Friday, March 11, 2011

Illustrator and Photoshop to create gorgeous wallpaper patterns



In this paper, Illustrator (referred to as AI) and Photoshop (referred to as PS) of the powerful combination of software to play their respective advantages, creating a colorful flower pattern wallpaper. I hope you like!

We first look at renderings:






Click to view larger image

Production step is mainly based on the first draw with Illustratot pattern, then use Photoshop to do wallpaper effects processing.

1, open Illustrator, the new file. Using pen tool draw a curve, symmetric replication, connect two fixed-point (object> path> connection), leaf strokes to complete a steel arc, symmetric replication, connect two fixed-point (object> path> connection), leaves to complete.






Click to view larger image

Figure 1

2, copy 1 leaf, rotate 90 degrees. Mixed tools (w), linking the two leaves. Create 1 / 4 circle (draw a circle, remove with a node).






Click to view larger image

Figure 2

3, select the arc and mixed ridge line, the object> mixed> replace the ridge line.






Click to view larger image

Figure 3

4, object> mixed> Mixed option, the specified interval steps, steps 5 or so. (Translator's Note: This step is not very clear, to create mixed, chaotic, and I adjusted a bit, there is no need to create a whole mix of straight friends can tell you that way.






Click to view larger image

Figure 4

5, copy the mixed path, adjust the position (there is to know how friends can share) and color, on the ground floor.






Click to view larger image

Figure 5

6, repeat step 5.






Click to view larger image

Figure 6

7, continue to repeat step 5.






Click to view larger image

Figure 7

8, object> expand, with (A) Superposition of the four selected leaves duplicate, delete.






Click to view larger image

Figure 8

9, select all, the object> ungroup. Adjust the opacity 75%, then you can choose different stacking options, get different results.






Click to view larger image

Figure 9

Now we do a good job with Illustratot based design, let's open Photoshop, wallpaper production further. Please click "Next."

10, open the PS, create your desktop resolution size of the black background paper documents, to do a good job of "Flower" entrusted to the PS, the make some adjustments.






Click to view larger image

Figure 10

11, mixed Options> Bevel and relief. Set figure.






Click to view larger image

Figure 11

12, copy 1. Narrow, adjust the position.






Click to view larger image

Figure 12

13, repeat step 12.






Click to view larger image

Figure 13

14, continue to repeat step 12, adjusting the mixed mode, Darker Color.






Click to view larger image

Figure 14

15, repeat step 12, a black color overlay, 100% opaque.






Click to view larger image

Figure 15

16, continue to repeat step 12, adjusting the mixed-mode, Color Dodge.






Click to view larger image

Figure 16

17, add the top layer, black and white gradient, Multiply.






Click to view larger image

Figure 17

18, the new layer, Filter> render> clouds, foreground and background colors to black and white, Filter> Fuzzy> Gaussian blur, radius 5, as Multiply.






Click to view larger image

Figure 18

Finally, you're done, you can play your own imagination to add some additional elements and effects, color have another wonderful feeling.






Click to view larger image

Figure 19











VOB to WMA



VBScript ReDim statement



The birth of kissing fish



MTS FILE converter



Prerelease download ATi Catalyst 5.5



Directory Web Development



MKV to M4V



COLLEGE student hidden hard to guarantee the right to life and health worries



Describe the C # call an external process



Windows vista lxbkjswr.dll error fix now



News About Components And Libraries



Tuesday, October 19, 2010

Lead time and queuing time


RP, ERP in the early commitment of the orders, plans are important to set parameters. Most of the advance of the concept is easy to obtain. Queuing time (Queue Time) theoretical explanation of the ERP feel more mysterious, abstract and metaphysical are not sufficient to guide practice. ERP required textbook way, also need case studies of the device. This article talk a "device."

Ahead of many, mainly 2 large family, order lead time and production (manufacturing) lead. Order lead time is the sum of the following composition of lead:

Product Design Lead

Procurement Lead

Production lead time

Other treatments lead

Release lead

Among them, the production lead time can be further broken down into:

Production lead time

Production lead time

Demolition time

Wait time

Transit time

Queuing time

Most ERP software include at least the production lead time, production lead time, transit time, queuing time.

Queuing time is the work of the center workpiece to reach waiting time. In the work center to become the bottleneck of the process route, the queuing time arises.

When the technology to work on the center line does not match the processing capacity, the bottleneck will result, queuing time will result. Figure 1.



Figure 1

Work centers on the process line, although the matching processing capacity, but the number of product lines in the work centers on the process cross, the bottleneck will result, queuing time will result. Figure 2.



Figure 2


Work center queue time is often dynamic.

Yield fixed the dynamic, for example, generally the work center a batch / hour, the bottleneck work center 0.5 batch / hour, the processing of cases in the bottleneck work center queue time, batch 1 is 0 hours 1 hour 2 is approved, the first 3 batches of 2 hours 3 hours 4 is approved, ... ..., 8th is 7 hours.

At present most of the ERP software is only a static set of queuing time, textbooks should be based on historical data that averaging set. The above example, queuing time to take 3.5 hours. There are no more reasonable settings, we analyze the work center's calendar, work centers 1, 2 job centers, work centers should be 8 hours 4 calendars, work centers should be 16 hours 3 calendar. Otherwise, the work center 3 OEM products will queue full of workshops, full of plants. We look at the first four batches of 2 if the work center output in the first 5 hours, 3 in the work center queue processing 2 hours 3 hours, the work center 4 has been off work. 5th batch, batch 6, 7 approved, 8 groups of people, so we can say that 5 to 8 award award although a longer waiting time, but they use the "spare time." Now we get the arithmetic average queuing time is 1.5 hours ((0 +3) / 2). Since the 8th of 7 hours queuing time is the use of "amateur" time, queuing time is 0 hours, so we get the weighted average queue time is 1.5 hours.

