Tuesday, October 26, 2010

10 days of the seventh day learn ASP.net


Learning Objective: Learn to add remove modify the record

ASP in the past, whether we add or delete records or to use SQL statements with EXECUTE () or is directly RECORDSET of NEW, DELETE, UPDATE and other methods to add delete modify records. Which we use in ASP.NET with SQL statement object to execute SQL statements COMMAND way to add delete modify records. This is up from that record is also easy to read. Actually only one difference, the ExecuteReader () was revised to ExecuteNonQuery () can, because we do not need the return value ah.
string strConnection = "Provider = Microsoft.Jet.OleDb.4.0; Data Source =";
strConnection + = Server.MapPath (strDb);
OleDbConnection objConnection = new OleDbConnection (strConnection);
OleDbCommand objCommand = new OleDbCommand ("Here is the SQL statement", objConnection);
objConnection.Open ();
OleDbDataReader objDataReader = objCommand.ExecuteNonQuery ();

-----------------------
dim objConnection as OleDbConnection
dim objCommand as OleDbCommand
objConnection = new OleDbConnection (Provider = Microsoft.Jet.OleDb.4.0; Data Source = "+ Server.MapPath (strDb))
objCommand = new OleDbCommand ("Here is the SQL statement", objConnection)
objConnection.Open ()
objDataReader = objCommand.ExecuteNoQuery ()

Cite the following examples illustrate the SQL statement (ACCESS):

Add record: insert int
o table name (field 1, field 2) values (string 1, string 2) where the conditions
Delete records: delete from table name where conditions
Modify the record: update table name set field 1 = 脳 脳, field 2 = 脳 脳 where conditions

Require special attention, if it is to delete record delete Sql Server table name, do not need to add from the.

Here today, tomorrow, said inside the most famous ASP.NET DATAGRID.






相关链接:



Reviews Seasonal - Screen Savers



Directory Web Development



AMD expects Q4 REVENUE to fall about 25%



Terminal promotion on doing SOME of the views



Telnet in RHEL 5 on the OPENING process



comparison Personal Finance



Correctly UNDERSTAND the IPD of the "structured process"



Younger's Quickstep



M2TS to MKV



Easy Food And Drink



Photoshop Rendering Realistic Beautiful Necklace



The Rise Of Domestic Erp Market Share In 2010



MKV to VOB



Cool I am a LEADING online high quality music box



Flash to MPEG



TMPGEnc --- MPEG Compression King



INSURANCE Goes to focus on risks and preventive measures



Thursday, October 21, 2010

Beat my opponents so


I remember a few years ago, I followed up a hotel project in the city. In fact, it's a year ago, I conducted a thorough investigation by a number of ways the market is estimated at about this hotel will be conducted in two lock management system reform. Thus, the hotel's name, in my diary on the top of the constantly forward, and finally entered the focus of my business to track the object list. During this time, I did everything possible, use every opportunity to continue with them into contact with different departments. In the end, from CEOs to the clerk, getting along all Jiaoshu, and they all know that I am selling a lock.

One day, the Finance Department received a Miss the hotel phone, call me in the past to help them a little better. I rushed to the hotel, financial Miss told me that they are preparing the budget hotel transformation, asked me to lock, monitor, and front desk management system to provide some help. I'm so happy, of course, make every effort to help. I immediately look for veterans, respectively, procurement vice president and chief engineer, hope they will consider my company's products. When told that the transformation of the whole package, and has determined the contractor, and the contractor has worked with me a few times more likely to trust each other, my heart felt, won the single business, with great certainty.

I found the general contractor, that I had come, the boss told me that my product in the list of candidates, ranked first, and total hotel workers and works minister said were called to give priority to my product, I Fengyun heart finally hung a little practical. But I dare not be complacent, often contacts with hotels and general contractor. During this period there have been dealers to enter, mostly to the impact of the price that the sword, and I was a professional explanation to convince the hotel and the general contractor declined them.

After about ten days, when I once again came to general contractor here, we found the situation a little different. When I move almost the same when they play, their faces do not always feel natural, not like the original advice to me as some of the technical aspects of the installation process. Look at the sample area, my samples are gone, replaced by a general quality, but also little-known product. I know the boss of marketing this product, people quite live, but in our industry, in the city, her performance is not how good. I asked how this is going on general contractor, he did not answer me, and told me to ask the hotel will know. But when asked when I went to the hotel, and no one told me how the thing just kept on comfort me, and lost not a single business, you will starve, or lose it time to look for other business. I think that I could not just die for no apparent reason, even if I lose, I have to know how I failed, but also a good sum up, in subsequent operations can not be repeated. I went to inquire about general contractor that end, the procurement minister told me that the contract price, my God, higher than my tens of dollars a quote, and asked me: "Do you know the boss of operating this product? Anyway, I do not know. "I said:" I know people very live. "procurement minister:" Do you think she like? "I said:" Indeed you can. "procurement minister:" It does not have to matter, She accompanied the hotel office for three days, you can do so! "My God, there is such a way, I nearly fainted at that time. This opponent, I really no match for her.

