Thursday, August 5, 2010

3 min Jin: "Germany" moves of the



Rush is the surface force, the real contest of it is wisdom. This wisdom has come from human resources, "integration."

In 771 BC, King Ping of Zhou Moving Eastward, the Spring and Autumn era; to 403 BC, three points in Shanxi, the Warring States era; and then to 221 BC, the Qin unification in 450 years time, the decline of the emperor, princes hegemony , doctor good at the political, Pei Chen country life enforcement. From top to bottom, inside and out, among dozens of countries, countries between the different political and economic blocs, one after another and endless campaign thousands of times ... ... "no just war", said that Spring and Autumn Period The war between the belligerents does not matter just and unjust, to see who has a real competitive!

Rush is the surface force behind the overall strength ratio is. This one has a very important factor at work, that is, "wisdom." The real contest between the various interest groups is that wisdom is the wisdom of leaders is wisdom among the leadership team. This wisdom has come from where? From the "talent", is the human resources by "integrated."

"Germany" "only" identified

"Mirror" the first big case, "the three sub-Jin", the Sima Guang in detailing Zhao, Wei, Han strength of the concrete process of growth, we see that the "wisdom" - "talent" is the key. Since competition depends on the talent, what is the "talent" on the need for clear definition of what kind of "talent", there should be a standard scale. So he said, some very well-known but often and help us continue to be used to pondering the words:

"Husband only differences with Germany, while the secular Mo it can distinguish, through that of Yin, the loss of their so people." Sima Guang OK "before" and "virtue" is completely different, if these two confused, collectively referred to as "wise men", you employer will surely mistakes. He said: "The only virtues of the capital also; Germany who also was the commander." But only Germany can count on the resources, Germany is the commander in chief. He further explained that "it" refers to such a person: smart, insight, strength, perseverance; "Tak" means such a person: integrity, fairness, tolerance, peace. A person "talent with all do, that the 'sage'; virtuous and death, that of 'fool'; Ruby before, that the 'gentleman'; only wins German, that the 'villain'." While employing the technique that is "standard", that is: "Gou no saint, but taken from a gentleman; its too bad people do not have to fool if." can not find the sage, then use the gentleman's right; its use of the villain, as with the fool. Competence as a gentleman would be used in the right path, villains will stop at no evil with competence; fool even want to do evil, but the wisdom and strength numerous bad.

In this world, the challenge is in the saints, gentleman, villain, fool, not the head tattooed, clear boundaries, often temporary or is for some time, and even life are difficult to distinguish and identify them completely. Sima Guang also special analysis of the situation, it is because "Germany" on the request of this stuff is very high, and "only" this thing makes one look like. So the "virtue" often respected, but people get an arm's length; a "talent" who liked and loved person on the natural full-time on the easy-to specially trusted. But since ancient times, until the time or the country breaking, or at home defeated, it was found that the chaotic state minister, home of the lost son, is "more than before but less than Germany," the people. So Sima Guang said with emphasis that statement the last sentence: If the country were able to carefully examine household management "talent of Separation" and "know what to have", then do not worry about losing talents!

"The three sub-Jin" incident, temporarily width of the background of that time, the direct origin from the occurrence, to show the results of the consequences of a complete process, we can see that: in the history of this experience at least two decades and three generations. It can be seen, in reality, a leader of the eyes to be able to know the real "talent", is no easy task! "Mirror" put the essence of this case are concentrated to show to us.

Not the same as the "successor"

Spring and Autumn Period, there is wisdom Jin, Zhao, Han, Wei Four Powerful family.

Chi house Zhao Zhi Xuan Son, and the Zhao Jianzi into consideration both before and after the time his successor.

Zhi Xuan Son to Chile in the various schools identified as the successor of Yao. But the tribe, said Chilean fruit: he as Chi Xiao. Chi Yao has strengths beyond the five others, there is a shortcoming. Strengths are: the first looks, the second good at riding and shooting, talent, wealth and the third, fourth eloquent, resolute and decisive fifth. The only shortcoming is the intention heartless. If he is using his strength to subdue five other people and do things without virtue, who can get along with him then? "If Yao has established, intellectual case will be destroyed!" If the legislature Chi Yao, clan will be destroyed. So it is difficult to listen to, and therefore not listen to Zhi Xuan Son. Chilean fruit then the name is changed, from the clan, to avoid trouble later.

