Saturday, October 23, 2010

Optional U disk watch "shell" scam


A few years ago also are luxury U disk, now put down his value, consumers increasingly approached. And compared to the traditional three-inch disk, U disk is not only the potbellied, pretend to be under the various "build" a large photo, music, games, also less susceptible to external damage, better data security .

Meanwhile, the small chic look, cool colors, all make the big tolerance gadgets as a young person's new jewelry, and more laid its next-generation storage tools dominance.

How to make this new "hegemony" is practical and obedient? Three-step, to help you create the perfect plan U disk!

Eyes that care "shell" U disk

Xiao Xu lives in dense downtown areas of Shanghai University Northeast films, more often stalls hawking cheap goods to sell Tuizhao Che, which Daorangxiaoxu benefit. One day, Xiao Xu see a students face Tuizhuo Che selling headsets, Repeater, U disk and the like. A random quotations, 64M, U disk even as long as 50! Although not a big brand, but Xiaoxu always wanted this thing U disk, not any number of technical content, so they did not hesitate to buy one. Who would have thought to try to go home only to find, the computer simply undetectable U disk, and then look closely, actually just bought an empty shells!

銆?銆怱mall alarm

How can I spend the least money to the best product? This may be the general topics of interest to consumers. This also made a lot of unscrupulous traders psychological advantage of the loophole. In fact, U disk market is very competitive, many businesses have adopted low-cost competitive strategy. Therefore, consumers can pay more attention to product advertising, through formal channels can, buy cheap affordable U disk.

In addition to pay more attention to store information, a proper understanding of the small number of U disk selection knowledge will help choose a cheap U-disk Oh!

First of all, Mo greedy, buy regular. Most ordinary people the role of U-disk data exchange not only data storage, so do not buy very greedy U-disk, generally between 32M-128M is a practical choice. General case of promotion, better brand of 64 trillion U disk selling for 70 yuan or so, so do not spread the risk to buy a shell on the U disk.

Secondly, the stability of the most important. Do not be so-called carry-Q advertisers advertising push email confused by language, in fact, the most important feature is the U disk data storage, can be stably stored without loss of data, U is the most important criteria for site selection. In fact, most users only use this function.

In second place is the start and hardware encryption. And some of the speculation out of the concept, nothing more than some of the U disk preloaded software, only to achieve specific functions, and of little practical significance. In fact, if you will, can create their own "scores of one" U-disk products.

Finally, to judge by the appearance of quality. U disk enclosure seal, there are two processes. One is fixed with screws, appearance, and there is not a good sealing; the other is the use of ultrasound technology package, high sealing, packaging and long service life out of U disk, but using this package on the plant and equipment and demanding process, the general small factories can not be achieved. Therefore, in general, U-disk sealed packaging and quality in the process will be more secure Oh!

Beware of tight to prevent leakage of the virus

Xiaodong usually like to surf the Internet side of the picture downloaded to the U side dish, but this month he found home broadband charges as high as 200 yuan, but his time spent online is absolutely no more than 80 hours, according to regulations due only 100 ah! After "the census", Xiaodong found himself broadband user name and password was cracked, and the culprit is the U disk dyed a strange virus.

In fact, Xiaodong have to feel badly: When using U disk, not only the message window will appear inexplicable, "the school I eat enough food, snack tray is garbage !!!", U heart will automatically generate a file while running this file will be a "program damaged, can not run" warning - can not think of this is the legendary Trojan!

銆?銆怱mall alarm

Xiaodong infection is quite popular recently, "e-album" (Win32.Troj.cimspark) virus, in fact the deleted method is simple. Experts, they do not run the program, the computer will not be infected with the virus. First, remove by hand. First of all, the system directory windows \ system32 under search SVCHOST.EXE file, if found red "heart" file, the first in Task Manager to end its process, and then delete the file. Second, anti-virus tools, such as PC omnipotent wizard, Duba Trojans only kill the virus can be cleared.

