Thursday, October 21, 2010

Waterproof Wall - terminology to explain



In the field of computer security, firewall and waterproof walls are a very similar name. Firewall is installed in different networks (such as a trusted internal network and the untrusted public network) or network security domain combinations between the number of components. It can monitor, limit, change the data flow across the firewall, as far as possible within the network on the external screen of information, structure and operating conditions, in order to achieve network security. Logically, a firewall is a separator, a limiter, is a parser to effectively monitor the internal network and the Internet between any activities to ensure that the internal network security.

As a result, we know that a firewall to prevent external network through the isolation of the internal network to attack, it passively inspect all network packets flow through to block the communication security policy violations. Firewalls are based on the work of a basic assumption: it is located inside and outside the network access point, and there is no other bypass external gateway is based on this assumption, the firewall within the network became the protector. But, obviously, for internal security, the firewall can do nothing.

Waterproof wall thus came into being, and the traditional firewall concept is completely different, waterproof wall design to prevent leakage of internal information like water. The birth of a firewall is to prevent outside intrusion. It is a monitoring system within the network, at the internal network, at any time monitor the security situation within the host. If the fire is to prevent the spread of external threats to internal, then water is the means to prevent the leakage of internal information. Visible, waterproof wall is a network monitoring system within this very image of a call.

Simple waterproof wall by the probe and the monitoring center. In general, which consists of three structures: high-level user interface layer, real-time updates based within the network topology to provide system configuration, policy configuration, real-time monitoring, audit reports, security alarm and other functions; low-level modules layer, the distribution of the probe in the composition of each host; middle layer of the security services, real-time information collected from the lower to the senior report or alarm, and record the whole system of audit information, to prepare for queries or generate reports.

Waterproof wall generally has the following major functions: information leakage prevention, to prevent the internal network host, network, storage media, printers and other media, intentionally or unintentionally Kuosan local confidential information; system user management system records the user login information for the provide the basis for future safety audits; system resources, security management, limited hardware and software installation, uninstall, control the operation of a specific procedure to restrict the system into Safe Mode, rename the control file and delete operations; real-time health monitoring system, through the Intranet real-time capture and record screen host, to monitor internal security personnel to deter malicious insiders, and after the issue of security and provide the basis of its source, when necessary, can also be involved in direct control security of the host I / O devices such as keyboard, mouse, etc.; information security audit, network security audit record information, and provide the host within the network usage, security event analysis report.

In summary, the water wall is a firewall, virtual private networks, intrusion detection systems and other safety equipment, security services provided by an effective complement. On the overall security system, it is also an integral part. Although information security products, including encryption, antivirus, firewall, anti-electromagnetic radiation, platform systems, electronic authentication, vulnerability scanning, intrusion detection, identification authentication, physical security protection system and other ten series, but these products can only be part of the solution , not the whole problem.

According to international authorities CSI / FBI statistical data provided, and aggressive behavior in many cases, the most important time is the most secure information leakage; attacks were mainly from within, not from outside hackers. Well, there is no readily available information technology or products can block the leakage of the tap it? Waterproof wall system, such a system is adopted.

Waterproof wall system is composed of Internet access security control, computer control port security, procedures, use of safety control, safety control file copy, CD burner safety control, file and print security control, illegal invasion of security control, security control hardware resources, operating behavior management, remote surveillance, immunization and virus hackers trojan from a centralized management platform.







Recommended links:



Operation of supermarkets to dealers Suggestions



MKV to Xbox 360



CNNIC proposes to amend the terms of promoting open to individuals, CN domain name registration



Waves RESURGENCE - Purple VS Sogou contest



HR staged Star Wars



Who Made The Prosperity Of Reduced Memory Zhongguancun



DVR-MS to MPEG



QuickTime to MPEG



Lists Trace And Ping Tools



Easy to use Web Servers



Simple Education



How To Record Music From Youtube



Interpretation of the computer can not shut down five major ISSUES raised



My favorite Helpdesk And Remote PC



Lucent Technologies QINGDAO Company



Tuesday, October 19, 2010

P2P operators transform their billing through traffic into the regular army



The most hot as the last two years is also one of the most controversial technology, P2P technology revolutionized the traditional telecom model of centralized control, the development of the traditional telecommunications network had a huge impact.

In the September meeting held in the Internet, P2P once again become the focus of public attention, but different from the past that are in contradiction whirlpool carriers showed an extremely calm and rational, China Telecom and China Netcom in charge were invariably shown on the P2P-minded attitude.