Zhao Jianzi has two sons, a big name Golubeva, called non-small shirt. Zhao Jianzi to establish successor. Li who? Then look at it. One day, he admonished the family everyday words were written on two bamboo, and to two sons, asked, said: "do well to remember ah!" After three years, he suddenly asked his two sons, rupah entirely to not up, and even bamboo do not know where to go throw; free shirt out of it in verse to memorize, but also immediately removed from the sleeve bamboo offer. Did not say, and Zhao Jianzi that no shirt that children "Yin"! To make him heir.

Zhi Xuan Son's death, Chi Chi Yao Xiang Zi is ruled a. In his eyes, not look down on Han, Zhao, Wei various Bureaucrats, a feast, the banquet will random fun of insulting other people, also reminded him of the retainer, said: "nobody would dare to make trouble!" Retainer hastened to tell him : "You can be wrong with these words. ancient books, said one triple again to make mistakes, cemented the hatred from time in the open ah, so a preventive measure. Gentleman to deal cautiously because small things can, will not lead to great evil of. "Zhi Yao with the dead father, Remonstrance made a few words would not listen to, then it is blatant. His request to the Han Kangzi territory, Han consideration, in order to retreat, to the; He also demanded territory Wei Huan Zi, Weijiade to retreat, but also to the; last he Zhaoxiang Zi, is the main point has been Zhao government request without shirt territory, immediately met with Zhao Xiangzi's flatly refused! Chi Yao rage, he set from the Han, Wei 2 to attack Zhao. So Zhao Xiangzi ready to flee, and asked its: "I go?" Under the proposal he went to the eldest son of the city, or go to the city of Handan. Zhao Xiangzi then said: "No. The former, people just completing city, exhausted; the latter has just recruited the people filling the food storage, they now have to go to flame wars, who would, and I concentric enemy too! "In the end, no shirt thought his father had told him before his death: experience of crisis, must not hold anything against this person Duo Yin-status, must not hold anything against Jinyang that place a long way, and went to go over there, that destination. School year because Zhao Jianzi Yin Duo to control Jinyang, the Yin Duo asked Jane Son: "You let me go to painstaking to plunder the wealth, or whether I soothing retreat for the future?" Jane said, of course, the latter child. So Yin Duo to Jinyang, then the residents of a small number of households considered ways to alleviate the people's taxes. No shirt on under very confident: "We defected Jinyang it. It was the first master of the old site, Yin Duo has to be generous people, they certainly can and we all shared the." So went the Jinyang.

Although Chi Yao kill to Jinyang, and cited pour City, the city people's cookstoves are bubble collapsed, people are still loyal Zhaoxiang Zi, vow to fight to the death. When Chi Yao proudly said: "Now I know how perished in the water," Wei Huan Zi and Han Kangzi immediately touched each other. Zhi Yao Wei retainer told masters, the two Koreas, unreliable, certainly rebel. Chi Yao carers said these words lightly on to the Wei Huan Zi and Han Kangzi, Wei, Han retorted: "people who speak these words must divide the villain, we stood fast How could hand the land should not it?" This perfunctory the past. And Zhao Xiangzi later was sent to persuade Wei, South Korea, to announce the "same boat," the truth, then, killed three Fandao combined wisdom Yao, Jinmie his family. Chilean fruit had only a result of a change of surname and spared.

Sima Guang wrote: Chi Yao's demise is that he was "only little more than moral." With a skill really empty! And Zhao Xiangzi because his father did not stand Gegelubo as heir, despite his five sons, but refused to set up as a successor, but has established rupah son, grandson to Zhao's successor.