Three months later, the officers fired by the hotel, but this is not important to me, the important thing is that I spent so much energy and effective, then failed to get one. But I remind myself, in this market, we should pay attention to this man, he was dry in the line of file in the future should work, if his figure at the time, certainly in this respect he buttoned. (Postscript: A year later, the door of the hotel to spend our management system has had, as installed in front of major quality problems, the guests are locked in the room can not get out, are forced to change).







Recommended links:



MKV to Xbox 360



Report Hobby



China Business Daily: Who Is the end of the traditional MP4



LOOKING for a breakthrough signing strangers



My favorite Dictionaries Education



Waves Resurgence - Purple VS Sogou Contest



MPG to AVI



ASP.NET 2.0 At The Same Time To Prevent The Same User Login



Shopping GUIDE all high-end DVD recorder Raiders



Children's Books list: Foreign Books victory, was embarrassing domestic children's books



Comparison of six agent approach



FLV to iPod



Sogou Pinyin input method and how to do conflict Game?



build home made windmills



Comments: Baidu more recent non-



Sunday, September 26, 2010

Vector graphics on the description of several concepts


FONT class = unnamed1 size =- 1> What are vector images?
Vector images, also known as object-oriented images or graphics images, a series of mathematically defined by a line connecting the points. Graphic elements vector file as an object. Each object is a self-contained entity, it has the color, shape, contour, size and screen position and other attributes. Since every object is a self-contained entity, it can maintain its original clarity and curvature, while many mobile and change its properties, without affecting the Legend of the other objects. These features make the vector-based program suitable for the legend and three-dimensional modeling, because they are usually required to create and manipulate a single object. Vector-based graphics has nothing to do with the resolution. This means that they can be the highest resolution display to the output device.
What are bitmap images?
And above compared to vector-based drawing program like Photoshop photo editing program that is used for processing the bitmap image. When you deal with a bitmap image, small details can be optimized to carry out significant changes, and enhancement. Bitmap images, also known as dot matrix image or draw images, is called pixels (picture elements) composed of a single point. These points can be arranged in different patterns and coloring to form. When the enlarged bitmap, you can see the whole image which constitutes the numerous single box. Expand the size of the effect of the bitmap more individual pixels, lines and shapes seem so uneven. However, if a little far from the location of watching it, bitmap image of the color and shape it seems is continuous. Since each pixel is individually dyed, you can order each time the frequency of operation of a pixel generated selected area near photo-realistic effects, such as the deepening shadows and add color. Will also reduce the size of original image bitmap distortion, because it is by reducing the pixels to make the entire image is small. Similarly, the bitmap image is a collection of pixels arranged in the form of created, it can not operate independently (eg, mobile) Office location map.
Why focus on when dealing with bitmap consider the resolution?
Handling bitmaps, the output quality of the image depends on the processing level of the beginning of the resolution settings. Resolution is a general term that refers to an image file contains the details and information, size, and input, output, or display device to generate the level of detail. Operation bitmap, the resolution will affect the quality of the final output will also affect the size of the file. Handling bitmaps need to think twice, because the choice of the resolution to image the entire process is usually accompanied by the document. Whether in a 300 dpi printer or a typesetting device a 2570dpi print bitmap file, the file is always to create the image size set by resolution printing, unless the sub printer encyclical real ideological choice between Tuo Yuan province H Farm Direct Quan 顛?M 顜?Kangzhangsuzhui female swan spring Tuiliaohuangxian Yunjingnanghuang 願?顑?knock plexus lie 顎?care ridge Bru skull Egypt 顑?weighbridges 顎?private Zhuanjiasongmu straight tube feces Yuan Huang 顑?Pufuzhiyuan hand 顔?Lai Yun Huang Tomb thereupon lazy O Karma off season rates cylinder Qin Huai NIE palpitations straw yo? br> about objects in CorelDRAW
CorelDRAW The object can be any basic drawing element or a line of text, such as line, ellipse, polygon, rectangle, mark the word line or line art, etc.. After you finish creating a simple object, you can define its characteristics, such as fill color, outline color, curve smoothness, etc., and special effects of its application. In this information, including the location of the object in the screen, create it in the order, and define the attribute values are described as part of the object. This means that when the operation object (such as moving objects), CorelDRAW will rebuild its shape and all the attributes.
Object can have a closed path or an open path. A group object is composed of one or more objects. When using the selection tool to select an object, you can select the frame around it to identify it. Elected in an object, select the box corner and the midpoint of the filling box will appear 8. Each individual object has its own selection box. When using the "group" command to two or more objects are combined, it will create a group, may take it as an object to select and operate. Objects from the path of composition, these paths form the contours and boundaries of its. A path constituted by a single or a few segments. Endpoint of each segment has a hollow box, called the node. Can use the shape tool to select an object node, thus changing its overall shape and bending angle.
Open path and closed path object object What is the difference?
Open path object is the intersection of the two endpoints. Closed path object is to constitute the two ends of a row that the path of the object. Open path object can be a straight line may be curved, for example, hand-painted tools to create lines, use the Bezier tool to create lines or thread tool to create the thread lines. However, with the "Hand Tools" or "Bezier curve tool" when to start and finish together can create a closed path. Closed path objects, including round, square, grid, natural document line, polygon and star and so on. Closed path object is filled, and open path to the object can not be filled.





