星期四, 11月 04, 2010

Composing and Sending Mail in Lotus Notes 7

When you create an e-mail, what field or option will indicate the context of the e-mail to the receiver?

Choose an option.

Address fields
Body
Importance

Subject



You've written a memo to notify staff of a new project they will be working on. You want to send the memo and keep a copy of it in a particular folder on your hard disk. What should you do?

Choose an option.

Save the memo as a draft
Send and file the memo
Send the memo
Send the memo with a request for delivery confirmation






Lotus Mail enables you to sort your memos using different criteria. Which criterion would you use to sort your Inbox messages alphabetically by sender?

Choose an option.

Date
Size
Subject

Who




You want to send a memo to Tom, Sarah, and Consuela. The memo is mainly directed at Tom but you want Sarah to receive it as well, with Tom knowing she has received it. You want Consuela to receive the memo without Tom and Sarah knowing that she did. How should you address this memo?

Choose an option.

Tom in the cc field, Sarah in the bcc field and Consuela in the cc field
Tom in the To field and Sarah and Consuela in the cc field

Tom in the To field, Sarah in the cc field, and Consuela in the bcc field
Tom in the To field, Sarah and Consuela in the bcc field

星期三, 11月 03, 2010

Getting Help in Lotus Notes 7

1. Which tasks require you to obtain general Help?

Choose more than one option.

Finding out how to change the location preferences
Finding out more about dial-up settings (This was a correct option)
Searching for information about remote settings (This was a correct option)
Wanting to know how to create a signature



2. Which features belong to the general Help feature?

Choose more than one option.

Indexed (This was a correct option)
Searchable (This was a correct option)
Situation-relevant
Opens to default pages (This was a correct option)


3. You've been introduced to Lotus Notes, and you've decided to look into the Help to find out about it in general terms without looking for specific information. Which Help feature would you use?

Choose an option.

Contents (This was a correct option)
Index
Search



4. Which tasks would require you to obtain context-sensitive Help?

Choose more than one option.

Adding contacts to the Address Book (This was a correct option)
Discovering all about Instant Messaging
Finding information about hotspots
Moving documents to a new folder (This was a correct option)

星期二, 11月 02, 2010

Overview of Lotus Notes 7 Databases

1. You want to add a Spanish dictionary to Lotus Notes' default dictionaries. Which page of the User Preferences dialog box do you use?

Choose an option.

Basics
Calendar
International
Spell Check (This was the correct option)

2. You want to manage your mailbox so that you store all e-mails from different departments separately. Which feature of a database should you use?

Choose an option.

Documents
Folders (This was the correct option)
Panes
Views


3. Identify the feature of Lotus Notes databases that determines who can access the database.

Choose an option.

Access control lists (This was the correct option)
Documents, views, and folders
Templates
The .nsf file extension


4. Suppose you want to locate Jennifer Westlein's database of delivery addresses. Identify the various ways in which you can do this.

Choose more than one option.

By accessing the Open Database dialog box (This was the correct option)
By accessing the Delivery Addresses folder
By navigating to the Mail Threads view
By using the database icon on the Bookmark bar (This was the correct option)

星期一, 11月 01, 2010

Basic Features of Lotus Notes 7

1. Topic title: Basic Features of Lotus Notes 7
Your company's policies require that computers remain turned on at all times. What could you do to keep others from accessing your Lotus Notes user account, without turning off your computer?

Choose more than one option.

Lock the Notes Welcome page
Exit Lotus Notes
Lock the Lotus Notes interface
Log out of Lotus Notes


2. Which Lotus Notes interface object enables you to display Instant Messaging options?

Choose an option.

Action button bar
Bookmark bar
Status bar
Toolbar

3.
Which database enables you to store information that you don't necessarily want to share with the public?

Choose an option.

Calendar
Mail
Personal Journal
To Do list


4. What are the advantages of logging off Lotus Notes?

Choose more than one option.

