Monday, October 25, 2010

Express (FlashGet) The tone could be so cool



With Express (FlashGet) released the latest 1.82 version, the operation interface to rearrange the main menu, new icons, gives a fresh feeling. But after the download is complete, or so the harsh tone, with the new version seems very inconsistent. I decided to move hands to create Express (FlashGet) personalized tone.

First, find the sound settings

Express (FlashGet) has provided, set up in the "Add new task", "mission success", "mission failure", "full completion," the voice of the four states.
We in turn click on "Tools - Options - Program / Event", will see their presence (Figure 1). The "open voice" is selected, during the operation and download the appropriate end will hear the software comes with sound.


Figure 1

Second, understanding of sound files

By observing Figure 1, we find the sound file name suffix. Wav, in fact WAV (Wave Audio Files) is Microsoft's development of a sound file format, its extension. Wav, audio to save the Windows platform, information resources, Windows platforms and applications are supported.

In our operating system already comes with a tape recorder, use it to record the sound files can satisfy Express (FlashGet) needs. Click the "Start - Programs - Accessories - Entertainment - Sound Recorder", tape recorders appeared in our eyes (Figure 2).



Figure 2

Using a headset, we just click on red circle recording button, you can record your voice down. In order to show personality, we can talk about for the previous four state record. "Male, download completed, come take a look at beauty bar", "handsome, download failed, the reason for you Come Zhao Zhao," ... ....

If you prefer online sound files of some classic comedy, which we can download to a local, through a number of software and convert them into. Wav format, so your download tone more lively sense of humor.

Third, set the character voices

Everything was ready, we first selected in Figure 1, "event" in a certain one, then click "Browse" to find the voice and make sure to use. This operation to complete the full set.
Personalized tone results in the end how what? Select the appropriate event, click on "Play" that can listen about.

Thus, the Express (FlashGet) to download individual tone has been completed, still waiting for? To get to the Internet to download some crazy, feeling called "male" sense of satisfaction it!









Recommended links:



Yang Jianrong policy first laid off TCL Computer is expected to cut 70% of R & D



ASF To MPEG



WMV TO MPEG



"Dream Zhu Xian," How the experience card



Xi Guohua, Vice Minister Of MII: China's 3G Licenses Around Four Factors



3GP to WMV



Cool I am a leading online high quality music box



FTP Operation of common sense



Audio Speech Comparison



Expert Vehicles - Screen Savers



"Aion" 1.2 There are a brush obs of the BUG is still alive



Miao Qinghai: Digital Agriculture DISCUSSION



How To Install Windows Xp On Sun Virtualbox 2.1.2



Thursday, October 21, 2010

To prevent the most effective way to Trojan


Anti-Trojan way to teach everyone, only for web Trojans, there are more than 90% efficiency, can prevent over 90% on your machine Trojan is executed, or even anti-virus software is able to detect the Trojan can prohibit the implementation. Before the point of principle.

Trojan is now nothing more than a page in the following ways to your machine in

1: the Trojan files into BMP files, and then with you in the machine to restore DEBUG EXE, 20% of online presence of the Trojan

2: download a TXT file to your machine, and then inside there is a specific FTP ^ - ^ for, FTP to connect their machines to download Trojan horse, the existence of the Trojan line of 20%

3: The most common way is to download an HTA file, and then the interpreter with a web control to restore the Trojan horse. The Trojan horse for more than 50% of online presence

4: The JS script, use the VBS script to perform the Trojan file, this type of Trojan horse to steal QQ, more, less stealing legend, probably about 10%

5: other

Now is the method to prevent

That is to windowssystemmshta.exe file rename, change what their casual (Win XP and Windows 2000 is in system32 under) HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerActiveX Compatibility under the Active Setup controls to create a new key based on CLSID (6E449683_C509_11CF_AAFA_00AA00 B6015C), then the new key create a REG_DWORD value type of key Compatibility, and set the key to 0x00000400 can.

