Friday, March 11, 2011

Zhongguancun hand new countryside


The first two villages Engineering Village - Li Jia Fen Village information service platform opened

PRC January 28, 2007, in Town, Haidian District, Beijing Li Jia Fen Village, the first two villages Engineering Village - Li Jia Fen Village information service platform www.hdljfc.cn, after 1 month of trial operation After the official opening. Sales of agricultural products, consulting agricultural technology, Agriculture policy ... to understand ..., Li Jia Fen Village, led by the Li Shigang village head, took the lead with 9 million farmers in the villages of engineering information service platform, onto the broad road of agriculture science and technology. Chinese entrepreneurs attending the opening ceremony, Tan Yang Yang said network executives, the platform is the opening of a new socialist countryside construction of the great beginning of the information, it is the Zhongguancun Science and Technology of China in the name of the Holy Land, on the first document in 2006 instructed the Central "To actively promote the construction of agricultural information, the full use and integration of agricultural information resources, with emphasis on integrated information service platform of agricultural engineering" to make a positive response.

In the December 2006 meeting of the Central Rural Work Conference, Premier Wen Jiabao pointed out: "the central task of the new rural construction is to increase rural productivity, the solution is the development of modern agriculture." Agricultural production and management of modern agriculture, agricultural science and technology, rural market circulation, farmers need information on all aspects of living service platform.

It is understood, had reached more than 6300 domestic agriculture-related sites. However, according to the Secretary of the Ministry of Information to Promote the needs of rural information services, there are still not well resolved four issues: First, the most concerned with the interests of farmers are closely related to the information collection, processing, integration, release, exchange , sharing difficult; two diverse information needs of farmers, personalized, timeliness, accuracy can not meet; third is facing a "last mile" problem, namely, how the information to the hands of the majority of farmers, farmers like to use, with affordable, put to good use; Fourth, the construction of information systems related to operating and maintenance costs and how to achieve sustainability.

Haidian District in Beijing and under the guidance department, in the Haidian District Secretary Comrade Tan under the care of Vick, in the Zhongguancun Administrative Committee and the Working Committee of Zhongguancun Haidian enterprises with the support of the Commission by the red and the Zhongguancun International Incubator of Zhongguancun Software Association launched China Site factory "wonderful world" company, more vivid language translation technology company, CRE aspect, China 10 000 network companies, Chinese entrepreneurs network and many other Internet companies in Zhongguancun, the support of the birth of a two village project - a new rural Zhongguancun hand it is a nationwide 500 000 500 000 villages to establish an independent domain name may be in Chinese, English, Japanese, Korean, Russian, Traditional publishing information in six languages at the same time "online big village" to help the 9 million farmers in China's vast rural areas, to establish interoperability, and can be broadcast globally to connect the modern international market of agricultural exports, the country regularly update synchronization, powerful works of China's new rural information to domestic and international show an international , a colorful new socialist countryside.

Village project has two 65 channels, including nine aspects: 1, sales of agricultural products. 2, agricultural technical advice. 3, rural tourism. 4, land resource development. 5, investment cooperation projects in villages and towns. 6, production of consumer goods Buy. 7, rich exchange of information. 8, rural employment. 9, the new rural and cultural fronts.

Village works to support the two key modern agricultural industrial chain formation and perfection of being test run in the Beijing Association for Information Platforms Mentougou Rose show a bright future of modern agriculture, attended the opening ceremony of the Beijing boutique Rose Growers Association president, said Li Jiyong At present, members of the Rose Society of farmers planting crops income rose 6 times, the corresponding output rate of land productivity and farmers are 6 times! Village project will also support two farmers to plant roses from the rose oil to the refinery, to the production of cosmetics, Rose Valley, the domestic market and international markets into the whole industrial chain of modern roses.
He Enpei two villages project director of the Executive Committee, said: "Every village by village as a source of information, the villagers are most concerned about the information collected, then the village responsible for network maintenance release of information workers. By the farmers themselves collect their release, information to guarantee on the timeliness, the information is true, also had a dedicated review system. "As for the information release, the system construction cost, the two villages, Deputy Director of Engineering Executive Committee, said Qiu Dong, the villagers do not entirely his own pocket. "The initial site construction costs and maintenance fees can apply for government financial support to solve our red Zhongguancun Committee members also plan oriented entrepreneurs reconstruction, for the national reconstruction of each county is a modern agricultural industrial chain associated with the two villages demonstration project, information service platform, party members and entrepreneurs from the two villages for the initial engineering information service platform construction costs, we can also operate through the site to roll its own development. "in ensuring the timely update of information issues, Qiu Dong said that the world wonderful behind a dedicated team of software engineers, guaranteed 24-hour time-line publishing, adjustment, supervision, and regular site upgrades.