China Telecom chief engineer Wei Leping clear that China Telecom will provide the media with a P2P service, and applications for legal P2P traffic to divert to accelerate local service. China Netcom (Group) Co., Ltd., deputy chief engineer left the wind even more bluntly, P2P is a good model, telecom operators should consider using this model.

Under such a change, we now see is that carriers bearer network transformation, and through technical means to strengthen control of P2P services, and then to traffic accounting based on the direction of change.

Abnormal input-output ratio

Resulting input-output ratio is mainly due to lower carrier has not been found more responsive to the P2P model.

BT download, online video, instant messaging, ... ..., these take up a lot of bandwidth to P2P service users to experience the pleasure, and gradually become the killer application of next-generation Internet, but the operator has little revenue from; the same time, P2P caused by network congestion also affects the critical links to other Internet business. From a fixed network operators, data show that, P2P traffic generated from operations of individual links in the individual time slots occupied by the operator's network 80% of the bandwidth, but do not bring their earnings to 20%. The iResearch Consulting statistics showed that in normal circumstances, P2P network operators to take up 40% to 60% of the bandwidth, the peak occupancy rate even as high as 70% to 90%, but revenue is only P2P service 5% of its total revenue.

Resulting input-output ratio is mainly due to lower carrier has not been found more responsive to the P2P model. To charging, for example, according to Ministry of Planning and Design Institute of the telecommunications and data exchange, deputy director of the Department of Lin-xiao, at present domestic operators mainly for broadband services such as monthly and monthly fee model, these models aimed at ordinary rates Internet business and design. As the ordinary business of the Internet bandwidth consumption is relatively small, and flow rates in a relatively balanced state, input-output ratio is relatively reasonable. However, the emergence of P2P allows users to flow substantially faster than the general Internet business (some calculations, 1 hour video take up the equivalent of an electronic mail network resource consumption of the year). In this case, still using the original charging mode, naturally will cause a decline in input-output ratio.

Moreover, while the traditional C / S structure than, P2P is high on the other, extensibility, robustness, high, cost-effective as well as load balancing and other advantages, P2P applications business also faces a lack of control, no guarantee of quality , piracy and other issues.

For taking up a lot of bandwidth and resources, many companies have to P2P software to disable the method; operators for P2P is showing a strong "ban" attitude, some operators have also adopted restrictions on P2P traffic means control of users.

Rational Transformation Network

The rapid decline in fixed voice and broadband boost for P2P applications, forcing operators to have a more rational treatment of P2P, and start thinking of the bearer network transformation.

Despite the impact of the P2P operators build enthusiasm, Internet users and carriers intensified the conflict between, but the rapid decline in fixed voice and broadband boost for P2P applications, forcing operators to have a more rational treatment of P2P, and start thinking transformation of the bearer network.

Recently, renowned Internet expert Professor Hou Ziqiang said the General Assembly on the Internet, China Telecom, China Netcom and China Mobile and other operators have begun to transform CDN network, transformed the network can support, including BT and P2P streaming media category, including download. "Currently, China Telecom megaupload, Netcom CNCMAX have been able to apply P2P. Monternet China Mobile also began to explore applications for the Internet, and has already set the wireless IP and Internet business environment, the idea to support the P2P service. "

Concern is that many problems faced in the P2P, the growth of video content to be a very prominent contradictions, some people even call it P2P, "knot."

Statistics show that, in the domestic Internet market, the Web content is more than 10% increase in annual growth, which is the fastest growing video content. If you rely only on hardware investment to increase bandwidth, not only will lead to rising costs, will create security problems. Hsu, CEO ChinaCache four young that, CDN (content distribution network) is the key to solve this problem, "If we need to use the Internet compared the P2P transfer of resources copy of the film, CDN service is set up one by one cinema. If there is only on the Internet a cinema, then go to the cinema when a large number of users to watch, they will form a congestion situation; even into the cinema, the audience can not have a good viewing environment. And if the film was made into copies are shown in different theaters, This congestion situation would not exist. This is the CDN works. "

Qing Xu four that does not use CDN impact the overall performance of the network, and video content providers can help significantly reduce overall operating costs. "After the way with CDN, the operation between the independent cinema, including a theater problem does not affect the work of other theaters. He also presented a set of data: in the United States, 80% of users use the CDN services and, in China the figure is only 5%.