Zhao Xiangzi no shirt death, Zhao has been civil strife, but the tribe-insurgency efforts, and meet established Zhao Xiangzi designated successor. The heir born to the son of Zhao Ji, was the grandson of the Weiss and Wei Huan Zi, Han Qian Han Kangzai grandson King Weilie with the packet by the week, was promoted to princes.

The soul of the brand to rely on to protect

Clearly, what kind of talent by selecting the "successor" to this topic, Sima Guang show their preference. That is: In the last who must be "generous", "love the people." This may be in contradiction with the interests of the moment, but "generous", "loving" is still the highest leaders defend "virtue" of "this." Duo Yun Zhao Jianzi then sent to Jinyang, if we just raise Zhao's "income" and "profit" to identify whether the increased competitive strength, then, Yin Duo bound to increase taxes, take this as "operating results" and thereby Zhao Jianzi also think they have been sitting on strength. But this monarch and his subjects both had not done so. Years later, Zhao was no shirt caught in distress, it is Zhao Jianzi, Yin Duo "generosity" of the old site, to save the day in the swing of his land. Zhao free shirt from the words and deeds of his father also unconsciously accept the "law-abiding," the character, the final position of the heir to another trying to come to a Gegelubo's name, so that future generations continue rupah ruled. Zhao died without shirt to do so would not know what the consequences, however, the behavior of others have put a little look in his eyes. Once the countries are in trouble, the Serbs would stand up and his legacy, exterminate political disorder who return to his values. Because they believe: Zhao No shirt, "generosity", his choice would not be wrong. In contrast Chi Yao, a so-called talent, is not clever, not real life "kind", arrogant arrogant, calculating people, but others were calculated. Using today's words: This person, lacking!

Chongqing Contemporary System science and an associate research fellow, said the Rainbow: is doing his business background, but not so successful. However, in practice with his own sensibility and quest together into a management maxim. Which advise managers: must not exist, "the plot to fake, evil evil thoughts, ugliness of the act." Because the company is the epitome of entrepreneurial personality. The brand not only depend on entrepreneurs to create, but also on domestic enterprises to protect the soul.







Recommended links:



M4v file



flac to mp3 converter free



The World To Those Who Have Access



iphone video Format



Win XP Home Edition can INSTALL IIS



Infomation Cursors And Fonts



"Nobunaga's Ambition 13 Heaven" tells you what is most important unit



Silicon Valley Women difficult to seek higher



Storage Search Or Lookup TOOLS



Invoicing the concept of THE perfect model



Flash5 ActionScript Advanced Programming Guide (6)



FORMAT mkv



Details determine success or failure: Lean Production (4)



The Autonomy To Users



Tuesday, August 3, 2010

Deep antivirus Guide (2)


Step 3: Malicious Software Analysis

Control the spread of malicious software attacks, you must take the time to understand the nature of sudden and malicious software to perform more detailed analysis. Does not perform this step can increase the likelihood of re-infection; do not understand the work of malware will not be able to ensure that the system had been cleared and safe from future attacks.

Check the operating system elements
* Activities, processes and services.
* The local registry.
路 Microsoft? Windows? System files in the folder.
鈥?New user or group account with administrator privileges, especially the new user or group account.
* Shared folders (including hidden folders).
* File name but with a normal position in the new file exception.
* Open network ports.

Check the active processes and services
The system may be infected in their memory in the introduction of a new process. Process to help minimize the number of entries in the list and therefore help to identify any malicious processes, should be closed to all valid applications, and any effective back-office applications, such as Instant Messenger, e-mail monitor, or in memory of the third-party utility program.

If special tools are not available, you can use all Microsoft Windows systems Windows "Task Manager" tool to quickly check the active processes running on the system. However, due to "Task Manager" does not show the path to start the process of the image, it can not be determined as "svrhost" malicious software attacks start whether the legal process.