The future, the two village projects attached at one end 500 000 Li Jia Fen Village, such villages, one end attached Zhongguancun, a cone structure of the site clusters - the basic unit of the village, the village building platform, the village built the town of platform platform , the town built the platform and the Agricultural Economics Association, the county platform platform platform after the municipal, provincial platform, the provincial platform is the platform www.2cun.com Zhongguancun Village project all of the above information platform for the two sites is responsible for all unified by the Zhongguancun automatically upgraded on a regular basis to Village works to ensure the information platform for the two sites with the times, the new rural farmers can spend in the shortest possible time out constant innovation in Zhongguancun, the most advanced Internet technologies. Policy of benefiting the country can pass through the Zhongguancun platform in a timely manner to all the rural; rural areas, agriculture and farmers need information can be one level to the higher layers of government pass filter; each village platforms can be broadcast to all other platforms agricultural information; the same time Zhongguancun platform also open up international markets for exports, and the introduction of international capital, information dissemination through the six languages, and modern agricultural industrial chain integration, to help China's new rural modern agriculture to international markets.

Opening ceremony drew to a close, Zhongguancun, deputy secretary of the United Party, Comrade Bin excited that the two integrated village project is an ongoing area of Zhongguancun, all the Internet's most advanced technology to ensure the provision of good technical support for farmers to provide comprehensive information dissemination services information platform; two villages project for the first time, governments at all levels leading to true and accurate understanding of the needs of farmers, rural status and agricultural production; to connect to modern agriculture, domestic and international export markets; to urban residents aware of the rural farmers directly Le tourist situation; for new rural culture spread to every rural China; for Chinese farmers have expressed their needs of information distribution channels; to Zhongguancun Information Technology Innovation out of service the first time a new socialist countryside, new rural service the process of getting an unprecedented, broad space for development.










Using De exterminate rabbits ANNOYING ads RMVB movies



winword exe faulting module In mso dll is it



The birth of Kissing fish



Themes And Wallpaper Brief



First Job Out Of The Ivory Tower Beginning How The Election



VBScript REDIM statement



VOB to M4V



XviD to WMV



News about COMPONENTS And Libraries



DVD Ripper



Hot Science Education



College student hidden hard to guarantee the right to life and health worries



Describe the C # call an external process



Catalogs Clipboard Tools



Sunday, October 24, 2010

IPTV Start-scale operations


Chamber of Harbin Netcom IPTV demo platform is quite spectacular seems to show the operator the full confidence of the industry.

Harbin, more than 60,000 users

Harbin, China Netcom launched the first IPTV service in the pilot cities. Recently, reporters learned that the Office of Netcom in Harbin, as of July 30, the total IPTV users in Harbin city reached 66 212. Heilongjiang Province, China Netcom Communications Group segment Xudong, said general manager, through cooperation with Shanghai Media Group, pioneered the domestic IPTV in Harbin, the real scale of business operation, currently the company's IPTV Heilongjiang communication business has more than 7000 hours of on-demand programs, on-demand programming content updates every week up to 300 hours of. The system consists of UT Starcom's torrents IPTV system to support, is the largest of the commercial deployment of IPTV.

It is understood that the first half of this year, Heilongjiang Province, broadband content applications for more than 10 million paying customers, the completion of revenue 33.33 million yuan, accounting for broadband applications the proportion of broadband revenue to reach 8.16%, the contribution of broadband ARPU value reached 4.13 yuan. The IPTV service from the beginning of the year to July 20, has achieved revenue of 16.38 million yuan, increase broadband ARPU value of 1.06 yuan. Visible, IPTV has been not just run as a pilot project, but began to appear the signs to the industrial development.

Business platform to protect the user experience torrent

Hardware platform in the business, Harbin Netcom cooperation with UT Starcom, in Harbin city set up a central node to store all the program content; the lower nodes with four convergence, convergence user data; there are 40 in the lower edge of the most nodes, storing part of the show. Covers the entire system all 7 District 12 in Harbin suburb, that is basically all the people of Harbin have been covered by this system was. Protection in the business, the current Harbin Netcom to each user's IPTV and ADSL services offer shared bandwidth of 3M, and can automatically adjust the bandwidth limitations of different services to achieve the best QoS results. In the experience, the reporter also found the time to respond to IPTV on-demand very fast, and the general feeling of not much different from cable television.

When asked whether Harbin IPTV system can support the development of long-term users of expansion, UT Starcom, Vice President, IPTV general manager Zhaobo Jun told reporters, Harbin Netcom's IPTV platform is the UT Starcom torrent system , and this system is most characteristic of the server network layer in the business exploitation of the transmission principle of reciprocity (ie, the characteristics of P2P), and the content section, all content is stored in the system network, reducing the content server flow pressure and cost savings. He also told reporters that the number of users of the system is in many cases, the more it can demonstrate its superiority, its architecture is in line with current trends in network traffic.