Lin-xiao that, CDN and P2P integration is a good idea, but combined in different ways, and now appears there are some problems.

Apart from the introduction of P2P CDN business, there are experts on the future of P2P services network carrying the new ideas presented.

Wu Hequan Chinese works that overlap in the CNGI network based on technology developed intelligent points of P2P, better utilization of the Internet resources.

In fact, operators are also changing for the P2P network equipment manufacturers to bring opportunities and challenges. On the one hand, P2P services to enable operators to increase the demand for equipment, for manufacturers to provide more market opportunities; while on the other hand, operators are implementing sophisticated operation, do not blindly expansion.

In this regard, ZTE Intelligent Network Products Network Systems Division, Senior Engineer, Director of Dong Zhenjiang that P2P's impact in the telecommunications industry has been the traditional focus on service model is difficult to effectively support the rapid development of broadband applications and users growing needs, who can provide operational, can be managed P2P network equipment solutions will be operator of all ages.

P2P technology used to control business

According to estimates, as have the ability to distinguish between business, the backbone of the Internet bandwidth management costs per 10G to increase around 1.5 million yuan; the end of the deployment of service differentiation in the ability to access higher costs, assessed to each user's bandwidth costs would increase accordingly Great.

In addition to the network transformation, the current operators have also adopted a number of technical means to realize the P2P services classification and scheduling, enhance the ability of the control of P2P services. Early applied to the corporate market DPI (deep packet inspection) technology is increasingly being used to distinguish P2P service operators.

It is understood that many U.S. carriers in the deployment of IPTV, we began large-scale adoption in the business hub of DPI equipment. This trend is also stimulating a focal point for equipment manufacturers in the data device to increase the functions of DPI or DPI board. Carrier IP network technology consulting Xiangdong that the focal point of the DPI equipment and data equipment integration will be the future trend of development, such as the Cisco 7600 series and Alcatel-Lucent 7750SR features are available in the DPI.

Typically, Cai Yong DPI technology products of the main features include: using real-time user Shuojufenxi, Zhuangtai Xieyishibie, Ye Wu Liu Jian Kong, Yingyongchengxu monitoring, Hui Hua control, business strategy deployment, use and control, operational quality, safety, traffic management. According to Zhang Xiangdong introduction, although DPI technology for the mitigation of P2P services to the network congestion caused by very effective, but the domestic carriers should be combined with the domestic status of DPI technology, and combined with actual test results to select the DPI product. In the promotion of foreign firms, it should highlight the status of those applications for the Chinese product features. For example, domestic operators MAN exports, net exports are mostly provincial, 2.5G POS link, but most foreign companies are mostly foreign to provide the 10G interface DPI product.

Broadband network by upgrading the quality of services and the business of perception, classification, scheduling capabilities, making P2P services have become able to "control", but also for traffic accounting by operators to achieve possible, but it will also lead to increased costs. According to estimates, as have the ability to distinguish between business, the backbone of the Internet bandwidth management costs per 10G to increase around 1.5 million yuan; the end of the deployment of service differentiation in the ability to access higher costs, assessed to each user's bandwidth costs would increase accordingly Great. Therefore, there are some other new operators tend to carry a large number of networks for business customers, the existing network will continue to carry, including P2P services, including general application.

P2P speed up the transformation operator

For those who can not tolerate their marginalization of the value of operators, service providers need to transition to the information to provide more value-added services, and P2P operators will become an integrated information service provider to the transformation of the accelerator.

In the transformation of the network and through technical means to enhance operational control of the P2P capabilities, operators can not ignore a crucial question is: to explore a reasonable profit model, the formation of healthy industrial chain, P2P industry to promote healthy, positive development, but the basis of this development to be able to ensure the continued construction of the network.

As Hou Ziqiang said, the attitude of P2P operators for the change is only a matter of time, "used to be thinking about how to make more money, and now must consider the needs of users. Broadband is the operator that the ultimate solution, but it's broadband users to download a P2P strong demand, operators must strive to do this ecosystem. "Recently, the Ministry of Information Industry Institute of Telecommunications Planning and Design Institute, Deputy Director Hu Jian Bo also said that" the user needs to download BT very strong, certain points of view , operators should lead to this need, and use the model to achieve a reasonable profit. "

Traditional telecom operators to provide users with service model is controllable, high-quality service and charge accordingly. But with VoIP, as represented in free Internet service intervention, operators of traditional profit models are being challenged. For those who can not tolerate their marginalization of the value of an operator, information service providers need to transition to provide more value-added services, while P2P Ze become the operator to integrated information services business transformation accelerator.