相关链接:



Screen Savers SHOP



E-cology In The Pan Micro Series 45



Simple News SERVERS



VOB to MPG



Overcome Stage Fright Interview The 10 Candidates Recruited Nirvana



Ordering a small wind investment and long-term business secretary was Still uncertainty



C + + Monitor: compatible with the accepted type of member function templates



Job 10 kinds of unhealthy Attitude towards students



ASF converter



CAT5 Cable Company's Innovative New Products Distributor --- MinicomAdvancedSystems



Task tracking software 2



MKV To VOB



Photo 6 of a Tough, for the first magic



Tuesday, September 14, 2010

In the first half of the 12 most dangerous "killer"


July 14, well-known information security company Rising company released "Mainland China reported outbreaks of computer viruses in the first half of 2003", the report shows the first half of the domestic computer virus disaster presents new features and development trend, "Red terminator "sequential ranking in 12 new and old viruses are currently the main threat to computer users.

The most extensive damage during the first half of 2003 the 12 viruses of the following:

1. Red terminator (Script.RedLof)
2. Love the back door (Worm.LovGate)
3.FUNLOVE (PE_FunLove)
4. Unknown email viruses
5. Nimda (Worm.Nimda)
6. Cover letter (Worm.Klez)
7.CIH (Win32.Cih)
8, WYX (Wyx)
9. Laura (Win32.Xorala)
10. Hard drive killer (Worm.OpaSoft)
11. Trash (Worm.Lentin)
12. Great Promise (Worm.SoBig)
(Note: related, viruses that file to "Rising virus database" search)

Report this epidemic is through the Rising global virus monitoring network (domestic part), the National Anti-Virus Service Network and Rising online antivirus and other departments submitted joint monitoring statistics. From this report, the first half of the domestic computer virus disaster presents the following six characteristics.

A new virus emerging, the extent damage growing

According to statistics, 82% of computer viruses disaster nearly two years by the emergence of new viruses and their variants and are therefore to remind users to buy anti-virus products must pay attention to the product of the new virus update capability, and in the course of in the anti-virus software must be time to upgrade. At the same time as the popularity of the network, the virus spread rapidly increase the speed and breadth, RISING "online antivirus" User feedback shows that average user experience first half of the amount of virus was 2.11.

Second, 12 major virus group caused more than 50% of virus disasters

"Red terminator" and the top 12 viruses and their variants is the most destructive virus, according to statistics of all disasters in the first half, nearly 53% from these "major killer" due. Be noted that most of these viruses showed "varying population" posture, which caused the disaster in the first half of this year, most of them are new variants of these viruses cause, even for the CIH and FUNLOVE this is an old virus, The new variety is endless, so should not these "old Killer" lightly.




[Next]

Third, the worm into the mainstream

Since 2002, through the mail system and network vulnerabilities to spread the worm virus began to become the new Pang, number far exceeds the mainstream of the system once the virus, and this year has been more development, not for not folding Button mainstream virus. Forbes.com said the virus in more than half a worm, its rapid development suggests that Le domestic network construction has accelerated, network security has not Jishi to keep up, network anti-virus will become a network management focus.

4, hybrid virus become a trend

From the first half of the developing trend of the virus, the virus showed characteristics of more and more mixed trend. This category are represented by the Nimda virus, the virus, it is a network vulnerability in the "worm" is an infected file "system the virus." "Great Promise" virus, a member of the family is all set, "worms", "hackers", the "backdoor" virus, and many other features in one, so their ability to greatly enhance the dissemination and destruction.

