Tuesday, October 26, 2010

Intrusion Detection Terminology Keys




With the IDS (Intrusion Detection System) is speeding the development of the terminology associated with the rapid evolution of the same. This technology to share with you some IDS terminology, some of which are very basic and relatively common, while others are some uncommon. As the rapid development and a number of IDS IDS manufacturer's market power, different manufacturers may use the same terminology that different meanings, leading to the precise meaning of certain terms out of whack. Therefore, the paper will try to include all the terms are entered.

Alerts (alert)

When an intrusion is occurring, or attempts occurred, IDS alert information system will issue a notification system administrator. If the console with the IDS system with one machine, alert information will be displayed on the monitor may also be accompanied by voice prompts. If the remote console, then the alert will be built into the system through the IDS method (usually encrypted), SNMP (Simple Network Management Protocol, is usually not encrypted), email, SMS (short message) or more of several methods of mixed mode delivery to the administrator.

Anomaly (anomaly)

When there is an event with a signal to match known attacks, most IDS will alarm. One based on anomaly (anomaly) of the IDS activity will then construct a rough outline of the host or network, when there is a profile in this time of the incident outside, IDS will alarm, such as it was done he had not done before the When, for example, a user suddenly get the administrator or root directory permissions. Some IDS vendors as heuristic function this way, but a heuristic IDS should judge their reasoning has more intelligence.

Appliance (IDS hardware)

In addition to those existing systems to be installed up the IDS software, the shelves in the market can also buy a number of existing IDS hardware, just that they can access the network application. Some of the available IDS hardware including CaptIO, Cisco Secure IDS, OpenSnort, Dragon and SecureNetPro.

ArachNIDS

ArachNIDS developed by Max Visi an attack signature database, it is updated dynamically, for a variety of network-based intrusion detection system, and its URL address http://www.whitehats.com/ids/.

ARIS: Attack Registry & Intelligence Service (Registration and intelligence service attacks)

SecurityFocus ARIS is provided an additional service that allows users to anonymously connect to the Internet network to the SecurityFocus submitted to the network security incidents, then the data will SecurityFocus and many other participants in the data, which eventually form a detailed network safety statistical analysis and trend forecasting, publishing on the web. It's URL address http://aris.securityfocus.com/.

Attacks (Attack)

Attacks can be understood as an attempt to infiltrate the system or bypass the system security policy, to obtain the information, modify information, and destroy the target network or system functional behavior. The following lists the IDS can detect the most common types of Internet attacks:

鈼?attack type 1-DOS (Denial Of Service attack, denial of service attacks): DOS attack is not a means to destroy a system by hackers, security, it is only paralyze the system, the system refused to provide services to its users. The categories include buffer overflows, by flood (flooding) run out of system resources and so on.

鈼?attack type 2-DDOS (Distributed Denial of Service, Distributed Denial of Service attack): a standard DOS attacks use a lot of data from a host to attack a remote host, but can not send enough packets to achieve the desired The results, thus gave rise to DDOS, or distributed from the host over a target to attack, run out of the remote system's resources, or failure to connect.

鈼?attack type 3-Smurf: This is an old-style attack, but also occur when an attacker use the target's camouflage the source address of broadcast address to the implementation of a smurf amplifier ping operation, then all activities will be to target the host response to interrupt the network connection. Here are 10 smurf amplifier reference URLhttp: / / www.powertech.no/smurf/.

鈼?attack type 4-Trojans (Trojan): Trojan attacks on the term comes from the ancient Greeks used the Trojan Trojans, Trojans, in the possession of the Greek soldiers, when the Trojans arrived in the city, the soldiers on the Trojans to the city and its emission Residents attack. In computer terminology, it refers to those who had the form of legal process, in fact, those who harbor malicious software software. Thus, when the user runs the legal program, in unknowingly, malicious software was installed. However, because the majority of this form of malicious programs are installed remote control tool, Trojan quickly evolved into the term refers specifically to such tools, such as BackOrifice, SubSeven, NetBus, etc..

Automated Response (automated response)

In addition to sound the alarm on the attack, some IDS can automatically defend against these attacks. There are many ways to resist: First of all, you can re-configure the router and firewall, reject that information flow from the same address; secondly, by sending reset packets off the network connection. But it both ways have problems, an attacker can in turn use to re-configure the device, the method is: by posing as a friendly address to attack and then IDS will configure routers and firewalls to reject these addresses, so was actually "own people" refuse service. Send a reset packet method requires an active network interface, so it will be placed under attack, a remedy is: to make activities within the network interface in the firewall, or use special contracting procedures to avoid the standard IP stack needs .
CERT (Computer Emergency Response Team, Computer Emergency Response Team)

The term is reflected by the first computer emergency response team selection, the team at Carnegie Mellon University to establish their computer security incident response, take action. Many organizations now have a CERT, for example CNCERT / CC (Computer Network Emergency Coordinator in China center). Because some lack of clarity in the word emergency, many organizations use the term Incident to replace it, creating new words Computer Incident Response Team (CIRT), the computer incident response team. response handling the word is sometimes used instead, which means that emergency response action, rather than long-term research.

CIDF (Common Intrusion Detection Framework; common intrusion detection framework)

CIDF trying to standardize some extent, the intrusion detection, developed a number of protocols and application program interface, so that between the intrusion detection research projects can share information and resources, and intrusion detection components can also be reused in other systems. CIDF the URL address is http://www.isi.edu/gost/cidf/.

CIRT (Computer Incident Response Team, Computer Incident Response Team)

CIRT is evolved from the CERT, CIRT represents a security incident in the philosophy of understanding change. CERT was originally a computer specifically for a particular emergency situation, but in terms CIRT incident indicates that not all incidents are necessarily emergencies, and all emergencies can be seen as incidents.

CISL (Common Intrusion Specification Language, Common Intrusion Specification Language)

CISL is CIDF between the components communicate with each other's language. As the agreement is CIDF and interface standardization attempts, so that intrusion detection CISL research attempts to standardize the language.
CVE (Common Vulnerabilities and Exposures, Common Vulnerabilities and Exposures)

On the vulnerability of an old problem is in the design of scanner or coping strategies, different manufacturers on the vulnerability of the title will be completely different. There are some loopholes in the definition of a Chamber of Commerce produced a variety of features and applications to their IDS systems, thus giving a false impression, as if their products more effective. MITRE created CVE, will be standardized vulnerability names, participating manufacturers also logical development of IDS products in accordance with this standard. CVE's URL address is http://cve.mitre.org/.

Crafting Packets (custom data packets)

Create custom packets, you can avoid the usual requirement of some data packet structure, thereby creating a data packet to deceive, or makes the computer receiving it I do not know how to handle it. Create a custom packet program available Nemesis, its URL address is http://jeff.chi.wwti.com/nemesis/.

Desynchronization (synchronization failure)

desynchronization The term originally refers to the sequence number of ways to evade IDS. Some IDS might expect it would have confused the serial number, which will lead to re-construct the data. This technology is very popular in 1998, is now obsolete, and some articles to desynchronization this term to mean other IDS evasion method.