There windowscommanddebug.exe and windowsftp.exe gave a change of name (or deleted)

Some of the latest effects of the most popular Trojan defense

Such as the popular network smss.exe Trojan horse that is one of the main body hidden in the 98/winme/xp c: windows directory, 2000 c: winnt .....

If you are in this Trojan first, we end with the process manager smss.exe trojan is running and then in C: windows or c: winnt directory create a 0 price and is set to read-only attribute smss.exe ~ (2000/XP NTFS disk formats, then so much the better, you can use the "Security Settings" is set to read) After this Trojan did not re-infection had been tested this way for many Trojans have a great effect. After such modifications, I am specifically looking for someone to test the hair of the Trojan site, the experimental results is about 20 trojans on the site, there will be about 15 Rising alarm, another 5 did not reflect the Rising, and my machine does not add out of the new EXE file, and no new process appears, but some remained in the wreckage of Trojan IE temporary folder, they are not enforcing it, there is no risk, it is proposed that we often clean up temporary files folder and IE.






Recommended links:



ASF to MPG



Warning: evil "cool dog" fake "cool dog" EVIL



MKV to MOV



Catalogs Security And PRIVACY:



RUP Anti-pattern



COREL KNOCKOUT Guide (1): Interface description



Sony BMG U.S. Federal Court approved a settlement agreement with the consumer



When The "vision" Into A "trap"



tips for phone users to make cheap calls



Transport Stream Converter



CMM Assessment in China Suggestions



"Want to" Match "can do"



Brief Puzzle And Word Games



Zhongguancun HAND new countryside



Jobs Leak Macworld Speech



Tuesday, October 5, 2010

Non-fiction list: set list "fashion" and "elegant"


The largest book market in 2006 list "'to study life-changing' Dangdang of the most influential annual book named" astonishing debut. The high gold content - all public voted to win the support of nearly a million readers in the domestic book market, which was a very unique beautiful scenery, and a textbook of many book lovers vane. The most popular book readers surfaced, non-fiction book list situation transform the competitive scene, it reflects the tendency of readers to read and taste changes, there is a great reference value for the market, called the largest list of domestic book market .

"Elegant": foreign monks chanting

Impressively out on top of non-fiction is the French fashion industry leading authority Andong Li Dealiao Mrs. classic "elegant", from the list results, "elegant" by such as a dark horse, battle through ranks, as if an alien posture will be chanting monks, surrounded by the vast number of Chinese readers, the final by a narrow margin win over the hot-selling fiction books, crowned Top10 top, of course, be non-fiction books list the first, "elegant," called the French fashion leading authority Andong Li Deeliao Mrs. classic since its introduction, best-selling Europe and the United States, on the stroke of her beautiful, wonderful and detailed proposals put forward. From the everyday to the small zipper accessories, Dealiao wife for all fashion problems Meaningful comments made concisely.

Local Library: an occasion to rally

First of all, that culture books, with the Beijing TV "Dream Man" large pick to the event, "Red House Literature" revival climax coming, cultural essays books "called A Reveal" Red, "" hot again The book is called A well-known Mr. CCTV-10 100 Dream forum talks in a written assembled, he started from the Twelve Beauties of Jinling in the qing and careful verification of the prototype of the book of life of all people, recovery of the "red Building Dreams "era of the birth of style, won the first human Essay category list. A nation, it is that ancient immortal soul, to all forms of expression in the endless time and space, one of the most important form, is reflected in their mother tongue to write a classic text. As Shakespeare and theater in Britain, Cao Xueqin and "Dream of Red Mansions" is part of the Chinese nation immortal soul. How to help it carry forward will be the external factors put a heavy task before us, television is undoubtedly popular culture to the revival of traditional Chinese literature played a positive stimulant to make such classics as the Red House to the waves in overcoming all obstacles, shine, good news.