Discrete manufacturing is not practical as the process type as a stable rhythm. Fluctuations in production, work in different parts machining line in the center stack, queue processing center will lead to fluctuations in queue length, using the above method, to the right time to the processing center to adjust the time line is necessary.

In essence, in the manufacture of discrete time queue is dynamic. Conditions for calculating queue is full time. However, existing ERP software bottleneck work centers on the dynamic queue time is very limited processing power, APS, and TOC theory is the way to solve this problem.






Recommended links:



My Favorite Audio And Multimedia



Guiyang Information Industry Bureau of his party visited the headquarters of King Abacus



MOD CONVERTER



comparison Server Applications



MOD to MPG



runtime error 1624 BEWARE of these errors



Lightning fast shortcut keys used to grasp Thunder 5.9



C # And Class Differences In The Structure



Around The "home Appliances To The Countryside," The Strange Status Of The Eight



Only store is NOT enough



PROCESS



DAT to MP4



See our court! Within the wide Sogou Super Rabbit letter



Lu Morrison: leading subordinates to make decisions



Wednesday, October 6, 2010

Enhance the concept of active intrusion prevention IPS is not speculation


Intrusion Detection (IDS), has been put on the market for years, but more and more users find that it can not meet the new network environment for security needs.

IDS can detect passive attacks, and can not take the initiative to stop the threat to the vagaries of the network.

Therefore, it was urgent need to find a proactive intrusion prevention solutions, to ensure that the four enterprise network threat environment in normal operation.

Deep-level defense security needs

Currently, enterprises are facing increasingly complex security problems, security threats are growing rapidly, particularly the risk of blended threats, such as worms, DDoS attacks, spam mail, etc., greatly troubled the user to the enterprise's Wangluo cause serious damage.

So what options do business? Intrusion prevention system is the next generation of security systems business. It not only can be detected, can block the attack before they cause damage to the intrusion detection system to a new level. IPS and IDS obvious difference: intrusion prevention systems block the Code Red, Nimda and SQL Slammer, and the use of intrusion detection systems, users are required after each attack to spend millions of dollars for virus removal. Because of this, companies need the security strategy has not only limited to a single firewall and other protection products, but a deep-level protection strategy.

NAI launched includes host protection IPS technology strategy and network protection strategy for the two most, which is the McAfee Entercept host-based intrusion prevention solutions, technologies and rules of conduct signed by the integrated approach, providing an effective protection as Code Red, Nimda worm that attacks such as; McAfee IntruShield network intrusion prevention solutions, integrated feature library detection, abnormal behavior test, behavioral analysis, correlation, and denial of service techniques that can intelligently detect known attacks, the first place attacks and DDOS attacks, a deep level to effectively protect the enterprise network security.

IPS will replace IDS

Currently, IPS and IDS for the dispute, it was said, IPS, and no new technical breakthrough, but a conceptual speculation, Pubic do not think so. He believes that as technology development and continuous improvement, IPS will replace IDS, NAI IPS technology has been made in a number of international patents, IDS in the network is real-time detection of network attacks, while the IPS includes IDS technology In the IDS based on the increased detection of active response to block the defense function, once the attack is detected, you can take the initiative to cut the intrusion. Of course, true, IDS is already a mature product. Pubic think, IPS will take some time to replace IDS, IPS also requires the user to accept a change process, and now this change is also underway.

Currently, the face of mixed-type attacks, users need a proactive defense strategy, IPS is a large potential market for new business, therefore, NAI technically spent a great deal of input, hope to play a lead role. Now has more than 180 customers worldwide use of IPS products in China, after some users in the test trial of the IPS are also interested. Pubic believe, IPS will have a significant demand for this market, it is very useful to users. IDS products have been used for the user you want to migrate to IPS, you can purchase a license only on the user's input costs are also guaranteed.

It is reported that already has a financial company based on the original IDS, IPS purchased a few licenses to the successful deployment of intrusion protection system IPS.

In addition, IPS is a very technical product, the user's skill level requirements are high, and only on the IPS used properly, the effect will be significant, or just the opposite, but rather as IDS, so, user education and training essential. NAI will intensify efforts in this area, which is the current IPS technologies to promote the great challenges facing.

What is the real IPS

Currently there are many products on the market are dubbed "protection" of the word. But the real intrusion prevention solution should enable companies to analyze can not take measures to protect the system; the same time, it should prevent attacks result in the user's operating system, applications and data corruption. NAI believes that a good intrusion prevention solution should include the following features:

First, the real solution should provide real-time attack prevention and analysis. It should be before the start of any unauthorized activity to identify attacks, and prevent it from access to important server resources.

Second, intrusion detection is the most effective way is to adopt a mixed approach, that integrates specific attack signatures and behavioral rules of power. This hybrid method can provide the protection of known and unknown attacks, while at the same time keeping false positives to a minimum, so do not make any concessions on the loss.

In addition, a strong defense in depth security are based on the concept of protection can be deep. IntruShield's unique architecture integrates a number of patented technologies, including feature detection, anomaly detection and denial of service analysis to be able to multi-gigabit of network traffic and intelligent under the accurate detection and protection. This kind of creative control unprecedented ability of technology to protect those with the most stringent requirements of the network against known attacks to the first occurrence of unknown attacks and DoS attacks.