Fifth, the rapid development of e-mail virus

銆??鐢靛瓙閭欢鏃犵枒鏄洰鍓嶄簰鑱旂綉鏃朵唬鏈?富瑕佺殑淇℃伅娌熼?鏂瑰紡锛岃繖绉嶆柟寮忓鑷翠簡閭欢鐥呮瘨杩呴?澧為暱锛屼竴浜涜爼铏梾姣掋?鏈ㄩ┈鐥呮瘨銆佹伓鎰忕▼搴忕瓑鐥呮瘨绾风悍鍒╃敤璇ュ钩鍙拌繘琛屼紶鎾紝鐟炴槦鍙嶇梾姣掍笓瀹堕娴嬪苟蹇犲憡鐢ㄦ埛:閭欢浼犳挱鏄粖鍚庣梾姣掍紶鎾殑涓昏鏂瑰紡,涓嶈鎵撳紑闄岀敓鐨勯偖浠躲?缁欑郴缁熸墦琛ヤ竵鏄渶濂界殑闃茶寖鎺柦銆?br />
銆??鍏?鏈煡鐥呮瘨涓嶅蹇借

銆??鍦ㄤ笂姒滅殑鎵?湁鐥呮瘨涓紝鏈煡閭欢鐥呮瘨鍦ㄦ暟閲忎笂浠?.8%鐨勬瘮渚嬩綅灞呯鍥涳紝铏界劧鍏跺畠绉嶇被鐨勬湭鐭ョ梾姣掑鏈煡鑴氭湰鐥呮瘨銆佹湭鐭ョ郴缁熺梾姣掔瓑娌℃湁涓婃锛屼絾鐤儏涔熶笉瀹逛箰瑙傘?杩欒鏄庢湁鐩稿綋涓?儴鍒嗙敤鎴峰湪琚祦琛岀梾姣掑洶缁曠殑鍚屾椂杩樺湪蹇嶅彈鐫?湭鐭ョ梾姣掑甫鏉ョ殑鐑︽伡銆傚悓鏃讹紝杩欎篃涓烘湭鐭ョ梾姣掓煡鏉?妧鏈殑鐮旂┒鎻愪緵浜嗘洿澶х殑搴旂敤绌洪棿锛岀憺鏄熷叕鍙哥殑鏈煡琛屼负鍒ゆ柇鎶?湳宸茬粡鍙互寰堟湁鏁堝湴闃叉不鏈煡鐥呮瘨锛屼絾鍓嶆彁鏄敤鎴蜂竴瀹氳鎵撳紑閭欢鐩戞帶銆?鐟炴槦鍙嶇梾姣掑伐绋嬪笀璁や负,浠?003骞翠笂鍗婂勾鐥呮瘨鐤儏鎶ュ憡涓樉绀虹殑鎯呭喌鏉ョ湅锛岀敤鎴烽渶瑕佸仛鐨勪笉浠呬粎鏄畨瑁呭悎鏍肩殑鍙嶇梾姣掍骇鍝侊紝鏇撮噸瑕佺殑鏄鎻愰珮鑷韩鐨勯槻鑼冩剰璇嗐?杩欎綅宸ョ▼甯堢户缁В閲婇亾,瀵逛簬涓汉鐢ㄦ埛鍏跺疄鎿嶄綔骞朵笉澶嶆潅,棣栧厛鏄強鏃跺崌绾ф潃姣掕蒋浠?鍏舵鏄湪浣跨敤璁$畻鏈烘椂





相关链接:



How to quickly assess the adoption of CMMI



Background to REN Zhengfei



M4v



Picked INVENTORY And Barcoding



Easy Gallery And Cataloging Tools



Video Mpg



Call Center Strategy, Direction And Goals



Convert flv to 3gp



Source Editors comments



Three 3G Licenses Which Zhang's Most "money" Way?



swf to flv



When the embedded 3G experience



Flash5 ActionScript Advanced Programming Guide (6)



Evaluate Access Control



Assembly language of high-level language features



Carefully key in SECRET



Visual Studio08 now open to MSDN users



Wednesday, July 28, 2010

Managed and leased operators should pay attention to the problems and suggestions



Rent server hosting server and open up business, mainly on the specific details of the hardware and software to meet customer requirements. At present, the domestic rental server managed server and the situation is probably as follows:

Server hosting server and hire a number of problems

1. Customers to their problems

Client to server hosting to IDC, the management server is basically managed remotely by software, can be understood, the server hardware hosting service provider to the IDC, IDC need to provide network resources, power, security and other basic services; the server operating systems, application software services part of the stability and security in all of them in the hands of customers, IDC service providers with no direct relationship. Therefore, the server in the IDC problem, largely because the customer's own operational errors caused by the accident.

2.IDC service provider's network fails

Various IDC network services still exist some problems, and backbone operators link line does not have enough redundancy, if compared with other major Internet service provider ChinaNet connection line fails, then the whole network all the possible disruption To enhance the anti-risk ability, must be connected to multiple backbone carriers, even if a certain line problems, through other networks to provide services can also be normal.

If the IDC service provider's network problems, or network interruption, and the server itself has no direct relation, when the circuit returned to normal after return to normal access.

