. If you want to offer simple public access, check if your current wireless router or access points (APs) have a guest feature, or that they support multiple SSIDs and VLANs for business-class products.
If you're up to the tech challenge, you could upgrade a compatible wireless router with third-party firmware to get hotspot features. If not, consider getting the Fon router. To cover a larger area, look into Open Mesh. If you’d like all the bells and whistles, shop for a hotspot gateway.
Whatever hotspot setup your company adopts, it’s a good idea to enable content filtering, as you probably don’t want visitors surfing inappropriate websites. Some routers and hotspot setups offer a content filter. If yours does not, you can enable the OpenDNS cloud security service on any router or hotspot gateway.

2015年4月27日

Waterfall vs. Agile Methodology

Information Source: http://www.seguetech.com/blog/2013/07/05/waterfall-vs-agile-right-development-methodology

One of the first decisions we face for each of our project implementations at Segue is “Which development methodology should we use?” This is a topic that gets a lot of discussion (and often heated debate). If this is not something you’ve worked with before, a definition of development methodology is in order; put very simply, it’s a way of organizing the work of software development. To clarify further, it is NOT a style of project management or a specific technical approach, although you will often hear these terms all thrown together or used interchangeably.
The two basic, most popular methodologies are :
  1. Waterfall (ugh, terrible name!), which might be more properly called the “traditional” approach, and
  2. Agile (newer than Waterfall, but not that new).
Both of these are usable, mature methodologies. Having been involved in software development projects for a long time, here are my thoughts on the strengths and weaknesses of each.

The Waterfall Methodology

Waterfall is a linear approach to software development. In this methodology, the sequence of events is something like:
  1. Gather and document requirements
  2. Design
  3. Code and unit test
  4. Perform system testing
  5. Perform user acceptance testing (UAT)
  6. Fix any issues
  7. Deliver the finished product
In a true Waterfall development project, each of these represents a distinct stage of software development, and each stage generally finishes before the next one can begin. There is also typically a stage gate between each; for example, requirements must be reviewed and approved by the customer before design can begin.
There are good things and bad about the Waterfall approach. On the positive side:
  • Developers and customers agree on what will be delivered early in the development lifecycle. This makes planning and designing more straightforward.
  • Progress is more easily measured, as the full scope of the work is known in advance.
  • Throughout the development effort, it’s possible for various members of the team to be involved or to continue with other work, depending on the active phase of the project. For example, business analysts can learn about and document what needs to be done, while the developers are working on other projects. Testers can prepare test scripts from requirements documentation while coding is underway.
  • Except for reviews, approvals, status meetings, etc., a customer presence is not strictly required after the requirements phase.
  • Because design is completed early in the development lifecycle, this approach lends itself to projects where multiple software components must be designed (sometimes in parallel) for integration with external systems.  
  • Finally, the software can be designed completely and more carefully, based upon a more complete understanding of all software deliverables. This provides a better software design with less likelihood of the “piecemeal effect,” a development phenomenon that can occur as pieces of code are defined and subsequently added to an application where they may or may not fit well.
Here are some issues I have encountered using a pure Waterfall approach:
  • One area which almost always falls short is the effectiveness of requirements. Gathering and documenting requirements in a way that is meaningful to a customer is the most difficult part of software development, in my opinion. Customers are sometimes intimidated by details, and specific details, provided early in the project, are required with this approach. In addition, customers are not always able to visualize an application from a requirements document. Wireframes and mockups can help, but there’s no question that most end users have some difficulty putting these elements together with written requirements to arrive at a good picture of what they will be getting.
  • Another potential drawback of pure Waterfall development is the possibility that the customer will be dissatisfied with their delivered software product. As all deliverables are based upon documented requirements, a customer may not see what will be delivered until it’s almost finished. By that time, changes can be difficult (and costly) to implement.

