Thursday, October 14, 2010

To prevent the most effective way to Trojan


Anti-Trojan way to teach everyone, only for web Trojans, there are more than 90% efficiency, can prevent over 90% on your machine Trojan is executed, or even anti-virus software is able to detect the Trojan can prohibit the implementation. Before the point of principle.

Trojan is now nothing more than a page in the following ways to your machine in

1: the Trojan files into BMP files, and then with you in the machine to restore DEBUG EXE, 20% of online presence of the Trojan

2: download a TXT file to your machine, and then inside there is a specific FTP ^ - ^ for, FTP to connect their machines to download Trojan horse, the existence of the Trojan line of 20%

3: The most common way is to download an HTA file, and then the interpreter with a web control to restore the Trojan horse. The Trojan horse for more than 50% of online presence

4: The JS script, use the VBS script to perform the Trojan file, this type of Trojan horse to steal QQ, more, less stealing legend, probably about 10%

5: other

Now is the method to prevent

That is to windowssystemmshta.exe file rename, change what their casual (Win XP and Windows 2000 is in system32 under) HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerActiveX Compatibility under the Active Setup controls to create a new key based on CLSID (6E449683_C509_11CF_AAFA_00AA00 B6015C), then the new key create a REG_DWORD value type of key Compatibility, and set the key to 0x00000400 can.

There windowscommanddebug.exe and windowsftp.exe gave a change of name (or deleted)

Some of the latest effects of the most popular Trojan defense

Such as the popular network smss.exe Trojan horse that is one of the main body hidden in the 98/winme/xp c: windows directory, 2000 c: winnt .....

If you are in this Trojan first, we end with the process manager smss.exe trojan is running and then in C: windows or c: winnt directory create a 0 price and is set to read-only attribute smss.exe ~ (2000/XP NTFS disk formats, then so much the better, you can use the "Security Settings" is set to read) After this Trojan did not re-infection had been tested this way for many Trojans have a great effect. After such modifications, I am specifically looking for someone to test the hair of the Trojan site, the experimental results is about 20 trojans on the site, there will be about 15 Rising alarm, another 5 did not reflect the Rising, and my machine does not add out of the new EXE file, and no new process appears, but some remained in the wreckage of Trojan IE temporary folder, they are not enforcing it, there is no risk, it is proposed that we often clean up temporary files folder and IE.






Recommended links:



Specialist Audio And Multimedia



3G2 to AVI



Who is knocking the door of opportunity?



Review Animation Tools



How effective will be the core customers Haitao delineated Order



Vlc Exe Entry Point Not Found Fix Now



Vigilance "wind Downloader" Summer lift vitality and



Watch cool mechanical picture production process



Introduction Games And Entertainment



RMVB to MPEG



3G2 To WMV



Mito Xiu 1 MINUTE transfiguration "Impressionism" Photo



Built-in objects of the JSP in a brief overview



"National Teacher Quality And Ability Of The International Training" Ended In Beijing



AVOCENT growth in M & A



Top Compilers And Interpreters



Listed company s three key financial indicators



Tuesday, October 12, 2010

Job on the road a few lessons to remember


Job failure is usually roughly the following:

Expectations too high or too hot career. Some job-seekers in the choice of units, set unrealistically high standards, resulting in job failure. For Lapin are concerned, we should adjust their expectations in a timely manner, appropriate to reduce these "high standards and strict requirements" for their own characteristics and the actual, choose more suitable for their own units. Some units can not take into account your specific requirements, to grasp the principal contradiction. For example, some candidates preferred professional counterparts and have the task of dry units, some job seekers with the development of the vision of the unit that it is very promising, Guer be considered so.

Lack of experience or training. Competitiveness of some job seekers did not bad, but the job interview and lack of experience to answer the question is not answered do not tense up, that is irrelevant answer the question and answer it, the spot did not play its normal training level or less, to a poor impression of the main test of people to lost opportunities. Interview, your goal is to persuade each other to work with you, then you must be a strong showing as much as possible to the conditions and potential employers, not to take "up for sale" or too humble attitude. Short to very good grasp themselves, everybody.

Performance, capacity or the specialty is not poor counterparts. Narrow professional caliber, non-professional counterparts there how do? Candidates should be graduates and employers to understand the dialectical relationship between professional counterparts. From a subjective perspective, it should be working hard at school, active learning enhance the knowledge and skills to meet the needs of the community. For employers, the choice depends on the basic quality of the students and their intelligence and skills in many aspects.

