Saturday, October 23, 2010

Using PPT production tree chart


Open PowerPoint, build a new presentation, click the "Insert" menu, point to "Picture" and select "Organization Chart" command, open the "Microsoft Organization Chart" window (Figure 1). At this point "Microsoft Organization Chart" window and its own menus and toolbars instead of PowerPoint's menus and toolbars, and the difference is large, can move the mouse pointer for each toolbar button and stay few seconds Department , get tips on the button. (Click to see more software skills)



Figure 1

At this time, you can enter the relevant content in the box. If you want a certain structure on the left, right, below the increase in branch, if necessary click the window in the different tools (subordinates, colleagues, managers, assistants, etc.) to the target location.






Recommended links:



Analysys On Yang: Adjustment For A Number Of Ideas Through High-level



Compression bag watch the highlights (2)



Articles about Remote Computing



"Torchlight" HARDCORE Mode Survival Guide



Transport Stream converter



Spring Scene photos using Photoshop will be processed into autumn scenery



3G2 To MPEG



MPEG4 TO WMV



Rain FOREST wind-founder: CNTV.com destination domain being assessed



ASP.NET 2.0 at the same time to prevent the same user login



Quot The Language Dll Vbe6intl.dll Could Not Be



Timers And Time Synch evaluation



A key to the A + to help improve processes to achieve CMMI goals



Tuesday, October 19, 2010

vb6 how to dynamically add controls


vb6 can dynamically add a control without control array:
object.add (progid, name, container)

Parameters:
object: necessary. An object expression, its value is "used" in the list of an object.

progid: necessary. A string that identifies the control. Most of the control progid can see objects through the browser to decide. Progid control by the control of the library and class composition. For example, commandbutton control progid is vb.commandbutton. Progid with the object in the browser not the same as shown in the case, visual basic will display a error message including the correct progid.

name: necessary. A string used to identify the members of the collection.

container: Optional. An object reference that specifies the control container. If not specified or null, the default value of controls set their containers. By specifying the parameters, a control can be placed in any existing container control (such as frame control). Users can control or activex document as a container.

For example: (add in picture1 above a commandbutton)
private sub form_load ()
form1.controls.add "vb.commandbutton", "cmdok", picture1
with form1! cmdok
. Visible = true
. Width = 500
. Caption = "confirm (& y)"
end with
end sub

Focus: When you add a reference to the need not permit the control to an existing (already deployed good) application, before using the add method to add the controls you have to have the license keyword.


Add no reference in the run-time control
You can also add methods to dynamically add a reference in the project was not the control. ("Not cited" control is not present in the control toolbox). To do this, you must also add keywords to control the license to the licenses collection. The following example be added before adding the control itself, the control of the permit keyword:
option explicit
private withevents extctl as vbcontrolextender

private sub form_load ()
licenses.add "prjweeks.weeksctl", "xydsfasfjewfe"
set extctl = form1.controls.add ("prjweeks.weeksctl", "ctl1")
extctl.visible = true 'the control is invisible by default.
end sub
However, no reference to such a control program of events, you must use withevents keyword to declare a variable as vbcontrolextender target object (as above), and set the object variable to add a reference to the method returns. Then, vbcontrolextender object objectevent events programming the control of the event. Here is a simple example:
option explicit
dim withevents objext as vbcontrolextender 'statement extender variable

private sub loadcontrol ()
licenses.add "project1.control1", "xydsfasfjewfe"
set objext = controls.add ("project1.control1", "myctl")
objext.visible = true
end sub

private sub extobj_objectevent (info as eventinfo)
'Using the select case programming control events.
select case info.name
case "click"
'Click here to deal with the incident.
'Now show the other case
case else 'unknown event
'Here to deal with unknown events.
end select
end sub

Note: not to an inherent control variables assigned to the vbcontrolextender; any such attempt will cause a type mismatch error.

However, you can also use an object variable declared withevents keyword, and set the method returns a reference to the variable, add the control to a dynamic program of events, as shown below.
option explicit
'Declare an object variable commandbutton.
private withevents cmdobject as commandbutton

private sub form_load ()
set cmdobject = form1.controls.add ("vb.commandbutton", "cmdone")
cmdobject.visible = true
cmdobject.caption = "dynamic commandbutton"
end sub

private sub cmdobject_click ()
print "this is a dynamically added control"
end sub

If you want to add a user control or any activex control to your form, or to the control must be added to the "tool box", or to control the license tags to the licenses collection. For more information, please refer to the "increasing method (licenses set)."

Note: If you add an activex or user control to your project, but did not use it in the form, you must not select "Project Properties" dialog box "build" tab on the "delete the unused The activex control "option. If your application tries to add the control, then the add method will fail because the necessary information has been discarded.