The Agile Methodology

Agile is an iterative, team-based approach to development. This approach emphasizes the rapid delivery of an application in complete functional components. Rather than creating tasks and schedules, all time is “time-boxed” into phases called “sprints.” Each sprint has a defined duration (usually in weeks) with a running list of deliverables, planned one sprint in advance. Deliverables are prioritized by business value as determined by the customer. If all planned work for the sprint cannot be completed, work is reprioritized and the information is used for future sprint planning.
As work is completed during each sprint, it is continuously reviewed and evaluated by the customer, who may be considered the most critical member of the Agile team. As a result, Agile relies on a very high level of customer involvement throughout the project.
Some advantages of the Agile approach are easy to see:
  • The customer has frequent and early opportunities to see the work being delivered, and to make decisions and changes throughout the development project.
  • The customer gains a strong sense of ownership by working extensively and directly with the project team throughout the project.
  • If time to market for a specific application is a concern, Agile can more quickly produce a basic version of working software.
  • Development is often more user-focused, likely a result of more and frequent direction from the customer.
  • For more Agile Development benefits, please see 8 Benefits of Agile Software Development
And, of course, there are some disadvantages:
  • The very high degree of customer involvement, while great for the project, may present problems for some customers who simply may not have the time or interest for this type of participation.
  • Agile works best when members of the development team are completely dedicated to the project.
  • Because Agile focuses on time-boxed delivery and frequent reprioritization, it’s possible that some items set for delivery will not be completed within the allotted timeframe. Additional sprints (beyond those initially planned) may be needed, adding to the project cost. In addition, customer involvement often leads to additional features requested throughout the project. Again, this can add to the overall time and cost of the implementation.
  • The close working relationships in an Agile project are easiest to manage when the team members are located in the same physical space, which is not always possible. However, there are a variety of ways to handle this issue, such as webcams, collaboration tools, etc.
  • The iterative nature of Agile development may lead to a reduction in overall system quality, as there is less emphasis on understanding the finished system as a whole early in the project. This becomes more pronounced in larger-scale implementations, or with systems that include a high level of integration.

Making the Choice Between Agile and Waterfall

So, how do we choose? First, we change the game a little (which is what most software development organizations do) by defining our own process. At Segue, it’s called our Process Framework, and it’s a variation on the traditional Waterfall methodology. Our modifications include use of prototyping where possible to provide the customer a better view of their finished product early in the design/development cycle. This helps to improve the team’s understanding of requirements and communication with the customer. After the primary framework of the application is completed per high level requirements, we continue to develop and also to reach out to the customer for refinement of requirements. In this way, we strive to be as iterative as possible without compromising our overall system architecture.
We consider the following factors when considering which methodology to use:
waterfall vs. agile chart
The factors above are not equally weighted; each is assessed depending on the individual project and circumstances.
Once we’ve decided which basic methodology to utilize, we can further refine the process to best fit our project goals. Ultimately, although the way in which we do our work is important, delivering a solid and maintainable product that satisfies our customer is what really counts.

2015年4月25日

Tips of Online Consumer Buying Behavior

Four important stages for consumer buying behavior analysis is: 1) Research Stage, 2) Decision Stage, 3) Buying Action Stage, 4) Post-Sales Follow-Up Stage. Read its description is the following link:

http://iearningtips.com/tips-of-online-consumer-buying-behavior-analysis/

2015年4月24日

How to Set default username at Window XP Logon screen

Change the following under regedit:

HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\DefaultUserName --> UserName

2015年4月21日

free software to map Amazon S3 storage to a drive in Windows

1) https://wins3fs.codeplex.com/
WinS3fs is a filesystem for Windows written in C#, allowing access to Amazon S3 Storage. It implements a local virtual SMB server \\s3 to allow access to Amazon S3 buckets.allow the files copied to S3 be usable from the Internet via: bucketname.s3.amazonaws.com, allowing easy file collaboration, and web site creation.

2) http://www.duplicati.com/home
Duplicati is a backup client that securely stores encrypted, incremental, compressed backups on cloud storage services and remote file servers. It works with Amazon S3, Windows Live SkyDrive, Google Drive (Google Docs), Rackspace Cloud Files or WebDAV, SSH, FTP (and many more). Duplicati is open source and free.


3)  Amazon Web Services: Integrating S3 and EC2 in a few simple steps

In order to use S3 as a drive, you need to FUSE a bucket to a particular folder in your VM. Once that is done, the folder behaves just like any other folder from the standpoint of file management, but the storage occurs in the S3 bucket.
ABOUT SHARING: While S3 is made to be attached to many servers, it's probably best if those servers share both codebase and database so that conflicts do not occur in file management. Setting up a shared database is very easy with AWS, but is a topic for another day.
ABOUT TIMING: Most of this can occur on a live site, without interrupting anything. I wouldn't recommend it, though. You're installing software and messing with the file system. There's always the chance for conflicts to occur. So it's better to do this before the site launches, when you can afford to turn off or interrupt the web server. At a minimum, you could spin up a dev copy of the EC2 instance and experiment there before doing it on the live server. Then you could take the minimum required time on the live server, during a time of day when there isn't much traffic, and reduce your stress levels a bit.

