Monday, October 25, 2010

Yanzhao tentacles stretch pupils how to actually make the child away from unhealthy content



"Pornographic" event continues for more than a month, over time, the wide dissemination of indecent according to an increasingly large number of minors involved in sharing the "Pornographic" ranks in years, even a small number of primary and secondary students even imitate these photos, but also the on-line privacy of their own photographs. This situation, so that teachers and parents are worried about: how to get kids away from the "Pornographic" and other undesirable content, has become the focus of the community. The Trend Micro Internet Security Expert (TIS) 2008 leading "parental control" feature, which can effectively purify the home network environment.

Hong Kong, "Wen Wei Po" in the questionnaire survey: up to 4 percent had contact with primary and secondary students in Hong Kong is the second involving indecent photographs, of which nearly half are in circulation among friends and classmates, even a few people in possession of relevant images, the situation worrying! and in the Mainland, to buy CDs Yanzhao team had much uniform-clad figure. In addition, students also appeared more than imitate the "Pornographic" in the case of online dissemination of their photos. This has led to many parents and teachers concerns. Mr. Liu said, according to Guangzhou parents, although his son has just started this, but from a lot of students that peep photos, also the parents of their students find it particularly worried them.

CPPCC National Committee members, Beijing Haidian District People's Court Second Criminal Court of Vice-President Shang Xiuyun that network to provide convenient, but also mixed with some harmful information. Such as: network, violence, obscene content, gambling. Minors are in development stage, to identify not strong, but curious, good at imitating, vulnerable to adverse cultural influences, and then change their value judgments. But like "Pornographic" This network of information focused on bad outbreak, but parents and teachers feel helpless. Lee said a middle school teacher in Guangzhou, class a few students in private stole mass Yanzhao, I do not know how to explain this to students, can only hope that this early in the past.

Faced with this situation, Trend Micro Internet security experts say, want to clean up a home network environment, need to introduce a ratings system management. Experts such as Trend Micro Internet Security (TIS) 2008, as an individual user's network security software, which would have "parental control" feature. This feature goes beyond the traditional extensive classification model, relying on the billions of websites on the global real-time monitoring and analysis, will be divided into adult bad website, violence, alcohol and tobacco more than ten categories, parents can be home local area network, according to the child In the computer age disaggregated to "prevent access to unwanted Web sites"; If you find such a setting close enough, you can also set "allow the Web site," the learning needs of the child day to day, your website will be set can ensure that young people are not bad from a search engine or other website any adverse information obtained.



Press through the use of this feature interviews with the parents that although children are first starting some resistance, but the "parental controls" to prevent the effect of this security is very satisfactory, children can adapt quickly, after all, does not affect it has used the access information, log on forums and other operations, but actively take the initiative to prevent access to information on the possible bad. A student also told reporters: "We often do not want to know how things Pornographic, the key is a random search for relevant information can be too easy to see, so are the engine room of our school to implement this access restrictions of security, although some awkward beginning, but a habit still think that better. "

At present, the network information varies greatly, especially pornography is particularly prominent. Young people lack self-control and the resolution is easy to be misled, even committed crimes. To this end, we should mobilize all social forces, from the moral, educational, social responsibility and the correct guidance, and regulation of minors to further strengthen the education and guidance. The Trend Micro Internet Security Expert (TIS) 2008 unique "parental control" feature, for the purification of a minor home network environment provides new ideas and means.







Recommended links:



Screen SAVERS Guide



WMV to QT



Photoshop Save Format



Town and only "limited earnings"



Chen Zhou reflect years of business success: The greatest scar has not come yet



sql server 2005 data types on the maximum



Neusoft Transition Stranded Behind The Overall Market Rejections



QT To WMV



Brief Science - Screen Savers



CGI teaching: CGI environment variables used



Expert Games CARD



News About Chat And Instant Messaging



China does not thereby adversely Affecting the timing of 3G licenses as early as 4 years will be hug



Alibaba CEO Wei Zhe: Mergers And Acquisitions In The Domestic Launch



Manufacturing integration trend manufacturing and EMS Has Approaching



FLV to SWF



Digital Home DIY



Tuesday, October 19, 2010

"Crocodile Group" under the chip, "national character"


A few days ago, I saw an interesting street in Qingdao, a picture, the local front page of several major newspapers are published in the first group of substantially loaded Hisense R & D of digital video processing chip, "the letter core" of Hisense TV off the assembly line news, seemed to shoot straight, and lined up like soldiers.

Successive chips are Chinese companies that do, to pray with us all day stuck in the world of Chinese enterprise IT people a kick out of the throat. Some people come up with a book called "chip a little better discipline."