Eleet

When hackers write vulnerability development process, they often leave a signature, one of the most notorious one is the elite. If eleet into digital, it is 31,337, and when it refers to their ability, elite = eleet, said the elite. 31337 is often used as a port number or serial number. Popular word "skillz".

Enumeration (list)

After passive research and social engineering work, the attacker will begin to list on network resources. List is the active exploration of a network attacker to found what is and what can be made use of. As the present action is no longer a passive, it is likely to be detected. Of course, in order to avoid being detected, they will quietly as possible.

Evasion (dodge)

Evasion is to launch an attack without being detected by IDS successfully. The trick is to let them see only one aspect of the IDS, but the actual attack is another target, the so-called out at large, stealing a march. Evasion of a form is set up for different packets different TTL (effective time) value, so the information through the IDS looks like a harmless, innocuous information bits in the TTL to reach the target host the Bi TTL needs to be short. Once through the IDS and close, friendly part will be lost, leaving only harmful.

Exploits (exploits)

For each vulnerability, have exploited this vulnerability to attack mechanism. In order to attack the system, the attacker exploits the preparation of a code or textbook.

Will exist for each vulnerability exploit the implementation of the mode of attack, this method is the Exploit. In order to attack systems, hackers will write exploits.

Vulnerability used: Zero Day Exploit (zero-day exploits)

Zero-day exploits is not yet understood and is still running amok exploits, that this type of vulnerability has not been found using the current. Once a vulnerability found in use by the network security community, and soon there will be a patch for it, and write the characteristics of IDS identification information, to make use of this loophole is invalid, and effectively capture it.

False Negatives (omitted)

Omission is not an IDS to detect attacks or analysts considered harmless.

False Positives (false positives)

False positive is the actual sound of the issue has been detected as IDS attacks.

Firewalls (Firewall)

Network security firewall is the first hurdle, although it is not IDS, but the firewall logs can provide valuable information for the IDS. The principle is based on the work firewall rules or standards, such as source address, port, etc., will block out dangerous connection.

FIRST (Forum of Incident Response and Security Teams, Incident Response and Security Team Forum)

FIRST is an international government and private organizations together to exchange information and coordinate response actions Alliance, the annual FIRST be a high priority, and its URL address is http://www.first.org/.

Fragmentation (fragment)

If a packet was too large to load, it had to be divided into pieces. Slice based on the network MTU (Maximum Transmission Units, the maximum transmission unit). For example, the tablets ring (token ring) the MTU is 4464, Ethernet (Ethernet) the MTU is 1500, so if a packet from the tablets were transferred to the Ethernet ring network, it will be split into smaller fragment, and then rebuild at the destination. While this deal will result in reduced efficiency, but the effect of fragmentation is still very good. Hackers will slice as a way to evade IDS, and there are some DOS attacks are also used Segmentation.

Heuristics (inspiration)

Heuristics refers to the use of intrusion detection in AI (artificial intelligence, artificial intelligence) thinking. IDS actually use heuristic theory has emerged about 10 years, but they are not enough "smart", an attacker can make it through the training of it and ignore those malicious information flow. Some IDS uses to detect abnormal pattern of invasion, such IDS must be constantly learning what is normal for the event. Some producers think this is very "smart" IDS, so they will be seen as heuristic IDS. But in fact, the real application of AI technology to the analysis of input data is also very little IDS.

Honeynet Project (Honeynet Project)

Honeynet is a learning tool, is a security flaw in the network contains. When it is under security threat, the invasion of information will be captured and accepted analysis, so that hackers can learn some things. Honeynet is a professional organization of more than 30 security members, dedicated to the understanding of hacker groups using the tools, tactics and motives as well as share their knowledge of the project. They have established a series of honeypots, provides a seemingly vulnerable Honeynet network, observe the intrusion into the hacking of these systems to study the hacker tactics, motivation and behavior.

Honeypot (Honey Pot)

Honeypot is a system that contains the vulnerability, which simulates one or more of vulnerable hosts, to provide an easy hacker targets. Since honeypots have no other tasks to be done, all connection attempts should be regarded as suspicious. Another use of honeypots is their real goal to delay the attacker attacks allow an attacker to waste time on the honeypot. At the same time, the initial targets are protected, the real value of the content will not be violated.

Honey Pot is one of the original purpose of gathering evidence for the prosecution of malicious hackers, it looks like there are "trapped" feeling. However, in some countries can not use honeypots to collect evidence to prosecute hackers.
IDS Categories (IDS category)

There are many different types of IDS, the following breakdown:

鈼?IDS Category 1-Application IDS (Application IDS): IDS application for some special applications found invasion of the signal, these applications usually refers to the more vulnerable applications such as Web servers, databases and so on. There are many original focus on the operating system host-based IDS, although not for the default application, but can also be trained, used in applications. For example, KSE (a host-based IDS) can tell us in the event log is doing, including the event log report on the application's output. An example of an application IDS is Entercept's Web Server Edition.

鈼?IDS Category 2-Consoles IDS (console IDS): In order to apply collaborative environment IDS, distributed IDS agents need to report information to the center console. Now many of the center console can also receive data from other sources, such as other producers of the IDS, firewalls, routers. The integration of these information can be presented a more complete picture of the attack. Some of the console will also add their own signatures to the agency-level console, and provide remote management capabilities. This IDS product has Intellitactics Network Security Monitor and Open Esecurity Platform.

鈼?IDS Category 3-File Integrity Checkers (File Integrity Checker): When a system's threat of attack, it often will change some of the key files to provide continued access and prevent detection. Additional information for the key documents through summaries (encrypted hash), you can periodically check the file to see if they are to be changed, thus providing a guarantee to some extent. Once such a change is detected, the integrity checker will issue a warning. Moreover, when a system already under attack, the system administrator can also use the same method to determine the extent of the system at risk. File Checker before the incident occurred after a long time to come out to intrusion detection is "hindsight", the recent number of products can be accessed in the document, while on inspection, can be seen as a real-time IDS products. Such products are Tripwire and Intact.

鈼?IDS Category 4-Honeypots (honeypots): on the honeypot, as already introduced. Examples of honeypot Mantrap and Sting.

鈼?IDS Category 5-Host-based IDS (host-based IDS): IDS on multiple sources of such systems and event log monitoring, suspicious activity. Host-based IDS, also known as host IDS, the most suitable for detection of internal staff who can be trusted and have to avoid misuse of the traditional testing methods to infiltrate the network activities. In addition to the completion of a similar event log reader function, host IDS is also on the "event / log / time" for signature analysis. Many products also contain heuristic function. Host IDS for almost real-time work, the system errors can be quickly detected, technicians and security people are very like it. Now, host-based IDS is that based on server / workstation all types of host intrusion detection system. Such products include Kane Secure Enterprise and Dragon Squire.