At the same time, enterprises have to choose whether to adopt the solution of advanced technology industry, is well-tested and used, and are subject to ongoing maintenance, it is very important.

Things correct safety and performance

IDS generally parallel in the network to bypass the network monitor in real-time detection of suspicious traffic, the performance is not significantly affected, but not IPS IDS, it is deployed mainly in the series in the network, all access to the internal network traffic to go through the IPS, if found aggression, to respond immediately to block attacks, so that will affect network performance, NAI also take into account this situation.

NAI's IPS performance is very good, IPS products in more than 20 integrated chip, 60G of cache, to ensure maximum network performance, and this is one of IPS's main selling points.

The so-called "true blue streak", despite the different opinions of the IPS's, but it is the concept of right, and it indeed has been in existence, many manufacturers are successively pushed IPS products, as long as the actual use indeed the role of the user's network security are effective, the user can try.






Recommended links:



Storage Timers And Time Synch



SWF To MP4



comparison People - SCREEN Savers



NavInfo SAIC Roewe help promote the car navigation



Liu: Do not play tricks to play on the capital



How Far From The Focus To The Expertise?



Photoshop - Neon TEXT



emerging wholesale ELECTRONICS markets from china



Quality control in the "Statistics" several concepts



finaldata recovery partition from experience



Flash to MPEG



DVR-MS to MPG



Dell "Ren Zhang" Wrong Standard Price Order



Saturday, September 25, 2010

18 Interpretation of retail display as rule specifications



Store product display case directly affects product sales and image display effect, the author summed up display suppliers to do business over the 18 reciprocity, according to primary, intermediate and advanced categories. Primary guiding rule is easily obtained with the KA system the same, and also in the display the most basic requirements, intermediate and advanced guidance laws may be because the shop to display management system or enterprise marketing cost considerations will limit the need flexibility.

Although the multi-display rules, but not "limit", the science and practice of experience, more of a "guidance", "to use the wonderful, Bottom of Heart" flexibility according to circumstances, not dogmatic .

Part 18 rules as displayed

First, the primary guiding principles

1. To keep clean

? Ensure that the display of goods and tidy, clean, no damage;

? Ensure shelves clean, no damage, no rust, etc.;

? Guaranteed price cards neat, clean, no damage;

? Guaranteed to help sell products (such as shelf stickers, POP, jumping card, etc.) neat, clean, no damage.

2. Timely exchange defective products

Damaged products will not generate sales, and will impact corporate and brand image, to be transferred in good time.

3. Mark outwards

Product labels must be unified front toward the consumer, the product is not flat, not on its side, not inverted, to uniform, beautiful eye-catching display.

4. The little great, the light under the weight

Be heavy, big, goods placed in the following, small, light goods placed in it. So the next focus is security, and for consumers to get, but also conforms to people's aesthetic practices. But sometimes will to promote the image of the large packaging products such as stocking, gift, etc. placed on the shelf at the top is not included. Also, as shelf too high (eg 2 meters), the top shelf can actually play advocacy role, you can use the external box, handbag seize the position, display the image.

5. FIFO

FIFO is the warehouse management fundamentals, the shelves in supermarkets also have the concept of date by the factory will be the first product on the most outside the factory, the latest products manufactured on the inside, to avoid immediate product.

Second, intermediate guiding principles

6. Price Smart

Price brand label accuracy, clarity, eye-catching. Prices can be compared with similar products, increase product display notices effects of publicity. The use of promotions, the promotional price original brand must be clearly marked, the reasons for current price and the price reduction. Shall not commit any time following five errors:

? Can not find the price of identity;

? Price marking error;

? Price logo placed dislocation;

? Price of brand new and overlapping;

? Promotion area and the normal shelf price of brand price card price discrepancies.

7. Display full

Make your own display rack filled with goods and increase fullness of goods on display and visibility. As the saying goes, "selling goods heap Mountain", consumers generally believe that more must be selling goods products, are fresh and full display to display positions are competitive products to prevent misuse. When not full display shelf inventory, the products should be back to move forward, it is less than goods, but also with empty boxes, bags and other fill-packed plane.

Tally clerk Invoicing shelves in time traffic statistics, timely order to ensure the safety of shelf inventory, non-stock occurrences. But the display does not mean full display of goods in the shelves the better, in fact, display shelves in ensuring full and without stock-out premise, Yahuo less not a bad thing.

8. Color contrast

The same product (same color packaging) together form a "color block" display effect, the same color different "blocks of color," the best kept separate, more easily identify customers, to highlight the effect.

9. Where they should be

That is the best product on the shelf off the best location, location is the best sales per unit area (floor effect) the greatest location, such as shelves in people flow into the top 1 / 4 to 1 / 2 and at eye level line between high and pick up line height (1.2 meters to 1.45 meters) should be placed on selling product.

10. Display the largest

Display of goods on display as possible take up more space, entering the single product (SKU) to ensure at least 20 cm row width. How much the display area will have sales, seize the consumer's "eye" is the first step to provoke impulse buying, and only occupy more than competing brands on display space, have more sales opportunities.

11. Close to the main competitive products

Display area and major competitive brands to put together, star products and the main competitor to put together, differentiate their products. Do not you see a Coca-Cola Pepsi-Cola where most will have it? Remember, "Like attracts like groups" of the old saying, and what your products are often products together, long after the consumer will think it is a class of products, while your main competitors, consumer groups also happens to be you The target consumer group, you can appeal through the competitive products you attract customers, and through the successful marketing and promotional activities to intercept opponent's potential customers.