SETTING UP THE BUCKET

Create a new S3 bucket. Name it something specific to the project and use. For instance, "example_upload_folder". Make sure the name is all in lower case and contains no spaces or other special characters. FUSE requires the name to be in lower case. Don't worry about creating permissions on the bucket.
Each bucket should have its own user created for programmatic access via FUSE. Create a user in the AWS IAM. As with the bucket, name it something specific to the project and use. For instance, "example_upload_usr". Copy the secret access key and public access key for later.
Create 2 custom permissions on the user, one for each of the following scripts: (change specifics to your bucket's details)
{ "Statement": [ { 
  "Action": "s3:*", 
  "Effect": "Allow", 
  "Resource": [ 
    "arn:aws:s3:::BUCKET_NAME", 
    "arn:aws:s3:::BUCKET_NAME/*" 
  ] 
} ] }
And
{ "Statement": [ { 
  "Action": "s3:ListAllMyBuckets", 
  "Effect": "Allow", 
  "Resource": "arn:aws:s3:::*" 
} ] }

SETTING UP THE VM

There are four steps to be taken.
  1. Install FUSE;
  2. Create a security file;
  3. Add an fstab entry to automatically mount the FUSE when the VM starts;
  4. Mount / activate the FUSE.

Installing FUSE

Run through the FUSE installation instructions. I used the SVN checkout method to download the application. I installed on Ubuntu (like most of our VMs), but because I was using YUM as my installer, I actually used the Fedora / CentOS instructions for installing dependancies. Make sure you install all of the dependancies before trying to build FUSE. I didn't encounter any problems with the installed packages, though there's always the chance that you install something and it damages your VM.

Creating a Security File

Create a file as:
PATH_TO_SITE/security/BUCKET_NAME
PATH_TO_SITE might start with /var/www/... But if you set up your site on the server, you'll know where your site is located. Anyway - inside that file, enter a single line of text in the following format:
bucketName:accessKeyId:secretAccessKey
Save and exit. Make sure the file permissions are sufficient to allow your web server access.

Adding an fstab entry

Grab the UID and GID of the web server (apache or nginx, whatever you're using on this VM). You can discover these by using:
cat /etc/passwd
These will allow the FUSE to be mounted with the correct ownership and permissions.
Edit the file at:
/etc/fstab
Add a line at the end, in the following format:
s3fs#BUCKET_NAME PATH_TO_SITE/httpdocs/DIR_TO_FUSE fuse defaults,uid=WEB_SERVER_UID,gid=WEB_SERVER_GID,allow_other,use_cache=/data,default_acl=public-read,use_cache=/tmp/s3-cache,passwd_file=PATH_TO_SITE/security/BUCKET_NAME 0 0

ALMOST DONE: TIME TO ACTIVATE

Now, when the VM restarts, the FUSE will be automatically mounted. When you're ready, you can restart the VM and your FUSE will be available. Up until now, everything caould be done without interrupting the hosted site(s). Before you activate, try a fake test mount with the following command:
mount -afv
If you don't get any errors, you're good to go.
You have two options. You can activate the mount in a straightforward, forceful way. Or you can be a  fancy pro and mount completely seamlessly. If your site isn't live yet, I'd recommend the first option.

The Straighforward Way

It's probably a good idea to stop the web server before continuing (apache or nginx, etc). That way, your web app isn't fighting against you as dependent folders are changed.
You'll want to make sure that the target folder does not already exist in your file system. If it does, rename it to something else temporarily. After the FUSE gets mounted, you can copy those files back into their proper location.
Restart your VM. This can take a few minutes. The FUSE should now be mounted. Your VM will probably show you a list of active mounts when you reconnect to it. You can test the mount by dropping a file into it and logging into the S3 bucket via the AWS console.

The Fancy Way

You can mount the FUSE without restarting, but if the attached folder is being used on your site site then you've got a conflict. I haven't tried this method, but here's the idea:
  1. Move your target folder and symlink to it from the target folder's original location.
  2. Instead of FUSEing directly to the target folder, FUSE to a folder nearby.
  3. Mount the FUSE. The FUSE project page lists this as the command:
    /usr/bin/s3fs mybucket /mnt
    Test the FUSEd mount at your leisure.
  4. Copy the (moved) target folder's contents into the FUSE folder.
  5. Alter the symlink to point to the FUSE folder.
  6. Profit.
If you do it this way, you'll want to be confident that your fstab works as expected. The best way to gain this confidence is to spin up a replica EC2 instance and see if the FUSE automatically mounts as expected.