Complete the following steps to use the "Task Manager" of active processes:
1. While pressing Ctrl + Alt + Del pop-up "Windows Security" window and select "Task Manager." Note: In Windows 9x computer, you will see a running list of programs, rather than the "Task Manager" application.
2. Click the "process" tab.
3. Adjust Windows "Task Manager" window in order to screen the activities of the process as much as possible.
4. From the menu bar, select "View" option and click "Select columns ..."銆?br />5. Select the following check boxes:
路 PID (Process Identifier)
路 CPU usage
路 CPU time
* Memory usage
* Memory usage peak
路 I / O read
路 I / O write
6. Click "OK" and adjust the size of the window to show as many of these columns. You can click any column heading to sort the column. Each column of the list using the sort method and determine which process is using what resources. Note: To obtain a printout of the list for future reference, activate Process Explorer or the Windows "Task Manager" window and press the keyboard's Alt + Print Screen. Will be created on the computer's clipboard the list of screen shots, the snapshot can be pasted into Windows Paint application or Microsoft Word, and to print.

Blaster worm under the map will show the process details for the Microsoft Windows 2000? Server "Task Manager" in the activities of the process.



Figure 3 shows the activities of Blaster worm process, Windows 2000 Task Manager

Note: some of the malicious software may try to stop the "Task Manager" starts as a form of defense. This case, can Microsoft Windows? XP and Windows Server? 2003 computer using the Tasklist command line utility (or Windows 2000 computer using the TList command-line utility) generated can be copied to removable media, a simple text file list for further analysis. Use the following command line syntax generated list contains all active processes the text file: tasklist / v> TaskList.txt the command line in the current working directory, create a file named TaskList.txt.

Check the Startup folder
Malicious software can try to modify the system's Startup folder from the start line. Note: According to the analysis of the operating system, the exact path of these folders will be changed. The following information applies to running Windows XP, Windows Server 2003 or Windows 2000 operating system. Should check the startup files of the two regions. The first is the "All Users" folder, this folder can be found in the following default location: C: Documents and SettingsAll UsersStart Menu

The second area is the account currently logged on user profile path, check the system configuration files created on all accounts not just the currently logged on is very important. You will be C: Documents and Settings \ Start Menu to find the information, which is defined on the system checks the user's login ID.

Analysis of the local registry
Since the completion of the system registry is a large, complex data storage, so the recovery process after the completion of attack to create a copy of the entire system registry for detailed analysis will be of benefit.

All Windows versions contain the backup utility can be used for backup and restore entire registry. If you have regular backups using the backup disk, you can easily include in the backup registry. To use the backup application to backup the registry, please select the focus to be included in the backup drive, files and folders select "system state."

As the "system state" contains specific information and other system registry, so the size of these backup files may be hundreds of MB. Another option is to use all Windows versions with the Registry Editor utility. The utility is more suitable to generate a copy of the registry. Windows XP and Windows Server 2003 with two Registry Editor tool, Regedit.exe and command-line tool Reg.exe.

To use the Regedit generate a copy of the registry, please do the following:
1. Click "Start", "Run", type Regedit, then press Enter.
2. In the left pane, select the "My Computer" and then from the "File" menu, select "Export."
3. In the "File Name" box, type a copy of the registry file name and location.
4. In the "Export Range", click "All", then click "Save."

Highlights: As the disk will be exposed to malicious software, it must pay more attention to ensure an effective control method, before the disk will not be exposed to other systems.

Check malicious software and corrupted files
Most malicious software will modify the computer's hard drive to one or more files, and find the file may have been affected is a very difficult process. If the image created by the system, you can be infected system with the image created by the new system were compared.

If this option is not available, another to determine which files have been changed since the method is the introduction of malicious software system to change the first time all the files system-wide search. You can use the Windows search tool to search; the following screen shot shows how to use the "Search Results" pane of the advanced options narrow the search range of infected files.



Figure 4 "

Search results for "Advanced Options dialog box

According to the set options as shown, will be listed in the introduction of malicious software, the host of the date (for example, April 27, 2004) to create all the files. You can also create a subdirectory that contains the current directory and all files in the list of text files, it should be noted that the list may be a long list.

To create a directory and its subdirectories for all files in the list, please do the following:
1. Click "Start", "Run", type cmd, and then press Enter.
2. Change to the directory to record.
3. At the command prompt, type dir / s /-c / o:-d / t: c / q> FileList.txt, and then press Enter.

