3月第四週還剩兩天結算,這週整個就是慘。
大區間的策略,主要是做Put Spread,但因為有買了1組Call Spread,要收集權利金來買Put,誰知就一直往上漲,Call Spread就GG了。
然後Put Spread一開始有50~80%左右就停利,但一直漲上去,沒機會在好的價位在進場做,所以最後這些獲利變的無法抵消Put的成本。
這週加個手續費大概會虧到6500吧。
下週要嚴守只做大區間的單邊就好,先單純一點,能穩定有獲利是現在最重要的目標。
3月第四週還剩兩天結算,這週整個就是慘。
大區間的策略,主要是做Put Spread,但因為有買了1組Call Spread,要收集權利金來買Put,誰知就一直往上漲,Call Spread就GG了。
然後Put Spread一開始有50~80%左右就停利,但一直漲上去,沒機會在好的價位在進場做,所以最後這些獲利變的無法抵消Put的成本。
這週加個手續費大概會虧到6500吧。
下週要嚴守只做大區間的單邊就好,先單純一點,能穩定有獲利是現在最重要的目標。
Forti 防火牆上的SSLVPN連線功能,在GUI的設定介面裡,可以設定只允許特定IP連線,屬於白名單的方式。
可是公司的人會去其他國家出差,所以也無法確定到底哪些外部IP會連進來做SSLVPN的連線。 禁止特定IP連線。
然後又發現有特定的IP一直試著用不同帳密在TRY SSLVPN連線,實在有點擔心。
後來發現是有設定可以把白名單的限制方式,改成黑名單,但這要用指令來開啟
#config vpn ssl settings
set source-address-negate enable
設定好之後,原本在GUI上啟用的白名單連線,就會變成是黑名單的效果了,只是在GUI的畫面上,上面還是一樣是寫允許清單,而不是禁止清單。
Forti SSLVPN Blocking Specific IP Connections
The SSLVPN connection feature on the Forti firewall allows you to set up a whitelist of specific IP addresses that are allowed to connect through the GUI configuration interface.
However, in our company, employees often travel to different countries, making it difficult to determine which external IP addresses will be used for SSLVPN connections. Therefore, we want to block specific IP connections.
We also noticed that there were certain IP addresses continuously attempting to connect through SSLVPN using different credentials, which raised some concerns.
Eventually, we discovered a configuration option that allows us to change the whitelist restriction to a blacklist, but it requires using commands.
#config vpn ssl settings
set source-address-negate enable
After setting this up, the whitelist connections that were previously enabled in the GUI will effectively become a blacklist. However, in the GUI interface, it will still indicate "Allow List" instead of "Block List."
Forti防火牆上的sslvpn 連線程式,可以上forti的網站下載。
但下載下來的安裝程式並不是完整的,執行時才會再連上網下載真正的安裝程式到電腦的一個暫存資料夾,載完後才執行安裝,有點浪費時間,而且一定要有網路功能,才能進行安裝。
所以就想找能不能有一個實際的安裝檔,這時就要這麼做
一開始先找一台電腦,照上面的方式,下載最新的安裝程式,執行後會再下載真正的安裝程式,下載好後就會進行安裝,跳出安裝畫面。
這時請到本機的 %LocalAppData%\Temp directory 資料夾中,會看到sslvpn 連線程式的真正安裝檔,檔名會叫"FortiClientVPN...."之類的,蠻好找的,把這個檔案複製出來。
之後其他台電腦要裝,就直接用這個檔案來裝就行了。
Forti SSLVPN program offline install
The SSL VPN client program on the Forti firewall can be downloaded from Forti's website.
However, the downloaded installation program is not complete. It only connects to the internet during execution to download the actual installation files into a temporary folder on the computer. After the files are fully downloaded, the installation process begins. This method is time-consuming and requires an internet connection to complete the installation.
Therefore, the goal is to find an actual installation file. Here's how to do it:
Start by using a computer to download the latest installation program following the aforementioned steps. After executing it, the program will initiate the download of the actual installation files. Once the download is complete, the installation process will begin, and an installation window will appear.
At this point, navigate to the "%LocalAppData%\Temp" directory on your local machine. You will find the actual installation file for the SSL VPN client program there. It will have a filename similar to "FortiClientVPN...." and should be easily identifiable. Simply copy this file.
For installing on other computers, you can directly use this copied file for installation.