All open databases are closed
All open views are left open
Other people can log on
Protects your documents

星期六, 10月 23, 2010

部份球衣店舖資料

352 大本營
地址:旺角西洋菜南街 38-40 號萬高商業大廈 9 樓 B 室
營業時間:
電話:27707352

C. K. SPORTS
地址:九龍城太子道西 426 號地下
營業時間:
電話:27165840

Ensport
地址:太子荔枝角道 107 號德仁大廈 1 樓
營業時間:
電話:21947628

Futbal Trend
地址:旺角朗豪坊 7 樓 L7-01 號舖
營業時間:11:30 a.m. - 10:00 p.m.
電話:23171686

No.7 Soccer Co.
地址:旺角西洋菜南街 74-84 號旺角城市中心 9 樓 02 室
營業時間:1:00 p.m. - 10:00 p.m.
電話:26979777

SFALO
地址:旺角通菜街 8 號地鋪
營業時間:
電話:23900004

大球場
地址:旺角西洋菜南街 1A 號百寶利商業大廈 21 樓 09 室
營業時間:3:30pm - 8:00pm
電話:21539169

足球特區
地址:旺角亞皆老街 109 號皆旺商場三樓
營業時間:
電話:

自由球
地址:旺角西洋菜南街 2A 號銀城廣場 9 樓 03 室
營業時間:1:00 p.m. - 10:00 p.m.
電話:21714228

球迷世界
地址:旺角彌敦道 582-592 號信和中心 3 樓 05 室
營業時間:
電話:23697822

新波衫足球用品專門店
地址:荔枝角永康街 23-27 號安泰工業大廈 B 座 5 樓 505 室
營業時間:
電話:35250554

興發 (1)
地址:旺角花園街 71-73 號地鋪
營業時間:
電話:23001155

興發 (2)
地址:旺角奶路臣街 12-14 號地鋪
營業時間:
電話:23001155

[b]港島 HONG KONG ISLAND[/b]

Futbal Trend
地址:銅鑼灣時代廣場 7 樓 731-2 號舖
營業時間:11:30 a.m. - 10:00 p.m.
電話:25069188

S.E.E.
地址:銅鑼灣啟超道 16 號 3 樓
營業時間:
電話:25757660

Soccer Hero
地址:銅鑼灣富明街 2-6 號二樓
營業時間:12:00 p.m. - 9:30 p.m.
電話:26680008

球迷天地
地址:柴灣新翠商場 3 樓 305A 鋪
營業時間:
電話:28979211

[b]新界 NEW TERRITORIES[/b]

Futbal Trend
地址:荃灣登發街 10 號登發大廈 7 號舖 (力生廣場後面)
營業時間:11:30 a.m. - 09:30 p.m.
電話:24928384

Kitroom Sports
地址:元朗教育路 15-19 號嘉城廣場 1 樓 1057 鋪
營業時間:
電話:24430434


[b]Factory Outlet[/b]

Adidas Outlet (觀塘)
地址:九龍觀塘開源道業發工業大廈二期 11 樓 H 室
營業時間:
電話:27932791

Adidas Outlet (荔枝角)
地址:九龍荔枝角長沙灣道香港工業中心 B 座 7 樓
營業時間:星期一至六 10:30am - 8:00pm,星期日及公眾假期 11:30am - 6:30pm
電話:29590357

Adidas Outlet (東涌)
地點:東涌東薈城 G06 舖
營業時間:
電話:21093010

Nike Factory Outlet (觀塘)
地址:九龍觀塘開源道業發工業大廈二期 8 樓
營業時間:
電話:21727938

Nike Factory Outlet (東涌)
地址:東涌東薈城 G02-03 舖
營業時間:
電話:27079159




Adidas Outlet (荔枝角)

開放時間:

星期二, 10月 12, 2010

Test 9 Topic 10

COMPUTER CONTROL AUDITING AND SECURITY
Question 1
Which of the following aim to prevent buffer overflow attacks? (11.1)
A. writing code that is not vulnerable
B. protection of executable address space
C. detection of stack modifications
D. using the C programming language
E. All of the above
F. Only A, B and C above

Correct answer is F

Refer to your text, page 351, Computer Security Principles and Practice, Stalling & Brown, 2008.