It is noteworthy that Chinese companies "to do chip" is the ability to zoom into corporate strategy, and some media that Changhong would like to become the chip giant, together with Shanghai Symphony, it is a "crocodile group."

However, Shougang NEC's warning not far away.

There are two chips, one for national security, a development of the industry total. However, domestic enterprises to describe their own chip, like it is a "nation." Then, the chip has "national character" it?

From a commercial sense, the chip is there as an upstream product. Its value is the ability of the downstream products of an important impact on the whole industry chain. So, this is the chip value.

In this sense, if only beneficial to a company or several companies, such as Hisense developed the core chip video processing, as a long period of time, may Zhi Shi Zi Ji Kongzhichengben the Shouduan Hisense. Believe it or not?

In the commercial, the Hisense launched chips, domestic manufacturers still no cheers, taking into account the color TV in the world factory in China, so it limited prospects. Technically, Hisense chip is not unique to China, is not a pioneer, a few years ago, Chengdu and Xi'an have been developed by the company once, but did not realize industrialization and mortality.

Chinese enterprises in promoting their own time, like the ethnic label affixed. Some industry so, but the chip industry may not be. Need chip color TV, PC, camera, mobile phone industry and other industries are the three high - a high degree of globalization, highly standardized, highly coordinated, but it must be trade names, or chips, "nationalism" should be properly defined.

As standard, to sweep the world, will hit the user. At first, Esperanto has been defined as an international language, but in the end, pass the world is English.

Samsung and SMIC is the world's chip industry, the two model, they, as newcomers to quickly become the world leader. If you look at family history SMIC hair, you will find have a global "mind" how important it is.

SMIC growth in the key stage, with the cooperation of the world's chip leader is always the main theme. In the 0.18-micron chip, it is the world's third-largest chip foundry Chartered Semiconductor; in 0.13-micron chip, but also cooperation with Texas Instruments. Since then, it has with the European IC Design Factory Accent Srl, Elpida, Toshiba, Infineon, Infineon Technologies of Germany to reach the transfer of technology and OEM agreement.

Changhong, Hisense, or both, are the terminal equipment manufacturers, in this area, they are the world leader. However, if really like the outside world may say so, to become the chip giant, I am afraid we must first note, the chip can not be a nation.






Recommended links:



MKV to Zune



The World's Major Media On The Views Of Chrome OS



P2P operators transform their billing through TRAFFIC into the regular army



XviD To MP4



Photoshop to create an alternative form of gorgeous flowers!



Articles about Desktop



Some tips on data collection



Streaming audio format, the entire 10-YEAR-OLD Real companies will have a new action



overwhelmed by bizarre pc errors get a free



"Steal" food reform "Abstract" dishes: Without Thieves lonely farm still in the



News about Audio Recorders



GEM Made The Most Rich Of 10



M2TS to MKV



Essays on CMMI [1]



Friday, October 8, 2010

Norton Ghost clone parameter four examples demonstrate


I believe Windows to crash, system crashes we've seen a lot. The brilliant idea quickly restore the system is to use Ghost program, but each time must be selected using Ghost, too much trouble. In fact, Ghsot many parameters, clever use of these parameters, and write them in MS-DOS batch software.

I believe Windows to crash, system crashes we've seen a lot. The brilliant idea quickly restore the system is to use Ghost program, but each time must be selected using Ghost, too much trouble.

In fact, Ghsot many parameters, clever use of these parameters, and write them in MS-DOS batch software that can backup and restore system to bring us great convenience.

1. Automatic Backup

ghost-sure-clone, mode = pdump, src = 1:1, dst = system.gho

Put the first hard disk first partition information back up to the current folder's system.gho in the future can use it to restore

2. Sub-volume backup

ghost-sure-clone, mode = pdump, src = 1:1, dst = system.gho-span-split = 630

Its role is to first partition the first hard disk information back to the current folder's system.gho, if generated system.gho more than 630 trillion will be generated in the GHO file segmentation, the parameters of a large area in the back and to burn them to a 650 MB CD-R is useful when.

3. Automatic Recovery

ghost-sure-rb-clone, mode = pload, src = system.gho: 1, dst = 1:1

Its role is to system.gho under the current folder to a file to restore the first partition on the hard drive, and without confirmation, after the completion of the operation automatically restarts the computer

4. With a password backup

ghost-sure-pwd, 666888-clone, mode = pdump, src = 1:1, dst = system.gho

The statement is the first hard disk first partition information back up to the current folder's system.gho in, and to 666,888 after the GHO file as a password generated for encryption.