In the course of the promotion of IPTV, the reporter observed, Harbin, China Netcom, Shanghai Media and equipment provider company UT Starcom together three very good role to play. After a year of hard work, Harbin IPTV has achieved many accomplishments. Zhaobo Jun told reporters that the current industry environment is IPTV is different from a year ago, he said, the policy-oriented significantly more clear than before, content providers have done quite well prepared, and also, in all co-promotion and hard work have accumulated a lot of experience in related services.

Detailed breakdown of sales and marketing program package

In the interview, reporters learned that Harbin's IPTV marketing more detailed work has been a year ago. In the tariff package, the Harbin Netcom will soon be 60 per package of programs to promote further differentiation. Current tariff package has been extended to 3, respectively, 20 yuan, 38 yuan and 60 yuan. Of which 60 per monthly user can enjoy all the IPTV business, including 48-hour times, all of the VOD on-demand resources, and all of the 64 sets of SMG's television programs provided; 38 per monthly package, you can enjoy the times and some VOD video programs; and 20 yuan for 64 packages can watch normal TV programs.

For users, this package is very tempting. Because the reporter has learned that the local cable TV monthly fee is 16 dollars, but provide only 20-30 sets of TV shows. And 20 dollars, you can watch IPTV to 64 sets of programs, the reporter also observed that this program not only includes 64 sets of 12 CCTV channels, and basically covers the provinces of the TV show, there are Netcom and the Shanghai itself some of the characteristics of channels in the entire installation process, the most expensive equipment - set-top box is provided free by the Netcom (but requires users to sign a contract year and a half in the network), the user, or there is a considerable temptation, in addition to local ordinary user, the many local hotels and restaurants have also introduced the IPTV service to the guest room.

It is understood, Harbin Netcom IPTV business in order to create an interactive set up operations centers, line center and marketing center of three relevant departments. The Shanghai Media in the local business sector known as IPTV-100 Vision is responsible for program updates, production and monitoring.鑰岀櫨瑙嗛?鐨勭洃娴嬩腑蹇冨氨浣嶄簬鍝堝皵婊ㄧ綉閫氱殑鍏徃鎬婚儴鍐咃紝鍦ㄩ偅閲岋紝鐢变笂娴锋枃骞垮埗浣滃畬鎴愮殑鑺傜洰鍐呭浠庝笂娴风洿鎺ヨ皟搴﹀埌杩欓噷鐨勭洃娴嬩腑蹇冿紝浼犻?鍒扮敤鎴风殑瀹朵腑銆?br />
娣卞眰甯傚満娼滃姏浠嶉渶鎸栨帢

灏界濡傛锛孖PTV褰撳墠浠嶇劧澶勪簬鍙戝睍璧锋闃舵锛屾嵁褰撳湴鐨勭綉閫氫笟鍔′汉鍛樹粙缁嶏紝鐜板湪姣忔湀鏂板鐨勭敤鎴锋暟澶ф鏄?000-2000鎴峰乏鍙筹紝杩欎釜閫熷害鐩稿鏉ヨ杩樻槸涓嶅蹇殑銆傚嵆渚挎槸褰撳墠鏈?垚鍔熺殑鍝堝皵婊↖PTV涓氬姟涔熸槸澶勪簬璇曠偣鍚戝ぇ瑙勬ā杩愯惀杞彉鐨勫垵濮嬮樁娈碉紝铏界劧鍙備笌鍚堜綔鐨勪笁鏂逛笉閬椾綑鍔涳紝浣嗘槸鑻ヤ粎浠呮湁涓夋柟鍔涢噺鏉ユ帹鍔ㄦ暣涓骇涓氳繕鏄笉澶熺殑銆備粠鍐呭鎻愪緵鍟嗘潵璇达紝铏界劧涓婃捣鏂囧箍鎻愪緵浜?4濂楄妭鐩紝浣嗘槸杩欑绠?崟鐨勬椂绉昏繕涓嶆槸IPTV鏈?粓鎵?拷姹傜殑鐩爣锛孖PTV鐪熸瑕佽拷姹傜殑鏄竴涓秴澶х殑濯掍綋瓒呭競銆?br />
涓浗浼犲獟澶у娼樺姏鏁欐巿璁や负锛屽湪宸茬粡杩囧幓鐨勫嚑骞达紝骞跨數浼犲獟浜т笟鍜岀數淇″鍊间笟鍔″凡缁忎粠鏈?垵鐨勯檶鐢熷拰闅旈槀锛屽紑濮嬭蛋鍚戞帴瑙﹀拰鍚堜綔锛屽苟涓斿凡缁忓睍鐜颁簡涓?簺鎴愬姛鐨勮寖渚嬨?浣嗘槸鍙屾柟鐨勫悎浣滆繕鍙槸涓?娴呭眰娆$殑锛屽悎浣滅殑鑼冨洿鍜屽箍搴︿粛鐒跺仠鐣欏湪姣旇緝绠?崟鐨勫簲鐢ㄥ眰闈笂锛岄?淇$殑澧炲?涓氬姟鍦ㄥ箍鐢典紶濯掍腑鐨勫湴浣嶈繕涓昏澶勫湪涓庡箍鐢佃妭鐩唴瀹圭殑缁撳悎涓婏紝鏄竴绉嶈緟鍔╁拰灏忚寖鍥寸殑寤朵几锛岃?閫氫俊澧炲?涓氬姟瀵逛簬骞跨數浼犲獟浜т笟鍦ㄦ笭閬撴帶鍒跺拰缁堢瀹㈡埛鐨勫紑鍙戠瓑灞傞潰涓婏紝杩樺鍦ㄥ疄楠屽拰鎽哥储闃舵銆?br />
Observer reporter