鈼?IDS Category 6-Hybrid IDS (Hybrid IDS): The structure of modern switched network intrusion detection operation to bring some problems. First, the default state in exchange for network card in promiscuous mode does not allow the work, which makes the installation of traditional network IDS is very difficult. Second, the high speed of the network means that many packets will be discarded by NIDS. Hybrid IDS (Hybrid IDS) is a program to solve these problems, it will raise a level of IDS, a combination of network node IDS and Host IDS (host IDS). Although the coverage of this solution greatly, but taking into account the resulting huge amount of data and costs. Many network servers only critical to retain mixed-IDS. Some manufacturers to complete more than one task are called IDS Hybrid IDS, in fact it is only for advertising effects. Hybrid IDS products CentraxICE and RealSecure Server Sensor.

鈼?IDS Category 7-Network IDS (NIDS, Network IDS): NIDS on all flow through the monitoring agent to monitor network traffic for suspicious activities and unusual features include activities to respond to attacks. NIDS was originally mixed with the IDS filter information packet sniffer, but recently they have become more intelligent and can decipher the agreement and to maintain state. There NIDS products based on the application, just install and can be applied to the host. NIDS attack on the characteristics of each information packet analysis, but under high load in the network, or to discard some packets. Network IDS products are SecureNetPro and Snort.

鈼?IDS Category 8-Network Node IDS (NNIDS, network node IDS): Some network IDS is not reliable at high speed, the load will be discarded after the high proportion of their network information packet, and switching network will often hinder the network IDS to see to the mixed packet transmission. NNIDS the NIDS functions entrusted to a separate host, thus alleviating the high speed and exchange issues. Although NNIDS and personal firewall features similar, but there are differences between them. To be classified as NNIDS personal firewall, an attempt should be made of the connection. For example, unlike many personal firewall found in the "trying to connect to port xxx", a NNIDS would have done any of the probe characteristics. In addition, NNIDS will host the event received is sent to a central console.

NNIDS products BlackICE Agent and Tiny CMDS.

鈼?IDS Category 9-Personal Firewall (Personal Firewall): a personal firewall installed on a separate system, preventing unwanted connection, either incoming or out to protect the host system. Be careful not to confuse it with NNIDS. Personal firewalls are ZoneAlarm and Sybergen.

鈼?IDS Category 10-Target-Based IDS (target-based IDS): This is not a clear one IDS terminology, different people have different meaning. One possible definition file integrity checker, while the other is the definition of the network IDS, which is only for those who are looking for and protected as vulnerable to attack by the characteristics of the network. The purpose behind this definition is to improve the speed of IDS, because it does not search for those unnecessary attacks.

IDWG (Intrusion Detection Working Group, Intrusion Detection Working Group)

Intrusion Detection Working Group's goal is to define data formats and exchange of information, procedural steps, such information is for intrusion detection systems, response systems, and those in need of management systems and their interaction are important. Intrusion Detection Working Group to work with other IETF organizations.

IDWG the URL address is http://www.ietf.org/html.charters/idwg-charter.html.

IETF's URL address is http://www.ietf.org/.

Incident Handling (event processing)

To detect an intrusion is just the beginning. More generally, the situation is, the console operator members will Buduan to receive alerts, with a fundamental Wufa separate the time to personally track every potential incident, the operator will be in the interest of the event Shangzuo Chu Biaozhiyibei future You Response Team to research. After the initial reaction, you need to deal with the incident, that is, such as surveys, debates and issues like the prosecution.

Incident Response (incident response)

On the detection of the initial response of potential events, then these events according to event handling procedures.

Islanding (island)

Island is to the network is completely cut off from the Internet, which is almost a last resort, and no way of approach. An organization only in the large-scale virus outbreaks or security attacks are very obvious when using this tool.

Promiscuous (mixed mode)

By default, IDS can only see out of the host network interface information, which is the so-called non-promiscuous (non-promiscuous mode). If the network interface is a mixed mode, you can see the segment in all of the network traffic, regardless of its source or destination. This is necessary for network IDS, but may be used by packet sniffer to monitor network traffic. Exchange-based HUB can solve this problem, see the place full of traffic, will have a number of cross (span) port.

Routers (router)

Router is used to connect different subnets center, they work in the OSI 7 layer model of the transport layer and network layer. The basic function of the router is a network packet transmitted to their destination. Some routers have access control lists (ACLs), allows packet filtering unwanted information out. Many routers can log information to their injected into the IDS system, providing access to the network blocked attempts to valuable information.

Scanners (Scanner)

Scanner is an automated tool that scans the network and host vulnerability. With intrusion detection systems, they are also divided into many types, the following were described.

鈼?Scanner Type 1-Network Scanners (network scanner): network scanner on the network search to find all the hosts on the network. Traditionally, they use the ICMP ping technology, but this approach can easily be detected. In order to become hidden, there are some new technologies, such as fin ack scan and scan. Use of these scanners is another more subtle advantage: different operating systems on these scans have different reactions, thus providing an attacker with more valuable information. An example of this tool is nmap.

鈼?Scanner Type 2-Network Vulnerability Scanners (network vulnerability scanner): network vulnerabilities scanner network scanner a step forward, it can detect the target host, and highlight all the loopholes for hackers to use. Network vulnerability scanner for attackers and security experts to use, but will allow IDS systems often "tense." Retina of such products and CyberCop.

鈼?Scanner Type 3-Host Vulnerability Scanners (host vulnerability scanners): such tools as a privileged user, from the internal scan host, password strength testing, security policy and file permission and so on. Network IDS, Host IDS particular it can be detected. Such products are SecurityExpressions, it is a remote Windows vulnerability scanners, and can automatically repair vulnerabilities. There are as ISS database scanner, will scan the database vulnerability.

Script Kiddies (script kiddies)

Some are much-vaunted Internet security breaches, such as the February 2000 denial of service attacks against Yahoo, is the number of teenage students dry, they dry the purpose of these bad things seem to fame. Security experts often to these people as script kiddies (Script Kiddies). Script kiddies are usually spontaneous, less skilled cracker, they use the information downloaded from the Internet, software or scripts on the target site for destruction. Hacker organizations or law enforcement authorities have expressed contempt for these script kids, because they are usually unskilled, there are a lot of time to carry out his hand, destroy, their purpose generally is to impress their friends. Script kiddies is like holding a rush of children, they do not understand ballistics, do not have to be able to manufacture firearms, can become a powerful enemy. Therefore, whenever they can not underestimate their strength.

Shunning (hide)

Equipment is configured to avoid the border to reject unwanted packets to all, and some even refuse to escape all the IP addresses from certain countries, the information packets.

Signatures (feature)

IDS is the core of signatures, which allows IDS to trigger when the event occurs. Feature information is too short will always trigger the IDS, leading to false positives or wrongly reported that the work is too long will slow down the rate of IDS. Some features will be supported by the number of IDS IDS as a standard of good or bad, but a feature of some commercial products cover many attacks, and some manufacturers of these features will be listed separately, which would give the impression as if It contains more features, a better IDS. We must be aware of these.

Stealth (hidden)

Hide is the IDS in detecting attacks from outsiders can see, they often use outside in the DMZ, not firewall protection. Some of its shortcomings, such as automatic response.