Third, senior guidance law

12. Focus on display

Concentrated focus and display items including the brand focus. Brand focus is displayed in a form as possible all products will focus on the company's brand and its sub-brand will focus on all products, items refer to different concentration of sub-brand its products are in accordance with the specifications of different products (packaging packaging weight), different flavors concentrated. Obviously, the product easier to build momentum together, showing is better.

13. Prominent display

Some will focus on items placed in the most prominent position, to maintain optimal sequence, arranged the largest emission surface, do prioritize, reflect the product's primary and secondary structure, so that customers at a glance. Because the key products is a good market image of the behalf of the company's products, is selling the best product, need to show more to the consumer.

14. Vertical display

Vertical display can be divided into fully vertical display, and some vertical display. Refers to a completely vertical display items or a brand of products placed vertically from the top to the bottom shelf; part of the vertical display is a kind items, or a brand of products according to block the vertical display, only occupy a row The layers in the shelf part of the row side. In practice, as arranged in accordance with the main part of the vertical display shelf display, first ensure that the brand of the vertical display, and then take into account packaging color (flavor) and packaging specifications.

15. The best position

Display area and sales directly related to the different locations, the normal shelf life should be for the best display spaces, a special display at time of purchase must not only look at price, measured input / output ratio is the most scientific. And the display area in the store is relatively fixed (fixed placeholder rule), so easy to find the old customers.

16. Display dynamic

Display can not be rigid, there should be a vivid of measures to attract consumers, not only in the promotion period. Shelf can be affixed with a beautiful, POP, jumping cards, flags, hanging plate and so on to help sell products, or the use of lighting, sound and so vivid of marketing, or just based on full display (such as Duitou) intends to take the outer shelf off a few products on display, this will not only help consumers get, but also show a good product sales, these are vivid of.

17. Multi-point display

Multi-point display is to display different forms of diversity in different display areas display products, is no contradiction between this and focus on display. If there is a special addition to the normal display shelf outside (hanging strips, including columns, end, Duitou, etc.), in addition to the shelf area outside the normal checkout area, elevators, etc. are also set up display.

18. All items unity rule

All items refer to the company as much as possible to a classification of goods All items on display in a normal shelf, can meet different consumer demands, increase sales, but also enhance the company image and increase the impact of goods; unity refers to the product style and tone of the whole display to seek unity, to help sell product forms as uniform as possible. However, all items on display will be affected by the restrictions into the codes, and requirements for the uniform standard is the first to have Caixing. In addition, all items on display only for the unity of the shelf, the special display materials (end frame, end, Duitou, including columns, etc.) is often the items for a purchase or a brand, not included.

Interpretation of the second part of the display specification Darunfa

Modern Terminal KA system stores all the operators are pondering is: How can the limited display area of more profit? New Bin talent emerging on the market, "display division" posts, also mostly to adapt to this need arise. The KA system stores under the operating conditions of the whole product will have its own display management requirements, vendor products into the code, the first thing to follow them to the display specification, so learning about their operations specifications to the more practical.

Following Darunfa operating specification (excerpt), studied law after the 18-like display, look at the retailers will display a standard level of understanding.

1. The Company is a self-service wholesale warehouses, so product configuration should be marked with the description of goods (such as rack cards, POP) and all kinds of signs, allowing customers to easily read, easy to handle, easy to buy needed goods. (Note: some of us should support the request to help sales.)

2. Use of high shelves, forklifts, pallets and other tools, with large display, the establishment of the wholesale warehouse company's image. (Note: the available "Pallet" pad do Duitou; high shelf at the top to display publicity materials.)

3. Close to the entrance configuration of the goods must be of high slew rate of the product, so customers entered the store, they began to buy goods; selling goods should be configured on a store shelf near both ends of the aisle Department, to attract customers into the shelves easily choose between goods; is impulse buying of goods, configure the active line of the corridor (including the checkout area, but not too high priced goods). (Note: If the product sold well, display position will be affected!)

4. Relevance display to display the first time must comply with guidelines, the so-called correlation function classification display means to display merchandise, not to manufacturers to differentiate. (Note: the focus on the implementation of display rules in this converting!)

5. Price: display should be considered in the order of display in accordance with high and low price, the price closer to the display of goods together. (Note: the display of our brand and other laws such as the close competition is a limit.)

6. Packing: as for the vertical display, display a small way for the great, under the light weight (Note: the requirements of our agreement.)

7. Color: different colors easily attract customers attention, to stop buying, more often vertical display can show beauty (Note: the color contrast, and we ask the same.)

8. Do not always change the product display location, to avoid the customer can not find the merchandise (Note: the fixed placeholder rule.)

9. Each product display area greater than 20 cm (Note: the maximum display area of single-product display area required)

10. High-margin products and customers view on display in the shelves of the same height (about 120 cm, commonly known as the gold line) (Note: is where they rule)







Recommended links:



AVI To MOV



WMV to MPEG



Media Take Out 2



Interpretation Serv-U User Attributes "Account"



Introduction Vertical Market Apps



Compare Firewall And Proxy SERVERS



Sony and NEC will Merge the two departments



Mito Xiu Funeral Flowers To Create Poignant Picture Of Non-mainstream



Recommend Web Development



IME TOOL to input more obedient



TOD to WMV



Win 7 Random And Changed Anti-piracy Measures Become Soft Black



Chinese version of Firefox: Firefox for free to watch television with



Bar code knowledge



Thursday, August 5, 2010

3 min Jin: "Germany" moves of the



Rush is the surface force, the real contest of it is wisdom. This wisdom has come from human resources, "integration."