IPTV浜т笟閾捐繕闇?惛绾虫洿澶氬弬涓庤?

鈻犲皬涓?br />
浠庝骇涓氶摼鐨勮搴︽潵璇达紝涓婁笅娓歌繕缂轰箯鑺墖甯傚満浠ュ強鏈洪《鐩掕澶囧拰鐩稿叧璁惧鍘傚鐨勫弬涓庯紝鏁翠釜浜т笟閾剧殑寮哄.鎬т笉寮猴紝甯傚満鐨勭粏鍒嗗拰鎺ㄥ箍娑堝寲宸ヤ綔杩樼己灏戝弬涓庤?銆傛垜浠煡閬撳湪绉诲姩澧炲?棰嗗煙鍐咃紝瀛樺湪鐫?璁稿澶氱殑SP锛屼粬浠線寰?兘澶熸瘮杩愯惀鍟嗘洿鍔犵簿纭湴鎵惧埌鐢ㄦ埛鐨勯渶姹傦紝璁稿瀹惰繖鏍风殑SP灏辫兘鎵惧埌璁稿鎷ユ湁娼滃姏鍜屾満浼氱殑甯傚満锛屼粠鑰屼娇绉诲姩澧炲?涓氬姟寮?睍寰楅椋庣伀鐏?鑰屽湪IPTV鐨勫競鍦轰笂锛岀洰鍓嶆澶勪簬绉疮瀹炲姏鐨勯樁娈碉紝瀵逛簬鏁翠釜浜т笟閾句笂鐨勫弬涓庤?鏉ヨ锛岃繖鏃㈡槸鎸戞垬鍙堟槸鏈洪亣锛屽洜涓哄綋鍓岻PTV浣滀负涓?鑳藉鍦ㄧ粓绔笂浣撶幇鐨勫唴瀹瑰競鍦哄垎閿?钩鍙扮殑娼滃姏杩樻病鏈夎鍙戞帢鍑烘潵锛屾湁涓撳鍒嗘瀽绉帮紝杩欎竴甯傚満濡傛灉寮?彂寰楀綋锛屽彲鑳戒細褰诲簳鏀瑰彉褰撳墠鐨勫唴瀹归攢鍞ā寮忥紝鐢氳嚦鏈夊彲鑳藉鑷磋澶氳涓氱殑閲嶆柊娲楃墝銆?br />
鍝堝皵婊↖PTV浠庢煇绉嶇▼搴︿笂鏉ヨ鏄竴涓瘮杈冩垚鍔熺殑鍓嶆湡鎺㈢储鑰咃紝瀹冪殑鎴愬姛缁忛獙鍦ㄤ簬鍦ㄨ繖閲屽舰鎴愪簡鐢典俊閮ㄩ棬鍜屽箍鐢甸儴闂ㄤ箣闂寸殑鍚堜綔鍏辫耽銆傚湪浠婂勾锛孖PTV甯傚満鐨勬璋冨彲鑳借繕浼氬ぇ浜涳紝姣曠珶澶涔熷緱鍒颁簡涓?紶IPTV鐨勭墝鐓э紝骞朵笖宸茬粡鍦ㄦ渤鍗楀崡闃冲競寮?浜嗚瘯楠屾?鐨勪笟鍔℃帹骞垮伐浣溿?姝ゅ杩樻湁鍗庝负銆佷腑鍏翠互鍙婁笂娴疯礉灏旈樋灏斿崱鐗圭瓑鍘傚涔熷湪绉瀬鍙備笌鍒拌繖涓?涓氫腑鏉ャ?鎹編鍥介珮绉戞妧甯傚満鐮旂┒鏈烘瀯棰勬祴锛屼粖鍚庝笁骞村唴锛屽叏鐞冪殑IPTV璁惧鍜屾湇鍔″競鍦虹殑鏀跺叆灏嗚揪鍒?40浜跨編鍏冦?鈥滄槦鏄熶箣鐏紝鍙互鐕庡師鈥濓紝涔熻鍝堝皵婊ㄧ殑IPTV涓氬姟灏辨槸浠婂ぉ鐨勨?鏄熸槦涔嬬伀鈥濓紝鑰屾槑澶╁叴鏃哄彂杈剧殑鍒欐槸鏁翠釜涓夌綉铻嶅悎涓嬬殑鏈濋槼浜т笟銆?br />