相关链接:



DB2 9's XML index



Decrypt the World Trade Center's first building built on the ruins of



3GPP to WMV



Jobs leak Macworld speech



ABC classification OF goods



error 1607 unable to install installshield



How I sold 1,000 cars, 200 sets of villas



Children's Books list: Foreign Books victory, was embarrassing domestic children's books



Guide Adventure And Roleplay



VBScript Month Function



Flash to MPEG



Font Tools CATALOGS



Fast Switch Input 3 Ax



FLV to SWF



The new VPN Strength



Specialist Health And Nutrition



Friday, October 15, 2010

China Business Daily: Who is the end of the traditional MP4


Cinema, Album, Photo, MP3, mobile hard disk, tape recorders, cameras, portable TVs, wireless Internet ... ... due for market launch large-scale, MP4 fashion concept of this seemingly already set a number of functions in one ultra-high integration unity, the cross and end its traditional definition. The hero, Techno music and other planning in the future to occupy a favorable position in the territory of the new entrants are even more to solution providers on behalf of itself, shot the upstream industry chain, looking for their new products with more profit selling .

"Super-integrated" end "traditional MP4"

In the traditional sense "MP4" is a palm-sized only to watch MPEG4 format video files player. But as long as the Dinghao Zhongguancun in Beijing, Dragon and other stores to walk round, you will find that the simple sense now that MP4 has almost vanished. Film source shortage, prices remain high, even as the biggest characteristic of the video seems to move with the public runs counter to traditional habits of consumers, these "shortcomings" that traditional MP4 players have emerged with more and more limited commercial prospects, "niche products" almost to be the fate of its doomed.

However, "integration and reunification," the IT trend also applies to digital. So manufacturers have tested the water at home and abroad, with more features to help you leap into the high level of integration of a broader market space. Now the market is still all kinds of products known as MP4, MP3, DC, DV, mobile hard drives, digital partner, e-books and other functions are being more and more enterprises into their own products which, even the phone call functionality can easily be added.

From pure MPEG4 video player to the present ultra-integrated products, and then follow the "MP4" the very narrow sense, is not appropriate the name is already. Techno music was developed by the company to its new product called the PMP (portable multimedia mobile terminal), while the hero in its own product called "palm hegemony." In accordance with the Hero Chao Liang head of new words: "Although we are now doing MP4, but perhaps it did a few years more advanced things."

As we explore the mobile phone could replace MP3, digital cameras, electronic books, when, in fact, should see a bit farther, not only who have replaced, but the new generation of mobile devices will look like? Although all the vendors we interviewed agree that MP4 will be hot next year, but they had in mind has a brand new MP4 mobile terminal, while a narrow escape MP4 is still a "transitional Hero" destiny.

Expand profit margins

It is, therefore, how to seize the lead in the new map in a good position to avoid a sudden one day going to face the dramatic ebb and flow of dry sand of embarrassment, some manufacturers thought would be the problem. When the number of hardware manufacturers still do follow along the old train of thought, picked a price war, "the old sword" to kill the market, some entrants have quietly resorted to after the new "trick."

"Hero to do is move the digital entertainment solutions. End-products are only part of the background software support and a variety of audio and video content works is also essential. Put these together, what we want to provide a complete application of concepts . "Liang Chao repeatedly emphasized to reporters the new. Support such a new concept of entertainment, is a hero by tying the interests of all to build up an industrial chain alliance.

Currently the MP4 content production chain, including publishers, audio and video technology providers, content delivery and download platform for service providers, terminal Play equipment manufacturers, distributors and end users in these most. However, the public use of the upstream chip brand MP4 different format to support playback of the content are not the same. Techno music executive director Zhuming Cheng told reporters: "In dozens of MPEG4 file format, a product can play MP4 only about two or three, so despite the existence of many content services platform, but can not provide the corresponding format of the content."

Gaps and opportunities that this market a lot of the manufacturer. France ARCHOS Shenzhen Office marketing Chen Jun Hong, said: "Companies are looking for local content partners, there are already several in the discussions among the successful if that is the outcome of the year." MP4's in the same constant has been wading DEC Executive Assistant Wang Huan also said: "the enterprise is considering whether it should be shot with the integration of industrial chain of problems."

In addition to integrated industry chain, China's enterprises in this new market, there are other similar real opportunity. Techno music claims in the system design, application design and software design aspects of PMP products with independent intellectual property rights, the hardware manufacturers to sell abroad "program." "At present, the agreement was signed with our PMP technology solutions including Core Pacific Digital has five companies, including, but come to us to do program evaluation, the intention to take sample tests are already dozens of companies, including even very well-known digital production company. estimated that in 2006, we adopted this solution provides the project will reach 100 million yuan annual income of more than. "Zhu way very proud.

Not difficult to see shot in the upper reaches of the program through the synergy of hardware and software, so solution providers of the new ideas and technology, domestic enterprises have been interested in a step forward. Success or failure is still difficult to clear, but simply do MP4 hardware has not much room for development, up to now is like color TV, phone manufacturers, like. But it means the software application development possibilities, many manufacturers with industry cooperation, Chinese enterprises can also be completely the same as Microsoft or Intel to start the role of upstream suppliers.






Recommended links:



Evaluate Graphic



I have a A4 paper give you a high PERFORMANCE [1]



Additional team bonus, energy stimulate team



Automation Tools Directory



Five-stroke Input Method Is Not Just Pole



Selected FIFTH one, Peking University Guanghua New Year's Forum



Specialist Management AND Distribution



TD 3 TENDER cover is the key to solve



ASF To AVI



fix hotmail virus for free Speed up slow running



"Computer countryside" Brewing changing situation



Recommend Inventory And Barcoding



Customer is NOT his wife is a lover of God is



MPG to Flash



Describes the properties of the problem MIDP



QuickTime To MPEG



Tuesday, October 5, 2010

WinGate FAQ


WinGate is a proxy server and firewall software package that allows multiple users simultaneous access only through a connection Internet. I use it in the process of collection, summarizes some small experience, is dedicated to you "size."

Q: Client QQ, network flashget Ant and how to set?

A: First confirmed WinGate server is enabled by default Socks proxy service, QQ client preferences in the network settings tab, find the proxy settings, select the "Use Socks5 proxy server", "Proxy server address" enter WinGate server's IP address, the default port is 1080, such as the WinGate server to allow anonymous access to optional user name and password, press the test button, if you can over the line through.
Netants, Flashget set method similar to the "Options" settings find the "Agent" tab, add a "proxy server", enter the server address, port type and port number (FTP port default is 21) , must be noted that even if the server does not offer Socks, and FTP proxy services can use the HTTP proxy port (default 80), and then set it to "Default Proxy" button.

Q: What applications to install WinGate client?

A: The need for a direct Internet connection without support Socks proxy service programs (such as NetMeeting) need to install the WinGate Client software. In the WinGate client configuration is successful, the client application should be configured to direct Internet connection, but no longer need to configure proxy server parameters. As the LAN only WinGate server has a valid WAN IP, can only call other people using NetMeeting, or receive calls within the LAN can not accept calls from the Internet.

Q: OE and Foxmail how to send and receive E-mail settings?