Represented by the Chinese telecom operators are trying to use its technological advantage and operational advantages, the scale of development of P2P applications. It is reported that last year, China Telecom, Guangzhou Institute of CNGI successful demonstration project in the "P2P-based digital media business development and application of experimental" project, Guangdong Telecom is developing P2P-based security integrity of the on-demand, live, downloads and other digital media business.

While the huge user base allows operators to have a good basis for operating P2P services, but in the information services, telecom operators to provide capacity information and other media can not be compared with the broadcast. In this regard, Hu Jianbo that telecom operators and content providers need to adopt a collaborative model to bring this piece of business done.

In addition to file download, video, instant communications with external, standardized P2P 鎶?湳 is also widely used in IPTV, streaming media services, video storage and other fields, Li Yong P2P 鎶?湳 also Keyi 浜や粯 build new media, distribution of Ji Tong. Therefore, in addition to the scale of development of the P2P applications, P2P provide differentiated services for carriers is also an option. From this point, Guizhou, China Netcom and Shanghai used together to build a network of "Netcom Watch" is very representative.

As the first test the water P2P streaming media operators, Guizhou, Shanghai Netcom network by using a new generation of P2P technology platform to provide - SNS network, has created a telecom operator and ISP P2P networks as a dominant industry chain. Analysis, advertising revenue will account for dominance of P2P streaming media to build new media platforms, advertising revenue will become dominant. According to iResearch statistics, in 2006 the Chinese P2P streaming media market, advertising revenues of 0.1 billion, is expected to reach 070 million yuan in 2007, reached 480 million yuan in 2010.







相关链接:



MJPEG to AVI



Who will replace the YANG?



ASF to MPEG



You will enter the English PHONETIC it?



How I sold 1,000 cars, 200 sets of villas



Recommend Covert SURVEILLANCE



Identify the black and white ash field, Rapid correction of color cast photos



Manufacturing integration trend manufacturing and EMS has Approaching



Extreme Programming (eXtreme Programming) Summary



windows 7 Hidden gems



MTS To MOV



CCTV affected by EXPOSURE Baidu shares down 25%



comparison Personal Finance



My Gmail so cool, custom domain Gmail login



Qihoo give the flag to WIN users for free



Premier Education



Friday, October 8, 2010

Open source model, the wonderful work of education


Eleventh Five Year Plan, China's economic growth mode change, independent innovation as the core driving force of economic development. China's education system faces reform an urgent need to increase employment skills students, colleges should change their teaching ideas to guide the teaching of new concepts, adhere to the student, the use of open source education.

Fates got tied to open source and education

Information industry has become increasingly evident as the national leading industries, the software industry as the core and soul of the information industry has become a national priority to the development of strategic industry. Operating system is the core technology foundation for the software industry is a national essential strategic high technology, promote the Linux operating system will be to maintain national security, the development of national information industry's strategic decisions.

Eleventh Five Year Plan, China's economic growth mode change, independent innovation as the core driving force of economic development. Innovation is the core driver who's to say what is accurate and human capital.

First, the community invested huge resources to education, these resources continue to be transformed into "human capital", and then the human capital as an "economic engine" of the total stock of capital to promote sustainable economic development. China's education system faces reform an urgent need to increase employment skills students, university teaching ideas should be changing to a new concept to guide teaching, adhere to the student, the use of open source education.

Today, the country has the education sector by a number of provinces and cities combined with education and open-source form. Larger size and results of which are Zhejiang provinces. Linux Professional Committee, Zhejiang province Linux industry to promote the development of the key universities in the province center set up to promote Linux.

So far, more than 20 universities engaged in a variety of Linux campaign, which sought after by college students, tens of thousands of students heard a special report Linux, in which nearly ten thousand were received professional training in Linux certification.

Light of developments and market demand, Zhejiang Linux Professional Committee, Zhejiang Province, the joint public service center in Hangzhou, some colleges and universities information class (Department) initiated by President of Student Forum, set up a LUPA.

LUPA is the Open Source University Promotion Alliance. Academician Ni Guangnan has commented: "LUPA innovation everywhere, it creates a new model in China to promote open source software."