Fraud or opportunistic. Some job seekers fight for good jobs, professional achievements at altered to conceal the actual situation, which first did not pass on personal conduct, when the employer understand the real situation, they are not hiring.

Rhetoric, hard-edged. Mutual respect and honesty is the basic principles of human coexistence, in an interview with the employer should pay attention through conversations and humble nature to increase their credibility and affinity. Exaggerated and inappropriate to some observers, disgusted with hard-edged, but exposed the weakness of character. Of course, modesty does not mean inferior, in the performance of their own personality and unique insights, they need bold calm. Specifically, the applicants state-owned enterprises, private enterprises, the conversation should be modest number; while some foreign-funded enterprises, joint ventures and a number of management is more modern, westernized units, the performance can be bold, flexible and free. This is the concept of domestic enterprises and foreign enterprises and management-related differences in the way of nature.

Thinking style and attitude is not correct. After by employers to employ graduates. Generally a period of probation. Was dismissed during the probationary period, with only a few because of professional knowledge, ability is poor, many people who are neglected work attitude, due to non-compliance with organizational discipline. Employers candidate's work attitude, organizational discipline and operational capacity are the same value. They attracted me the most is not welcome, events can not do it, little things do not want to dry, grumbling over the lack of hard spiritual. Shows that style of thinking, work attitude of poor people, can not easily employ another, not to reuse. If no serious work attitude, work style loose, not to work with others, is bound to the low efficiency, but also affect the overall efficiency and set a bad practice in the work. Such a person is unwelcome.

Jumps, off oneself. Increasingly frequent movement of personnel, enter the job market every candidate who I believe have some switch to record, although most requests for candidates with relevant work experience, but in contradiction with the fact that many leaders it is taboo quit frequently people. Not single-mindedness, anxiety in our own work, always high this mountain that looks who refuse to work hard at in order to progress, simply to be returned must be cast aside by the employer. Therefore, the work experience of job seekers in a short time in terms of frequent updates, avoid not to quit his experience as a show off.






Recommended links:



The best smartphone cameras



ASF to MPEG



MTS To MOV



MJPEG To AVI



Saturday, September 25, 2010

Liang No. 400 400 640 074 008 Take your pick



Download: 1304000008.doc far 400 business also under special development needs of enterprise, so that any expansion route. No longer as in the past, specifically to a single submission of applications for telecom business office, waiting for the number of working days, how many running back and forth, playing N telephone inquiry results.
There are also electronic fax, business switchboard, call centers, business conference, corporate instant messaging, are services for SMEs launched. Integrates all the communications needs of small and medium enterprises do not need to buy or install any software, hardware, you can enjoy much special in the "unified communications platform" for all services. Greatly reduces the cost of business inputs, technological inputs, inputs such as personnel, have been more than 100 million customers alike.
400 600 ordinary phone number free monthly 60 yuan corporate switchboard, super switchboard 200 per 0.3 yuan / minute (domestic)
Hong Kong, Macao and Taiwan: 1.50 yuan / minute;
U.S., Canada: 2.40 yuan / minute;
Britain, France, Germany, Italy, Singapore, South Korea, Japan, Australia, New Zealand, Indonesia, Malaysia, the Philippines, Thailand: 3.60 yuan / minute;
Other countries: 4.6 yuan / minute
Tail No. 300 yuan with 6,8
400 Super switchboard number is 1000 yuan last two even numbers (except 66,88,99,68) 500
Last number is 66,88,99,68 1,000 yuan
Mantissa for the AABB, ABAB 3000 鍏?br />Last number is AAA (except 666,888,9999) 5000 yuan
AAAA or 666,888,999 8,000 yuan
Other features IVR automated voice service, voice mail, fax, receive free

Contact :021-60912702 East China Office Manager Li QQ: 844059747 msn: yuantel@msn.cn







相关链接:



3GPP to WMV



Spring Festival travel, then the insurance



Premier Security And Privacy:



CGI teaching: CGI environment variables used



Make Rootfs Problem Records



CSS Generated Special Effects



Ad Blockers Storage



DDSN analysis, PLM value for the DDSN



Recommendations China.com Home



Recommend Install And Setup



AMD: It is easy to say the reality is cruel



My favorite ANTI-VIRUS Tools



TOD Converter



XviD to IPhone



Give vista a chance of 11 reasons



Complete package compile STEP



What the future of "beneficial" booming



Wednesday, September 15, 2010

Enhance the concept of active intrusion prevention IPS is not speculation


Intrusion Detection (IDS), has been put on the market for years, but more and more users find that it can not meet the new network environment for security needs.