A: OE and use the client to receive e-mail settings Foxmail easier POP3 server mail program is set to WinGate server's IP address, attention should POP3 account in the "@" symbol to crosswise " "such as your original account is" user@263.net ", be changed to" user # 263.net ". However, mail has some problems, WinGate's SMTP proxy can only set up a server, which means you have to find a letter of the SMTP server allows anonymous to ensure that the LAN users to use different mail letters, so best to own build an SMTP server on the server.

Q: I have IIS installed WinGate server to use port 80, the WWW service can be modified into WinGate as another port?

A: Yes, as long as no other server on port conflict on the line. In fact, modify the port there are other useful, for example, you do not want to let other people use QQ but do not want to influence their use, the Socks in the server port set to other numbers. Some SMTP port by increasing the number of SMTP servers to resolve the problem letter, but the server and the client set a lot of trouble.

Q: WinGate server cache (Cache) is set too bigger better?

A:. Because the hard disk is increasingly becoming the bottleneck of the whole system, Cache is too large, multiple concurrent client access to server hard disk will cause congestion, the current mainstream models (CPU: P 鈪?800MHz, memory: 128MB) according to the number of users and access custom settings for the 100MB ~ 200MB is enough.

Q: Why browse the server where the content can not be added to the Cache?

A: First of all, the server must also like the same client can be WinGate Internet through a proxy cache, followed by some pages (such as ASP, PHP) dynamically to access Internet, generally can not be saved in the Cache.

Q: How WinGate server to filter out undesirable sites?

A: WinGate server side in a strategic (Policies) to filter sites. But take note, WinGate support the transfer of HTTP to Socks, Socks proxy service must be both in the application of the policy. Setting an example with the following? Quot; sex "site filter string.

The first step: in the WWW proxy service in the establishment of a strategy

By Administrator log on to the Gatekeeper, double-click Services (Services) tab of the WWW Proxy Service (WWW proxy service) to edit. Selection strategy (Policies) tab, the default rights (System policies) option, choose to ignore (Are ignored). Click Add (Add), select "All" radio button (Everyone) as an acceptable strategy for users. Click the ban list of labels (Ban list), click open the prohibited list of options (Enable ban list option). Click Add (Add), restrict a specific site, click This criterion is met if, select the HTTP URL, in the middle of the input box, select "contains" (Contains from the list). In the last input box, type "sex", increase the other to join the list of prohibited content, save your settings.

Step Two: Application Strategy

Double-click the Socks proxy service, select Socks Advanced (Advanced) tab, the HTTP protocol option, select the Use following policy button. Then the next menu, select the WWW Proxy server entries, click OK and save.

Q: Set the "use dial", the why, when access to LAN resources, WinGate also dial-up?

A: This is a request from the workstation by the DNS query result, even if these queries are in the local network (such as query the LAN computer name or shared printer name) will trigger the automatic dialing WinGate, by prohibiting DNS request to allow dial-up solution. By Administrator log on to the Gatekeeper, in the "System" tab, double-click the DNS service (DNS service), the General (General) tab close "to allow start dialing request (Allow request to initiate)" option, click OK, Save your settings.






相关链接:



3G2 to MPEG



free online fax Services to send fax by email



DVR-MS To MP4



ASF converter



Wednesday, September 29, 2010

PhotoShop new tricks: Paintings in paintings



There are two views of a picture, I believe we have not heard of it. Today, we gave presents a picture of the new ideas, at first glance, with no difference between general picture (Figure 1), when you press [Ctrl + A] is another picture (Figure 2). Is it interesting?



Figure 1

By 顧?Ctrl + A 顧?from

Figure 1 into Figure 2



Figure 2



Figure 3



Figure 4

Since it is a synthetic map, then we need two images. Here, a handsome selection of photographs and a fish tank pictures, compared with the background of deep tank as the underlying image, while the handsome picture on the hidden map, this display will be better. Then the two images merged together, the handsome layers on top, fish tank on the following layers (Figure 3). Next we create a new file, width and height of 2 pixels, (so the newly created images have four pixels, just black and white the two), will enlarge the image to 1600%, then the two points with a pencil tool point, define a pattern (Figure 4).


Select handsome guy that layer, create a new channel, in the "padding" which have defined a new pattern selection. Hold down the left mouse button, click to select the newly created channel. Then select the layer, the layer above that handsome guy pressing [Del] key, this step is to remove the white pixels. Then click on the tank that layer, then an anti-election ([Shift + Ctrl + I]), then delete. This 2 layer on the use of the pixel position opposite to delete, Windows in the picture is to be marked by the whole election if its above adding a black and white mask. Mongolian version of the white part is transparent, the black part is opaque. Advantage of this, select all the images before and after the fact, already exist in a graph. This map even if the effects of basic good, and put inside to see if IE is not very satisfactory results, we have to make some adjustments. First select the layer that handsome guy, and then "no transparency" which adjusted to 35%, this effect is to hide the map display in the general state is not very clear. Next, copy a few more tanks of this layer, which in the copy of the layer option of "stacking", this background image displayed more clearly.


All have chosen to complete another try and found that results have been pretty good. Next we need to do is to merge layers ([Shift + Ctrl + E]) of several layers into a single layer. Then saved as JPG or BMP format, so diagram on the site made a picture in picture effects. Well, you're done!


Is not it wonderful ah, and so what, quickly make a go himself.







相关链接:



FLV to Zune



Open-source THIRD-POLAR world



Storage Games Kids



A Record Of Random Access Recordset



British grams, Novel Medicine 1000 Chain layout help



Procter & Gamble senior students practical experience



Like Facebook Wants To Rule The World?



3GP to MPEG



Expert Delphi



Dynamic change CBA button



VOB to SWF



Taobao Shielding Baidu Sohu Baidu PPC Trouble



Taobao Alipay betrayal?



brief Gallery And Cataloging Tools



transform yuv to wmv



U buy four unique Skill set



To expose the fraud: WinRAR to compress 775MB 13.4MB



I believe many people probably remember about a year ago was used to compress an empty file 100MB 1MB, then put into the 1.44MB floppy disk, and led to numerous spittle farce Why?

Recently, the author of a well-known in the country to see such a post Forum: A Russian's ARPG game to a 755MB compressed file size is only 13.4MB! From 755MB to 13.4MB, which is amazing what a compression ratio of Oh! Indeed a ripple, flew forum attracted many users of the incredible evaluation. In the end is not really that amazing? Is is a hoax? According to the post by the prompt to download the file address, I also curious to start the following test.

Witnessed

Click http://24apr.vega-service.ru/images/sacredCD1.exe (extract password erased), this "magic" of the file downloaded to the local hard disk, open its properties, and found that we usually do not use the Common 7.zip self-extracting file format, and size really is only 13.4MB, compression rate of 1%!






Figure 1:755 MB compressed file turned out to be 13.4MB!?






Figure 2: such a high compression ratio and amazing!

We should know that the latest version of WinRAR has supported 7.zip file format, directly with the latest version of WinRAR to unpack, get three files, one of the MDF file size is really 755MB, if played Sacred (Sacred Discipline) This game should know that this is CD1 mirror, can be used Deamon load.






Figure 3: File size

I was not interested in the game itself, but know the MDF file compression ratio is not likely so high, why have such a high compression rate? And extracting such a large 755MB file, even when less than 1 minute!