相关链接:



"Abnormal" Jason Jiang: year one is moral derailment



Bohai Shipbuilding Heavy Industry under the Overall management planning branch of the digitization p



Svchost.exe application error how to repair



Siphon fighter 4 FULL Raiders



SAIC SSANGYONG Qin Zhu



AVI to MKV



Two loud sigh as the HC



DB2 basics



Matroska to MPEG



Evaluation Accounting And Finance



Never fight a battle unprepared



Simple Registry Tools



ESSO card from the city to look into the need for integration



YouTube to WMV



Contribute something to do on the sales



Thursday, October 14, 2010

How to send a dynamic image JSP page



When a web page with an image / jpeg (or other image format) of the MIME type is sent, your browser will that return results as an image, then the browser to display images, as part of a page or completely as the image itself. Jsp page for you to set MIME types, you need to set page contentType attributes:



You need to create a BufferedImage and then draw your dynamic image:

BufferedImage image = new BufferedImage (width, height, BufferedImage.TYPE_INT_RGB);

After you finish creating a BufferedImage, you need to draw the graphic environment, a Graphics or Graphics2D object:

Graphics g = image.getGraphics ();

/ / Or

Graphics2d g2d = image.createGraphics ();

From now on you can draw the image content. Drawing on the graphical environment will be drawn to the BufferedImage. Initially the image is black, so you want to use the background color fills the image is a good idea, then, when you have finished rendering, you need to dispose graphical environment:

g.dispose ();

/ / Or

g2d.dispose ();

Once the image of the drawing, you return the images in response. You can use non-standard com.sun.image.codec.jpeg package JPEGImageEncoder class code image, or if you use JDK1.4, you can use the standard ImageIO class. JPEGImageEncoder when using a skill, you must take to ServletOutputStream from ServletResponse not use the JSP implicit output variable out.

ServletOutputStream sos = response.getOutputStream ();

JPEGImageEncoder encoder = JPEGCodec.createJPEGEncoder (sos);

encoder.encode (image);

/ / Or

ImageIO.write (image, "JPEG", out);

There is a program from all possible (for example g.dispose (); or g2d.dispose ();) selected a complete sample. This example uses the Graphics object to draw a random polygon, image by JPEGImageEncoder drawing, you can free to set the polygon vertices more complex shapes, in other words, more vertices and edges.

To run this example, from the "" between the jsp code into a file named image.jsp, will that file into your web server can find the place where the use of Tomcat is the ROOT directory, start Tomcat, visit http://localhost:8080/image.jsp.







Recommended links:



Neusoft NetEye win opener



What is the JPEG2000



DivX to iPod



Directory Science Education



How to promote sales will not die



OPEN source model, the wonderful work of education



hotmail email reverse lookup easily catch a



Joint Commerce and Industry of India: India will rely heavily on computer hardware in China



No trace of her it just so to find The original 1000 Baidu



With A Good Wind Power, Send Me Albatron



Picked Audio Recorders



OGM to AVI



UML in practice, the current situation and some of the recommendations [2]



ASF to MPG



Simple Vehicles - Screen Savers



Sunday, October 10, 2010

Qihoo give the flag to win users for free



Over the past year, the virus has undergone a drastic change in the market, the protagonist is no longer just viruses, but with black industrial chain Daohao Trojans and malware. This is not only harmful to users of the property, but also for security vendors to provide a development opportunity. Among them, the odd tiger 360 potential health and safety or to successfully squeezed into the top three personal network security market.

The third highest domestic security firms

According to iResearch released in August this year, "2007 Personal Internet Security report" shows that currently, the latest network security market personal top three rankings are Rising, Kaspersky, odd tiger 360 security guards. Kaspersky, 360 security guards have been from behind, as the domestic emerging network security vendors. With what strange tiger was so successful?

First, the market spread of Trojan horse virus. 360 odd tiger Security Center released "Internet Insecurity Report" revealed that the first half of 2007 were intercepted viruses, malware and Trojans totaled 168 135, which accounted for 80% Trojans ratio. Meanwhile, according to 360 the Forum survey, Internet users have lost over Qi Cheng QQ accounts, while 60% of Internet users, therefore reluctant to use online payment platform. Qihoo CEO Zhou Hongyi, also said the deteriorating form of Internet security, the domestic Internet is from the spread of viruses and malicious software, Trojan horses spread to the changed circumstances.

Next are the service based on Internet users. Qi Xiang-Dong Qi, President Hu said that now 30% -40% of Internet users use the odd tiger 360 products. After all, a large number of domestic Internet users do not want money or buy legal copies of software, and 360 security guards to free marketing tools to meet at no cost to use genuine software needs. Xiang-Dong Qi also said that the majority of Internet users adhere to the benefit, it can be surprising to upgrade tiger to bring the brand and reputation enhancement.

