選擇權下單跟股票或期貨不一樣,沒有當沖這個功能可以選,讓單子可以在收盤自動平倉。
如果想要實現在這功能,就需要搭配autoit這個軟體來實現。
現在就是使用永豐的e-leader裡的組合單操作
1. 假設已手動下好多次IOC的組合單,而且成交了,這時後畫面就會停在原本下單的條件。
選擇權下單跟股票或期貨不一樣,沒有當沖這個功能可以選,讓單子可以在收盤自動平倉。
如果想要實現在這功能,就需要搭配autoit這個軟體來實現。
現在就是使用永豐的e-leader裡的組合單操作
1. 假設已手動下好多次IOC的組合單,而且成交了,這時後畫面就會停在原本下單的條件。
如果想查詢近期DHCP server 的IP發送給哪一台主機,可以用下列方式查詢。
先開啟DHCP的管理工具,在server名稱按下滑鼠右鍵,選擇內容。
透過chrome登入某些網站後,都會產生cookie,下次在登入時,就可以不用輸入帳密就登入了,像是spotify,teams等等的網站。
但有時後卻希望網頁關閉,這些cookie就清除掉,避免下一次登入又自動使用上一次的帳密登入。
chrome的設定裡有一個清除cookie的功能,但這會清除所有的cookie,沒辦法只清除特定網站的cookie,也不太方便。
64位系統安裝請安裝:
Visual C++ Redistributable for Visual Studio 2015 (Windows 64-bit)
32位系統安裝請安裝:
Visual C++ Redistributable for Visual Studio 2015 (Windows 32-bit)
When installing the OCS agent, an error occurs: api-ms-win-crt-heap-l1-1-0.dll.
For 64-bit systems, please install:
Visual C++ Redistributable for Visual Studio 2015 (Windows 64-bit).
For 32-bit systems, please install:
Visual C++ Redistributable for Visual Studio 2015 (Windows 32-bit).
在shioaji下單的模式中,只有ROD 、FOK、IOC三種。
如果要下組合單,需要使用到多次IOC的話,但shioaji系統內無多次IOC可以直接使用,就必須用迴圈讓系統一直重覆執行IOC,但在執行前,必須先確認庫存是否已有單,有單就表示成交,就不能在繼續跑,不然就可能會一直下單下到滿為止。
所以在下IOC前,有先做檢查庫存,但檢查庫存的功能卻失效,一直下單,還好戶頭裡錢不多,下了10口就停了。
檢查程式才發現,原來是檢查庫存的變數在更外圈的程式中,所以第一次成交後,下單前檢查庫存的變數未更新,還保持是0,所以就繼續下IOC,繼續成交。
在測試多次IOC真的要小心,錢不能放太多,以免不小心就直接被下滿。
使用teams程式開會音量正常,但用瀏覽器開會時,聲音超級小,喇叭已調到最大聲了,還是沒用,其他程式的聲音都正常,唯讀teams有問題。
原來是win10的音效設定,可以針對各別程式設定音量,所以要去音效裡做調整。
這篇就是以一個完全不懂程式的人, 分享學習Python的一些書或網站,主要就是以能讓初學者比較好懂的內容為主。
書的話,下面這兩本就是自己有看完覺得還不錯的,大概就是要範例多一點,但不要太長,而且對程式的說明要多詳細一點:
1-Python零基礎入門班(第三版)
2-跟著阿才學Python
網站的話,就推薦YOUTUBE上的彭彭,內容豐富,講的也很仔細,難怪網路上也一堆人在推薦。
https://www.youtube.com/watch?v=wqRlKVRUV_k&list=PL-g0fdC5RMboYEyt6QS2iLb_1m7QcgfHk&index=1
一台虛擬機DC的時間被設定成與底層hyperv系統同步,結果與正確的時間差了一分多鐘。
PDC的時間是正確的,所以並不是所有client電腦的時間都錯了,就看是抓到哪台DC做時間同步。
時間錯誤的DC一開始就直接用NTPCLOCK這個小工具調整成對的時間,但沒多久又變回錯的時間,在該伺服器執行"w32tm /query /configuration",有看到有一區"VMICTimeProvider"的設定,enable=1,這就是設定成與底層hyperv系統同步的地方。
直接找到HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\VMICTimeProvider ,把enable改成0就好,不用重開機,然後在用NTPCLOCK調成正確時間就行了。
Client端如果不想等重開機做時間同步的話,可以下指令直接強制同步。
要用系統管理員執行cmd,然後輸入 w32tm /resync就可以開始同步了,時間不會馬上就變正確的,而且會慢慢的縮小與正確時間的差距,所以要等一下。
可以開啟client的時鐘,如果是client的時間是比較慢,就會發現秒數有時後會跳的比較快,然後慢慢跟上正確的時間。
Domain Controller Time Error Causing Incorrect Client Computer Time
The time of a virtual machine Domain Controller (DC) was initially set to synchronize with the underlying Hyper-V system, but it ended up being more than a minute off from the correct time.