Figure 4: The shocking speed

WinRAR by this author tried to achieve the highest compression ratio method, to extract out of the 755MB file to re-compress it again.

Tip: How to get the highest compression rate of WinRAR?

1. Use the "best" compression, run in WinRAR "Settings 鈫?Options 鈫?Options 鈫?Create the default compression compression configuration" open "to set the default compression options" window, in the "General" tab of "compression "field select the" best. "

2. On the compressed file or the same type of large number of small files, you can in the "Archive options" bar check "to create a fixed file file", and do not use the recovery record, in the "default compression option" is not checked " set to resume recording. "

3. With the best dictionary file: "default compression options" window, switch to the "Advanced" tab, click the "compression" button in the pop-up window "conventional compression column," select "Dictionary File" of the size of the largest "4096KB".

The author has compressed many times the size of the results obtained are between 16MB ~ 20MB, and compressed into the compression rate of 13.4MB is quite close, and to compress the time required to less than 4 minutes! "God" a?






Figure 5: We personally compressed, it has also to be such a high compression ratio?






Figure 6: re-compression

However, this is often used for file compression is not confused by the author, can be sure that the original author of the document source tampered. In the absence of the game's original CD, so CD can not be compared with CDCheck software to compare the before and after the two CD. So, I thought of using 16-bit text editor UltraEdit to directly analyze the source code. Open the 755MB file took a lot of time and found that most of the source code file is 00!, This file is a compressed air-scam!






Figure 7: The file's source code actually is 00! Empty file?!







相关链接:



MOD Converter



Eclipse + JBoss + EJB3 Entity Bean's connection strategy



MOD to MPG



How to create Firefox extensions of Jetpack



Compare E-Mail List Management



great promise Variant e virus file



AMD: It Is Easy To Say The Reality Is Cruel



How To Set Up RAID SATA And SAS Disks



DAT TO MP4



Liang No. 400 400 640 074 008 Take Your Pick



Articles about GAMES Card



On The Operation Table



2005 Fun WORKPLACE



Frequently Asked Questions based on C # language summary (2)



Fans paradise - watch the game with Three arms PPMate



Sunday, September 19, 2010

Striving to be China's "Shipbuilding City", on the shipbuilding industry along the Yangtze River



Low-end break impasse private enterprises in China shipbuilding industry, the flag ship "COSCO Kawasaki," the Chinese leader made a large seagoing vessel changes were "COSCO" If Nantong "COSCO" of large enterprises, like "Gemini," Yao Liang World shipbuilding night sky, then, in recent years, floating down the Yangtze River in Nantong hundreds of miles more than 30 bank line of private enterprises, such as the sky the stars are also shining.

銆??7鏈?3鏃ワ紝鍗楅?浜氬崕鑸硅埗寤洪?3涓囧惃绾уぇ鍨嬫捣涓婇摵绠¤埞鈥滆惃鏅媺3000鈥濊疆涓嬫按锛屽垱鎴戝競寤洪?澶у瀷閾虹鑸逛箣鏈?6鏈?鏃ャ?28鏃ワ紝鍗楅?閫氶『鑸硅埗鍏徃寤洪?鐨勪竾鍚ㄧ骇鏁h姘存偿杩滄磱杩愯緭鑸光?鐜悆1鍙封?杞?涓囧惃绾ф垚鍝佹补杞?閫氶『浜斿彿鈥濇垚鍔熺鍧烇紝鈥滅幆鐞?鍙封?杞槸杩勪粖鍏ㄥ浗寤洪?鐨勬暎瑁呮按娉ュ伐绋嬭埞鑸跺悓绫诲惃浣嶆渶澶с?鎶?湳鍚噺鏈?厛杩涖?鐜繚鎬ц兘鏈?ソ鐨勪竴鑹橈紝鈥滈?椤轰簲鍙封?鍒欐槸鍗楅?姘戜紒寤洪?鐨勯鑹樻垚鍝佹补杞?浠婂勾2鏈堬紝鍏ㄥ浗鏈?ぇ閫犺埞姘戜紒鐔旂洓閫犺埞涓庢尓濞侀噾鑹叉捣娲嬭埅杩愬叕鍙哥涓嬬涓?壒璁㈠崟锛屼负鎸▉寤洪?75500鍚ㄥ啺鍖哄姞寮哄瀷宸存嬁椹暎璐ц埞锛屾绫昏埞鍨嬪湪鍥藉唴灞為娆″缓閫犮?

銆??涓?墭鑹樺法杞紝涓?娆′粠澶╃敓娓?濡傜殝闀块潚娌欍?鍚笢娌挎睙椹跺悜涓栫晫锛屽畠浠妸鍗楅?姘戣惀閫犺埞浼佷笟寤洪?浣庣鑸硅埗鐨勨?甯藉瓙鈥濇姏鍚戜簡澶钩娲?

For a long time, due to size, technology, capital, management, and various constraints, Nantong private shipbuilding enterprise to build barges, mainly general cargo ships and other vessels, and high technology, high added value, large tonnage of high-end ship, few involved. Today, however, is precisely because of COSCO, "Double Star", Nantong private enterprises ship owners have a dream of transcendence.

銆??娌℃湁浜烘墠锛屼笉鎯滆?璧勭櫨涓囦粠鍥藉唴涓?祦浼佷笟寮?瑙勬ā涓嶅锛屾湞鈥滃ぇ鍘備笉鎰垮仛銆佸皬鍘傚仛涓嶄簡鈥濈殑鐗圭鑸硅埗甯傚満閲岄捇!缂哄皯璧勯噾锛屽悜涓婃捣銆佹禉姹熶箖鑷虫捣澶栬储鍥㈣瀺!鍗楅?娴蜂簨灞?鏈堟湯缁熻锛岀洰鍓嶅崡閫氭皯钀ラ?鑸逛紒涓氳揪39瀹讹紝閫犺埞杞介噸鍚ㄧ瓑鏁板瓧宸插崰鎹簡鍗楅?閫犺埞涓氬崐澹佹睙灞便?

But this was not enough, the various elements of productive private enterprises ship, eager to faster and more smooth to pour. RSHI President Chen Qiang said that in the construction of the ship mortgage is international practice, but it does not work in the domestic shipbuilding enterprises urgently need financial capital. In addition, Shanghai, Nantong ship test has an advantage, but the procedures are more, if the additional delivery of the Vessel base in Shanghai, ship exports will flow. General Manager Wang Zhinan born in Hong Kong shipping companies argued that the development of the shipbuilding industry, industry associations have existed in name only. In re-associations, should reflect the status of small and medium private enterprises, so that equal communication.