Again, the odd tiger 360 security guards is not entirely a sense of anti-virus software, why can spread the virus in the market, the majority of users favor of cooperation with Kaspersky is one of the main.

Cooperation achievements "win-win"

Kaspersky and the odd tiger 360 security guards of the strong combination, effectively protect the user's information security, it has been recognized by the majority of users, so that a rapid increase in market share between the two.

In fact, the 360 security guards is not a complete solution for PC virus, Trojan horse viruses can only be carried out against the killing, but the Trojans, after all, is only part of the virus, users can not odd tiger killing a number of outside inter Trojan virus, so can only download 360 security guards to conduct a comprehensive bundled Kaspersky Anti-Virus. Such cooperation, but by 360 security guards in free mode for the respective customer propensity to consume, for themselves and their partners to create favorable conditions for market competition.

If an occasion to spread malware to Qihoo popularity increasing rapidly, then the alliance with the Kaspersky user is played a training habits, or even form a "dependent" role, which is to say from a marketing perspective. From the product point of view, the function of accurate positioning, easy, functional and strong market is characterized by an important reason for their win, while the alliance Kaspersky played a finishing point. Zhou Hongyi, says that Kaspersky co-operation with the 360 security guards is also a very successful case. Both push each other branded software, Kaspersky installed with 360 security guards in a rapid growth, rapidly increasing brand influence.

Free patterns to bring brand awareness

Although the co-operation with Kaspersky so odd tiger made great breakthrough, but the move has been to promote free trade suspicion. And this just brings free Qihoo more brand awareness, for the odd tiger more products in future be a good foundation.

銆??鍦ㄤ簰鑱旂綉鏃朵唬锛屽緢澶氫笢瑗块兘鏄厤璐圭殑锛屾瘮濡傚缓鍗氬銆佹场璁哄潧銆佷笂缃戠珯锛岃幏鍙栭噸瑕佺殑淇℃伅銆?Xiang-Dong Qi, says that a free time like this, why is killing the virus inside the computer have to spend?鎸夌収浜掕仈缃戠殑妯″紡灏辨槸缃戞皯鍏嶈垂锛屼紒涓氫拱鍗曞槢锛岀綉姘戞槸娑堣垂鑰咃紝娑堣垂鑰呯殑鐪肩潧鏄?閽辩殑銆?Zhou Hongyi, also said the Internet age is to taste before you buy, let the user to spend three months, six months, how to let others know your products?

It is this free of charge in a short time makes the odd tiger get majority of the customers, it also brings a great brand, but also to the odd tiger charted the course of future developments. Zhou Hongyi in "The Second shareware Heroes," the meeting said, malicious software industry chain has been checked this year, the current network environment has been recovered cleaner. Sharing software has been cleaner in the soil and environment, the software development in the future, you can and Rising, Jinshan and other cooperation.

Xiang-Dong Qi, stated clearly that do odd tiger Web2.0 era Google. Qihoo without commercials, by 360 security guards on the dissemination of ideas odd tiger, spread the image of odd tiger on it. Qihoo free antivirus for the Internet users, and other applications on the Internet should be able to get more revenue. In accordance with such rules for Internet users to enjoy more convenience, so naturally someone will foot the bill.







相关链接:



Interview With B & Q (China) Vice President, Human Resources Director Miss Hu Weiyan



PPTV sued the PPS legislation grievances to experts hope



Five new features JSP2.0



Recommend E-Commerce



Hpqtra08 exe quot hang quot problem fix it now



MPEG to MOV



YUV To AVI



DV to AVI



PICKED Audio CD Burners



"3G" staged battle



New UMPC Make Waves



Storage Cartoons - Screen Savers



He Enpei "Changing Faces"



BEA loneliness



Recommend Newsgroup Clients



Saturday, September 25, 2010

How to avoid the invasion of Trojan



銆??濡備綍閬垮厤鏈ㄩ┈鐨勫叆渚?br />
1, do not perform any software of unknown origin

For downloading the software from the installation, use more than the former must use some anti-virus software, the best killing Trojan software is designed to check the further implementation of the identified non-toxic, use.

2, do not believe that you will not receive junk e-mail messages and infected

Never believe that you will not receive junk e-mail messages and infected, even if the mailbox has never been seen or ISP mail, sometimes you'll never know how others know your mail address.

銆??3銆佷笉瑕佽交淇′粬浜?br />
Do not be your friend sent the software to run, because you can not ensure that his computer would not have the virus, of course, the possibility of deliberate deception is not a good friend, but maybe he (she) in the hack itself do not know! same time, the networks of today, you can not guarantee that this must be your friend sent you, because someone else can give you someone else's mail.