3. Application system can not function properly

Client to server hosting to IDC, will run multiple applications on the server services such as WWW service, Mail service, Ftp service, etc., but also dynamic data like a database query service. Type of service provided by more the greater the impact on the server, if access to the server is too big, the greater the likelihood of problems, it is best to allocate resources efficiently, to avoid a server too much to bear traffic. If a service does not start, you can remotely restart the service; occur if the server crashes, it immediately so that IDC service providers on duty restart the server to release resources to achieve the purpose, after a reboot or related treatment you can quickly return to normal.

4. Technical capacity, misuse or non-standard operation

Client server, poor management, if the technical staff of the technological strength is not good enough, you may be wrong on the server operation or operation is not standardized, resulting in the server can not access.

5. Safe, hacker intrusion

Server has been penetrated by hackers or malicious attack, or sudden large server traffic, it will adversely impact the server, or even a vicious incident.

6. Server aspects of the fault

Server, problems may arise where, mainly memory, hard drive, applications and so on. Designed to be unreasonable if the IDC may be bad because of heat, there CPU downtime due to excessive heat; if memory compatibility is not good, it will affect the server performance degradation, such as dust, static electricity, air circulation, wind problem affect the normal operation of the server.

Rent server hosting server and the problem solution

1. Learn more about servers, providers, etc.

Managed services customers need before, will consult various aspects, including understanding the background of service, price, service quality, server performance and other information and data, sources of information through newspaper advertisements, Internet, friends and co-operation partners. Enterprises in the purchase of a server as far as possible to understand the server's expert advice before buying in determining what to pay attention to understand clearly, and then decide what to buy the brand and performance of the server.

2. Outsourced to professional service organizations

If there is demand for business, I can allow professional service providers to be responsible for procurement, outsourcing to a unified company, responsible for the procurement of hardware, software purchase and installation, system development and debugging, custody and maintenance of a range of services, this can be as much as possible to avoid the purchase is not suitable for their own servers and related products and services losses. Server in the purchase process needs to consider many factors, but the most important application is based on business requirements to select their own server configuration standards, not everything needs the best, most expensive products. To meet their own needs, but also a lower investment and ensure that the server normally, and stable operation, is the best server.

3. Server vendors to provide solutions

Server manufacturers have a variety of solutions, there are variety of server is completely designed for users of products IDC, the original structure and configuration of the server some adjustments would be more suitable for current users. IDC user applications include WWW, Mail, Ftp, and database query services. Server vendors to provide better products, the part of the application software pre-installed on the server, to provide customers with a package of solutions, so companies can expand server sales, but also to solve the practical difficulties encountered by customers.

4. By providing a platform for IDC services, server and other resources available to the client companies

IDC business from the current development trend, the server hosting the proportion declined steadily, and this contrast is the proportion of rented servers to grow rapidly. Basically, the current IDC service providers have launched a server rental business and the price is very cheap, the customer does not require any hardware and software investment, just a one-time capital investment that can enjoy high-speed broadband access, software and server rental, value-added services, applications, rental and other services. IDC service providers are already aware of the current development trends, to hardware manufacturers, software vendors, application service providers together to provide customers with a comprehensive service platform. Enterprises to choose a server problem needs only themselves, by the IDC service providers by adjusting the data to meet customer demand, this service model has been in ChinaNetCenter good practical application.