2015年4月20日

Prepare Your Mindset To Become Wealth

Prepare your mindset to start your online marketing business, read the following article -->

http://iearningtips.com/prepare-your-mindset-to-become-wealth/

2015年4月19日

7 Tips to Write Awesome Blog Post for Online Marketing

Success factor of a blog post is whether or not it can bring benefit to your reader and to attract reader to stay and read the blog post. Here describe 7 tips to create awesome blog post for online marketing...

http://iearningtips.com/tips-writing-blog-post/

2015年4月17日

How to Sell Your Product Online via Sales Funnel

Sales funnel refers to the buying process that online marketer seeks for customer to purchase their products. It is important for online marketer to understand how to due with Sales funnel, and the following link will describe how to do it: 

http://iearningtips.com/how-to-sell-your-product-online/

2015年4月16日

How to Promote Your Product Online via Traffic

‘Traffic’ is one of the important factor for advertisement online because traffic means to get more people to browse your web site and view your products. Nowadays, business owner is willing to invest big money on advertisement to get effective traffic in order to win sales as soon as possible. So, it is important for online marketer to study the power of Traffic. Check Detail below link:

http://iearningtips.com/how-to-promote-your-product-online/

2015年4月14日

Which Kind of Product is good sales for Internet Marketing?

Everyone wants to select a winning product to sell, which can attract many customers easily and have high profit. The following articles will describe some ideas for your consideration:

http://iearningtips.com/product-selection-sales/

2015年4月13日

How to Get Fund for Starting Business

How to get fund to promote your web site. The following link will introduce you several methods to get fund, check it-->

2015年4月12日

A good suggestion to run affiliate business

If you are struggling about running your own business or affiliate business. Here is a good comparison for your consideration, check the link below:

http://iearningtips.com/what-best-business-model-internet-marketing-business-vs-affiliate/

2015年4月9日

SPF (Sender Policy Framework) 防止冒用網域名稱

Source: http://ithelp.ithome.com.tw/question/10023169

你一定常收到 寄件者與收件者都是同一人的廣告信件,依照以下設定方法就可以簡單的阻擋這類廣告信. SPF 功能是用來防止他人冒用你的Email 位址來發信,在外部DNS與內部DNS內加入 SPF record,在設定宣告後,就可以馬上啟用這項功能. 

舉例來說,假設您的網域 example.com 使用 Gmail。您可以建立 SPF 紀錄,用來識別 Google Apps 郵件伺服器的確是您網域的授權郵件伺服器。當收件者的郵件伺服器收到 user@example.com 寄來的郵件,可以檢查 example.com 的 SPF 紀錄,判斷它是否為有效的郵件。如果發出該郵件的伺服器「未」明列在 SPF 紀錄的 Google Apps 郵件伺服器清單中,收件者的郵件伺服器即可將郵件視為垃圾郵件並加以拒絕。

設定方法: 

第一步:在外部DNS 的Text裡加入二項設定: 

第一個record: hotst = “@” , TXT Value = “v=spf1 include:_spf.why0412.com –all “ (備註: why0412.com就是你的網域名稱) 

第二個record: host = “_spf”,TXT Value = “v=spf1 mx mx:mail.why0412.com ip4:1.1.1.0/24 ip4:2.2.2.0/24 –all “ (備註: ip4:後入你的Email server的外部IP 位址) 

第二步:重覆第一步驟,將 record 加到內部的DNS Server裡 

完成設定.完成設定.完成設定.完成設定.完成設定.完成設定.完成設定.完成設定.完成設定.完成設定.完成設定.完成設定.完成設定.完成設定.完成設定.完成設定.完成設定. 