The time displayed on PDC files was accurate, indicating that not all client computers had incorrect time settings. It depended on which DC the clients synchronized their time with.
Initially, the DC with the time error was adjusted using a small utility called NTPCLOCK to set the correct time. However, after a short while, it reverted back to the incorrect time. When running the command "w32tm /query /configuration" on the server, the configuration showed a section called "VMICTimeProvider" with enable=1, indicating synchronization with the underlying Hyper-V system.
To resolve this, the registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\VMICTimeProvider was located, and the "enable" value was changed to 0. There was no need to restart the server. Afterward, the correct time could be set using NTPCLOCK.
For client computers that didn't want to wait for a reboot to synchronize their time, a command could be executed to force synchronization. By running cmd as an administrator and entering "w32tm /resync," the synchronization process would begin. The time wouldn't immediately become correct but would gradually narrow the gap with the accurate time. Patience was required.
Observing the client's clock, if the client's time was slower, one would notice that the seconds occasionally jumped ahead and slowly caught up with the correct time.
在用弱點掃描軟體做伺服器弱點檢查時,有些主機有下列這個弱點被掃出:
Vulnerable' cipher suites accepted by this service via the TLSv1.0 protocol:
TLS_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32)
'Vulnerable' cipher suites accepted by this service via the TLSv1.1 protocol:
TLS_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32)
'Vulnerable' cipher suites accepted by this service via the TLSv1.2 protocol:
TLS_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32)
就是有3個TLS的連線協定用了不安全的密碼套件TLS_RSA_WITH_3DES_EDE_CBC_SHA。
網路上比較多的解決方法是用IISCrypto這套軟體,免安裝,直接在伺服器上執行,它會列出很多種連線協定跟密碼套件,把你不要的取消勾選按下套用,重開機,就好了。
也有人說要去改機碼,只是比較麻煩,用IISCrypto比較快。
所以我就在查了一下IISCrypto跟改機碼差在哪,結果是一樣的,IISCrypto背後的方式也是改機碼。
所以就決定自己用改機碼的方式在處理:
因為三個連線協定都是用同一個有問題的密碼套件,因此直接先停用這個密碼套件看看。
原本在Chiphers底下是沒有Triple DES 168,就直接新增,加入這段機碼
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\Triple DES 168]
"Enabled"=dword:00000000
好了之後不用重開,直接在掃一次,就沒有這三個弱點出現了。
When conducting a vulnerability scan to check for server weaknesses, some hosts may exhibit the following vulnerability:
Vulnerable cipher suites accepted by this service via the TLSv1.0 protocol:
TLS_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32)
Vulnerable cipher suites accepted by this service via the TLSv1.1 protocol:
TLS_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32)
Vulnerable cipher suites accepted by this service via the TLSv1.2 protocol:
TLS_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32)
These vulnerabilities involve the usage of insecure cipher suites, specifically TLS_RSA_WITH_3DES_EDE_CBC_SHA, across all three TLS connection protocols.
One commonly suggested solution found online is to use a software called IISCrypto. It can be executed directly on the server without installation. IISCrypto provides a comprehensive list of connection protocols and cipher suites, allowing users to deselect undesired options, apply the changes, and then reboot the server.
Another approach involves modifying the registry, although this method is considered more cumbersome compared to using IISCrypto, which is faster.
After researching the differences between IISCrypto and registry modification, I discovered that they achieve the same result, as IISCrypto utilizes changes to the registry behind the scenes.
Therefore, I decided to handle the issue by modifying the registry myself:
Since all three connection protocols employ the same problematic cipher suite, the first step was to disable this specific cipher suite.
Initially, the "Triple DES 168" option was not present under the Chiphers section, so I added it directly by inserting the following registry key:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\Triple DES 168]
"Enabled"=dword:00000000
After applying this modification, there was no need to restart the system. Running another scan revealed the absence of the aforementioned three vulnerabilities.