Server hosting server and rental recommendations

銆??1.瀹㈡埛鍦ㄩ?鎷╂湇鍔″櫒鏃讹紝绗竴鑰冭檻鐨勫簲璇ユ槸鎵樼鎵?渶瑕佺殑搴旂敤鏈嶅姟锛岀劧鍚庣‘瀹氭湇鍔¢渶瑕佺殑纭欢鍜岃蒋浠剁殑閰嶇疆

銆??浠ュ墠浼佷笟鍦ㄥ噯澶囨墭绠℃椂锛屾?鏄厛鎯冲ソ璐拱涓?彴楂樻。鏈嶅姟鍣紝鐒跺悗甯屾湜绉熺敤澶氬ぇ鐨勫甫瀹芥潵鎵樼鑷繁鐨勬湇鍔″櫒锛岃?涓嶆槸浠庤嚜宸辩殑瀹為檯闇?眰鍑哄彂鏉ラ?鎷╂湇鍔″櫒鍜孖DC鏈嶅姟鍟嗭紝浣嗚繖鏍风殑鏂瑰紡鏃㈡氮璐硅祫婧愬張澧炲姞浜嗙敤鎴风殑璧勯噾鎶曞叆銆?br />
銆??浼佷笟鍦ㄥ缓璁剧綉绔欐垨鏄紑灞曠數瀛愬晢鍔℃椂锛屾湭蹇呴渶瑕侀珮妗f垨鏄环鏍兼槀璐电殑鏈嶅姟鍣紝涔熶笉涓?畾闇?鍦↖DC绉熺敤寰堝ぇ鐨勫甫瀹姐?瀹屽叏鍙互鏍规嵁鑷繁鐨勫疄闄呭簲鐢ㄩ渶姹傦紝鏉ヤ紒涓氬喅瀹氳喘涔拌嚜宸辩殑鏈嶅姟鍣ㄥ搧鐗屽拰閰嶇疆鏍囧噯锛屽鏋滃仛鍏嶈垂鐢靛瓙閭欢鏈嶅姟锛岄偅涔堝瓨鍌ㄥ櫒涓?畾瑕佸ぇ浜涳紝鍙互閲囩敤澶氫釜纭洏鎴栨槸纾佺洏闃靛垪锛岀敋鑷虫槸缃戠粶瀛樺偍璁惧;濡傛灉鏈夋暟鎹簱鏌ヨ鏈嶅姟锛岄偅涔堝唴瀛樹竴瀹氳澶т簺;濡傛灉缃戠珯鐨勮闂噺寰堝ぇ锛屽氨闇?閲囩敤璐熻浇鍧囪 鎶?湳;濡傛灉鏁版嵁閲忓緢澶э紝閭d箞鏁版嵁澶囦唤鍜屾剰澶栦簨鏁呯殑鏁版嵁鎭㈠鎶?湳涓?畾瑕佸己銆傛?浣撴潵璇达紝浼佷笟閫夋嫨鏈嶅姟鍣ㄦ椂锛屼竴瀹氳浠庤嚜宸辩殑搴旂敤闇?眰鍑哄彂鏉ラ?鎷╁搧鐗屽拰鏈嶅姟鍣ㄧ殑閰嶇疆锛屾病鏈夊繀瑕侀?鎷╂渶濂藉拰鏈?吹鐨勶紝鑳芥弧瓒宠嚜宸辩殑闇?眰灏辨槸鏈?ソ銆?br />
銆??2.楂橀厤缃笉绛変簬楂樻?鑳斤紝绋冲畾鎬у拰鎵╁睍鎬ф渶涓洪噸瑕?br />
銆??鏈嶅姟鍣ㄧ殑鍚勪釜缁勬垚閮ㄥ垎鏄竴涓湁鏈虹殑鏁翠綋锛屽郊姝ょ浉鑱旂郴鍜屼簰鐩稿奖鍝嶃?鍦ㄩ?鎷╂湇鍔″櫒鏃朵竴瀹氳鑰冭檻鍒板悇閮ㄥ垎鐨勫吋瀹规?锛屼粠鑰岃揪鍒伴厤缃兘鍙戞尌鏈?匠鐨勬?鑳姐?鏈嶅姟鍣ㄦ渶閲嶈鐨勬寚鏍囧氨鏄ǔ瀹氭?锛屽挨鍏舵槸IDC鍐呰繍琛岀殑鏈嶅姟鍣紝瀹冨繀椤绘槸24脳7脳365鐨勫伐浣滄椂闂达紝鎵?互瀵规湇鍔″櫒鐨勭ǔ瀹氭?灏辫姹傚緢楂樹簡锛屽繀椤昏兘淇濊瘉瀹冧滑鐨勭ǔ瀹氥?瀹夊叏銆佹甯稿湴宸ヤ綔銆傚鎴锋墭绠℃湇鍔″櫒鍚庯紝闅忕潃瀹㈡埛璁块棶閲忓拰鏈嶅姟鍙樺寲锛屾湇鍔″櫒闇?涓嶆柇鍦板鍔犳垨鏄噺灏戠浉鍏崇殑杞‖浠讹紝浠ヨ揪鍒颁笉鏂湴鎻愰珮鏈嶅姟姘村钩鍜屾湇鍔¤兘鍔涳紝鎵?互鏈嶅姟鍣ㄤ竴瀹氳鏈夊緢寮虹殑鍙墿灞曟?锛屼负瀹㈡埛鎻愪緵鍙墿灞曠殑绌洪棿銆?br />
銆??3.閫氱敤鏈嶅姟鍣ㄥ悜涓撶敤鏈嶅姟鍣ㄥ彂灞曪紝鏄撶敤鎬у拰涓撶敤鎬ч潪甯告槑鏄?br />
銆??闅忕潃浜掕仈缃戠殑鍙戝睍锛屽鎴峰鏈嶅姟鍣ㄧ殑瑕佹眰涔熷湪涓嶆柇鎻愰珮鍜屽彉鍖栥?鍥犳锛岀洰鍓嶇殑閫氱敤鏈嶅姟鍣ㄥ皢浼氶?娓愬湴鍚戜笓涓氭湇鍔″櫒杞彉锛屼互鐢靛瓙閭欢涓轰緥锛岀數瀛愰偖浠舵湇鍔′互鍓嶅彧闇?鍦ㄤ换浣曚竴鍙版湇鍔′笂瑁呬笂涓?鐢靛瓙閭欢杞欢鍗冲彲浠ユ彁渚涚數瀛愰偖浠舵湇鍔★紝涓嶇瀹冪殑绋冲畾鎬ц兘濡備綍锛屼篃涓嶇瀹冨鐞嗛偖浠剁殑鑳藉姏濡備綍锛屽彧瑕佽兘鐢ㄥ氨鍙互銆備絾浜嬪疄杩滀笉濡傛兂璞$殑閭d箞绠?崟锛屽鐢靛瓙閭欢鐨勬湇鍔′笌瀵筗eb鏈嶅姟鏄笉鍚岀殑锛岀ǔ瀹氭?鍜屾湇鍔″櫒鐨勫搷搴旈?搴﹂潪甯搁噸瑕併?鎵?互锛岄渶瑕佹湁涓撶敤鏈嶅姟鍣ㄦ潵鎻愪緵鏈嶅姟銆傛湭鏉ヤ紒涓氶偖灞?湇鍔″櫒鐨勫彂灞曡秼鍔垮簲璇ユ槸鏄撶敤鎬у拰涓撶敤鎬э紝鏈嶅姟鍣ㄧ殑閫夋嫨鍜岄厤缃兘搴旇鐩稿绠?崟锛屼笉闇?鏈夊お楂樼殑鎶?湳闂ㄦ锛屽苟涓斾笓鐢ㄦ?鐨勫彂灞曡秼鍔夸細闈炲父鐨勬槑鏄撅紝浠?箞鏍风殑鏈嶅姟灏变細鏈変粈涔堟牱鐨勭壒鐐癸紝涓嶅悓鐨勭壒鐐瑰氨闇?涓嶅悓鐨勪骇鍝佹潵婊¤冻浠栫殑瑕佹眰銆?br />
銆??4.纭欢鍜岃蒋浠躲?缃戠粶璧勬簮鍏变韩鏄彂灞曡秼鍔?br />
銆??IDC鐢ㄦ埛鐨勪竴涓噸瑕佺壒鐐瑰氨鏄祫婧愮殑鍙叡浜?锛岃繖涓?壒鐐瑰湪鐩墠鐨処DC鐢ㄦ埛涓繕鏃犳硶寰椾互浣撶幇锛屼笉鍚屽鎴峰洜鑰冭檻鑷繁鏁版嵁鍜屼俊鎭殑瀹夊叏鎬э紝涓嶅彲鑳戒笌鍏跺畠鐨勫鎴峰叡浜‖浠跺拰杞欢璧勬簮銆備絾鏄湭鏉ョ殑鍙戝睍瓒嬪娍锛屼笉鍚岀殑瀹㈡埛鍙兘鍏变韩IDC鎻愪緵鐨勭綉缁滃瓨鍌ㄣ?澧炲?鏈嶅姟銆佸簲鐢ㄦ湇鍔$瓑鍚勭被鍨嬭祫婧愩?鏈嶅姟鍣ㄤ腑鐨勯儴鍒嗚澶囧彲浠ヨ揪鍒板叡浜紝杈惧埌璧勬簮鐨勪紭鍖栧拰鎴愭湰鐨勯檷浣庯紝鎻愰珮璧勬簮鐨勫埄鐢ㄧ巼銆?br />
銆??5.杞欢涓庣‖浠朵簰琛ユ?寮猴紝缁煎悎鑰冭檻閫夋嫨鏍囧噯