IDS can detect passive attacks, and can not take the initiative to stop the threat to the vagaries of the network.

Therefore, it was urgent need to find a proactive intrusion prevention solutions, to ensure that the four enterprise network threat environment in normal operation.

Deep-level defense security needs

Currently, enterprises are facing increasingly complex security problems, security threats are growing rapidly, particularly the risk of blended threats, such as worms, DDoS attacks, spam mail, etc., greatly troubled the user to the enterprise's Wangluo cause serious damage.

So what options do business? Intrusion prevention system is the next generation of security systems business. It not only can be detected, can block the attack before they cause damage to the intrusion detection system to a new level. IPS and IDS obvious difference: intrusion prevention systems block the Code Red, Nimda and SQL Slammer, and the use of intrusion detection systems, users are required after each attack to spend millions of dollars for virus removal. Because of this, companies need the security strategy has not only limited to a single firewall and other protection products, but a deep-level protection strategy.

NAI launched includes host protection IPS technology strategy and network protection strategy for the two most, which is the McAfee Entercept host-based intrusion prevention solutions, technologies and rules of conduct signed by the integrated approach, providing an effective protection as Code Red, Nimda worm that attacks such as; McAfee IntruShield network intrusion prevention solutions, integrated feature library detection, abnormal behavior test, behavioral analysis, correlation, and denial of service techniques that can intelligently detect known attacks, the first place attacks and DDOS attacks, a deep level to effectively protect the enterprise network security.

IPS will replace IDS

Currently, IPS and IDS for the dispute, it was said, IPS, and no new technical breakthrough, but a conceptual speculation, Pubic do not think so. He believes that as technology development and continuous improvement, IPS will replace IDS, NAI IPS technology has been made in a number of international patents, IDS in the network is real-time detection of network attacks, while the IPS includes IDS technology In the IDS based on the increased detection of active response to block the defense function, once the attack is detected, you can take the initiative to cut the intrusion. Of course, true, IDS is already a mature product. Pubic think, IPS will take some time to replace IDS, IPS also requires the user to accept a change process, and now this change is also underway.

Currently, the face of mixed-type attacks, users need a proactive defense strategy, IPS is a large potential market for new business, therefore, NAI technically spent a great deal of input, hope to play a lead role. Now has more than 180 customers worldwide use of IPS products in China, after some users in the test trial of the IPS are also interested. Pubic believe, IPS will have a significant demand for this market, it is very useful to users. IDS products have been used for the user you want to migrate to IPS, you can purchase a license only on the user's input costs are also guaranteed.

It is reported that already has a financial company based on the original IDS, IPS purchased a few licenses to the successful deployment of intrusion protection system IPS.

In addition, IPS is a very technical product, the user's skill level requirements are high, and only on the IPS used properly, the effect will be significant, or just the opposite, but rather as IDS, so, user education and training essential. NAI will intensify efforts in this area, which is the current IPS technologies to promote the great challenges facing.

What is the real IPS

Currently there are many products on the market are dubbed "protection" of the word. But the real intrusion prevention solution should enable companies to analyze can not take measures to protect the system; the same time, it should prevent attacks result in the user's operating system, applications and data corruption. NAI believes that a good intrusion prevention solution should include the following features:

First, the real solution should provide real-time attack prevention and analysis. It should be before the start of any unauthorized activity to identify attacks, and prevent it from access to important server resources.

Second, intrusion detection is the most effective way is to adopt a mixed approach, that integrates specific attack signatures and behavioral rules of power. This hybrid method can provide the protection of known and unknown attacks, while at the same time keeping false positives to a minimum, so do not make any concessions on the loss.

In addition, a strong defense in depth security are based on the concept of protection can be deep. IntruShield's unique architecture integrates a number of patented technologies, including feature detection, anomaly detection and denial of service analysis to be able to multi-gigabit of network traffic and intelligent under the accurate detection and protection. This kind of creative control unprecedented ability of technology to protect those with the most stringent requirements of the network against known attacks to the first occurrence of unknown attacks and DoS attacks.

At the same time, enterprises have to choose whether to adopt the solution of advanced technology industry, is well-tested and used, and are subject to ongoing maintenance, it is very important.

Things correct safety and performance

IDS generally parallel in the network to bypass the network monitor in real-time detection of suspicious traffic, the performance is not significantly affected, but not IPS IDS, it is deployed mainly in the series in the network, all access to the internal network traffic to go through the IPS, if found aggression, to respond immediately to block attacks, so that will affect network performance, NAI also take into account this situation.