Remove the control

To remove dynamically add controls, use the "remove" method. Please note that you can only remove those who use the "Add" method to add the control (and use the "load" statement to add the control to compare) the following example to delete a dynamic added controls:
form1.controls.remove "ctl1" 'The name of the control ctl1







Recommended links:



Teach you in a foreign country for international domain name registration



Quality integrators corporation is canadian



MP4 TO 3GP



Approach new and successful



E-mail Scrubbing Brush



Store goods without manually



Intel Strikes started



Evaluate Java And JavaScript



Ningbo CHIC - Yum CRC show "weapon"



Easy-speed Run 47 Hours To Restore The Secret



3GPP converter



My Favorite Text Or Document Editors



Evaluate Screen Capture



VBScript Length Property



MP4 To Flash



Friday, October 8, 2010

LG fourth quarter net profit surged 91 percent net profit 319 million U.S. dollars


By the strong sales growth and improved margins boost mobile phone, LG Electronics (LGE lectronics) announced fourth quarter net income rose 91%. While the announcement of earnings, the company said it planned to invest in Poland by 2011 to 101 million euros to build a home appliance manufacturing plant.

Ended December 31, 2005 in the fourth quarter, LG Electronics net profit of 312 billion won (about 319 million U.S. dollars), a year earlier data is 163 billion won. However, as companies shift more of its production operations overseas, but also coincided with the won appreciation, sales have shrunk. The company's sales of 6.2 trillion won, down 5.2% year on year.

The fourth quarter handset margins also improved, up 8.1%, higher than the 5.4% the previous quarter and 3.6% a year earlier. The quarter, LG Electronics sold 16.2 million handsets. LG Electronics expects mobile phone sales in 2006, the company will reach 70 million, more than 55 million in 2005 increased 27%.

Currently, LG Electronics is second only to Nokia, Motorola and Samsung Electronics, the world's fourth largest handset maker.






Recommended links:



Recommend Audio Players



Europe and the United States will not be outsourced as "mirage"?



FLV TO SWF



OPTIONAL U disk watch "shell" scam



QT to WMV



Good Web Or VIDEO Cams



IPS detection and prevention SIMULTANEOUSLY



Female Employment: Shuobo difficult job there is the cycle undergraduate



Improvement of The current financial report



amazon kindle how to series convert FREE e books



2010 Breakthrough Into A 2D Game Or Turning Point



Source Editors comparison



Super EFFECTIVE 99% sterilization mouse



First Financial Weekly: Direct supply in the Shadow of Digital China



WMV to QT



Thursday, September 23, 2010

09 'happy to steal food' in 2010 what we steal?



- What 3G applications to copy the 'stealing food trend'

Taoism advocated cautious and subtle ideological content of most of people of doing things. In the past year, even if occasionally mixed with almost concerned about 3G in the domestic market, stir-fried, a considerable number of people to join in the attitude of 3G or reservations. Even so, the various interest groups Rao is not explicitly or implicitly on the 3G waves, the author's enthusiasm remains unabated 3G attention. If you move outside claimed - "Move to change the life", led by the 3G mobile Internet era arrived quietly and thinking of trying to influence people's behavior. I believe this change to explode, detonating the key point is not to enhance transmission rate of hundreds or thousands of times, but in the application of mature content is timely penetrate people's lives - which we knows quite well.

Video phone, mobile search, 3G video surveillance, mobile payment, mobile TV, mobile gaming content ... ... a variety of applications such as shops begin to kaleidoscope of refraction. In a recent opinion on the collection activities of 3G applications, the more users that make mobile security needs, enough to see how people hold on 3G applications with high expectations. 3G services with foreign state to carry out a raging fire, compared to the beginning of the development of the domestic 3G into confusion. Apart from the terminal, user acceptance, content constraints, the business lines is an important factor constraining the development of one. It is understood that the widely used types of business are still in search, mobile IM, mobile email and so on.