銆??瀹㈡埛鍦ㄩ?鎷╂湇鍔″櫒鏃跺簲璇ヤ粠杞欢涓庣‖浠朵袱鏂归潰鏉ヨ?铏戙?濡傛灉瑕佽繍琛屽ぇ閲忓簲鐢ㄨ蒋浠讹紝鍒欓渶瑕佸ぇ鐨勫唴瀛?濡傛灉闇?璐熻浇澶ц闂噺锛屽氨闇?鑰冭檻杈冨ぇ鐨勫唴瀛樸?纭欢涓庤蒋浠剁殑閰嶅悎鑹ソ鎵嶈兘鍙戞尌鏈嶅姟鍣ㄧ殑鑹ソ鎬ц兘锛屼粎浠呰拷姹傛湇鍔″櫒鐨勭‖浠堕珮妗e寲锛屽鏋滄病鏈夎蒋浠剁殑閰嶅悎锛屼篃鏃犳硶淇濊瘉鏈?粓鏈嶅姟鐨勯珮鎬ц兘鍜岀ǔ瀹氭?銆傚洜姝わ紝鍦ㄩ?鎷╂湇鍔″櫒鏃跺簲璇ヤ粠涓ゆ柟闈㈢患鍚堣?铏戯紝浠ョ患鍚堟寚鏍囨潵閫夋嫨鏈嶅姟鍣ㄣ?