In fact, the use of U disk if there are good habits to avoid infection. When the Internet is best not to use U disk. As this would increase the infection probability of a virus or Trojan horse programs, and if the Internet must use flash drives to read data is the best write-protect switch to open it. Once your U disk speed is too slow or has an unknown file there, I remember first went to a professional drug test online antivirus antivirus website, do not rashly run that virus file, to avoid unnecessary losses suffered.

Through the use of errors across minefields

Millet, U disk, though not to buy any big-name goods, but also regular factory product. For some reason, less than half a year with millet, it appears the data loss, running too slow and so on. Insert the USB interface, sometimes, to try several times to be identified. U can look at other people's plate is not a big shipment, with more than a year are still fast. In the end how the back thing?

銆?銆怱mall alarm

In fact, tools, must find the know-how. Down the temper of these tools will not only more you use the more smoothly, but also reduce their losses. U disk in the process of using the same, a lot of misunderstanding, seems a small thing, but in use it will affect the efficiency of the process.

Take the U disk speed is too slow, if excluded, computer virus and quality of U disk itself, probably because when using the flash drive does not open the system, "write cache opened" this feature. Opened, write caching is: in Win98, WinMe may be by right-clicking "My Computer", select "Properties 鈫?Properties 鈫?File System 鈫?removable disk" enabled "after the write cache" dialog box before the tick ; in under WinXP can open the "My Computer", right-click the removable disk, select "Properties 鈫?Hardware" and then select the flash disk drive is located, click the "Properties 鈫?Strategy", select "for the performance Optimization ... ... "dialog box, and click OK.

Similarly, the usually careful attention in the use and maintenance, are also important. For example, never in the flash of light when the flash was quickly pulled out flash drives, because then U disk is reading or writing data, pull out halfway may cause hardware damage to the data. Also, do not shut down immediately after the backup documentation related to the procedure, because at that time on the U drive is still flashing light, indicating procedures have not completely ended, then unplug the U disk, it is easy to affect the backup. So, back to the flash file, it should be some time to close the related procedures to prevent accidents; the same token, the system prompts "can not stop" Do not pull out when U disk, it will also cause data loss.

In addition, attention will be placed in the U disk dry environment, do not let U disk interface prolonged exposure to air, otherwise easily lead to the surface of metal oxide, reduced interface to sensitivity. At the same time, do not need a long time has been inserted in the U-disk USB interface, or interfaces while easily lead to aging, the other on the U drive is also a loss.






相关链接:



The problem is with Chinese characters - five-stroke input



Review Helpdesk And Remote PC



Next-generation iPhone were reviewed by the Ministry of Industry



China OLPC Alliance Brewing Threat Of Wintel Alliance Formed



AVI to DivX



Food And Drink Storage



HTML 5 will be discarded, and the elements will be enhanced



New Converters And OPTIMIZERS



AMT share AND create competitive



Chen Zhou reflect years of business success: The greatest scar has not come yet



Middle figure PAINTING



XviD TO WMV



Unformat sd card unformat sd card data unformat



MKV To Zune



Monday, October 18, 2010

Flash CS4 Production rotating three-dimensional character animation



The case of thinking: The circular array emission words, for the text to create the traditional motion tween, and add the "fuzzy", "light" and "projection" filter to modify graphics.

First, arrange the text

(1) Start Flash CS4, create a new document, document properties and then do the settings shown in Figure 1.






Figure 1

(2) Click the "tool box" in the "Text tool" button, and then in its properties panel to do the settings shown in Figure 2 and Figure 3 shows the input stage of the text.






Figure 2 to set the font properties






Figure 3 Enter the text

(3) create a new "Layer 2", then hold down the Shift key while using the "Ellipse Tool" draw a circle as shown in Figure 4.






Figure 4 Round Draw

(4) select the text, then press Ctrl + B key combination to break up the text, shown in Figure 5.






Figure 5 break up text

(5) use the "Select Tool" to drag the text to the text around the circle to the line emission, shown in Figure 6.











Figure 6 Emission text

Tips:

In emissions can be activated when the text "tool box" in the "Snap to Object" button (activated state), so that when the discharge will automatically closely aligns the text round the line.