In addition, the national history books, the Yi Zhongtian, Professor of the "Three Kingdoms" is still the list, he chaos to the Qin and Han dynasties; from the Three Kingdoms to return to unity of official history records, unofficial legend, drama presentation, Romance novels; different times Commentary different; different works of different descriptions; non-true and false opinion; success or failure suspicions; Xiamen University President, Professor Yi Zhongtian civilians standing position, through the modern perspective, the use of three-dimensional structure; to story characters to historical figures that to history that culture to culture that life; one of the words of the Three Kingdoms. In the course of the book publicity, television and online media for the attention of Chinese history and culture also played an indelible role, as "the Ming Dynasty that thing," spread rapidly through the network, wide concern. The security means, such as the "if only as shown signs of life" after experiencing a plagiarism controversy, returned to the limelight from the underestimation of the wave, a major media hype of the popular shows to boost local book an occasion to martial artists.

Other list: Eight Immortals, the fancy takes

Intimate sister Erikson's "Tell your child, you're list! "Stood out single broke into the Top50, and access to family education, list the first author with a long period of extensive and close contact with children, able to respect children, while educating and guiding children. Her book to the many important points, a large number of successful experiences and failures, for contemporary parents are extremely useful. This is also the book had the overwhelming support of parents, the reasons for the reader.

Has been inspirational entrepreneurs who loved books, competition is fierce, and finally, "How to control your own time and life" to a clear advantage was the first such book, author Alan La Professor Jin, the United States "time Management of the Father ", he pioneered the method of time management, after the Stephen Covey (" Seven Habits of capable and efficient, "the author) inherit and carry forward. Time management book is the most outstanding classical works, the main content has been in the "Reader's Digest", "New York" magazine and "Metropolis" magazine.

Beautiful list, with a "beautiful code" to the reader about the pursuit of beautiful images of women necessary to correct knowledge, not just the attention to certain aspects of the United States, but to achieve harmony in all aspects, the formation of the natural harmony of the United States. Kim Eun-joo of the color of personal color consultant, color psychology expert, as many South Korean politicians and CEO's professional image consultant, set up in the CBS broadcast of "working people the image of the design" column.

To be such as "Dream of Red Mansions" as the real long-term eye books attract readers, it needs great efforts on the content of the book, otherwise, short-eye culture will always be only a moment. Dangdang held this selection not only fully cover the range of readers reading reflects the tendency of readers to read the change and adhere to, and, for the Chinese classical literature and modern literature the degree of integration also made the depth of interpretation and expression, but also purchase of books for readers to choose the direction of providing a good guide, called the book market in the Bangzhong Bang.






Recommended links:



Photoshop create hyper-realistic relics



Icons Shop



"China Computer Business 500" award, awarded the two winning BenQ chase the deer



Top Printer



DivX to VOB



java ee 5.0 can replace struts spring and



REVIEW Hobby



Europe and the United States will not be outsourced as "mirage"?



Comparison of Access methods: optical access with ADSL access, contest



Tomcat for a similar visit to password IIS



TS To WMV



U.S. will send experts want to increase overseas trade negotiations to combat piracy WEIGHT



JSP Servlet automatically jump to the wrong instance of the page



FLV to 3GP



2005 Fun Workplace



UT Starcom orders by the Indian IPTV operator



Tuesday, September 14, 2010

Enhance the concept of active intrusion prevention IPS is not speculation


Intrusion Detection (IDS), has been put on the market for years, but more and more users find that it can not meet the new network environment for security needs.

IDS can detect passive attacks, and can not take the initiative to stop the threat to the vagaries of the network.

Therefore, it was urgent need to find a proactive intrusion prevention solutions, to ensure that the four enterprise network threat environment in normal operation.

Deep-level defense security needs

Currently, enterprises are facing increasingly complex security problems, security threats are growing rapidly, particularly the risk of blended threats, such as worms, DDoS attacks, spam mail, etc., greatly troubled the user to the enterprise's Wangluo cause serious damage.