In 771 BC, King Ping of Zhou Moving Eastward, the Spring and Autumn era; to 403 BC, three points in Shanxi, the Warring States era; and then to 221 BC, the Qin unification in 450 years time, the decline of the emperor, princes hegemony , doctor good at the political, Pei Chen country life enforcement. From top to bottom, inside and out, among dozens of countries, countries between the different political and economic blocs, one after another and endless campaign thousands of times ... ... "no just war", said that Spring and Autumn Period The war between the belligerents does not matter just and unjust, to see who has a real competitive!

Rush is the surface force behind the overall strength ratio is. This one has a very important factor at work, that is, "wisdom." The real contest between the various interest groups is that wisdom is the wisdom of leaders is wisdom among the leadership team. This wisdom has come from where? From the "talent", is the human resources by "integrated."

"Germany" "only" identified

"Mirror" the first big case, "the three sub-Jin", the Sima Guang in detailing Zhao, Wei, Han strength of the concrete process of growth, we see that the "wisdom" - "talent" is the key. Since competition depends on the talent, what is the "talent" on the need for clear definition of what kind of "talent", there should be a standard scale. So he said, some very well-known but often and help us continue to be used to pondering the words:

"Husband only differences with Germany, while the secular Mo it can distinguish, through that of Yin, the loss of their so people." Sima Guang OK "before" and "virtue" is completely different, if these two confused, collectively referred to as "wise men", you employer will surely mistakes. He said: "The only virtues of the capital also; Germany who also was the commander." But only Germany can count on the resources, Germany is the commander in chief. He further explained that "it" refers to such a person: smart, insight, strength, perseverance; "Tak" means such a person: integrity, fairness, tolerance, peace. A person "talent with all do, that the 'sage'; virtuous and death, that of 'fool'; Ruby before, that the 'gentleman'; only wins German, that the 'villain'." While employing the technique that is "standard", that is: "Gou no saint, but taken from a gentleman; its too bad people do not have to fool if." can not find the sage, then use the gentleman's right; its use of the villain, as with the fool. Competence as a gentleman would be used in the right path, villains will stop at no evil with competence; fool even want to do evil, but the wisdom and strength numerous bad.

In this world, the challenge is in the saints, gentleman, villain, fool, not the head tattooed, clear boundaries, often temporary or is for some time, and even life are difficult to distinguish and identify them completely. Sima Guang also special analysis of the situation, it is because "Germany" on the request of this stuff is very high, and "only" this thing makes one look like. So the "virtue" often respected, but people get an arm's length; a "talent" who liked and loved person on the natural full-time on the easy-to specially trusted. But since ancient times, until the time or the country breaking, or at home defeated, it was found that the chaotic state minister, home of the lost son, is "more than before but less than Germany," the people. So Sima Guang said with emphasis that statement the last sentence: If the country were able to carefully examine household management "talent of Separation" and "know what to have", then do not worry about losing talents!

"The three sub-Jin" incident, temporarily width of the background of that time, the direct origin from the occurrence, to show the results of the consequences of a complete process, we can see that: in the history of this experience at least two decades and three generations. It can be seen, in reality, a leader of the eyes to be able to know the real "talent", is no easy task! "Mirror" put the essence of this case are concentrated to show to us.

Not the same as the "successor"

Spring and Autumn Period, there is wisdom Jin, Zhao, Han, Wei Four Powerful family.

Chi house Zhao Zhi Xuan Son, and the Zhao Jianzi into consideration both before and after the time his successor.

Zhi Xuan Son to Chile in the various schools identified as the successor of Yao. But the tribe, said Chilean fruit: he as Chi Xiao. Chi Yao has strengths beyond the five others, there is a shortcoming. Strengths are: the first looks, the second good at riding and shooting, talent, wealth and the third, fourth eloquent, resolute and decisive fifth. The only shortcoming is the intention heartless. If he is using his strength to subdue five other people and do things without virtue, who can get along with him then? "If Yao has established, intellectual case will be destroyed!" If the legislature Chi Yao, clan will be destroyed. So it is difficult to listen to, and therefore not listen to Zhi Xuan Son. Chilean fruit then the name is changed, from the clan, to avoid trouble later.

Zhao Jianzi has two sons, a big name Golubeva, called non-small shirt. Zhao Jianzi to establish successor. Li who? Then look at it. One day, he admonished the family everyday words were written on two bamboo, and to two sons, asked, said: "do well to remember ah!" After three years, he suddenly asked his two sons, rupah entirely to not up, and even bamboo do not know where to go throw; free shirt out of it in verse to memorize, but also immediately removed from the sleeve bamboo offer. Did not say, and Zhao Jianzi that no shirt that children "Yin"! To make him heir.