2009 "stealing food trend" has indeed a great wave of entertainment at all times SNS social networking with people's nerves, even into 2010, there has been dissipated heat, but it is still retained to create a new round of 'mass movement' of fantasy. Human thinking constantly jump, the result is to guide the science and technology to improve the lives of more intelligent. The lens extends to foreign countries, 3G penetration in the application not only catch up with fashion among the young group, a variety of convenient services such as product discounts, ticket booking, video-on-demand is in people's lives, gaining in popularity.鍗充究鑺辨牱灞傚嚭涓嶇┓锛屼絾瀹楁棬鍙湁涓?釜锛屽嵆鏄敼鍠勪汉浠殑鐢熸椿銆傚湪鏉ョ湅鍥藉唴3G甯傚満锛屾垜浠嫢鏈夋渶骞挎硾鐨勭兢浼楀熀纭??鈥旀嵁涓浗浜掕仈缃戜腑蹇?CNNIC)鏈?柊鍏竷鐨勬暟鎹樉绀猴紝鎴鍒板幓骞村勾搴曪紝鎴戝浗鐨勬墜鏈虹綉姘戣妯″凡杈惧埌2.33浜匡紝鍗犵綉姘戞?浣撶殑60.8%銆傚簽澶х殑鐢ㄦ埛缇ゆ縺鍙戞垜浠3G搴旂敤鐨勬?鑰冿紝涓嶅彲鍚﹁锛岃繖鏄竴涓换閲嶈?閬撹繙鐨勮繃绋嬶紝闇?瑙e喅缁堢銆佺敤鎴锋帴鍙楀害銆佸唴瀹圭瓑澶氶噸闅鹃銆傛墍骞哥殑鏄紝3G鍙戝睍鎴戜滑鎵嶅垰鍒氬惎绋嬨? 4鏈?7-29鏃ュ嵆灏嗕簬鍖椾含涓捐鐨?010 NexCom Expo涓嬩竴浠g綉缁滈?淇″睍鏆–WCC涓浗鏃犵嚎閫氫俊澶т細涓娿?CECC 涓浗浼佷笟閫氫俊澶т細灏嗗洿缁曗?鎬庢牱鐨?G鏉?墜绾у簲鐢ㄦ墠鑳借鎴戜滑鏀惧純2G鈥欒繖涓?儹鐐瑰懡棰樺睍寮?縺鐑堣璁恒?灞婃椂涓氱晫鍚勬柟绮捐嫳灏嗛綈鑱氫含鍩庯紝涓哄埌鍦鸿浼楃尞涓婃柊骞寸殑绮剧澶ч銆?br />
銆??鍏ㄦ柊鏀圭増鎺ㄥ嚭鐨?010 NexCom Expo 涓嬩竴浠g綉缁滈?淇″睍 鏆?CECC涓浗浼佷笟閫氫俊澶т細銆丆WCC涓浗鏃犵嚎閫氫俊澶т細灏嗕簬2010骞?鏈堜簬浜妇琛屻?鍏朵腑鐨凜WCC涓浗鏃犵嚎閫氫俊澶т細灏嗙潃閲嶆帰璁?G涓氬姟搴旂敤銆佺Щ鍔ㄥ簲鐢ㄥ晢搴椼?3G澧炲?涓氬姟銆佸鍊间笟鍔″钩鍙般?鎵嬫満鎿嶄綔绯荤粺绛夌Щ鍔ㄤ簰鑱旂綉鐩稿叧鐑偣鍦ㄥ浗鍐呯殑鍙戝睍搴旂敤銆備綔涓哄浗鍐呬笅涓?唬缃戠粶閫氫俊棰嗗煙鏈?珮绔殑灞曚細锛孨exCom Expo 涓嬩竴浠g綉缁滈?淇″睍 鏆?CECC涓浗浼佷笟閫氫俊澶т細銆丆WCC涓浗鏃犵嚎閫氫俊澶т細涓?洿涓撴敞浜庡浐缃戠Щ鍔ㄨ瀺鍚堜笅杩愯惀鍟嗐?SP鍜屽巶鍟嗗湪ICT棰嗗煙鐨勬渶鏂颁骇鍝侊紝鏂规鍜屽鍊兼湇鍔″苟涓斾繚鎸佹晱閿愮殑瑙傚療鍔涳紝涓鸿涓氬唴鏈?柊銆佹渶鐑殑鍏虫敞鐐规彁渚涙帰璁ㄥ钩鍙般?鏈灞曚細涓撳満鍐呭娑电洊鑼冨洿濡備笅锛?br />
銆??CWCC 涓浗鏃犵嚎閫氫俊澶т細