LUPA in the past year, quickly became the most influential open-source one of the organizations, more than at present by the National University to join.

LUPA Chairman said Zhang Jianhua, LUPA claims software innovation, focus on students "employment and entrepreneurship," erected a bridge between schools and enterprises, to school students or community groups to provide a platform for direct dialogue with the industry.

Here we recommend a more typical focus on open source education model, which is a proven successful model, it is by the LUPA open source to build the first National Education Colleges and Universities - Zhejiang Vocational College of Economy (hereinafter: Zhejiang by the hospital).

According to Zhejiang information provided by the hospital, the hospital financial information system last year, the employment rate of hospital-wide ranking last one or two of this year to jointly carried out with the LUPA open source education, employment rate climbed to hospital-wide first, one stroke beyond the hospital The most popular logistics professional (National Key Professional).

Education students through open-source skills improved quickly, the employment rate also increased significantly. Zhejiang scholastic pledged to increase cooperation with LUPA's efforts to promote open source in-depth education.


Educational outcomes of

Over the past year, Zhejiang by the Institute attaches great importance to open source Linux operating system software, especially the popularization and application, and a lot of basic work has made very significant achievements. Economic information system for the hospital's achievements, we analyze the reasons, summed up the following:

Multi-recognized

Through various channels of learning and exchange, Zhejiang Institute of economic information by the Department of the organizers of the Linux operating system at all levels of openness, security, diversity and economy have a better understanding; on the Linux operating system, the importance attached by the state has more deep understanding; promote the use of Linux on the future trends of China has optimistic expectations.

Through the Institute of leadership and related educational institutions to support and praise, the LUPA the Linux operators, Linux network administrator certification requirements included in Registration Certificates of professional qualifications. After the system of professional training, and comprehensively improve the employment skills, employment and competitiveness greatly enhanced.

Active participation

LUPA lectures by inviting experts to carry out the computer section of schools and student organizations will discuss a series of events, economic information department of the students a comprehensive understanding of the characteristics of the Linux operating system, relevant knowledge is growing, and a keen interest in open source.

In the LUPA guidance and economic information in close collaboration with the Department, students actively enrolled certification training. Enthusiasm to learn Linux, and other positive non-computer science students of economics spread very gratifying learning environment.

Closely

LUPA's strategy and economic information to promote orderly and efficient organization means the Department is to ensure that the key to the success of Linux forward. The two units that, Linux operating system will certainly come a long way in our country, and this decision in close collaboration, each playing their expertise to jointly push forward the completion of the work of Linux.

* Institute of mutual cooperation with the LUPA, in the teaching program, laboratory construction, the actual results.

鈥?Economic Information Department of Management with a strong and qualified teachers, the two units in a timely manner to ensure effective communication, work with high efficiency.

* Pay attention to student organizations and student leaders role in promoting employment of student workers and other measures to effectively organize the student network.

Impressive

Economic Information Department 90% of students passed the Linux operator certification exams, hospital-wide popularity of the work being carried out, Linux administrator course has been included in teaching plans. So far, more than 1,000 certified operator through Linux, which became one of the employment skills.

After training, the students have a dual operating system platform skills, with strong competitiveness in employment. This year, the Economic Information Department of University students in the employment rate more than one stroke all the key professional, up to a full-house first. Institute of Leadership graduates from vocational high degree of recognition of such skills development approach. And decided to launch a full-house two-card system.


Future of education in open source

LUPA in Higher Education to promote open source model, received government and domestic and international open source community and software companies to fully recognize and respect, has become popular open-source software development and a vital force in our country is playing an increasingly open source business The more prominent role. However, education in order to popularize open source, there are still some constraints.

First, the training mechanism of industrialization. Around open-source software start-related technology research and product development, various forms of technology in university exchange and cooperation, active participation in international open source community, open source software platform for promoting China's construction of the project, organize and coordinate efforts to address one of the parties common problems. Achieving students in school and after graduation communicate directly with the industry, breaking scientific research and the market, institutions and industry divorced from the status quo continue to promote the Linux operating system skills certification work, students from the computer to the expansion of non-computer science students.

Students from low-level Linux skills certification of the Linux operators to high-level network administrators, network engineers and systems analysts advance, step by step implementation of Linux software development.

Community-based open-source implementation of new product purchase patterns, to break the existing mechanism for bidding and construction support for traditional procurement open source software industry, technical support and service system, the establishment of open source software in public technical support center to enhance the Open Source University Promotion Alliance of overall level of service.