Question 2
Which if the following programing languages are considered NOT safe from buffer overflow attacks?
A. Java
B. Python
C. C
D. ADA

Correct answer is C

The programming languages vulnerable to buffer overflows are those without a very strong notion of the type of variables, and what constitutes permissible operations on them. They include assembly language, and C and similar languages. Strongly typed languages such as Java, ADA, Python, and many others are not vulnerable to these attacks.



Question 3
Which of the following best describes a "return to system call" buffer overflow attack? (11.14, 11.15, 11.16)
A. the return address is changed to jump to existing code on the system, typically in standard libraries
B. the targeted buffer is located on the heap rather than stack
C. the targeted buffer is located in the global data area
D. flush firewall rules (such as IPTables and IPChains) that currently block other attacks

Correct answer is A

In a “return to system call” attack, typically a stack overflow is used, but the return address is changed to jump to existing code on the system, typically in standard libraries. This avoids triggering run-time defenses that block executable code on the stack or heap. They can be prevented using stack protection mechanisms.

In a “heap buffer overflow” attack, the targeted buffer is located on the heap rather than stack. These generally target either function pointers located adjacent to such buffers, or heap management pointers. These attacks avoid defenses that focus on stack based attacks. Defenses include making the heap non-executable, or randomizing addresses of structures on the heap.

In a “global data area overflow” attack, the targeted buffer is located in the global data area. The attack is similar to heap overflows, as are the defenses.


Question 4
___________ typically involves using client-side scripts written in JavaScript that are designed to extract information from the victim and then pass the information to the attacker. (12.6)
A. Sneaker Scripts
B. SQL injection
C. Cross site scripting (XSS)
D. SQL scripting

Correct answer is C

A cross-site scripting attack occurs when input provided to a program by one user, is subsequently output to another user. They are most commonly seen in scripted web applications, where the vulnerability involves the inclusion of script code in the HTML content of a web page displayed by a user’s browser.

Question 5
The principle of __________ in access control means that each user should be given only the minimal amount of privileges necessary to perform his or her job function (12.11)
A. Assumed Attacker (AA)
B. implicit deny
C. separation of duties
D. least privilege

Correct answer is D

The principle of least privilege states that programs should execute with the least amount of privileges needed to complete their function.


Question 6
____________ testing is a straightforward testing technique that looks for vulnerabilities in a program or protocol by feeding random input to the program or a network running the protocol. (12.9)
A. White
B. Fuzz
C. Spike
D. Black

Correct answer is B

“Input fuzzing” is a software testing technique that uses very large amounts of randomly generated data as inputs to a program, to determine whether the program or function correctly handles all such abnormal inputs, or whether it crashes or otherwise fails to respond appropriately. The major advantage of fuzzing is its simplicity, low cost, and its freedom from assumptions about the “expected” input to any program, service or function. It ought to be deployed as a component of any reasonably comprehensive testing strategy, especially in relation to commonly deployed software.

星期一, 10月 11, 2010

如何關閉硬盤的寫入保護

  1. 某些硬盤有 jumper 用作 write protect,可查看一下 jumper 設定。
  2. 某些 BIOS 版本有 write protect 功能,可查看一下 BIOS 設定。
  3. 可能是某些軟件,如:Windows SteadyState 限制了寫入權限。
  4. 可能是磁碟配額問題 ,如有的話可嘗試停用。

  5. 如果是 usb 設備,有可能與 firmware 有關,可試一試重裝或更新驅動程式。
  6. 某些 usb 設備有保護功能,當不是穏定的水平攞放,有可能會啟動保護功能。
  7. 開啟「登錄編輯程式」,並更改:
    My Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies 中的 WriteProtect 為 0
    [請同時改
    ControlSet001 及 ControlSet002 中的 WriteProtect 為 0]
    {如果
    登錄檔中没有 StorageDevicePolicies,可自行建立}
  8. 可以嘗試刪除以下有可能已被病毒修改的檔案 (可能已被穩藏):
    boot.ini
    Autorun.inf
  9. 可能是硬盤老化問題,可考慮更換。

推薦此文