銆??4鏈?7鏃ヤ笂鍗?绉诲姩浜掕仈缃?涓撳満

銆??4鏈?7鏃ヤ笅鍗?3G澧炲?涓氬姟 涓撳満

銆??4鏈?8鏃ヤ笂鍗?鍏ㄤ笟鍔¤繍钀?涓夌綉铻嶅悎 涓撳満

銆??4鏈?8鏃ヤ笅鍗?涓嬩竴浠i?淇?IMS锛孎MC锛孭TN锛孭ON绛? 涓撳満

銆??4鏈?9鏃ヤ笂鍗?浼佷笟鏃犵嚎閫氫俊/鏃犵嚎鍩庡競 涓撳満

銆??4鏈?9鏃ヤ笅鍗?鐗╄仈缃?鏅鸿兘缁堢 涓撳満

銆??CECC 涓浗浼佷笟閫氫俊澶т細

銆??4鏈?7鏃ヤ笂鍗?UC涓庡崗浣?涓撳満

銆??4鏈?7鏃ヤ笅鍗?瑙嗛閫氫俊 涓撳満

銆??4鏈?8鏃ヤ笂鍗?浜戣绠?鏁版嵁涓績 涓撳満

銆??4鏈?8鏃ヤ笅鍗?铻嶅悎閫氫俊/浼佷笟澧炲?涓氬姟 涓撳満

銆??4鏈?9鏃ヤ笂鍗?鍛煎彨涓績 涓撳満

銆??4鏈?9鏃ヤ笅鍗?鍛煎彨涓績杩愯惀绠$悊 涓撳満

銆??鏈細灞曞彧瀵逛笓涓氳浼楀紑鏀撅紝搴т綅鏈夐檺銆傛杩庝笓涓氫汉澹湪www.nexcomexpo.com涓婃彁鍓嶆敞鍐?浼氬墠涓?湀浠ヤ笂娉ㄥ唽鍙幏鍙栧厤璐瑰叆鍦哄埜)銆傚苟娆㈣繋骞垮ぇ涓撲笟璇昏?鍜岃浼楁彁鍑哄浼氬睍璁锛屽舰寮忕瓑鏂归潰鐨勫缓璁?鎰忚閲囩撼鑰呭皢鑾峰緱绮剧編绀煎搧銆?br />
銆??鏈夋剰浠ュ弬灞曟垨鍙戣█褰㈠紡杩涜瀹d紶鐨勮繍钀ュ晢锛孲P, 鍘傚晢鎴栨笭閬擄紝璇疯仈绯伙細sales@microvoip.net; 鐢佃瘽锛?10 82212911;021 51701588.







相关链接:



Photoshop Candy Cane Gourmet Series



Affect China's Media Forum Held On The 14th



Do for others to do the wedding dress carriers should be out of the "influence" the edge



DivX to MPEG



Teach you to manually remove Angola variants



MP4 to 3G2



Good Screen Savers



SOURCE Editors Specialist



New PERSONAL Interest



business school new Territory market education



Armed new rural computer



Infomation Flash Tools



FLV To VOB



Kaspersky Lab set up regional OFFICES in Canada



How to become a DBA from a beginner



Sunday, September 19, 2010

Deep antivirus Guide (1)


Malware sudden recovery process steps include:

Step 1: infection confirmed

Quickly determine whether the system has been infected with the organization to minimize the impact of infection is essential.閫氳繃蹇?纭鎰熸煋骞舵爣璇嗗畠鐨勫彲鐤戠壒寰侊紝鍙互闄嶄綆鎰熸煋鐨勪紶鎾?搴︼紝骞跺噺灏忓畠瀵圭敤鎴风殑涓嶅埄褰卞搷銆?br />
There are many different types of computer failure could be mistaken for viral behavior. When the user through telephone or e-mail that "I think I'm the system has been infected" the support of staff must first determine whether the act Youkenengyou 鏌愮 types of malicious code by Dao Zhi. The following list provides some users may be reported as "virus-like" behavior of the typical symptoms of an example:
鈥?"I have to open an email attachment, then the situation is not abnormal; and now my computer is abnormal behavior. "
鈥?"I received an e-mail reply from the contact and asked me why I send them. Exe,. Zip or other accessories, in fact I have never sent a similar document. "
聽聽聽 鈥?"鎴戠殑闃茬梾姣掕蒋浠跺凡缁忓仠姝㈠伐浣滐紝涓旇绠楁満鎬绘槸鑷姩鍏虫満锛?"
聽聽聽 鈥?"鎴戠殑绋嬪簭宸ヤ綔寮傚父锛屽畠浠殑閫熷害閮介潪甯告參锛?"
鈥?"I can not open certain files or has disappeared! "

The user's observation and feedback is critical, because they have first to notice unusual activity may be. With unexpected speed of malicious software continue to increase, the initial infection and the effective length of time between the availability of defense has become increasingly important.鐢变簬澶ч儴鍒嗘劅鏌撳皢鍦ㄨ闃舵鍙戠敓锛屽洜姝ょ粍缁囪兘鍚﹀揩閫熸爣璇嗗苟纭鎰熸煋瀵逛簬灏嗙獊鍙戠殑浼犳挱鑼冨洿鍜屽畠鍙兘閫犳垚鐨勬崯瀹抽檷鑷虫渶浣庣▼搴﹁嚦鍏抽噸瑕併?

聽聽聽 浠ヤ笅閮ㄥ垎姒傝堪浜嗕竴绯诲垪浣挎偍鑳藉鏇村揩閫熷湴纭寮傚父琛屼负绌剁珶鏄惁鏄伓鎰忚蒋浠舵敾鍑绘垨绐佸彂鐨勬楠ゃ?

聽聽聽 濡傛灉鏂板瀷鎭舵剰杞欢鎰熸煋绯荤粺锛屽垯璇ョ郴缁熺殑鐢ㄦ埛灏嗙涓?釜娉ㄦ剰鍒板紓甯歌涓恒? Malicious software in the new release time and update anti-virus scanning applications to detect and respond to malicious software that often exists between the time delay. Early warning system to provide the best method is to let users know how to identify possible malicious software attacks signal, and providing them with fast communication links in order to report these malicious software attacks as soon as possible.