So what options do business? Intrusion prevention system is the next generation of security systems business. It not only can be detected, can block the attack before they cause damage to the intrusion detection system to a new level. IPS and IDS obvious difference: intrusion prevention systems block the Code Red, Nimda and SQL Slammer, and the use of intrusion detection systems, users are required after each attack to spend millions of dollars for virus removal. Because of this, companies need the security strategy has not only limited to a single firewall and other protection products, but a deep-level protection strategy.

NAI launched includes host protection IPS technology strategy and network protection strategy for the two most, which is the McAfee Entercept host-based intrusion prevention solutions, technologies and rules of conduct signed by the integrated approach, providing an effective protection as Code Red, Nimda worm that attacks such as; McAfee IntruShield network intrusion prevention solutions, integrated feature library detection, abnormal behavior test, behavioral analysis, correlation, and denial of service techniques that can intelligently detect known attacks, the first place attacks and DDOS attacks, a deep level to effectively protect the enterprise network security.

IPS will replace IDS

Currently, IPS and IDS for the dispute, it was said, IPS, and no new technical breakthrough, but a conceptual speculation, Pubic do not think so. He believes that as technology development and continuous improvement, IPS will replace IDS, NAI IPS technology has been made in a number of international patents, IDS in the network is real-time detection of network attacks, while the IPS includes IDS technology In the IDS based on the increased detection of active response to block the defense function, once the attack is detected, you can take the initiative to cut the intrusion. Of course, true, IDS is already a mature product. Pubic think, IPS will take some time to replace IDS, IPS also requires the user to accept a change process, and now this change is also underway.

Currently, the face of mixed-type attacks, users need a proactive defense strategy, IPS is a large potential market for new business, therefore, NAI technically spent a great deal of input, hope to play a lead role. Now has more than 180 customers worldwide use of IPS products in China, after some users in the test trial of the IPS are also interested. Pubic believe, IPS will have a significant demand for this market, it is very useful to users. IDS products have been used for the user you want to migrate to IPS, you can purchase a license only on the user's input costs are also guaranteed.

It is reported that already has a financial company based on the original IDS, IPS purchased a few licenses to the successful deployment of intrusion protection system IPS.

In addition, IPS is a very technical product, the user's skill level requirements are high, and only on the IPS used properly, the effect will be significant, or just the opposite, but rather as IDS, so, user education and training essential. NAI will intensify efforts in this area, which is the current IPS technologies to promote the great challenges facing.

What is the real IPS

Currently there are many products on the market are dubbed "protection" of the word. But the real intrusion prevention solution should enable companies to analyze can not take measures to protect the system; the same time, it should prevent attacks result in the user's operating system, applications and data corruption. NAI believes that a good intrusion prevention solution should include the following features:

First, the real solution should provide real-time attack prevention and analysis. It should be before the start of any unauthorized activity to identify attacks, and prevent it from access to important server resources.

Second, intrusion detection is the most effective way is to adopt a mixed approach, that integrates specific attack signatures and behavioral rules of power. This hybrid method can provide the protection of known and unknown attacks, while at the same time keeping false positives to a minimum, so do not make any concessions on the loss.

In addition, a strong defense in depth security are based on the concept of protection can be deep. IntruShield's unique architecture integrates a number of patented technologies, including feature detection, anomaly detection and denial of service analysis to be able to multi-gigabit of network traffic and intelligent under the accurate detection and protection. This kind of creative control unprecedented ability of technology to protect those with the most stringent requirements of the network against known attacks to the first occurrence of unknown attacks and DoS attacks.

At the same time, enterprises have to choose whether to adopt the solution of advanced technology industry, is well-tested and used, and are subject to ongoing maintenance, it is very important.