若要查詢設定是否成功 (以google 為例) 

到 DNS裡查看記錄是否這二筆 records 

至cmd下 

Z:\>nslookup
預設伺服器: us-dc1.why0412.com
Address: 10.1.1.2 

> server 168.95.1.1 <--轉換到hinet的DNS做查詢
預設伺服器: dns.hinet.net
Address: 168.95.1.1 

> set type=txt
> google.com
伺服器: dns.hinet.net
Address: 168.95.1.1 

google.com text = 

"v=spf1 include:_netblocks.google.com ~all" 註: 這是我們第1組所設定的值

> _spf.google.com
伺服器: dns.hinet.net
Address: 168.95.1.1 

未經授權的回答:
_spf.google.com text = 

"v=spf1 ip4:216.239.32.0/19 ip4:64.233.160.0/19 ip4:66.249.80.0/20 ip4:72.14.192.0/18 ip4:209.85.128.0/17 ip4:66
.102.0.0/20 ip4:74.125.0.0/16 ip4:64.18.0.0/20 ip4:207.126.144.0/20 ?all" 

這個只是在 DNS 上設定 SPF 的 TXT 記錄的步驟完成而已,
真正會有效果的是:
全世界的任何 Mail Server,在接受任何 SMTP 過來的時候,
有做 check 該信 From 哪裡的 SPF 的機制,才真的有效用。
也就是說:如果任何宣稱該信是 From: 哪裡來時,
除了從 DNS check 該 @ 後面的 host 名稱是否效之外,
也去 query 其 TXT 值是否有 SPF 的設定,
若有,則會依照 TXT 中指定的 IP 視為有效範圍,
若 送這信過來的 IP ,是屬其範圍,就接受,
若不屬該範圍,則看 Mail Server 所裝的過濾器,
看要給該信做怎樣的標示,及後續的處理。

所以設定 SPF record,只是讓有設 SPF filter 的 Mail Server,
可以去判定或過濾那些 可能是冒用 有設 SPF 網域 的信件。

2015年4月7日

IT人在工廠日記 – 香港長假期來回深圳的出入境擠迫情況

避免長假期回國內,太多人


More Detail HERE --> http://wp.me/p4Esku-do

2015年4月5日

MTTB Affiliate Program Review

MTTB provides you an affiliate program and teaches you how to sell their internet business training products, including “21 Steps to Implement MTTB”, “How to build a funded proposal”, “Email Marketing Empire”, “the OPT Formula”, “Traffic Masters”, etc, as well as "One to One Online Business Coaching Program", and "full days Training Summit". MTTB program was created by Matt Lloyd, an Australian, starting this business in US. Read More as below link: 

http://iearningtips.com/mttb-affiliate-program-review/

TRADITIONAL BUSINESS VS ONLINE BUSINESS MODEL

The main difference between online business and traditional business is that online business does not need to open a physical department store to attract customer, so, doing online business saves a lot of money for rental and decoration of store. Check more detail description in below link:

2015年4月3日

How to Create a eBook Cover Image for Free

With a beautiful eBook Cover, it is more easy to attract your reader, and also give an professional impression to your reader. Creating eBook cover image is a very useful technique for online marketer. Read the article from following link to learn how to create an eBook Cover:

http://iearningtips.com/how-to-create-a-3d-ebook-cover-image-for-free/

2015年4月2日

How to Solve Email Blacklist Delivery Problem

Information Source: http://infotechmanagefactory.com/blacklist-email-delivery-%E9%82%AE%E7%AE%B1%E4%B8%8D%E8%83%BD%E5%8F%91%E9%80%81%E9%82%AE%E4%BB%B6/


Section 1 Problem (邮箱不能发送邮件)

Do you experience the email delivery error which some emails cannot delivery to some mail addresses (but not all) ? The return error email message as below 5 examples.
>>>Error Message 1 Begin>>>
ironporta1.molasia.com 發生這個錯誤:
#5.7.1 Your access to submit messages to this e-mail system has been rejected.
將此郵件傳送到這個電郵地址時發生問題。請嘗試重新傳送此郵件。如果問題持續發生,請連絡支援人員。
ironporta1.xxxx.com 發生這個錯誤:
#5.7.1 Your access to submit messages to this e-mail system has been rejected.
將此郵件傳送到這個電郵地址時發生問題。請嘗試重新傳送此郵件。如果問題持續發生,請連絡支援人員。
>> >Error Message 1 End>>>
>>>Error Message 2 Begin>>>
COL004-MC1F49.hotmail.com 拒絕您傳送至下列電郵地址的郵件:
COL004-MC1F49.hotmail.com 發生這個錯誤:
OU-002 (COL004-MC1F49) Unfortunately, messages from 2xx.xx.xxx.250 weren’t sent. Please contact your Internet service provider since part of their network is on our block list. You can also refer your provider tohttp://mail.live.com/mail/troubleshooting.aspx#errors.
將此郵件傳送到這個電郵地址時發生問題。請嘗試重新傳送此郵件。如果問題持續發生,請連絡支援人員。