聽聽聽 鎰熸煋鎶ュ憡
Upon receipt of the user telephone or generate the possible new malware attacks alarm, used to define a warning as soon as possible to determine whether the process related to new attacks are usually very good for technical support. The following diagram shows the main steps in the process:



Figure 1 reports the process of malware infection

聽聽聽 寮傚父娲诲姩鎶ュ憡
The following issues apply to determine the cause of the alarm if abnormal activity may be a new malicious software. This guide assumes that these issues should be organized in the IT technical support to members to put forward non-technical users.

Collect basic information
The initial question should be can help to determine the alarm as soon as possible the nature and whether it is possible that new malicious software answers. You can use the following sample questions as a starting point of the process; should carry out modifications to meet the needs of the organization:
聽聽聽 鈥?鎶ュ憡鐨勬棩鏈熷拰鏃堕棿锛?br />聽聽聽 鈥?瀵艰嚧杩涜鎶ュ憡鐨勫紓甯告椿鍔ㄦ槸浠?箞锛?br />鈥?In the unusual event happened before the event?
鈥?whether the recent visit to a "normal" daily access to any Web site other than?
鈥?The system recently is in the external networks (for example, at airports, home networks, Wi-Fi hotspot or guest house)?
鈥?whether you are on the screen to see any unusual pop-up windows or ads?
聽聽聽 鈥?褰撳墠姝e湪杩愯鍝簺寮傚父鎴栨剰澶栬繘绋嬶紵
鈥?The computer is a workstation or server? It uses what operating system?瀹冨簲鐢ㄤ簡鍝簺瀹夊叏鏇存柊锛?br />鈥?it connected computer or any device whether to include mission-critical data?
鈥?whether the user account that has administrator privileges login?
鈥?the user whether to use strong passwords or password?
聽聽聽 鈥?璇ョ郴缁熶互鍓嶆槸鍚﹂伃鍒拌繃鎭舵剰杞欢鏀诲嚮锛?br />
聽聽聽 璇勪及璇ユ暟鎹?br />Collection of answers to these questions, technical support staff should assess the control group the following questions to collect data to help determine whether malicious software may be a reason:
鈥?whether the report could be a legitimate system features a new feature or update the results?
鈥?it can by the authorized user (not hackers / intruders) to explain the activities?
聽聽聽 鈥?瀹冭兘鍚︾敱宸茬煡鐨勭郴缁熸椿鍔ㄥ緱鍒拌В閲婏紵
聽聽聽 鈥?瀹冭兘鍚︾敱瀵圭▼搴忔垨绯荤粺鐨勬巿鏉冩洿鏀瑰緱鍒拌В閲婏紵
Finally, check the external anti-virus source, to determine whether the report, some of the existing virus or worm alert.

Collect detailed information
聽聽聽 姝ゆ椂锛屽彲浠ョ‘瀹氭柊鎭舵剰杞欢鏀诲嚮鏄惁鏄棶棰樼殑鍙兘鍘熷洜銆傚鏋滀笉鏄紝鍒欏彲鑳介渶瑕佹洿楂樼骇鍒殑鎶?湳淇℃伅锛屼笖鎶?湳鏀寔浜哄憳鍙兘闇?浠ョ墿鐞嗘柟寮忚闂紙濡傛灉鍙兘锛岃繙绋嬫帶鍒讹級鍙枒绯荤粺銆?You can use the following example to collect more detailed technical information, and clearly identify whether the system has been hackers or malicious code attacks:
鈥?equipment itself or in front of the firewall is enabled?濡傛灉鍚敤锛屽摢浜涚鍙e凡鍚?Internet 寮?斁锛?br />聽聽聽 鈥?濡傛灉搴旂敤绋嬪簭鍑虹幇鏁呴殰锛屽垯绔嬪嵆鑱旂郴搴旂敤绋嬪簭渚涘簲鍟嗕互纭畾鏍规湰鍘熷洜锛堜緥濡傦紝褰撳墠鐨?Microsoft 搴旂敤绋嬪簭鎻愪緵鍙敤浜庡彂閫佹晠闅滄姤鍛婄殑閿欒鎶ュ憡宸ュ叿锛夈?
鈥?the existence of the system has been released, but not yet installed the security update?
聽聽聽 鈥?绯荤粺鎷ユ湁鍝绫诲瀷鐨勫瘑鐮佺瓥鐣ワ紵 What is the minimum password length? Password complexity requirements?
鈥?the existence of the following new or suspicious circumstances:
鈥?the local computer if there is any new or suspicious account?
鈥?Administrators group for the presence of new or suspicious account?
聽聽聽 鈥?鏈嶅姟绠$悊鎺у埗鍙颁腑鏄惁鍒楀嚭浜嗘柊鐨勬垨鍙枒鐨勬湇鍔★紵
鈥?Event logs for new or suspicious incidents?
聽聽聽 鈥?鏄惁瀛樺湪鐢?Netstat 瀹炵敤绋嬪簭鎶ュ憡鐨勬寚鍚戝閮?IP 鍦板潃鎴栧彲鐤?IP 鍦板潃鐨勭綉缁滆繛鎺ワ紵

Response to unusual activity
The initial information gathered and used to determine the nature of alarm, the support staff should determine what happened is that false alarms, hoax or the real malicious software.