銆??4銆佷笉瑕侀殢渚跨暀涓嬩綘鐨勪釜浜鸿祫鏂?br />
Especially not in a chat room open your Email address.鍥犱负浣犳案杩滀笉浼氱煡閬撴槸鍚︽湁浜轰細澶勫績绉檻鏀堕泦璧蜂綘鐨勮祫鏂欙紝浠ュ灏嗘潵榛戜綘!鏇翠笉瑕佸皢閲嶈鍙d护鍜岃祫鏂欏瓨鏀惧湪涓婄綉鐨勭數鑴戦噷锛屼互闃查粦瀹镜鍏ヤ綘鐨勭數鑴戠洍璧颁綘涓?垏鈥滃?閽辩殑涓滀笢鈥濄?

5, not to offend people online

銆??鍦ㄨ亰澶╂椂锛屾案杩滀笉瑕佷互涓虹綉缁滀笂璋佷篃涓嶈璇嗚皝灏卞嚭瑷?笉閫婏紝杩欐牱浼氫笉灏忓績寰楃姜鏌愪簺楂樹汉锛屽埌鏃舵壘浣犲紑鍒??

6, Do not download software

Particularly unreliable small FTP site, the public information level, forum or BBS, because these places is a new virus released first choice.

7, it is best to use third-party mail program

If Foxmail etc., do not use Microsoft's Outlook program, because the Outlook program too many security vulnerabilities, hackers Moreover Outlook is also preferred that the target of attacks, many attacks have been selected entry;

8, Do not open attachments or click on advertising messages on the link

Because spam is an important attachment that hackers target program, especially in some of these links.

9 resource manager will be configured windows always show extension

Because some extensions: VBS, SHS, PIF files and more features for the Trojan files, even some of the documents for the further extension, it should focus view, once discovered to be immediately removed, do not open the file only always display The full name can be found in time.

10, minimize the use of shared folders

銆??濡傛灉鍥犲伐浣滅瓑鍏跺畠鍘熷洜蹇呴渶璁剧疆鎴愬叡浜紝鍒欐渶濂藉崟鐙紑涓?釜鍏变韩鏂囦欢澶癸紝鎶婃墍鏈夐渶鍏变韩鐨勬枃浠堕兘鏀惧湪杩欎釜鍏变韩鏂囦欢澶逛腑锛屾敞鎰忓崈涓囦笉瑕佺郴缁熺洰褰曡缃垚鍏变韩!

11, to the e-mail encryption

To ensure your messages are not other people see, but also to prevent hacker attacks, to recommend an encryption expert - PGP, I believe it will not let you down!

12, Hide IP Address

This is important!! You surf some of the best tools to use computer software to hide your IP address, such as the use of ICQ, the entry "ICQMenuSecuri-ty & Privacy", the "IP Publishing" following "Do not Publish IP ad -dress "option on.

銆??13銆佽繍琛屽弽鏈ㄩ┈瀹炴椂鐩戞帶绋嬪簭

Finally, the good is the most important thing is when you are online you need to run real-time monitoring anti-Trojan programs, such as, the cleaner, it's real-time monitoring program TCA, immediately display all current operating procedures and detailed descriptions, plus plus some outside professional such as the latest antivirus software, personal firewall, to monitor that is relieved, of course, to your love machine enough grade for the job you say?







相关链接:



Dell Accused Of The Largest Mergers And Acquisitions Worth The



E-Mail Clients introduction



3G2 to AVI



Hong Kong PCCW Privatization Commission will vote by sealed-depth inquiry



3G2 to WMV



News About Converters And Optimizers



Vb Program To Control The Flash



Good GRAPHIC



RMVB to MPEG



SCO UNIX Learning Collection



SSL WORKS



Organization process DEFINITION



E-cology in the Pan Micro Series 66



Jia PENG Lei: "diversity" denatured



Write-once HD-DVD discs will be in volume production to wait for final approval



Sina's Brilliant And Bleak: 5 CEO Change



Wednesday, July 28, 2010

Red Alert: Watch your ADSL password cat


With the popularity of the network, network security is increasingly being valued by the people. Today, we introduce a little man gave attention to the case. Writing this article does not teach you to attack others, but to everyone to raise safety awareness, through this article if you did nothing wrong thing, I'm not responsible! :)

We all should know, many of the cats with automatic dialing features, we can account on the ADSL dial-up software in the cat, so when the computer starts up each time the cat will be able to automatic dial-up ADSL, a computer can access the open . The above work is accomplished through the following steps:

1: Enter the Cat in the browser's default address, such as: http://192.168.1.1, a dialog box will pop up this time, in general, by default when the cat into the ADSL account and password are root., Or admin , or do not need ID and password, the problem also lies in this. Why do you say?

2: Everyone should know the principle of ADSL it! When we dial the time, the bureau will assign a random IP address to you. And this is a regular IP address, an area corresponding to a IP, such as the distribution of our side is 61 .*.*.* IP form, we can IPCONFIG / ALL command to view that their current access to the IP.