Second, to expand employment channels to develop a unified promotional strategy for policy, funding, legislation, public opinion support, promote Linux editing and publishing the information, expand the Linux knowledge base of products to enhance the Open Source University Promotion Alliance of influence. Achieving students in the school and the freedom of working environment after graduation, to break the existing mechanisms for recruitment and employment bottlenecks.

Third, the promotion of other colleges and universities. School will be under the leadership of LUPA, the Institute will be located in Hangzhou, Zhejiang Province, center of radiation, to be 50 in Zhejiang province to carry out LUPA promote vocational college, established in the province vocational branches, and vigorously promote Linux operating system.

Linux products through various channels to enhance the promotion in colleges and universities, improve the market share of Linux products, training and promoting the development of Linux Chinese universities attract more students and teachers involved in Linux product development, application and promotion, encourage more applications and solutions for migration to the Linux platform up and actively explore the development of China's Linux industry model.

Fourth, international and community integration. Protect national information security, the development of national information industry, based in Zhejiang Province, to promote open source software to the nation. Sharing resources, to resist monopoly environment to create a new software purchase model, through government guidance, student-oriented approach, establish a sound system of alliance to promote Linux.

Open source education will become the focus of education reform, it is not just a mode of education is an educational concept, which advanced the concept of open source software, the introduction to education up to an open, shared, passed to the spirit of collaboration Each student, in this based on the innovation will be everywhere, really for the enterprise, companies need trained personnel, students naturally find a job easily.

Link

About LUPA

LUPA is the Open Source University Promotion Alliance (Leadership Of Open Source University Promotion Alliance) in abbreviation, on June 12, 2005 in Hangzhou.

LUPA is the open source movement explorers and practitioners, but also "open source model in China," the founder. LUPA is the China OSS Promotion Union, the Secretary-General of OSS unit in China Linux Industry Strategic Alliance's core sponsor, OSS is by the National Development and Reform Commission, Ministry of Education, Science and Technology and Ministry of Information Industry jointly initiated the establishment of four Chinese ministries and commissions open Source Software Promotion agency.

LUPA claims software innovation, focus on students "employment and entrepreneurship," erected a bridge of communication between schools and enterprises. To students at school or social group to provide a platform for direct dialogue with the industry, LUPA international latest advanced technology integration, to create new, practical standardized courseware, tutorials for teaching reform in China, to support college students start their own businesses and flexible employment, is to resolve the current the "employment bottleneck" of the ideal model.

LUPA's purpose is to give full play to its government, enterprises and institutions of a link between the unity and coordination of all forces, to maintain national security, the development of national information industry, and enhancing our open-source software industry's core competitiveness; promoting China education system, open source system, training of personnel dedicated to open source and open source technology in colleges and universities to promote the application; to create open-source community, so that students and the open source industry in direct dialogue; promote the Japanese and Korean (CJK) and the World national dialogue on youth cooperation in open source technologies, open source movement for the promotion of establishing a new model.

Currently, LUPA has Tsinghua University, Peking University, Zhejiang University joined more than 100 colleges and universities, to become the largest, most resources have the institutions, affecting the most widely used open-source community organizations.

LUPA propulsion mode, access to the government and the open source community and software companies at home and abroad the full recognition and attention, has become popular open-source software development and a vital force in the cause of our open source is playing an increasingly prominent role.






相关链接:



". Com" dignity in SUN about to FALL of?



MPG to Flash



Blog: Beware Of The Computer In The City's "hidden Rules"



for you Games Arcade



New Games Board



Aspect-oriented (AOP) and object-oriented (OOP) [1]



PPTV sued the PPS Legislation grievances to experts hope



BEST Font Tools



Common operation of FreeBSD 5.2



How To Restart Core Foundation.dll Try This



[Other] Project2000 thematic knowledge (4)



AVI To MPEG4



Terminal And Telnet Clients Catalogs



The world's major media on the Views of Chrome OS



How to avoid price war



VOB TO Flash



Saturday, September 25, 2010

Red Hat and Novell in the United States were to prosecute violations



According to foreign media reports, the Acacia Research in California, hired the former head of Microsoft's intellectual property licensing, general manager of Brad Brunell as Senior Vice President after less than two weeks, then, through its subsidiary IP Innovation filed a lawsuit alleging open source software distributors Red Hat and Novell for patent infringement.