Zhi Xuan Son's death, Chi Chi Yao Xiang Zi is ruled a. In his eyes, not look down on Han, Zhao, Wei various Bureaucrats, a feast, the banquet will random fun of insulting other people, also reminded him of the retainer, said: "nobody would dare to make trouble!" Retainer hastened to tell him : "You can be wrong with these words. ancient books, said one triple again to make mistakes, cemented the hatred from time in the open ah, so a preventive measure. Gentleman to deal cautiously because small things can, will not lead to great evil of. "Zhi Yao with the dead father, Remonstrance made a few words would not listen to, then it is blatant. His request to the Han Kangzi territory, Han consideration, in order to retreat, to the; He also demanded territory Wei Huan Zi, Weijiade to retreat, but also to the; last he Zhaoxiang Zi, is the main point has been Zhao government request without shirt territory, immediately met with Zhao Xiangzi's flatly refused! Chi Yao rage, he set from the Han, Wei 2 to attack Zhao. So Zhao Xiangzi ready to flee, and asked its: "I go?" Under the proposal he went to the eldest son of the city, or go to the city of Handan. Zhao Xiangzi then said: "No. The former, people just completing city, exhausted; the latter has just recruited the people filling the food storage, they now have to go to flame wars, who would, and I concentric enemy too! "In the end, no shirt thought his father had told him before his death: experience of crisis, must not hold anything against this person Duo Yin-status, must not hold anything against Jinyang that place a long way, and went to go over there, that destination. School year because Zhao Jianzi Yin Duo to control Jinyang, the Yin Duo asked Jane Son: "You let me go to painstaking to plunder the wealth, or whether I soothing retreat for the future?" Jane said, of course, the latter child. So Yin Duo to Jinyang, then the residents of a small number of households considered ways to alleviate the people's taxes. No shirt on under very confident: "We defected Jinyang it. It was the first master of the old site, Yin Duo has to be generous people, they certainly can and we all shared the." So went the Jinyang.

Although Chi Yao kill to Jinyang, and cited pour City, the city people's cookstoves are bubble collapsed, people are still loyal Zhaoxiang Zi, vow to fight to the death. When Chi Yao proudly said: "Now I know how perished in the water," Wei Huan Zi and Han Kangzi immediately touched each other. Zhi Yao Wei retainer told masters, the two Koreas, unreliable, certainly rebel. Chi Yao carers said these words lightly on to the Wei Huan Zi and Han Kangzi, Wei, Han retorted: "people who speak these words must divide the villain, we stood fast How could hand the land should not it?" This perfunctory the past. And Zhao Xiangzi later was sent to persuade Wei, South Korea, to announce the "same boat," the truth, then, killed three Fandao combined wisdom Yao, Jinmie his family. Chilean fruit had only a result of a change of surname and spared.

Sima Guang wrote: Chi Yao's demise is that he was "only little more than moral." With a skill really empty! And Zhao Xiangzi because his father did not stand Gegelubo as heir, despite his five sons, but refused to set up as a successor, but has established rupah son, grandson to Zhao's successor.

Zhao Xiangzi no shirt death, Zhao has been civil strife, but the tribe-insurgency efforts, and meet established Zhao Xiangzi designated successor. The heir born to the son of Zhao Ji, was the grandson of the Weiss and Wei Huan Zi, Han Qian Han Kangzai grandson King Weilie with the packet by the week, was promoted to princes.

The soul of the brand to rely on to protect

Clearly, what kind of talent by selecting the "successor" to this topic, Sima Guang show their preference. That is: In the last who must be "generous", "love the people." This may be in contradiction with the interests of the moment, but "generous", "loving" is still the highest leaders defend "virtue" of "this." Duo Yun Zhao Jianzi then sent to Jinyang, if we just raise Zhao's "income" and "profit" to identify whether the increased competitive strength, then, Yin Duo bound to increase taxes, take this as "operating results" and thereby Zhao Jianzi also think they have been sitting on strength. But this monarch and his subjects both had not done so. Years later, Zhao was no shirt caught in distress, it is Zhao Jianzi, Yin Duo "generosity" of the old site, to save the day in the swing of his land. Zhao free shirt from the words and deeds of his father also unconsciously accept the "law-abiding," the character, the final position of the heir to another trying to come to a Gegelubo's name, so that future generations continue rupah ruled. Zhao died without shirt to do so would not know what the consequences, however, the behavior of others have put a little look in his eyes. Once the countries are in trouble, the Serbs would stand up and his legacy, exterminate political disorder who return to his values. Because they believe: Zhao No shirt, "generosity", his choice would not be wrong. In contrast Chi Yao, a so-called talent, is not clever, not real life "kind", arrogant arrogant, calculating people, but others were calculated. Using today's words: This person, lacking!

Chongqing Contemporary System science and an associate research fellow, said the Rainbow: is doing his business background, but not so successful. However, in practice with his own sensibility and quest together into a management maxim. Which advise managers: must not exist, "the plot to fake, evil evil thoughts, ugliness of the act." Because the company is the epitome of entrepreneurial personality. The brand not only depend on entrepreneurs to create, but also on domestic enterprises to protect the soul.







Recommended links:



M4v file



flac to mp3 converter free



The World To Those Who Have Access



iphone video Format



Win XP Home Edition can INSTALL IIS



Infomation Cursors And Fonts



"Nobunaga's Ambition 13 Heaven" tells you what is most important unit



Silicon Valley Women difficult to seek higher



Storage Search Or Lookup TOOLS



Invoicing the concept of THE perfect model



Flash5 ActionScript Advanced Programming Guide (6)



FORMAT mkv



Details determine success or failure: Lean Production (4)



The Autonomy To Users



Tuesday, August 3, 2010

Deep antivirus Guide (2)


Step 3: Malicious Software Analysis

Control the spread of malicious software attacks, you must take the time to understand the nature of sudden and malicious software to perform more detailed analysis. Does not perform this step can increase the likelihood of re-infection; do not understand the work of malware will not be able to ensure that the system had been cleared and safe from future attacks.

Check the operating system elements
* Activities, processes and services.
* The local registry.
路 Microsoft? Windows? System files in the folder.
鈥?New user or group account with administrator privileges, especially the new user or group account.
* Shared folders (including hidden folders).
* File name but with a normal position in the new file exception.
* Open network ports.

Check the active processes and services
The system may be infected in their memory in the introduction of a new process. Process to help minimize the number of entries in the list and therefore help to identify any malicious processes, should be closed to all valid applications, and any effective back-office applications, such as Instant Messenger, e-mail monitor, or in memory of the third-party utility program.