Implementation of the command in the current directory to create a text file named FileList.txt should copy the file to removable media for further analysis. Note: There are many other ways you can use other tools and scripts to create a similar list. However, this section is designed to help use the computer tools available to quickly gather information. If you have time to prepare a script that contains more advanced emergency response kit, use it instead of the process shown here.

Check user and group
Some malicious software on the system will attempt to assess the current user's privileges, or group with administrator privileges to add new a new account. Check the following exception settings:
* The old user accounts and groups.
* Not suitable for the user name.
* Invalid user membership of the group.
* Invalid user rights.
* The recently promoted to any user or group account privileges.
* Finally, make sure that all managers are effective team members.

Use Local Users and Groups Microsoft Management Console (MMC) snap-in check to the local Administrators group to set any exceptions. Should also check the local computer security logs for any unusual entries. For example, the "Account Management" category entry (such as event 636) direction has a new member to the local group. These logs will also provide you with the date and time change occurs.

Note: Although these articles describes Windows 2000, Windows 2003, but it is also relevant, because the same group did not change the basic default. However, Windows Server 2003 introduces additional default groups, such as network services and local services to special groups. Check the default system configuration for more information.

Check the shared folder
The other common symptoms of malicious software is to use the shared folder transmitted infections. Use Computer Management MMC snap-in, or through the command line using the NetShare command checks the infected system the state of the shared folder. The following table shows the Windows client and server, the default shared folders.

Note: By default, Windows 9x computers do not share files or folders, unless the file sharing is enabled. In addition, Windows 9x client does not "admin $" or the equivalent of hidden share; only those special shared folder or volume via the network to use (in some way stop the destruction of systems or to install some of the remote control software).

Table 1 Windows XP default folder sharing



Table 2 Windows Server 2003 and Windows 2000 Server default folder sharing

Check the open network ports
Many malware attacks attempt to weaken the system has been damaged for future attacks easier. A commonly used technique is to open the network port on the host malicious software, the attacker will then use these ports for the host of other routes. Finally, you can use Windows with the NetStat command-line utility records current network connections and listening ports in the state of the network. The tool can be used to obtain network connectivity and port status of the full printout.

Use network protocol analyzer
Network protocol analyzer tool can be used to create the infected host incoming and outgoing network traffic log data. Network trace file should be saved as part of the information file set for further analysis.

Check the system event log and export
Can use the Windows system event log identified a variety of abnormal behavior (malicious software can be used to identify the changes and the change of time). Use Event Viewer Management Console to each type of event log files (application, security and system) saved to removable media for further analysis. By default, these files are stored in C: WinntSystem32Config directory, and are known as AppEvent.evt, SecEvent.evt and SysEvent.evt. However, when the system is active, these files will be locked, so you should use the Event Viewer management tools to export.

The following tips provide information on how to use these logs to help determine the impact of malicious software attacks information:
* Find the suspected attack of any changes.
* The event log file creation and modification time and the time to compare.
* Look suspicious invasion to create an account or change the password.

Malware analysis process in the end, can be considered malicious software, according to the nature of re-connecting isolated networks. For example, if the analysis only through special peer (P2P) application, determine the spread of malicious software, then change the external firewall filters to block the application uses the network to restore the fracture network and other services. The patch will enable organizations to resume carrying out the system returns to a normal level of communication.






相关链接:



Auto Attendant Computer operator



Proficient in CSS filter (2)



Simple AUTOMATION Tools



Additional team bonus, energy Stimulate team



Science - Screen Savers Expert



Avc-free



convert mkv



China Unicom to introduce iPhone would be wasted



Why is throwing money at very odd tiger VC Zhou Hongyi Good "Fudge"?



Dell Shipped the wrong price is not the defendant of fraud: frozen funds



wma converter



Create Servlet Filter Wizard



On the open source Jetty SERVLET Container



Mov To Avi Converter Free



Catalogs Audio And Multimedia