相关链接:



flac to mp3 converter



The first THIRD-PARTY payments for business licenses will be issued in June



Quit with the accumulation of



What Is Rmvb



BenQ competing against the shining 2008 SEPG Conference



Do not let the knowledge base has become Garbage



Programming For The Constrained Environment



Report Dictionaries EDUCATION



C # Learning Notes (April 3)



Vob to mpg



Ma and Wang Shi in the end how much of the Donations for the disaster area?



Teach you to manually remove Angola variants



flv mp4



Brief Server Applications



Depth: "Anti" monopoly prove Safety



Wednesday, July 21, 2010

Do not Ping My Computer


To find objects in the hacking, most use Ping command to test the host, if Ping barrier, the level of bad "hackers" will quit most. In fact, can create a false impression, even if we are online, but can not be connected when the other Ping This can avoid a lot of attacks.

The first step: Add Standalone Snap-in


Start - Run, type: mmc, start to open "Control Panel" window. Then click "Control Panel" menu under "Add / Remove Snap-in", click "Add" button in the pop-up window, select "IP Security Policy Management" item, click "Add" button. In the Open window, select managed objects for the "local computer", click "Finish" button, and close the "Add / Remove Snap-in" window, return to the console.



(Figure 1)

Step two: Create IP Security Policy

Right-click the newly added "IP Security Policies on Local Machine" (Figure 2), select "Create IP Security Policy", click "Next" and then enter a policy described as "no Ping" (Figure 3). Click "Next", select "Activate the default response rule to" restore options, click "Next." Began to set the authentication mode, select "This string is used to protect the key exchange (preshared key)" option, then enter some random characters (the characters following will be used) (Figure 4). Click "Next", will be prompted to complete the IP security policy has been confirmed to select the "Edit Properties" check box, click the "Finish" button, will open its Properties dialog box.



(Figure 2)



(Figure 3)




[Next]





(Figure 4)




[Next]



Step Three: Configure Security Policy

Click the "Add" button and open the Security Rule Wizard, click "Next" to set the end of the tunnel, where select "This rule does not specify a tunnel." (Figure 6) Click "Next" and select "All network connections" to ensure that all computers are Ping unreasonable. Click "Next", set the authentication method, and as the third option above, "This string is used to protect the key exchange (preshared key)" and fill in with just the same content. Click "Next" in the open window, click the "Add" button, open the "IP Filter List" window. (Figure 7) Click the "Add", click "Next", set the source address to "My IP address", click "Next", set the destination address as "any IP address", click "Next ", select the protocol as ICMP, can now click" Finish "and" Close "button to return. At this point, you can see IP filter list you just created a filter, to select after click "Next", select the filter action is "required security settings" option (Figure 8), followed by clicking "Done", "Close" button to save the settings related to returns management console.



(Figure 5)



(Figure 6)




[Next]





(Figure 7)



(Figure 8)

Step four: assign security policies

Last only in the "Console Root" in the right-configured "against Ping" strategy, select "assign" command to configure the entry into force (Figure 9). After the above settings, when the other computer and then Ping the computer, no longer connected the. However, if your Ping local computer, still connected. This method is valid for Windows 2000/XP.



(Figure 9)






Recommended links:



Youtube to MPEG Pro



Free DVD RIPPER and Burner



Cartoons - Screen Savers reviews



How to enhance the productivity of textile and garment factories?



Mkv



Apolo DVD Editor



Open AVI to iPod



AVI to 3gp



Bliss M4P VQF to M3U Editing



Review Health And Nutrition



.m4v File



How the statistics of the time difference BETWEEN the two time points



Explosion DAT to DVD



Convert avi to mpeg4



Thursday, July 1, 2010

Youtube Video to H264 Ultra

Hot popluar youtube video Converter + download + player tool. With YouTube tool you can also convert downloaded YouTube videos to a format compatible with your favorite portable device; including - iPod Video, iPod Touch, iPod Nano, iPhone, Zune, PSP, as well as video capable MP3 players, video capable mobile phones, and Pocket PC, And finally... YouTube tool's embedded player will allow you to watch all your favorite YouTube videos off-line. So now you can enjoy any .flv and .swf videos anytime!
Supports YouTube video or any .flv and .swf file as input file. Supports not only YouTube video, but also various video formats as input file, including avi, DivX, XviD, rm, rmvb, MOV, MPEG, WMV. Supports a wide variety of output file format., including avi, DivX, XviD, rm, rmvb, MOV, MPEG, WMV. Provides various profiles, these profiles can meet the needs of most people. - is the most powerful YouTube assistant on the planet.



Recommand Link:



WinVDR PRO



Youtube Movie to iphone Plus



CaleSoft DVD Copy



How-to DVD to RMVB



QuickOne DVD to AppleTV



PeonySoft WAV Converter



Video to Sony NWZ-E436FBLU



flv TO swf



Review FTP Servers



Merry Video Editor



Explosion DVD To Xbox



brief Audio CD PLAYERS



Evaluate File And Disk Management



Converting Video To ZEN X-Fi