聽聽聽 鍒涘缓鍋囨伓鎰忚蒋浠舵姤鍛婅姣斿紑鍙戠梾姣掓垨锠曡櫕瀹规槗寰楀锛屽畠鍙互纭繚鍒涘缓璁稿鍋囨伓鎰忚蒋浠惰鎶ャ? These hoaxes and their calls and warnings generated will waste a lot of time and money. Mischief will bring trouble to the user, and usually report them to question the role of possible attacks. Should note the following to ensure proper handling of alarms:
鈥?false alarms. If the report is a false alarm, you should record call information. Regularly check the information may help determine the need for additional user training.
鈥?prank. Tracking and recording false alarms and malicious software malware real activities are important because they are still attacking instance - but they do not use malicious code.灏嗘湁鍏冲亣鎭舵剰杞欢璀︽姤浠ュ強鐪熸鎭舵剰杞欢濞佽儊鐨勪俊鎭姤鍛婄粰鐢ㄦ埛搴斾负缁勭粐鐨勫父瑙勯槻鐥呮瘨閫氫俊鐨勪竴閮ㄥ垎銆?This information will help users identify in advance hoax, thereby reducing the efficiency of the lower level.
鈥?known to be infected. If the system is infected, support staff should take steps to determine whether the infection is to use existing anti-virus applications deal with known attacks. Should check the system's anti-virus application to ensure it is functioning properly and to keep up to date.鐒跺悗锛屽簲杩涜瀹屾暣鐨勭郴缁熸壂鎻忎互灏濊瘯娓呯悊绯荤粺銆?If the scan successfully identify and clean up the infection, you should record call and send a warning to all users, to ensure that their anti-virus systems up and running and has been updated.濡傛灉鎵弿鏃犳硶鏍囪瘑鐗瑰畾褰㈠紡鐨勬伓鎰忚蒋浠讹紝鍒欏簲灏嗗叾瑙嗕负鏂版劅鏌擄紝骞堕伒寰?amp;quot;浜嬩欢鍝嶅簲杩囩▼"閮ㄥ垎涓殑鎸囧崡銆?br />鈥?New infections.濡傛灉绯荤粺鍙楀埌鏂版伓鎰忚蒋浠舵敾鍑荤殑鎰熸煋锛屽垯搴旀墽琛屼竴浜涘垵濮嬫搷浣滐紝浠ョ‘淇濇纭湴浜ゆ祦闂銆?The initial operation is designed to help IT support staff has always followed a process used to ensure proper operation follow the process.瀵瑰墠闈㈠垪鍑虹殑鍒濆闂鐨勫洖绛斿皢甯姪纭畾鍦ㄦ闃舵搴旇?铏戜互涓嬪摢涓垵濮嬫搷浣滐細
聽聽聽 鈥?浣跨敤璀︽姤璇︾粏淇℃伅鑱旂郴绱ф?鍝嶅簲灏忕粍鐨勬寚瀹氭垚鍛樸?
鈥?If you suspect your computer is a server, then contact the administrator to discuss whether it remove the computer from the network.
鈥?If the suspicious computer is a workstation, the link its users to discuss whether to remove the computer from the network.
鈥?To consider the IT system users to trigger a high alarm or warning of attacks against detected warning.
At this point, the role of support staff has been completed. The sudden responsibility will be transferred to the incident response process and the need to inform the Computer Security Incident Response Team (CSIRT) members.

Step 2: Incident Response

CSIRT will need to convene an emergency meeting as soon as possible to help arrange an event organized to respond to the next stage of the process. About how to create Incident Response Team, as well as the usual security and disaster recovery process more information, please see this guide in the same chapter.

For the purpose of this guide, assuming CSIRT has been created.姝ゆ椂锛岃灏忕粍鐨勭涓?釜鐩爣搴旀槸纭畾鍗虫椂绐佸彂鎺у埗鏈哄埗銆?The following section provides will help determine the mechanism and its components of the options.

聽聽聽 绱ф?绐佸彂鎺у埗
Confirmed malicious software attacks, the first step in control is to ensure that the sudden infection of computer and other equipment isolation. To ensure the isolation of infected computers is important, because it will not spread these malicious computer code. There are different mechanisms used to achieve this isolation, these mechanisms would affect the normal operation of the organization.瑕佺偣:濡傛灉鐩镐俊缁勭粐灏嗘彁璇峰垜浜嬫垨姘戜簨璇夎锛屽垯 Microsoft 寤鸿鎮ㄥ湪閲囧彇杩涗竴姝ョ殑鎺柦鍓嶅挩璇㈢粍缁囩殑娉曞緥浠h〃銆?br />
If the anti-virus community to detect sudden, use anti-virus vendor to provide a guide to help you determine the severity of emergencies. If the current burst in the broader anti-virus community is unknown, should be as soon as possible incidents reported to the anti-virus vendor. They may ask you to malware sample on compression and password protected file and send it to them so that they analyze. Find these examples of the process is not always straightforward, therefore, ideally should be prepared in advance to find malware sample preparation guide.