If special tools are not available, you can use all Microsoft Windows systems Windows "Task Manager" tool to quickly check the active processes running on the system. However, due to "Task Manager" does not show the path to start the process of the image, it can not be determined as "svrhost" malicious software attacks start whether the legal process.

Complete the following steps to use the "Task Manager" of active processes:
1. While pressing Ctrl + Alt + Del pop-up "Windows Security" window and select "Task Manager." Note: In Windows 9x computer, you will see a running list of programs, rather than the "Task Manager" application.
2. Click the "process" tab.
3. Adjust Windows "Task Manager" window in order to screen the activities of the process as much as possible.
4. From the menu bar, select "View" option and click "Select columns ..."銆?br />5. Select the following check boxes:
路 PID (Process Identifier)
路 CPU usage
路 CPU time
* Memory usage
* Memory usage peak
路 I / O read
路 I / O write
6. Click "OK" and adjust the size of the window to show as many of these columns. You can click any column heading to sort the column. Each column of the list using the sort method and determine which process is using what resources. Note: To obtain a printout of the list for future reference, activate Process Explorer or the Windows "Task Manager" window and press the keyboard's Alt + Print Screen. Will be created on the computer's clipboard the list of screen shots, the snapshot can be pasted into Windows Paint application or Microsoft Word, and to print.

Blaster worm under the map will show the process details for the Microsoft Windows 2000? Server "Task Manager" in the activities of the process.



Figure 3 shows the activities of Blaster worm process, Windows 2000 Task Manager

Note: some of the malicious software may try to stop the "Task Manager" starts as a form of defense. This case, can Microsoft Windows? XP and Windows Server? 2003 computer using the Tasklist command line utility (or Windows 2000 computer using the TList command-line utility) generated can be copied to removable media, a simple text file list for further analysis. Use the following command line syntax generated list contains all active processes the text file: tasklist / v> TaskList.txt the command line in the current working directory, create a file named TaskList.txt.

Check the Startup folder
Malicious software can try to modify the system's Startup folder from the start line. Note: According to the analysis of the operating system, the exact path of these folders will be changed. The following information applies to running Windows XP, Windows Server 2003 or Windows 2000 operating system. Should check the startup files of the two regions. The first is the "All Users" folder, this folder can be found in the following default location: C: Documents and SettingsAll UsersStart Menu

The second area is the account currently logged on user profile path, check the system configuration files created on all accounts not just the currently logged on is very important. You will be C: Documents and Settings \ Start Menu to find the information, which is defined on the system checks the user's login ID.

Analysis of the local registry
Since the completion of the system registry is a large, complex data storage, so the recovery process after the completion of attack to create a copy of the entire system registry for detailed analysis will be of benefit.

All Windows versions contain the backup utility can be used for backup and restore entire registry. If you have regular backups using the backup disk, you can easily include in the backup registry. To use the backup application to backup the registry, please select the focus to be included in the backup drive, files and folders select "system state."

As the "system state" contains specific information and other system registry, so the size of these backup files may be hundreds of MB. Another option is to use all Windows versions with the Registry Editor utility. The utility is more suitable to generate a copy of the registry. Windows XP and Windows Server 2003 with two Registry Editor tool, Regedit.exe and command-line tool Reg.exe.

To use the Regedit generate a copy of the registry, please do the following:
1. Click "Start", "Run", type Regedit, then press Enter.
2. In the left pane, select the "My Computer" and then from the "File" menu, select "Export."
3. In the "File Name" box, type a copy of the registry file name and location.
4. In the "Export Range", click "All", then click "Save."

Highlights: As the disk will be exposed to malicious software, it must pay more attention to ensure an effective control method, before the disk will not be exposed to other systems.

Check malicious software and corrupted files
Most malicious software will modify the computer's hard drive to one or more files, and find the file may have been affected is a very difficult process. If the image created by the system, you can be infected system with the image created by the new system were compared.

If this option is not available, another to determine which files have been changed since the method is the introduction of malicious software system to change the first time all the files system-wide search. You can use the Windows search tool to search; the following screen shot shows how to use the "Search Results" pane of the advanced options narrow the search range of infected files.



Figure 4 "

Search results for "Advanced Options dialog box

According to the set options as shown, will be listed in the introduction of malicious software, the host of the date (for example, April 27, 2004) to create all the files. You can also create a subdirectory that contains the current directory and all files in the list of text files, it should be noted that the list may be a long list.

To create a directory and its subdirectories for all files in the list, please do the following:
1. Click "Start", "Run", type cmd, and then press Enter.
2. Change to the directory to record.
3. At the command prompt, type dir / s /-c / o:-d / t: c / q> FileList.txt, and then press Enter.

Implementation of the command in the current directory to create a text file named FileList.txt should copy the file to removable media for further analysis. Note: There are many other ways you can use other tools and scripts to create a similar list. However, this section is designed to help use the computer tools available to quickly gather information. If you have time to prepare a script that contains more advanced emergency response kit, use it instead of the process shown here.

Check user and group
Some malicious software on the system will attempt to assess the current user's privileges, or group with administrator privileges to add new a new account. Check the following exception settings:
* The old user accounts and groups.
* Not suitable for the user name.
* Invalid user membership of the group.
* Invalid user rights.
* The recently promoted to any user or group account privileges.
* Finally, make sure that all managers are effective team members.

Use Local Users and Groups Microsoft Management Console (MMC) snap-in check to the local Administrators group to set any exceptions. Should also check the local computer security logs for any unusual entries. For example, the "Account Management" category entry (such as event 636) direction has a new member to the local group. These logs will also provide you with the date and time change occurs.