Acacia Research to Texas lawsuit filed in District Court, said Red Hat and Novell's Linux operating system, issued its patent infringement. Litigation that the two companies announced desktop and server versions of Linux operating system infringes three patents owned by IP Innovation.

However, there is no evidence that the prosecution of Microsoft and Red Hat and Novell, Acacia associated cases. However, Microsoft CEO Steve Ballmer said last week that the company will be a number of patents for commercial software developers in the same way free and open source software community to prosecute some violations.

Microsoft spokesman said in an e-mail, Microsoft is not involved in targeting Red Hat and Novell, Acacia lawsuits are not in any way involved in this litigation. Acacia officials did not immediately comment. Currently, Novell and Red Hat are no official response to this from the patent litigation.







Recommended links:



HP's new CEO took office claiming to be unwilling to Hollywood star



Baidu Lotte Joint Venture Formation Of Landed Four Domestic B2C



Chinese version of Firefox: Firefox for free to watch television with



OGM to MP4



FLV TO PSP



Covert Surveillance comments



OGM To MKV



Easy To Use Food And Drink



Premier Registry Tools



Liu Lanjuan for the "Digital Economy and Finance" bottoming



FLASH5 "flash"-type technology 18 (9)



Direct Deposit



Photoshop Top Aides - EXTENSIS Photo Graphics (1)



BI, In The M & A Growth?



What rod dealer Outlets



Wednesday, August 4, 2010

Macro and micro dogs the difference between a dog



The main function of the macro dog

1. With a large capacity storage area (1K ~ 63K), also has two built-in document management system, developers can easily manage data storage and modules.

2. Hardware support some standard encryption and signature algorithms, developers can easily add their own data, decryption and digital signature to prevent data from being tampered with.

3. To support two key management, developers can open different users different access control permissions.

4. To support high-level C-language custom algorithms, developers can write their own algorithms and procedures, a custom algorithm in hardware implementation of high security.

5. Support remote upgrade, developers can easily remote upgrade. Rich encryption interfaces for different levels and needs of the developers to use.

The main function of micro-dog:

Micro-dog is the rainbow world in the domestic sales of the largest intelligent encryption products. It is built-in microprocessor and 200 bytes of power-down to keep the memory, allowing users to customize the algorithm factor as high as 16 million kinds. Decryption technology for the development of domestic piracy, micro-dog inside the random noise data exchange technology, the time gate technology, technical expertise maze tracking against the decryptor. Rainbow provides a micro-world dogs and dogs dual-use USB drive, so that inconvenience to the user using the parallel port micro-dogs-for-plug USB directly to the dog.

Macro and micro dogs main difference between a dog, including the difference between software and hardware, and their respective characteristics.

A: The hardware differences: Micro-dog using COB technology which enables analysis and replication more difficult; micro-USB port and parallel port support dog dog macros only USB port; Micro dog products mature technology, high reliability and stability; macro dog capacity large, large storage areas to meet the needs of users. Wang dog support hardware virtual machine technology to meet higher levels of encryption algorithms defined strength and flexibility. Hardware support standard encryption and decryption, and signature algorithms. Dog hardware built-in macro Standard AES, MD5 algorithm high intensity.

Software difference: the macro dog users and developers to support a higher degree of password security, encryption control management more flexible and support developers micro dogs password. Hong dog support two forms of storage and file directory 3 file types, making operations easier, more intuitive, more secure, easier to do backup and content management, micro-dogs can only be addressed by store address, but the dog can be divided into micro- multi-module management; macro serial number dog dog support order management, through technical means to ensure the dog during the dog Ding security; macro dogs provide a more complete Remote upgrade solution. Wang dog support class C compiler, the algorithm defines a more flexible and safety of higher; macro dog API, more feature-rich; macro dog can bind specific host.







Recommended links:



Using Flash to create a Flash player



Lists E-Commerce



Awards before THE flowers red 2000 Hu Yong 9 years hard work recognized



DreamwaverMX and ASP.NET (1)



DB2 on the machine operating instructions guide



.swf File



Kodak V705 Dual Lens Camera Stabilization cheap listing weekend



J2SE 1.5 version of the new features list



Was Brilliant: Ten-man weapon crack revealed inside story of classical



Avc Converter



3G Has Not Yet Played The Most Intense Competition



How to read wine dealer, "and establish Its own"



swf Files



Good E-Mail CLIENTS



total Video converter



Project Management introduction



Directory ASP And PHP



Monday, July 26, 2010

FreeBSD dnstracer command description


鈼?Name
dnstracer - trace a chain of DNS servers to the source

鈼?Description
dnstracer dns server can determine where to obtain authoritative DNS records, and displays.