The next operation to be performed real-time process is to control the spread of attacks. Should consider three basic options:
鈥?The system has been damaged and the local network is disconnected.
鈥?If possible, isolate the infected host on the network contains.
聽聽聽 鈥?濡傛灉鏁翠釜缃戠粶宸查伃鍒扮牬鍧忔垨鏈夊彲鑳介伃鍒扮牬鍧忥紝鍒欏皢鏁翠釜缃戠粶涓庢墍鏈夊閮ㄧ綉缁滄柇寮?繛鎺ャ?

聽聽聽 鍙互閲囧彇璁稿鏇磋缁嗙殑鎶?湳姝ラ锛屽鐩戣瑕佸皾璇曠殑缃戠粶浠ュ強鏍囪瘑鏀诲嚮娑夊強鐨勭綉缁滅鍙e拰 IP 鍦板潃銆?However, if not yet completed a detailed analysis of the malicious software, it is likely omission may lead to more widespread infection of attack methods.缁勭粐鍙敤浜庣‘瀹氳椋庨櫓鏄惁鍙互鎺ュ彈鐨勫敮涓?満鍒舵槸瀹屽杽鐨勫畨鍏ㄩ闄╄瘎浼版姤鍛娿?璇ユ姤鍛婁娇鎮ㄨ兘澶熺‘瀹氭湭闃绘鏀诲嚮浠ュ強鍙兘鎰熸煋鎴栨剰澶栫敤浜庡瀹㈡埛鎴栧悎浣滀紮浼寸粍缁囧彂璧锋敾鍑绘墍娑夊強鐨勯闄┿?濡傛灉鍦ㄦ敾鍑诲彂鐢熷墠鏈畬鎴愭椋庨櫓鍒嗘瀽锛屽垯寤鸿缁勭粐鍔″繀灏忓績浠庝簨锛屽苟閫氳繃閫夋嫨鏈?珮绾у埆鐨勯殧绂绘帾鏂芥潵灏嗕紶鎾敾鍑荤殑鍙兘鎬ч檷鑷虫渶浣庛?

The options listed here only as a guide. May depend on the specific business needs of operational processes, regional settings, effects, severity and other factors, and other may only apply to organizations and unexpected environmental factors.

Ready to resume
Activation of emergency control mechanism, the activity should start the recovery process. The main objective of the recovery process is to ensure to achieve the following objectives:
鈥?Organization of business would be devastating to a minimum.
鈥?recovery from the attack time as fast as possible.
聽聽聽 鈥?鎹曡幏鐢ㄤ簬鏀寔鍙兘鐨勮捣璇夌殑淇℃伅銆?br />鈥?Capture the information for the development of other security measures (if necessary).
聽聽聽 鈥?閽堝宸叉仮澶嶇殑绯荤粺锛岄樆姝㈣绫诲瀷鐨勮繘涓?鏀诲嚮銆?br />
聽聽聽 閬楁喚鐨勬槸锛屽墠涓や釜鐩爣闇?"蹇?淇"鏂规硶锛岃?鍏朵綑涓変釜鏂规硶闇?鑺辨椂闂存敹闆嗘湁鍏虫敾鍑荤殑淇℃伅浠ヤ究瀹屽叏浜嗚В瀹冦? To satisfy these two conditions (that is, to solve the problem quickly, and still capture all relevant data required), please consider using the process shown in the image. The process is designed to ensure the release as soon as possible to restore infected systems, while ensuring that the necessary discussion of the data is not lost.璇ユ暟鎹緢閲嶈锛屽洜涓烘偍鐨勭粍缁囧皢浣跨敤瀹冪‘瀹氭仮澶嶇殑绯荤粺鏄惁浼氬厤鍙楁湭鏉ョ殑鏀诲嚮锛屽悓鏃跺畠杩樺皢鐢ㄤ綔璇佹嵁锛堝鏋滀互鍚庨噰鍙栨硶寰嬫椿鍔級銆?br />
System recovery and virus analysis process should be run as parallel activities to ensure the fastest possible recovery time.



鍥?聽 鍒嗘瀽鍓嶇殑鎭㈠姝ラ

聽聽聽 浣挎墍鏈夌郴缁熷緱浠ユ仮澶嶇殑鏈?揩鏂规硶鏄‘瀹氭煇涓彈鎰熸煋绯荤粺鑳藉惁鐢ㄤ簬鍒嗘瀽銆傚鏋滆兘澶熺敤浜庡垎鏋愶紝鍒欏簲闅旂鍜屽垎鏋愯绯荤粺銆?If you can not be isolated and analyzed, the next best option is to use some type of image software to create the system copy. If the option is available, the system should be shot images, released to restore the original computer, and then create a clone system.