(6) in turn to select a single text, and then press the F8 key words are to each movie clip, then use the "arbitrary deformation tool" to adjust the text direction, as shown in Figure 7, delete the circular line, and then select all the text will eventually convert it to movie clip, the effect shown in Figure 8.






Figure 7 to adjust the text direction






Figure 8 text effect

Second, rotation animation

(1) into the movie clip editing area, then select the first 100, then press F6 key to insert a key frame, as shown in Figure 9.






Figure 9 to create a key frame

(2) select the first one, then right-click on the frame, and in the pop-up menu, select "Create a traditional meeting between the" command, the last in the properties panel to do the settings as shown in Figure 11.






Figure 10 to create the traditional meeting rooms






Figure 11 Rotation property to set

(3) to return to the "Scene 1", create a "background layer", and then use the "rectangle tool" to produce a green background, as shown in Figure 12.






Figure 12 Add a background

(4) Select the movie clip, then press the F8 key then transformed into movie clip (named "spin the word"), then enter the movie clip's editor, create a new layer, and finally copy the movie clip to new layer, as shown in Figure 13.






Figure 13 Copy Graphics

(5) selected the first 50 frames of two layers, then press the F6 key to insert a key frame, as shown in Figure 14.






Figure 14 insert key frame

(6) and then select the first 100 frames of two layers, press F6 key to insert a key frame, then the first 50 in two layers to create the traditional motion tween, shown in Figure 15.






Figure 15 to create the traditional motion tween

(7) selected the first 100, then use the "arbitrary deformation tool" of the two layers into a movie clip to adjust the effect as shown in Figure 2-16.






Figure 16 to adjust the text shape

(8) to create two layers, then in 170 and 200 Department to create a key frame, again using the same methods in two layers between 170 ~ 200 created a traditional motion tween, and finally two layers of the video clip to adjust the text as shown in Figure 17 into effect.






Figure 17 to create the traditional motion tween

(9) Select "Layer 1" and "movie clip", and then moving down the number of pixels, and then to add "fuzzy" and "light" filter specific parameter settings shown in Figure 18.






Figure 18 Add a filter

(10) to create two layers, then the first two layers 340 and 400 Department to create a key frame, again using the same method to create between 340 ~ 400 out of the traditional motion tween, Finally, "Layer 2" s 400 Division into a movie clip to adjust the effect as shown in Figure 19.







Figure 19 to create the traditional motion tween

(11) Select "Layer 1" at 400 Department of movie clips, then move up a number of pixels, then set the text color to black, and finally use the "arbitrary deformation tool" to adjust the results as shown in Figure 20 .






Figure 20 to adjust the text

(12) to create two layers, then the first two layers to create Division 500 key frames, and then the "layer 2" of the black text to add "projection" filter, and finally adjust, "Layer 1 "in white writing" light "in the color filter, the specific parameter settings as shown in Figure 21.






Figure 21 to adjust filter parameters

(13) using the previous method to create loop back frame animation (the first one will be copied to the back of the frame to form a loop animation), then rotate the text as shown in Figure 22 results.






Figure 22 animation

(14) to return to the "Scene 1", then the movie clip add a "light" filter specific parameter settings shown in Figure 23.






Figure 23 Add a filter

(15) press Ctrl + Enter key combination release animation.







Recommended links:



Why not read the disk drive?



3GPP TO WMV



Good Font TOOLS



The basics of intrusion detection rules



Internal control: harm than GOOD, or at every step



Comment Multimedia Creation Tools



MPEG4 To MPEG



How to identify real And can automatically create index index



Detailed Analysis: Teach You To Master The Table Character Set And Proofreading



How to stop rundll32 exe errors fixing errors



With JSF + Spring + IBatis build a simple framework



Chen Qishen: Production is not magic



Simple FTP Clients



SA118 Chinese Translation 2



MPG to DIVX



Alternative: FrontPage also play image format conversion



Friday, October 8, 2010

"Deceiving" or "enlightened approach"



Not long ago, the United States have made a home for 2 more than 1000 computer crime survey of SMEs in the network, 88% of companies surveyed in 2005 had at least one safety incident occurred, but nearly half of the company up to four security breaches have occurred accident! Correspondingly, is a separate survey showed that more than 90% of IT managers think that business has been conducted on the company's effective security protection, and only less than 4% of the people a correct understanding of the enterprise information system is difficult to be 100% perfect security.