NAI's IPS performance is very good, IPS products in more than 20 integrated chip, 60G of cache, to ensure maximum network performance, and this is one of IPS's main selling points.

The so-called "true blue streak", despite the different opinions of the IPS's, but it is the concept of right, and it indeed has been in existence, many manufacturers are successively pushed IPS products, as long as the actual use indeed the role of the user's network security are effective, the user can try.






Recommended links:



iphone video format



Vob to mpg



convert wmv to Ps3



Digital TV in Chongqing THREE months free premium channels



Easy Graphic



Zha Yufeng: build "long Flight" back pillar



Trade More "smoothly" To Prevent The Risk Of More



QUICKTIME mkv



Operator within 30 seconds to bring a surprise



MMS can replace SMS?



Easy to use Web Servers



HITACHI trademark infringement, why still so arrogant?



Cost-effective in rural areas need appropriate IPTV



EVALUATE File And Disk Management



"Sacred 2 Fallen Angel" Mission Concert Details



The basic PRINCIPLES of SSL



Tuesday, July 13, 2010

HP and Novell reach a new exclusive alliance agreement



Recently, HP and Novell alliance reached an exclusive agreement to HP identity management center customers to migrate to Novell identity and security management solutions. As part of the agreement, HP and Novell will jointly offer migration services, HP will resell Novell identity and security management solutions, and Novell will license the technology to HP identity management center.

Earlier this year, HP announced that the investment will focus on identity management products focus on existing customers rather than selling products to new customers. To ensure that customers continue to receive high-quality identity management solutions, existing HP customers can take advantage of the advantages of the scheme, to migrate to Novell's industry-leading solutions. For customers do not choose to migrate, HP will continue to support it.

Novell's identity and security management solutions to help enterprise customers reduce the risk of identity and data theft, streamlining IT management and enhance business strategies and enhance the response line regulation, legal compliance, and many other business challenges.

HP and Novell migration program will provide full customer support throughout the migration process, including:

* HP identity management centers to provide current license - in the first 12 months, Novell will start to migrate to their identity and security management products provide customers with a complete license.

* Migration services - by the HP Consulting and Integration team provides services to ensure a smooth migration process smooth, the impact on customers to minimize business disruption.

* Joint development of migration tools - HP and Novell will develop tools to help their respective services team automatically and easily from a central HP identity management solutions to the migration of Novell.







Recommand Link:



Convert Avi To Ipod



Acker DVD to MP4 Converter



Easy to use Audio Recorders



Vob format



3gp CONVERTER



My favorite Themes And Wallpaper



Shop Teaching AND Training Tools



Youtube FLV To M4V Popular



AEPvideo DVD COPY SE



Youtube to DAT Today



avi Converter to mp4



Youtube FLV to Laptops Deluxe



Simple Education



AlltoDVD VCD Converter



Okoker Mp3 JOINER



Youtube Movie To Treo Freeware



AllRipper Flash to Mobile



Friday, May 28, 2010

Romeo Burner

Are you confused with disc burning and don't have enough patience in working with such software?

You don't need to have this with Romeo Burner! It's as simple as ABC.

Romeo burns all the formats you can find to burn: CD, DVD, Blu-Ray and HD-DVD discs.

Do you need to copy your audio discs to hard drive in MP3 or WMA format? Just run Romeo Audio disc grabber. Don't be afraid to do it for the first time! All you need just to try Romeo and all your fears will disappear.

Would you like to copy CD or DVD to the compressed file to your hard disc? Romeo Burner will do this like a charm from the format you have: ISO and formats of Nero & Alcohol programs.
Need a copy of your disc? Romeo will burn your grabbed disc images to a compact disc or may mount it as virtual device on your system at your wish. Don't worry to miss your grabbed images you want to use next time, Romeo Burner usually stores them to the "Disc Images" folder.

The full set of feature follows:

* easily make CD, DVD, VideoCD and VideoDVD discs
* maintain project groups and virtual folders for better information structuring
* make a copy of CD or DVD discs using one or more CD-ROM devices
* erase CD-RW and DVD-RW discs
* grab and rip information from CD or DVD discs on the hard drive
* mount and burn grabbed CD or DVD images as virtual devices
* multisession support (burn CD-R or DVD-R more than once)
* read and write Nero (NRG-files) and Alcohol (MDS-files)
* built-in mp3 player and mp3-tag editor with CDDB support
* command-line utility