鈼?works
dnstracer through the first set dns server, send the name of non-recursive queries.

Non-recursive query: check if the dns server to know the results, then return information.
Does not know the exact results will be closer to the target server dns.

If the dns servers respond to authoritative answer, then the server is queried next.
If the dns server to respond to non-authoritative answer, you may be in accordance with the target server to respond to inquiries.

dnstracer this program, all the authoritative dns server in the query results and stop.

Please confirm your initial query dns server does not forward the query to other dns servers.
dnstracer will not find such a change.

dnstracer will detect those with the wrong dns server. (who should have a dns record, but not the server.)

鈼?Installation (2004 Note: the path / usr / ports / dns / dnstop)

鈼?syntax dnstracer [options] name

鈼?parameters
-C Cancel the cache local records.

-O in dnstracer produce an overview of the last record.

-Q queryclass change the query class, the default is class A.
The following class can use a, aaaa, a6, cname, hinfo, mx, ns, txt.

-R retrIEs check fails, re-check the number of times. (Default is 3 times)

-S server Set the original query dns server issue. (The default is the system's dns server)
If using. Is that the use of A.ROOT-SERVERS.NET

-T timeout waiting for response time (timeout). The default is 15 seconds

-V verbose mode is used.

鈼?example
A: to B.ROOTSERVERS.NET for the first server to query the authoritative DNS server ohaha.ks.edu.tw.
# Ndstracer-s B.ROOTSERVERS.NET ohaha.ks.edu.tw
A cache server can be seen moesun.edu.tw situation. Figure:


B: to B.ROOTSERVERS.NET for the first server to query the authoritative DNS server ohaha.ks.edu.tw. But with the-c parameter, clear the cache.
# Ndstracer-c-s B.ROOTSERVERS.NET ohaha.ks.edu.tw
The cache can be the original moesun.edu.tw resolve the situation out. Figure:

C: Lame Server (which should have a dns record, but not the server.)






相关链接:



Firefox Firefox go to the fair riding quickly and easily Amoy Baby



Adsl how to do frequent dropped calls



Mov video



Games Simulation Catalogs



Convert avi to wmv



Evaluation Covert Surveillance



Mito Xiu a plus for the perfect



TOP Help Tools



Dynamic growth in 20 years - nine as chief of this newspaper and Hewlett-Packard China President Sun



Antarctic issues of common concern, Kaspersky act as pioneers



Out errors to make your writing more Efficient CSS



avi to Mp4



Considerate: Foxmail 6.0 beta 3 the beginning of EXPERIENCE



Rmvb



Chen Xiao, Gome Denies Best Buy Negotiation, Said False Rumors



Tuesday, June 29, 2010

M3U ID3 to M3U

M3U ID3 to M3U is a powerful and easy-to-use tool for you to rip DVD movie in smaller video files with quality, happy for copying DVD to VCD/SVCD/AVI. M3U ID3 to M3U's powerful to backup your DVDs. With batch converting features and great converting quality , and very easy to use with Step by Step wizard help user to do the ripping.
Audio MP3 WAV WMA Converter is designed for converting the most popular audio formats MP3, CD, CDA, CD-R, DVD-Audio, AAC, AC3, ID3, M3U, M4A, M4P, MP3 ID3 Tag, OGG, RA, WAV, WMA, MP2, APE, VQF, MPC, AMR, Midi, WAVE, and RM from one to another directly and on-the-fly (without temporary files produced). If you want to convert mp3 to wav, convert wav to mp3, convert wma to mp3, and so on, this is exactly what you are looking for.



Recommand Link:



Clone2Go DVD To IPhone Converter



WorldCup MP4 Converter



Infomation FTP Servers



YASA DVD to PSP Converter



Youtube to EPOC Tools



Rmvb



DVD to iPhone



Youtube to MOV Suite



Daniusoft DVD to Zune Converter



Youtube to Palm OS Store



Audio Recorders For You



Merry WMA Audio to MPC Backup



Convert DVD to Cowon S9



Infomation Shell Tools



EXPLOSION DVD to 3GP