In fact, most enterprises, especially SMEs, IT director of information security appears blind optimism is not accidental. They tend to believe that their business structure is as complex as many large enterprises, and has been equipped with the mainstream market, anti-virus software and firewall equipment, so should be able to sit back and relax.

However, these enterprises, especially SMEs located in the business environment and the need to face the main enemy - the hacker, and five years ago have made a big difference ... ...

The lifeblood of exposure

First, from the environmental point of view, the network spread and spread, making it the most important drivers for SME development, Er the competitiveness of SMEs edge, largely embodied in its markets and customers a high degree of rapid response, therefore, more dependent upon information networks.


More and more SMEs into their business systems on the network, the network security threats for the information also will increase:

1. Unlike earlier centralized applications, computer systems are mostly small and medium enterprises is based on client / server model and Internet / Intranet network computing model for distributed applications, in such an environment, the company's database servers, file servers, application servers are connected to the network's "door", as long as there is a "gate" did not fully protect, "hackers" will enter the system through the door, theft or destruction of all resources.

2. Intranet improving, with hierarchical network structure, a leading Internet company's transmission link, due to the growing third-party connections, on-site office of the temporary staff needed to connect to the corporate network, and the company's own employees are increasingly mobile stronger, resulting in threats to the Internet can bypass border controls, and then from within a relatively rapid rate of spread. According to ICSA, currently within the system from the enterprise security threat by up to 60%. Therefore, in addition to the original need to protect the growing number of infrastructure, the companies now need to protect the internal network and systems.

3. As the need to maintain a competitive edge, so each company must be applied more rapidly emerging technologies (eg, WLAN, VoIP, and Web services) and all existing technologies and platforms, the new version. Together with a number of important applications built on the internal network, such as property marketing system, customer management systems, office systems. All enterprises not only to manage and protect more computing infrastructure and applications, but most of them are emerging complex structure and procedures, highly fragmented. Results are due to configuration errors and negligence leading to the increasing vulnerability of code.

4. SMEs are usually high growth companies, with the continuous development and growth of enterprises, number of terminals within the enterprise increasingly expanding and changing, increasing the security management more difficult.

Hackers armed

And the increasingly complex and difficult to manage than the information environment, SMEs face a more direct challenge comes from the hacker. In recent years more and more motivation for committing the crime hackers strongly driven by economic interests, and most of the development of SMEs which customer records, financial data, technical characteristics of high commercial value, but the protective measures are often relatively single, so be the best target for hackers.

The past, people might think that hackers will not be developed for SMEs specific means of attack, because it looks more harm than good, in fact, according to Symantec survey found that the development of new malicious software, making the difficulty of getting lower and lower, increasingly sophisticated hacking toolkit growing and can be downloaded anywhere on the Internet, threatening the production of software and modular construction techniques led to the development threat to the behavior of common variants.

At the same time, these security threats are increasingly shorter generation time. From the discovery of new vulnerabilities to launch attacks against the vulnerability of a particular time between the inevitably shortened. In fact, according to recent statistics, leaving enterprises "patch" of the "window of time" on average only six days. Therefore, even if some businesses related to staff time to time on the vulnerabilities the updates, the network is still difficult to guarantee their safety, but at present most SMEs rely on antivirus software and firewall during the update of time, are facing similar problems.

Finally, the hackers use through the use of a variety of mechanisms, and effective method of load or spread of the hybrid means are more likely to avoid the invasion of defense enterprises, and successfully achieve its purpose. Another reason for the worsening situation led to a hacker attack system and the current main weaknesses in the application layer, not the network layer of vulnerability. In this way, they often focus on network layer attack protection strategy activities slip through the net, unfortunately, as mentioned at the outset, most SMEs are only by virtue of such security measures to protect themselves, and that has been foolproof.