3: For example, my ADSL was available to the IP 61.138.4.2. So and so within the push to change the last digit of the IP is likely that another user is using the IP. We are in the browser has been imported from 61.138.4.3 to 61.138.4.254. If a pop-up dialog box ADSL cat landing, which shows that we have not even on the other side of the ADSL cat, and then try to enter several account and password. How kind of go in it! That any one parameter which can be altered on, once we see who can make the other uncomfortable cat broken, the other party may think that your cat is broken.

Today I did a test, success is 80%, because our bureau here do not seem aware of the problem, and almost all of the ADSL cats have not changed your password. As the telecommunications installation of ADSL ADSL cat model used on so few, while the same type of ADSL modem's default password is the same, which greatly increased the likelihood of guessing the password. We see next map:



If you just can log in to your modem you will not much care about, but it logged on to your modem if the modem's NAT settings to change what can further access to your computer, including network, and then the computer itself, so do not do a good job protection That you danger.

The above said does not believe that we all OK, but this is my personal experience, my computer is so hacked once, then is the Internet, installed Rising _blank "> firewall, suddenly see _blank"> ; firewall alarm, the source address is 192.168.1.1, to what port to connect my computer, I did not pay attention, to the Internet, and so never get in after the next boot, and life and death get in, no matter what state, the total is restarted.

And I want to re-set to change the cat is also inaccessible. Each had to hold back a small head with a pencil origin reset to the problem. Now want to come outside was sure to be the use of IP network remote into my black cat I lost. Perhaps you will wonder, with so many problems, telecommunications who does not know it, on this issue I have asked friends in telecommunications, in fact they are addressing this issue, and gives several emergency measures. If your not aware of the telecommunications sector, then the problem. Can do:

1. To set ADSL WEB landing against public network, only local LAN WEB landing.

2. To change the default password.

3. That I think is the most misunderstandings. WEB landing port to ADSL-port also can be changed to the other, the way many of the most toxic way I am now is to map port 80 to my computer to do inside, and then my IIS default page with exploit code into a For example, the page can be made to open the other side of the drive source, a warning page, etc., I use JAVA to do a, Ha ha!

Well, that cat is HACK principle, we will not have to fear, and if your ADSL cat has not changed the password, or change as soon as possible about it!







Recommended links:



converting mov to wmv



Online video convergence can watch movies without HAVING to download



avi to mp4 converter



Operators burn punched 11 million users four drama success



Mp3 to aac



swf FORMAT



Firefox Firefox go to the fair riding quickly and easily Amoy Baby



Forbes: Goodbye, Alibaba?



Reviews E-Mail Clients



"Random eight-digit" Beware of your U disk



PPT edit show two Things correct



Good TEACHING And Training Tools



Vertical Market Apps Shop



E-cology In The Pan Micro Series 4



Tuesday, July 20, 2010

Easy Outline Introduction to XSLT


Preface

Hello, everybody, from today we will work together to learn another language family of XML XSLT, XSLT similar to HTML in CSS, but CSS function than to be more powerful. XSLT can be said to prefer a programming language, but it is not common programming language, complex, or even other than the js script language is also simple, so do not worry about learning difficulties. A Czech Republic will continue to stand in general designer's point of view, in plain and understandable language, Deep and introduction to XSLT. Well, let us together explore XSLT's secrets!

Statement: Because XSLT standard in the continuous development of syntax is also expanding, and we learned the following knowledge is November 16, 1999 issued by XSLT 1.0-based, it may be incomplete, the latest information please go to W3C web site (http://www.w3.org/TR/xslt).

Outline

This article is divided into five chapters: XSLT concepts, XSLT instance, XSLT element syntax, XPath syntax, XSLT resources.

1.XSLT concept

1.1 What is XSLT

1.2 Why use XSLT

1.3 XSLT history

What is XPath 1.4

Comparison of 1.5 XSLT and CSS

1.6 XSLT and IE5

2. XSLT examples

2.1 XSLT to transform XML

2.2 An example

2.3 Process Analysis

2.4 XSLT uses

3.XSLT elements of grammar

3.1 xsl: template and xsl: apply-templates

3.2 xsl: value-of

3.3 xsl: for-each

3.4 xsl: if

3.5 Xxsl: choose, when, otherwise

3.6 xsl: sort

4.XPath syntax

4.1 Location

4.2 Addressing Operation

4.3 Operators

4.4 The performance function

5. Appendix: XSLT resources






Recommended links:



Simple Business Databases And Tools



CoreWare DVD & Video Converter Pack



Youtube Movie to VOB MIXER



Youtube FLV to Laptops Products



.ts file Extension



Domeru DVD to Zune Converter



Infomation Web Servers



Delicacy Flash To Video Converter



Evaluate Animation Tools



RA Music to CD



avi to Mpeg



M4a to m4r



Browser TOOLS for you



Clever and FTP permissions under control related forums



Swift MPEG To XBox 360



Google video format



Bluesea Xvid MPG MPEG Encode