銆??鐪间笅锛屽鍦ㄥぉ鐢熸腐姘撮亾涓殑姘戜紒瓒婃潵瓒婂锛岃埅閬撶嫮绐勭煕鐩剧獊鍑猴紝搴斿姞閫熸暣娌汇?閫氶『鑸硅埗钁d簨闀块檰瀛︽櫤璇达紝鍗庤兘鐢靛巶鐮佸ご瑕侀?鏍堟ˉ锛屽ぉ鐢熸腐姘撮亾涓囧惃杞浣曢?杩?鍚屾牱涓烘垚鍝佽疆鈥滃嚭璺?鎵?洶鐨勮繕鏈夐煩閫氳埞鑸讹紝鏄庡勾7鏈堬紝閫犱环1.6浜垮厓娴蜂笂閽讳簳骞冲彴浜や粯锛岃懀浜嬮暱瀛熸垚鍚涘咖蹇冨俊蹇★紝澶╃敓娓按閬撳眾鏃惰兘寮??鍚?

This is a private enterprises ship's "high-end dilemma" is an urgent need to address the "sweet pains."

銆??瓒呭父瑙勫缓璁炬湇鍔¢珮鍦?br />
銆??鍑犱箮涓?涔嬮棿锛屽崡閫氬ぉ鐢熸腐瑗块儴銆佸鐨嬮暱闈掓矙銆佸惎涓滄部姹熺瓑鏈紑杈熻埅閬撶殑宀哥嚎锛屽啋鍑轰簡澶氬鍏峰3鑷?涓囧惃绾ч?鑸硅兘鍔涚殑閫犺埞浼佷笟锛屽叏鍥界綍瑙侊紝鐪肩湅鐫?鍗曢鍚戝崡閫氾紝寮曡捣姹熷崡浠ュ強娴欐睙绛夊湴閫犺埞浼佷笟涓讳滑杩炶繛鎯婂懠銆?br />
Not open water, no open channel, nor even the ship terminal opened, but in a short time one by one. Last year in March, Keppel Corporation, Singapore Maritime inject 45 million yuan, the overall purchase Nantong Shipyard, senior manager, said Li Gang, Chinese and Nantong in the development of shipbuilding industry the unique location advantage at the same time, Nantong Maritime Bureau, the courage Gangzha District and other government departments responsibility to actively create conditions to promote enterprise extraordinary development, the investment is the key. "Born in Hong Kong the number of channels such as shipbuilding and marine waters of scale, have more than channel stand, and new ships into the water and transfer of existing legal and security barriers, we actively seek the support of Jiangsu Maritime Safety Administration, through scientific argumentation, to create conditions for protection launching the new ship and transition. "Nantong Maritime Bureau said the Secretary Xiufeng.

銆??鈥滄垚涔熸睙宀革紝璐ヤ篃姹熷哺鈥濄?鍗楅?澶╃敓娓タ閮ㄦ按閬撱?闀块潚娌欍?鍚笢娌挎睙姘村煙浠嶆湭寮??鑸亾锛屽嚭璺棶棰樿涓?壒娌挎睙閫犺埞浼佷笟鎻績銆?Marine Department said it would strengthen the sea with Shanghai Maritime Safety Administration test Battalion communication and collaboration channel Qidong city to actively promote building of the sea. At present, the Shanghai Maritime Safety Administration of the sea test unit has begun testing the waters sweep, channel opening work is progressing steadily.瀵逛簬鍒剁害鍜屽奖鍝嶇浉鍏抽?鑸逛紒涓氬彂灞曠殑闀块潚娌欍?澶╃敓娓タ閮ㄦ按鍩熻埅閬擄紝姝e崗鍚屽幙甯?鍖?鏀垮簻鍜岀浉鍏充紒涓氳繘琛岃璇佽皟鐮旓紝缁勭粐鍔涢噺杩涜鎵祴锛屽苟绉瀬浜夊彇鑸亾閮ㄩ棬鐨勬敮鎸侊紝淇冧娇鑸亾鏃╂棩寮??銆?br />
銆??瓒呭父鏈嶅姟锛屽張宀傛鏄哺绾裤?鑸亾?甯傜粡璐稿鍓富浠绘潨姘告湞鎻愬嚭锛屽崡閫氳埞鑸跺伐涓氬彂灞曞簲閲囩敤鈥?鍔燲鈥濇ā寮忥紝鍗充互涓繙宸濆磶銆佺啍鐩涢噸宸ャ?鍚夊疂鑸硅埗杩欎笁瀹朵紒涓氫负鏍稿績锛岄噸鐐瑰彂灞曟皯钀ラ?鑸逛紒涓氾紝搴旀妸鐗╂祦涓氬拰鑸硅埗鍙婂叾閰嶅浜у搧甯傚満寤鸿锛屼綔涓鸿埞鑸跺伐涓氬彂灞曠殑涓ょ考锛岀潃鍔涘煿鑲层? In the Vocational Technical College, City metallurgical technology services company expanded model ship recruitment, training high-quality welding and other labor the same time, the ship opened in Nantong University, Engineering, established in Nantong, Shanghai Jiaotong University, Shanghai Maritime University and other institutions of higher learning training points professional training for more than engineers.

銆??鐪佸涔﹁鏉庢簮娼姹傦紝鍏氬銆佹斂搴滃簲鍔╂帹閫犺埞浼佷笟鍥介檯鍖栵紝鐔旂洓瑕佷簤鍙栧埌缇庡浗涓婂競锛屽湪绾界害璇佸埜浜ゆ槗鎵?笂甯傦紝鍊熷姪鍥介檯閲戣瀺璧勬湰鍙戝睍鍗楅?鐨勯噸澶ц澶囦笟锛屽崡閫氬氨瑕佹悶杩欐牱鐨勯噸澶ц澶囦笟銆?China Shipbuilding Industry Association, said Zhang Guangqin, shipbuilding industry in the past were state-owned enterprises, currently the dominant three major state-owned group, Nantong Yangtze River Delta and even the rise of private shipbuilding company to set up in private enterprises as the core of China's fourth largest shipbuilding group is possible in such a new arena, we look forward to Nantong private shipbuilding enterprise listed overseas.

Supporting the development of ship park

Gangzha District Chen Qiaozhen heat up.璧拌繘闈㈢Н杈?7.6骞虫柟鍏噷娓椄鑸硅埗閰嶅宸ヤ笟鍖猴紝閫氬煄璺?椹汉璺瓑鏂板缓閬撹矾绗旂洿瀹介様锛岄挗缁撴瀯浠跺洯銆侀厤濂椾骇涓氬洯銆佷腑灏忎紒涓氬洯銆佺墿娴佸洯鍖轰互鍙婄爺鍙戜腑蹇冧簳鐒舵湁搴忋? Gangzha District Vice Mayor Zhu Guihua, at present the infrastructure investment has reached 250 million yuan, to attract ships to China and Japan, South fly Heavy Industries, a large number of companies such as Kirin Heavy settled.

銆??鏍规嵁鍖轰綅鐗圭偣銆佷骇涓氬熀纭?拰鎵胯浇鑳藉姏绛夋儏鍐碉紝閲嶇偣鍙戝睍鐨勯挗缁撴瀯浠躲?澶у瀷闃?棬銆侀敋閾剧瓑椤圭洰锛屾腐闂稿尯绉戝閫夋嫨浜т笟鍔熻兘瀹氫綅锛岃蛋閿欎綅绔炰簤銆佸樊寮傚寲鍙戝睍涔嬭矾銆?This, in turn with the Municipal Committee, vice mayor of Blue Shaomin recent study related to the European shipbuilding industry. In his view, the development of shipbuilding industry, ship equipment industry to be bigger and stronger. Efforts to promote the shipbuilding industry supporting Park to create Marine Equipment industry development platform is essential.