Comprehensive intrusion prevention

Bring these issues to face the confusion and challenges for SMEs, Symantec believes that the key point is that the majority of SMEs by focusing on the border is highly reactive defensive measures, it can not maintain the current trend of ever-changing threats synchronization. The new security threats now emerging, and spread with unprecedented speed, will inevitably lead to the current chaos.

In other words, SMEs should be aware of multi-level security measures onion theory, adopt the intrusion detection, intrusion prevention represented mixed preventive measures possible to ensure network security. This is because normally the firewall access control policy is to implement a system of checks flowing through the network traffic, block non-compliant packets. Traditional firewalls to reject those obvious suspicious network traffic, but still allow certain traffic through, so do anything for many intrusion. An invasion of protection technology through the monitoring network or system resources, look for violations of security policies, action or intrusion signs, activities and attacks on the invasion of intercept network traffic and avoid the resulting loss, this way, the problem packets, and all follow-up from the same data stream of data packets, in the IPS device can be removed.

Symantec network security solutions for SMEs, the integration of and highlights the intrusion detection and intrusion prevention system role, such as the Symantec Network Security 7100 (hereinafter referred to as SNS) line of security appliances, regardless of the environment in which the network topology run, by clicking the mouse in the intrusion detection and intrusion prevention switch between modes, this flexibility in the protection of security, network applications as possible to ensure patency.

姝ゅ锛岃櫧鐒惰禌闂ㄩ搧鍏嬬殑鍏ヤ镜闃叉姢绯荤粺铏界劧鏄熀浜庣綉缁滅殑璁惧锛屼絾瀹冨嵈涓昏鐢ㄤ簬鍦ㄨ绠楀爢鏍堢殑鎵?湁灞傞樆姝㈡敾鍑伙紝鍥犳闃叉姢涓ュ瘑鍏ㄩ潰銆傚叾涓昏鎶?湳鐗规?濡備笅锛?br />
路閲囩敤鍒涙柊鍏ヤ镜闃茶寖缁熶竴缃戠粶寮曟搸 (IMUNE)銆侷MUNE 鏋舵瀯缁撳悎浜嗗绉嶆娴嬫妧鏈紝涓嶄粎鍙互鍑嗙‘鏍囪瘑宸茬煡鍜屾湭鐭ユ敾鍑伙紝鑰屼笖鍙互灏嗗涓嶅瓨鍦ㄥ▉鑳佺殑鍚堟硶閫氫俊鐨勫奖鍝嶉檷鑷虫渶浣庛?IMUNE 绯荤粺杩樺寘鍚鑷畾涔夌壒寰佺殑鏀寔锛涙壂鎻忋?渚﹀療鍜屾帰娴嬫娴嬶紱鎷掔粷鏈嶅姟妫?祴銆佸悗闂ㄦ娴嬩互鍙?IDS 鍥為伩妫?祴銆?br />
路瀵规敾鍑讳富鍔ㄦ嫤鎴?SNS璁惧鍙互宸ヤ綔鍦ㄩ?鏄庢ā寮忎笅锛屽湪涓嶆敼鍙樼綉缁滅粨鏋勭殑鍓嶆彁涓嬶紝鑷姩鎷︽埅闈炴硶鐨勭綉缁滆闂紝瀹炵幇涓诲姩闃插尽銆?br />
路娣峰悎妫?祴浣撶郴缁撴瀯锛岃瘑鍒浂鏃堕棿鏀诲嚮銆係NS缁勫悎鍗忚寮傚父妫?祴銆佺姸鎬佺壒寰佺鍚嶃?婕忔礊鏀诲嚮鎷︽埅銆侀?淇¢?鐜囩洃鎺с?IDS 閫冮伩澶勭悊銆佹暟鎹祦绛栫暐鍐茬獊銆両P 鍦板潃鎷嗗垎閲嶇粍浠ュ強鑷畾涔夊寮虹壒寰佺鍚嶆弿杩拌瑷?潵鏀堕泦鎭舵剰娲诲姩鐨勮瘉鎹?SNS 7100 鐨勫崗璁紓甯告娴嬫湁鍔╀簬妫?祴浠ュ墠鏈煡鐨勬敾鍑诲拰鏂版敾鍑伙紙鍦ㄥ畠浠彂鐢熸椂妫?祴锛夈?姝ゅ姛鑳界О涓衡?闆舵椂闂粹?妫?祴銆?br />
路瀹炴椂浜嬩欢鍏宠仈鍜屽垎鏋愶紝蹇?瀹氫綅浼佷笟缃戝▉鑳佹潵婧愩?SNS鐨勫叧鑱斿拰鍒嗘瀽寮曟搸鍙护鎺夊啑浣欐暟鎹?鍙垎鏋愮浉鍏充俊鎭紝浠庤?浣垮緱鎻愪緵鐨勫▉鑳侀?鐭ヤ笉浼氬嚭鐜版暟鎹秴杞姐?SNS 浣跨敤璺ㄨ妭鐐瑰垎鏋愬湪浼佷笟缃戝唴鏀堕泦淇℃伅锛屼粠鑰屽揩閫熷湴甯姪绠$悊鍛樺紕娓呮瓒嬪娍骞跺湪鐩稿叧浜嬩欢鍜屼簨鏁呭彂鐢熸椂璇嗗埆瀹冧滑銆?br />
路鑷姩鐨凷ymantec 瀹夊叏鏇存柊銆傛潵鑷?Symantec 瀹夊叏鍝嶅簲涓績鐨勫畾鏈熴?蹇?鍝嶅簲 瀹夊叏鏇存柊鍙彁渚涙渶浣崇殑瀹夊叏淇濇姢鍜屾渶鏂扮殑瀹夊叏涓婁笅鏂囦俊鎭紝鍖呮嫭鍒╃敤鍜屾紡娲炰俊鎭?浜嬩欢璇存槑浠ュ強鐢ㄤ簬闃插尽涓嶆柇澧炲鐨勫▉鑳佺殑浜嬩欢缁嗗寲瑙勫垯銆傝繖浜涙搷浣滃ぇ澶у噺灏戜簡浼佷笟绠$悊鍛樼殑缁存姢宸ヤ綔閲忋?