前兩次的週選策略都沒弄的很好,所以都賠蠻多的。
這週有小心一點,其實到星期四晚上就建的差不多,後來就沒什麼機會可以做調整,然後就一直保持最多虧損500塊的狀況。
今天結算本來下殺,有機會賺錢,結果快收盤又拉上去,最後就變賠,就是500塊,但連同手續費加進去,就1500塊左右。
很可惜還是沒賺錢。
今天把win10 iso做成安裝usb,重灌的時後,居然在過程中,找不到任何硬碟,換了不同的win10版本也是,這台筆電是這兩年出的,怎麼會這樣。
後來上網查了一下,居然是少了某個驅動,要去下載下來丟到隨身碟裡,重灌時要載入這驅動才看得到硬碟,方法就參考下列網址吧。
https://www.asus.com/tw/support/FAQ/1044458/
when creating a Windows 10 installation USB from an ISO file and attempting to reinstall the operating system, no hard drives were detected during the process. Even after trying different versions of Windows 10, the issue persisted. This laptop was released within the past two years, so it was unexpected.
After conducting an online search, it was discovered that a specific driver was missing. It was necessary to download the driver and save it to a USB drive. During the reinstallation process, the driver needed to be loaded in order to detect the hard drives. For detailed instructions, please refer to the following website:
https://www.asus.com/tw/support/FAQ/1044458/
一台新的win10電腦在安裝完fortinet sslvpn的連線程式後,開啟都會有java的錯誤
請安裝 Microsoft Visual C++ Redistributable ,把最近的版本裝一下就ok了。
https://docs.microsoft.com/en-US/cpp/windows/latest-supported-vc-redist?view=msvc-170
Fortinet VPN Program Error: A JavaScript error occurred in the main process.
After installing the Fortinet SSL VPN client program on a new Windows 10 computer, an error related to JavaScript occurs every time it is launched.
To resolve this issue, please install Microsoft Visual C++ Redistributable by installing the latest available version.
You can download the latest supported version of Microsoft Visual C++ Redistributable from the following link:
https://docs.microsoft.com/en-US/cpp/windows/latest-supported-vc-redist?view=msvc-170
這次的操作真的是失敗中的失敗。
一開始因為put避險買太貴,然後區間太大,要大漲或大跌500點才有機會賺,所以週五晚上看了一下,決定買比較靠近價平的兩組put價差單跟買put的部位先平掉,只虧損一點點,這樣的話馬上把虧損降到500內。
沒想到星期一就直接大跌,星期二繼續跌,put價差單避險沒了,狂賠....
如果當初買put有留著,賺個幾千塊沒問題。
真的要做好避險,不然依現在的盤勢,一天要漲跌個三百點,也不是多難的事。
一樣是用大區間的策略,在一個區間外用價差單跟買call/put做搭配。
這次發現一個很重要的問題,就是如果你多空兩邊都要做到,那你在買call跟put的成本,很難用價差單的權利金來抵消,像是大盤從上漲時,買put的成本很便宜,但這時後是call的價差單有立即的危險,要趕快買call,這個成本就會很貴。
盤勢很難剛好一直在一個很安全的區域上上下下讓你可以收到權利金,又買到便宜的put跟call。
這個策略還有可以在調整的地方,這個星期已無望,好好研究下星期該怎麼辦。
本周採用了一個大區間策略,用call跟put的價差單,配合買call跟put避險。
星期三都還ok,但星期四早上一個下殺,沒做到買put的避險,結果put價差單死傷慘重。
不過有記得可以用小台空單來對沖虧損,但小台空單做下去後,一開始還不錯,但後來突然大盤又往上衝,結果小台空單開始虧損~當下天人交戰,最後我決定50點停損小台,結果停損沒多久,又往下殺,真的是要我命啊。
晚上回家重新看了教學,乎略一個很重要的地方,小台空單進去後,要順便在買call抵銷小台往上漲的風險。
最後決定就用call價差單把put價差單對鎖.....才星期四,就已決定是失敗 的一週。
如果發現電腦有被遠端桌面連線,想了解來源的IP,可以到事件檢視器去看,路徑是
Event Viewer > Applications and Services Logs > Microsoft > Windows > TerminalServices-LocalSessionManager > Operational
可以搜尋這三個ID的事件內容:
Event ID 21 : 工作階段登入成功
Event ID 24 : 工作階段已中斷連線
Event ID 25 : 工作階段重新連線成功
也可以用指令的方式來查詢,速度比較快:
netstat -n | find ":3389" | find "ESTABLISHED"
To inquire about the source IP of a remote desktop connection, you can navigate to the Event Viewer. If you suspect that your computer has been accessed via a remote desktop connection and you wish to determine the source IP, you can follow these steps:
Open the Event Viewer.
Navigate to Applications and Services Logs > Microsoft > Windows > TerminalServices-LocalSessionManager > Operational.
Search for events with the following three IDs:
Alternatively, you can use the following command to perform a faster query:
netstat -n | find ":3389" | find "ESTABLISHED"