Low level of marine equipment at home, is striving to be China Nantong "shipbuilding city" of the "bottleneck." Value composition from a single vessel, combined with the current experience of the city part of the shipbuilding enterprise data analysis, material costs account for 80%% 10%% of labor costs and other costs 10%%. In accounting for the bulk of the materials, the ship manufacturing companies supporting the city's rate of about 8%%, outside the city matching rate of 20%%, matching rate of 72%% abroad, with Europe and other regions matching rate of 90%%, far from home. Only final assembly and integration, there is no supporting simultaneous development of industry, shipbuilding industry can only be "short-legged economy" can not be enduring.

It is gratifying that this situation began to change.浠婂勾3鏈堬紝涓栫晫鏈?ぇ鐨勬腐鍙f満姊扮敓浜у巶瀹朵笂娴锋尟鍗庢腐鏈猴紝钀芥埛寮?彂鍖烘捣娲嬭澶囧伐涓氬洯銆備互澶у瀷娓彛鏈烘璁惧銆佸ぇ椹姏涓?浣庨?鑸圭敤鏌存补鏈哄強鍏惰緟鍔╄澶囥?鑸圭敤鐢靛瓙鎺у埗绯荤粺鍜屽鑸澶囥?鏈鸿埍鑷姩鍖栫郴缁熶负涓绘敾鏂瑰悜锛屽紑鍙戝尯娴锋磱瑁呭宸ヤ笟鍥紝灏嗘垚涓哄崡閫氳埞鑸堕厤濂楀伐涓氬彂灞曠殑閲嶈澧為暱鏋併? Development Party Work Committee, Management Committee Director Chen of new confidence.

According to reports, the production base in Nantong Zhenhua Port Machinery total investment of 30 billion yuan put into production, annual output of 100 bridge crane, bridge container field 200 and a large offshore oil platform 50, the annual turnover of 1.5 billion U.S. dollars above. Among them, single-gear box, a project covering about 500 acres, completed an annual output of 20,000 sets of various major gear box, the annual output value of 1.6 billion or more, can significantly enhance China's own brands of large capacity of gear box.

Shipping supporting Gangzha District Industrial Zone, Development Zone, Industrial Park, marine equipment, and Qidong Binhai Industrial Park construction of ships, will greatly promote the marine equipment manufacturing industry cluster development, coordinated development and leapfrog development. Yong Du, deputy director of the Urban Economic and Trade Commission said the DPRK is currently the three parks have been approved by the Work Committee for National Defense, is expected to become a national ship supporting industrial park.







相关链接:



Good Games Board



YOUTUBE mpg



avi to mp4 converter Free download



Shop Games Board



Enhance the "soft environment" out of the performance appraisal errors [1]



Remodeling "value STREAM"



How Far From The Focus To The Expertise?



RFID into THE competition for the critical period



RUP Tailoring Principles And Cutting Process



Jianzhan All Games - From Entry To The Master (directory)



M4v



What Is Digital TV Renovation Project?



Avchd To Avi



Wednesday, August 4, 2010

Play the right to recover the main impact of CCTV IPTV


Six months ago, got the IPTV license, but had been quietly brewing CCTV is now back in the IPTV platform of its four main channels of broadcast rights. Industry estimates, if this practice will have IPTV in China to open up, as well.

CCTV CCTV planned to take back three, five, six, eight sets of programs (that is entertainment, sports, film and TV Channel) in the IPTV and digital television broadcast rights on new platforms. However, as digital television in the recovery time will be extended to the whole digital television shift is complete, so the impact of this initiative to launch a major, or IPTV.

CCTV: indeed brewing but inconclusive

CCTV CCTV IPTV operations for the core of high-level international told reporters really matter, but also stressed that the current policy have not yet come out clear, is not convenient to talk about. The Shanghai Media stakeholders also told reporters that an internal matter has been heard, but not yet received a formal statement. As such, the current issue not yet entered the practical level. Harbin and Shanghai IPTV customer service staff also told reporters that the withdrawal of these channels has not received notice of these channels is still present in the IPTV platform, the normal broadcast.

SMG: Everyone in a trench

Compared with the CCTV attack brewing, Shanghai Media area earlier in an interview to resolve the issue of competition has been strong. SMG's IPTV business, Blockbuster is responsible for communications said Li Feng, director of marketing, the industry still in its infancy, we are opening up the market, competition would be premature. The Da Zhong, vice president of SMG is stressed to reporters, with the CCTV system are radio and television, a vast cultural enterprise is actually standing on IPTV license, "a trench", among many co-operation.

CCTV to seek competitive advantage?

Industry for the basic interpretation of this incident, most of the judge for the CCTV to pave the way for its involvement in IPTV and seek competitive advantage. A broadcasting system, say, IPTV is now, "started taking" stage, if the CCTV own IPTV platform to enjoy the exclusive right to broadcast these channels, this can help CCTV operators to discuss cooperation with the dominant position at the time. At present, the city really only started commercial IPTV in Harbin and Shanghai, Shanghai Media and by the local telecom operators to operate, thus throwing the CCTV initiative, seem to point to the obvious. "This is a few channels on television in the traditional CCTV is also wired to the local charge, they do not want free to SMG's IPTV is reasonable." IPTV, a broadcasting system, the practice of those who believe that CCTV is not too.

Commercial broadcasting system war

Deeper interpretation of the system is linked to the broadcast the contest between the forces.

Personal broadcasting system, related view is that the meaning of this CCTV is not just between the two IPTV license business, "Running", but also implies that the traditional broadcasting system forces an early use of some potential advantages of this on three networks on IPTV integration of new media born of a growing business on the rise of attacks. "While that might not necessarily be taken back channel content users really have to, but few of these channels, or people that do not complete IPTV channels." Streaming Media Network COO Zhang Yanxiang said.

IPTV, a person close to the CCTV is revealed, and even CCTV's the IPTV business platform is to be allowed to put these channels, the current very difficult to say. Possible solution is to SMG and CCTV other IPTV operators to pay a fee to buy broadcast rights, but Zhang Yanxiang that CCTV could "give money not to sell," because this is the difference between a weapon of competition.

Zhangyan Xiang also said the plan in accordance with CCTV by 2010 these channels is to become the premium channels, and now the action is targeted at IPTV some protective measures.






Recommended links:



Converting avi to mp4



"Genuine of turmoil," the test of the Who?



Dell second Quarter profit by 28 percent cited dissatisfaction with the price war has hurt revenue



Directory Gallery And Cataloging Tools



"Replace", Font, Format Change With



Ulead SmartSaver Pro 3.0 Cheats bit through (c)



What Is Rmvb



Fireworks Animation - Aircraft And Parachute



Best Log Analysers



Mp4 To Mpeg Converter Free Download



Process



flv to Wmv



Dialog Box For Further Study



Fax TOOLS comments



Compuware Corporation third quarter fiscal year 2009, success in Adversity