After using Ghost to restore system.gho file, or to use Ghost Explorer to release the documents which are to enter a password, or can not recover or release documents, which played a secret role.

If you enter a ghost-sure-pwd-clone, mode = pdump, src = 1:1, dst = system.gho, ie-pwd back without a password, GHO Ghost in the production of documents before the user will be asked GHO encrypted password, you must remember the simplicity. GHO file to encrypt, the other can not be free to view or restore our files






Recommended links:



Easy to use Dial Up And Connection Tools



U.S. Export Control Policy Toward China Brewing Adjustment



ASF to MPG



News About Languages Education



Professional confused on how to spend?



Instmsi30.exe not found error fix these errors



Followed By A Variety Of Patches Manually Clear The New "Annie"



The biggest killer of retail sales



Planning red Boiler out of the discrete uniform



INFOMATION Shell Tools



Teach You How To Learn Wubi



Comparison People - Screen Savers



Interview with Eastman Kodak Asia Pacific Director of Human Resources is pleased to Ms.



AVI to 3GP



WMV To MPEG



Sunday, September 26, 2010

Of! The relationship between SEO and UCD



Spent a lot of time to read some SEO optimization documentation, for some questions to be discussed.

[Tips] What is SEO? Search engine optimization (search engine optimization, short seo): means the principles to follow search engine search on site structure, web site interaction between text language and foreign strategic deployment of rational planning, etc., to improve the site search in the search engine performance, thus increasing customers find and visit the website of the possibility of such a process. search engine optimization is also a scientific development concept and methodology, it changes with the search engines develop and also promotes search engine development.

Rules of the game

Search engine algorithm and between user needs, there must be some kind of hidden relationships, many basic principles are defined according to user needs, such as:

1, attention to the reverse link

2, stressed the update frequency and quality of

3, to promote original

That being the case, do not meet customer needs the product directly on the finished Why, why should not accurate search engine to card his neck then? Mining user research user needs is a matter, of course, you can think this is part of SEO work.

Dependent optimization is useless

Confused me the most is the most SEO issues are familiar recommendation that only SEO's to meet the object is known as search engine, and advocated to meet our target customer needs.

I think that optimization is a process of icing on the cake, that the original design did not do the bottom thing, all assigned to conduct SEO credit, called ignorance. For example:

1, Title availability

2, Meta, H1 application

3, station Keyword links

4, Url strategy

In addition, similar to the class Web site to download written test results are compared TITLE proposed "XXX Thunder download, XXXBT download, XXX eMule download" strategy to prove that search engine problems, but not the needs of users, so as technology development, it will be eliminated.

How to do SEO

Understand, think SEOer research should be focused on the search engine algorithms and temperament, can be based on actual research projects, to product designers a number of reasonable or unreasonable but can improve the ranking of the proposal, provided guidance to be in the UCD ideology of the Executive. Summarized in four aspects:

1, let the machine read the page HTML Structure

2, through the content to keep users Information Usability

3, to retain customers through the details of the User Experience

4, improve the algorithm matching Search Arithmetic

[Tips] What is UCD? User-Centered Design, User-centered design. In short, in product design from the user's needs and feelings of users starting around user-centered design of products, rather than the user to adapt products, regardless of use of the product process, product information architecture, human-computer interaction, etc. all need to consider the user's habits, expected interactively, visual perception and so on.

Itself is the scarcity of high quality technology, why mess gang to study, very weird social phenomenon. Actually there are many children who have just started, and exclaimed to learn SEO, it is inexplicable, 1234 of these cross-disciplinary expertise, you know how much?

As some of the scum of the actions, remember the words: sooner or later have to repay.

Summary

I write to you springing a very interesting idea, SEO and UCD is very similar to an idea and ideas are the only SEO provides services to machines, the development level; UCD provides services to users, the design level.

Can also be so understood: SEO awareness necessary to implement product development (note not the design) of each process, but that planning, planning, architecture a bit after (a IA duty), there are two different things. Because in addition to the research on search engines, I can not find any one belong to the "search engine optimization" of the independent technical details.