Things correct safety and performance

IDS generally parallel in the network to bypass the network monitor in real-time detection of suspicious traffic, the performance is not significantly affected, but not IPS IDS, it is deployed mainly in the series in the network, all access to the internal network traffic to go through the IPS, if found aggression, to respond immediately to block attacks, so that will affect network performance, NAI also take into account this situation.

NAI's IPS performance is very good, IPS products in more than 20 integrated chip, 60G of cache, to ensure maximum network performance, and this is one of IPS's main selling points.

The so-called "true blue streak", despite the different opinions of the IPS's, but it is the concept of right, and it indeed has been in existence, many manufacturers are successively pushed IPS products, as long as the actual use indeed the role of the user's network security are effective, the user can try.






Recommended links:



convert avi Mp4



Realplayer iphone



Matroska format



youtube vob



Friday, July 30, 2010

J2ME Game NORMAL-FRAME



Summary points:

1. Class as the small, generally 2-5. Usually on a MIDlet, Canvas class, other classes are subsidiary.
2. Abandoning the concept of package package, are placed in the same layer structure.
3. On Monternet carriers allow users to use such procedures are used midp1.0 + various special API.
4. Cell phone text messages displayed on a class declaration alone, in order to cross cell phone after transplantation in Chinese, English changes.

Most of J2ME development is partially transformed J2EE development, and I am also:) should be aware of the concept of MVC pattern (M - Model, V - View, C - Control), after analysis of the code I feel this old bird MVC can also be used. However, what still needs to write for the (M - Model, V - View, C - Control, O - Object, S - Sprite, T - Tool).
Modules to complete the function:
Model: run method. Game operations for the kernel module.
View: paint method and draw the interface. Responsible for drawing all the game interface.
Control: commandAction methods keyPressed, keyRepeated, keyReleased method. Responsible for receiving all of the operations the user.
Object: (interpreted as: Object) Menu, Item, Image, Sound, RMS, Connection. Responsible for packaging all of the above objects, a call for other local programs.
Sprite: (interpreted as: the wizard) game object class. Such as aircraft, ammunition, maps, radar, and so on. Said little in front of the class to use measurement to achieve the program, so all the objects in this module.
Tool: (read as: tools) random number generator, trigonometric functions and much more.
Program Framework:
1. Color: definition of the basic color of the game
2. Anchor definition: text, picture posts into the position of the screen
3. Font definition: the font used in the game
4. Screen width: portability as much as possible in order to use this function drawing
5. Defines the direction of the game: mobile phone keypad layout is different from the general to do with the unified management of this variable
6. Button definition: different phone keys are different to do with the unified management of this variable
7. Button to set even the law: whether different phone bursts of different operating functions. With this realization is not firing bursts of mobile phones to achieve
8. Program Status: The game program on the user view to be started when the game started, you can start our program from loaded
9. The internal game state: state of the game that
10.construct:
11. Display screen running:
12. Hide [screen running:
13. Program initialization:
14. Suspend the operation status:
15. Stop running:
16.run:
17.paint:
18.commandAction:
19.image: Pictures
20.sound: Sound management
21.item: Options management
22.command: button management
23.menu: Menu Manager
24.rms: Records Management
25.connect: File Transfer Management
26.socket: Network Management
27.CodeToObject: 2 binary files and image voice conversion
28.obj_init: Object constructor function is initialized
29.obj_paint: objects on the screen realization.
30.obj_way: method.
31.function: Function







Recommended links:



VBScript loop



avi to mp4 converter FREE



Convert .mov To .avi



Source Editors Infomation



Simple Vehicles - Screen Savers



Learning regular expressions entirely Manual: Getting Started guide rookie



YouTube expected profit Model



ESRI experts, non-Chan: Snow Emergency GIS can do more



Tax Link



Converter Avi To 3gp



Contact Home Linkist Then The New Tactics: To Provide Professional Exhibition Space



Popped Into the home appliance industry with high black horse



New System Utilities



Five-stroke input method is not just pole



f4v Converter



Wednesday, July 21, 2010

HP and Novell reach a new exclusive alliance agreement



Recently, HP and Novell alliance reached an exclusive agreement to HP identity management center customers to migrate to Novell identity and security management solutions. As part of the agreement, HP and Novell will jointly offer migration services, HP will resell Novell identity and security management solutions, and Novell will license the technology to HP identity management center.