鐢辨鎴戜滑鍙互鐪嬪嚭锛岃禌闂ㄩ搧鍏嬫彁渚涚殑涓皬浼佷笟鍏ヤ镜闃叉姢绯荤粺锛屼笉浠呯潃鐪间簬灏嗕腑灏忎紒涓氱殑瀹夊叏闃叉姢姘村钩鎻愬崌鍒颁笌鐜伴樁娈靛畨鍏ㄥ▉鑳佺浉閫傚簲鐨勬柊楂樺害锛屾洿浠庨儴缃层?缁存姢鐨勪究鍒╂?锛屽崌绾с?绠$悊鐨勭畝渚挎?涓婏紝璁╀腑灏忎紒涓氱殑淇℃伅瀹夊叏闃叉姢锛岀湡姝d粠鈥滄帺鑰崇洍閾冣?浼肩殑鐩茬洰涔愯杞彉涓衡?鎴愮鍦ㄨ兏鈥濈殑瀹夋灂鏃犲咖銆?br />






相关链接:



Hot REMOTE Computing



Install And Setup Introduction



Foreign general manager of Intel low-key arrival in shaping China's power structure



After the wedding, the trouble Unicom iPhone



C2C staged "Three Kingdoms"



Faster "Save All"



Samsung s5150 diva coming on january



Was the fate of the attention of young people again and again - Liu Chuanwei



MKV to ZUNE



AVI to DivX



First Financial Weekly: direct supply in the Shadow of Digital China



Harvest autumn harvest eMEX Internal Security Code



Shell Tools brief



EVD GB Classic caught in foreign control of position to defend the right to speak



XviD to WMV



The Face Of OOXML, How Can We Do?



Simple MANAGEMENT And Distribution