Recommended links:



Initial bitmap



Seasonal - Screen Savers Comments



The difference BETWEEN Samba and NFS



Dealers said the switch to the sale of genuine OEM version of Win7 low profits



ASF to MPG



Consumer NAS Me and you?



two of the country provide the first high speed 3g



TOD to WMV



VOB to SWF



Articles about Automation Tools



Review Health And Nutrition



Nokia's Enemies



Win 7 Random And Changed Anti-piracy Measures Become Soft Black



Of! The relationship between SEO and UCD



Friday, September 17, 2010

Across threads in C # Winform control access



CAD files in the program needs to read the list of file information, it is a very time-consuming operation, so I hope through multi-threaded approach to achieve, and can be suspended at any time. Since the initial use of multiple threads, beginning with an independent thread class that return data, Thread.Join () method to wait for the thread to write data to the form after the control, no difference between the results and single-threaded; later view information through the use of MethodInvoker solve this problem, but for the concept of threading is very vague, all who experience this regard, data and other shared learning to learn.

public partial class frmMain: Form

(

private volatile bool _stoped = false;

private void btFilter_Click (object sender, EventArgs e)

(

_stoped = false;

Thread t = new Thread (new ThreadStart (StartNewThread));

t.Start ();

)

private void btStop_Click (object sender, EventArgs e)

(

_stoped = true;

)

private void GetFileSize ()

(

btFilter.Enabled = false;

using (AutoCADConnector CAD = new AutoCADConnector ())

(

foreach (ListViewItem t in lvSource.Items)

(

if (! _stoped)

(

AutoCAD.AcadDocument doc = CAD.Application.Documents.Open (t.SubItems [2]. Text, true, "");

double [] p1 = new double [] (0, 0, 0); / / upper right corner coordinates

double [] p2 = new double [] (0, 0, 0); / / lower left corner

double scale = 0; / / scaling

p1 = (double []) doc.GetVariable ("EXTMAX");

p2 = (double []) doc.GetVariable ("EXTMIN");

scale = Convert.ToDouble (doc.GetVariable ("DIMSCALE"));

double w = Math.Ceiling ((p1 [0] - p2 [0]) / scale);

double h = Math.Ceiling ((p1 [1] - p2 [1]) / scale);

doc.Close (false, "");

t.SubItems [1]. Text = string.Format ("(0) * (1) (2)", w, h, scale);

/ / LvSource.Refresh ();

/ / Thread.Sleep (100);

Application.DoEvents ();

)

else

break;

)

)

btFilter.Enabled = true;

)

private void StartNewThread ()

(

MethodInvoker me = new MethodInvoker (this.GetFileSize);

this.BeginInvoke (me);

)

)







Recommended links:



Ghost 20 Little-known practical parameters



xbox 360 Avchd



Gateway Bank of China has become the odds



Light: Cold Chain Dancer



CONVERT .flv to .wmv



Win32 does not require the release of resources



BenQ "tails" of the pain of expensive school fees of the three Active Role



Font Tools CATALOGS



rmvb to dvd



Reference Tools Shop



E-cology In The Pan Micro Series 29



Experience the wind Took the new brilliant new housekeeper brilliant new listing 2008



Premier Clocks And Alarms



Giant B & Q



Chinese version of Firefox: FIREFOX for free to watch television with



matroska VIDEO file



Sunday, July 25, 2010

How to Ubuntu equipment Chinese character library



Currently, Ubuntu's Chinese character library or Taiwanese out of (text Ding Times New Roman font), however, that while you can, print often wrong (a blank character spaces). Let Ubuntu is humiliated, how do?

As we all know, Ubuntu is a Linux distribution for the whole of mankind, instead of supporting the Chinese character library come from? Look Canonical company? Definitely not. Even gave us a fine example of the Chinese character library, who would not appreciate. Chinese government departments concerned to find it? Definitely not. Obviously, the Government has not the necessary obligations. So, how should we do?

Alphabetic writing, dozens of letters on it, the problem easy to handle. Hieroglyphics on the trouble. Looking back 20 years ago, when the DOS Chinese character library, 16 and 24 dot matrix dot matrix, when the people's copyrights and very weak, easily make use of them even had a set out. Now the situation is different, and generally use the vector font, high development costs. In fact, even if you are a legitimate XP users, but also the Chinese character library can not be brought into XP to Ubuntu to use (of course, certainly can be used). So in the end how to do Chinese characters library equipment Ubuntu?

Ten years ago, I met in Changsha Huatian Han characters patent holder Professor Zeng Dongchu. I saw the vector character of the production process are indeed not easy to spend a lot of manpower and resources, and no special authoring tools is almost impossible. The fact that I deeply understand that the real application of Chinese character library is not completely "open source" for people to freely use. However, Ubuntu is a Linux-oriented distribution of all mankind, how can that be done?