Note: Although these articles describes Windows 2000, Windows 2003, but it is also relevant, because the same group did not change the basic default. However, Windows Server 2003 introduces additional default groups, such as network services and local services to special groups. Check the default system configuration for more information.

Check the shared folder
The other common symptoms of malicious software is to use the shared folder transmitted infections. Use Computer Management MMC snap-in, or through the command line using the NetShare command checks the infected system the state of the shared folder. The following table shows the Windows client and server, the default shared folders.

Note: By default, Windows 9x computers do not share files or folders, unless the file sharing is enabled. In addition, Windows 9x client does not "admin $" or the equivalent of hidden share; only those special shared folder or volume via the network to use (in some way stop the destruction of systems or to install some of the remote control software).

Table 1 Windows XP default folder sharing



Table 2 Windows Server 2003 and Windows 2000 Server default folder sharing

Check the open network ports
Many malware attacks attempt to weaken the system has been damaged for future attacks easier. A commonly used technique is to open the network port on the host malicious software, the attacker will then use these ports for the host of other routes. Finally, you can use Windows with the NetStat command-line utility records current network connections and listening ports in the state of the network. The tool can be used to obtain network connectivity and port status of the full printout.

Use network protocol analyzer
Network protocol analyzer tool can be used to create the infected host incoming and outgoing network traffic log data. Network trace file should be saved as part of the information file set for further analysis.

Check the system event log and export
Can use the Windows system event log identified a variety of abnormal behavior (malicious software can be used to identify the changes and the change of time). Use Event Viewer Management Console to each type of event log files (application, security and system) saved to removable media for further analysis. By default, these files are stored in C: WinntSystem32Config directory, and are known as AppEvent.evt, SecEvent.evt and SysEvent.evt. However, when the system is active, these files will be locked, so you should use the Event Viewer management tools to export.

The following tips provide information on how to use these logs to help determine the impact of malicious software attacks information:
* Find the suspected attack of any changes.
* The event log file creation and modification time and the time to compare.
* Look suspicious invasion to create an account or change the password.

Malware analysis process in the end, can be considered malicious software, according to the nature of re-connecting isolated networks. For example, if the analysis only through special peer (P2P) application, determine the spread of malicious software, then change the external firewall filters to block the application uses the network to restore the fracture network and other services. The patch will enable organizations to resume carrying out the system returns to a normal level of communication.






相关链接:



Auto Attendant Computer operator



Proficient in CSS filter (2)



Simple AUTOMATION Tools



Additional team bonus, energy Stimulate team



Science - Screen Savers Expert



Avc-free



convert mkv



China Unicom to introduce iPhone would be wasted



Why is throwing money at very odd tiger VC Zhou Hongyi Good "Fudge"?



Dell Shipped the wrong price is not the defendant of fraud: frozen funds



wma converter



Create Servlet Filter Wizard



On the open source Jetty SERVLET Container



Mov To Avi Converter Free



Catalogs Audio And Multimedia



Monday, July 12, 2010

YouTube expected profit model


Sept. 8 news YouTube, despite the establishment of only 19 months, but has become the darling of the Internet video site. The video has reached 100 million, YouTube's success attracted other new startups and giant jealous, Microsoft entered the video sharing market, launched its own service; this summer, SKYPE and KAZAA also introduced a Venice project to become a YouTube killer.

In this hectic situation, people seem to forget that so far the video sharing is still a high investment, low profit, non-profit business. YouTube plans to launch a new business model, each user can put their own video content. It should create their own advertising, and plans to spread through the Googel and Yahoo.

YouTube monthly inputs from 900,000 to 1,500,000 U.S. dollars, most of the inputs to the server provider and broadband provider in the hands. As the YouTube video piracy issues are being addressed, if faced with legal proceedings, the cost will be higher.

More importantly, it faces a difficult problem, how to achieve profitability? YouTube can make money from this growth, while maintaining the user can expand. If the introduction of advertising, the user can be alienating. Given this risk, YouTube founders Chad Hurley and Steve Chen of the advertising business is not eager to implement. In a two or three minutes of video in the tentative 30-second commercials running. YouTube in the development of a new model that allows advertisers to establish a video channel, or to place the home page of YouTube video content.

To open up new channels for advertising, logically possible, but in this competitive environment, how to seek avenues of cooperation? YouTube, Warner Brothers introduced the first branded channels, and promotion of new Paris Hilton CD. But for those who are not content businesses, another method is to build a theme-based management of channels. Or YouTube through technical means and in accordance with the user's browsing interest ads.

Another problem is that, YouTube does not help advertisers achieve the best video content. Gartner analyst Allen Weiner said institutions, YouTube could create separate channels to provide more professional video content.

So far, YouTube executives have been no positive stand on the advertising business. Company wants users to pirated content can automatically filter, for advertisers to establish a creative Fang Shi for community also faces great challenges, such as the film festival or to fund video competitions.

YouTube, a good beginning, but a new generation of mainstream sites and new start-ups than before, its impossible to have too much time to get into video services, real money.






Recommand Link:



Merry DVD-Audio CDA M4P to WAV Burner



vob To mkv



Bluesea DVD to WMV RM



New WEB Development



Mkv



Happiness DVD to DivX



.vob



New Text Or Document Editors



YOUTUBE FLV to EPOC Shareware



Bliss Audio WMA To Midi Burner



DVD to MP4 Converter



Vob Format



YOUTUBE Movie to VOB Mixer



Christmasgift Mobile Converter