Earlier this year, HP announced that the investment will focus on identity management products focus on existing customers rather than selling products to new customers. To ensure that customers continue to receive high-quality identity management solutions, existing HP customers can take advantage of the advantages of the scheme, to migrate to Novell's industry-leading solutions. For customers do not choose to migrate, HP will continue to support it.

Novell's identity and security management solutions to help enterprise customers reduce the risk of identity and data theft, streamlining IT management and enhance business strategies and enhance the response line regulation, legal compliance, and many other business challenges.

HP and Novell migration program will provide full customer support throughout the migration process, including:

* HP identity management centers to provide current license - in the first 12 months, Novell will start to migrate to their identity and security management products provide customers with a complete license.

* Migration services - by the HP Consulting and Integration team provides services to ensure a smooth migration process smooth, the impact on customers to minimize business disruption.

* Joint development of migration tools - HP and Novell will develop tools to help their respective services team automatically and easily from a central HP identity management solutions to the migration of Novell.







Recommended links:



M4v



Apple IPhone Conversion



REVIEW Access Control



Winner Video Splitter



VBScript FirstIndex Property



Stamp ID3 Tag Editor



Merry MP3 ID3 Audio to WAV Recorder



Compare Games SPORTS



Infomation File And Disk Management



Convert Avi To Mpeg4



Apolo MPEG To DVD Converter



Mp3 to m4a



free download mp4 TO 3gp



Articles about Strategy And War Games



PSP Desktop



Professional VCD MP4 Deconde



Youtube Movie Download + Player Store



Wednesday, July 7, 2010

MPC to Zune Deluxe

MPC to Zune Deluxe is a visual multifunctional and graphical audio editor which allow you to perform various operations with audio data such as displaying a waveform image of an audio file, filtering, applying various audio effects, format conversion and more. MPC to Zune Deluxe - Apply effects to selected area, zoom in/out, cut, copy, paste, mix, amplify, normalize, echo, stretch, fade in/out, invert, everse, null signal, silence, convert format, undo/redo etc. You can also record from any available source. Audio formats supported include: WAV, MP3, MP2, WMA, OGG, G721, G723, G726, VOX, RAW and PCM.
Spported conversions include: CD to WAV, MP3, WMA, and OGG; P3/WMA/OGG/WAV/AIF/VOX/MP2/MPC/G.72x/AU/RAW to MP3/WMA/OGG/WAV; WAV/MP3/WMA/OGG to CD burning, WAV/MP3 Compression, and two-way conversions among MPEG-1, MPEG-2, AVI, WMV, and ASF for video. MPEG options are available for VCD, SVCD, and DVD compliant output. DVD shrink functionality is also present. When converting from audio CD, track information can be dynamically downloaded from the CDDB and used to automatically name saved files.



Recommand Link:



Converting mov to avi



Happiness VCD DVD DAT Ripper Platinum



Youtube Video to 3G2 PROFESSIONAL



Catalogs Icon Tools



m4v to flv



5Star DVD to iPod Ripper



iKoysoft DVD to iPod Converter



Perpetually PS2 iPhone WII Conversion



Movavi Zune Video Converter



mov to AVI



DVD To iPhone Converter for MAC(INTEL)



Adventure And Roleplay INTRODUCTION



QUICKTIME to wmv converter



How-to VCD Converter



LasVegas AVI To IPod



Wizard Launchers And Task MANAGERS



Pop VOB Ripper Platinum Free Download