Solve this problem, only the Chinese custom version of Ubuntu to make a fuss brand. The Chinese custom version of Ubuntu can be different from that of Ubuntu's trademarks and brand. Specifically, the new brand of Linux distribution is Ubuntu package with commercial exquisite Chinese character library, a few almost is almost free software, pricing is close to zero, but the census drawn can not be zero. This requires a lot of input, but it will not be a complete lose money trading. Whom? This reminds me of one thing, this time in Shenzhen Wu Bangtuo company bosses are Shenzhen Beijing-bound train on the T106, came to participate in Beijing's "World Software Freedom Day" celebration. I'm going to a formal proposal to him to do this. If all goes well, he U-disk products also can be "justifiably" show for the.

We can not look down upon Chinese Characters Ubuntu, and this is the biggest stumbling block into Ubuntu. A beautiful Chinese character library (including a variety of physical character) input should be continuously invested many years, continuously refined and improved. Chinese character library is the IT industry and our modern civilization's infrastructure. Chinese Characters Chinese fine equipment customized version of Ubuntu's future will be very good.

If Ubuntu's Chinese character library solved the problem, then, Ubuntu Chinese custom version of the software can be formally involved in the procurement bidding, to enter our schools, enterprises and government departments. Therefore, to solve the problem is very urgent Ubuntu Chinese character library, must act quickly. Computer accessories from the start as a U disk, they must solve this problem. In short, on Ubuntu, the address of its Chinese character library (a set of fonts is not enough) is a key issue of supporting the project, we must resolve.

Description: Ubuntu specialized equipment to the Chinese characters library brand to the Chinese custom version of the same name with Ubuntu, or prone to font property loss, or did he move. Ubuntu's day Chinese characters library problem is not resolved, then, Ubuntu's Chinese language is necessarily empty talk. Now is the time, Ubuntu Chinese character library must be addressed.







Recommended links:



New worm VBS / VBSWG.an @ MM small Files



Beijing Grand Century Ocean Ka Hei Signed Real Estate Brokerage Industry Co., Ltd.



brief Gallery And CATALOGING Tools



Baidu hand Symantec



Flv to qt



Three steps teach you to set up a separate page Header and footer



Alert: New worm Jing Xian, suppose you code the deal is off



Convert Avi To Ipod



3gp converter



Why Not Read The Disk Drive?



Career Planning: Attitude is everything



Expert Gallery And Cataloging Tools



Vob



Tuesday, July 20, 2010

"Random eight-digit" Beware of your U disk



The virus a "hijacking image" technology, the virus running, will generate a random numbers and letters composed by the 8-bit name of the virus process and try to close the variety of anti-virus software, firewalls and security tools to process, making an extremely difficult virus. Virus in the root directory of each partition generated Autorun.inf and random 8-bit EXE, the user double-click the hard drive to activate the virus. The virus also through U disk, MP3, mobile hard drives and other removable storage spread, spread very rapidly.

Image hijacking "technology that is currently widely used virus virus technology. Viruses using the technology of some antivirus and security software screen, when the computer user to perform the procedure to be shielded, the virus can lead to the implementation of the goals is empty, this to evade anti-virus software to kill.

According to reports, "random 8-digit" virus Trojan-like virus, using Delphi language, through the UPX packers processing tools. Virus running, make the system run slower, and the virus will try to close the variety of anti-virus software and firewall processes, so that users can not open the antivirus software and virus database can not be upgraded. Virus will shield the Registry Editor and msconfig other variety of security tools, to create difficulties for users to manually killing the virus. The virus will be downloaded from the specified URL Trojan variety of online games can be stolen, including World of Warcraft, Legend of the world, journey, including several online game account and password, games for the network equipment constitutes a significant threat.

Prevention and treatment measures:

1. Protect your U disk, MP3, mobile hard drives and other removable storage usage, when the external U disk access computer, please do not rush to double-click to open, be sure to read the anti-virus treatment, suggested a U disk virus immune function antivirus software, such as U-disk shield KV2007 unique technology that can drive the virus immune to all U U disk by double-clicking to run.

2. Lay the patch to the system, especially in MS06-014 and MS07-17 The two patches, most of the pages currently Trojans are two holes through the invasion to the computers inside.

3. To update anti-virus software virus database, so that regular upgrades, regular anti-virus.

4. Install the software to go to regular website, avoid software installation package is bundled into the Trojan.







Recommended links:



Winner Video Splitter



MP3 to mp4



Directory Cartoons - Screen Savers



.mkv file



BLUESEA VCD SVCD Ripper Platinum



Youtube Video To MAC Today



FLV to Video Converter Lite



Review Password Managers



Myth of the fastest GROWING job market promotion



Youtube Video to PALM OS Products



Report Games And Entertainment



PS3 rmvb



Best Trace And Ping Tools



DVD Cloner build 08



convert vob to flv



#1 SmartSoft Video Converter