系統管理員的診斷資訊:
產生的伺服器: mail.xxxxx.com.hk
rxxxxxu@hotmail.com
COL004-MC1F49.hotmail.com #550 OU-002 (COL004-MC1F49) Unfortunately, messages from 2xx.xx.xxx.250 weren’t sent. Please contact your Internet service provider since part of their network is on our block list. You can also refer your provider to http://mail.live.com/mail/troubleshooting.aspx#errors. ##
>>> Error Message 2 End>>>
>>>Error Message 3 Begin>>>
sun.01link.net 拒絕您傳送至下列電郵地址的郵件:
sun.01link.net 發生這個錯誤:
“JunkMail rejected – mail.keetat.com.hk [2
xx.xx.xxx.250]:28500 is in an RBL, see Blocked – seehttp://cbl.abuseat.org/lookup.cgi?ip=219.76.176.250
將此郵件傳送到這個電郵地址時發生問題。請嘗試重新傳送此郵件。如果問題持續發生,請連絡支援人員。
>>> Error Message 3 End>>>
>>>Error Message 4 Begin>>>
傳遞至下列收件者或群組失敗:
xxx@xxxl.com
伺服器嘗試傳遞此郵件,但沒有成功,現在已停止嘗試。請嘗試重新傳送此郵件。如果問題持續發生,請聯絡支援人員。
>>> Error Message 4 End>>
>>>Error Message 5 Begin>>>
From: Mail Delivery System [mailto:MAILER-DAEMON@yxxxr.com]
Sent: Wednesday, April 01, 2015 1:00 PM
Subject: Undelivered Mail Returned to Sender
Importance: High

This is the mail system at host uk.yi-enter.com.

I’m sorry to have to inform you that your message could not be delivered to one or more recipients. It’s attached below.

For further assistance, please send mail to postmaster.

If you do so, please include this problem report. You can delete your own text from the attached returned message.

The mail system

<xxx@xxxx.com>: host mxwcom.263xmail.com[211.150.82.6] said: 550
xxx@xxxx.com:user not exist (in reply to RCPT TO command)
>>> Error Message 5 End>>>

Section 2. Investigation (分析)

The problem is that those reputed network computer declared our email domain server is spam and blacklist us. We found from the http://mxtoolbox.com, and it will come up the blacklist result which we require to apply for removing blacklist item one by one. However, Weexperience that those blacklist is very difficult to be completely removed. The actual situation is that we cannot guarantee our network without any spam and virus especially difficult for small SME without much investment on network security.
email-blacklist-1
Even-though I submitted for removal, the result was that some were removed, but some others added, as below diagram.Maybe a period of time after removal, it put thedomain to blacklist again.It is a very annoying problem, and quite trouble.
email-blacklist-2

Section 3. Solution (解决方法)

Join the Email Relay Pay Service. 付费给中继服务供应商,采用他们的中继服务器作为Exchange转发主机,设置如下描述。
Step 1. 打开Exchange2010管理控制台-〉组织配置-〉集线器传输-〉发送连接器
email-relay-1
Step 2.右键新建发送连接器,填写smtp名称
email-relay-2
Step 3. 添加地址空间
email-relay-3
Step 4. 在地址空间添加SMTP,输入*走中继服务。
email-relay-4
Step 5. 选择通过以下智能主机路由邮件
email-relay-5
Step 6. 添加新的智能主机,完全限定的域名:mailrelay.xxxxx.com(手动输入确保正确)
email-relay-6
Step 7.
email-relay-7
Step 8
email-relay-8
Step 9
email-relay-9
Step 10
email-relay-10
Step 11
email-relay-11

Step 12. 自己的连接器需要禁用,Select “Yes” below:
email-relay-12

Step 13. 重启exchange 传输服务,传输服务在windows系统的管理工具的服务里面,查找 Exchange  Transport Service。 restart
email-relay-13
Step 14. 在域名的dns管理下面加上中继地址的记录,v=spf1 include:spf.yi-xxxxr.com ~all
替换掉这一条无用的spf记录


email-relay-14
email-relay-15

Step 15. dns系统可能在国内还未刷新,在谷歌已经刷新了,仍有退信问题,就是spf记录!不用太担心!生效后,就可以了!
亦可删除以下的DNS项目,disable 谷歌:
Text(TXT) ,google-site-verification=KQNoFNHJ2d18XVfDByr1Yh6asZru7Opedw-c6p2DM-o
email-relay-16