In evidence to be collected or can be a more detailed analysis of the situation, take an infected computer as soon as the image (in the patch starts Zhi Qian) is very important, so be by the best and most appropriate method identifies priority treatment and deal with infection.

Finally, if you can not capture an image, then released to restore the system, should collect a minimum amount of court data. Ideally, the organization's security team should develop and maintain some type of incident response toolkit. You can use this toolkit will be used to provide systems to collect data on the instability and stability in the court system data.璇ュ伐鍏峰寘鍙互鏄洿瀹屾暣鐨勬伓鎰忚蒋浠跺垎鏋愬伐鍏峰寘锛堝皢鍦ㄦ湰绔犵殑涓嬩釜閮ㄥ垎涓敤浜庢毚闇插拰璁板綍鎭舵剰杞欢鐨勬墍鏈夊厓绱狅級鐨勫瓙闆嗐? However, the incident response toolkit main difference is that it should be captured in the shortest period of time the minimum level required for system information, so that the system can be resumed as soon as possible for release.






相关链接:



Dynamic Change CBA button



Project Management reviews



Avi ps3



In Section North soft, direct plug in for the "wings"!



New Timers And Time Synch



STORM infringement advice to the court sentenced the company abandoned online play



swf format



Salesforce Executives Leaving Three Hundred Will Continue To Recruit



E-cology In The Pan Micro Series 29



VC environment created in the symbian build EXE project questions



Official air strike 2 Cheats



mpeg4 Mp4



Articles about DESKTOP



Continuous production of the home page background music



Infomation Screen Capture



Hitachi trademark infringement, Why still so arrogant?



QUICKTIME for iphone 3g



Wednesday, July 21, 2010

Call of operations of foreign carriers


Recent months, carriers have been doing promotional work outside the call, found the process of promoting a lot of it is worth reminding the place here and share with you. The author referred to here mainly refers to telecommunications operators, China Mobile, Unicom and other telecom operators.

銆??鐢典俊銆佺Щ鍔ㄧ瓑杩愯惀鍟嗘槸鍥藉唴鏈?棭杩涜鍛煎彨涓績寤鸿鐨勪紒涓氾紝涓浗鐨勫懠鍙腑蹇冩妧鏈拰甯傚満鍙戝睍鍒颁粖澶╋紝杩愯惀鍟嗘棤鐤戝眳鍔熻嚦浼熴?绗旇?鍦ㄨ皟鏌ヨ繃绋嬩腑锛屽彂鐜板ぇ澶氭暟鐨勮繍钀ュ晢鐨勫懠鍙腑蹇冨缓璁炬棤璁烘槸杞欢銆佺‖浠躲?瑙勬ā鍜屽簲鐢紝閮借姳浜嗗緢澶氬績琛?紝鍋氫簡寰堝ぇ鎶曡祫锛岀幇鍦ㄤ粛鐒跺湪鍔姏鏀硅繘銆傝繖鏄?寰楁垜浠懠鍙腑蹇冧笟鐣屽簡骞哥殑涓?欢浜嬫儏锛屼絾鏄浜庡懠鍙腑蹇冩潵璇达紝寤鸿浠呬粎鏄竴鏂归潰锛屽浣曚娇涓嶈彶鐨勬姇璧勫甫鏉ュ疄瀹炲湪鍦ㄧ殑鍥炴姤锛岃繖鏇存槸涓嬩竴姝ュ?寰楁?鑰冩帰绱㈢殑闂銆?br />
銆??澶栧懠浣滀笟灏辨槸鑳藉澶уぇ鎻愬崌鍛煎彨涓績闄勫姞浠峰?鐨勬渶濂芥柟寮忎箣涓??绗旇?鍦ㄨ繖閲屾兂灏变互涓嬪嚑涓柟闈㈡潵璋堜竴璋堣繍钀ュ晢鐨勫鍛间綔涓氥?

澶栧懠浣滀笟鐨勭幇鐘?br />
銆??鐩墠锛屽ぇ澶氭暟鐨勮繍钀ュ晢閮藉凡缁忓紑灞曚簡涓嶅悓绋嬪害涓婄殑澶栧懠浣滀笟锛屼綔涓氱被鍨嬪寘鎷數璇濊惀閿??瀹㈡埛璋冩煡銆佸鎴峰叧鎬?紝娆犺垂鍌即绛夊涓柟闈?绗旇?鍦ㄦ暟瀹惰繍钀ュ晢澶勮?瀵熶簡澶氫釜澶栧懠椤圭洰锛屾?鐨勬潵鐪嬶紝鐩墠杩愯惀鍟嗙殑澶栧懠浣滀笟宸茬粡杩涘叆浜嗕竴涓閫熷彂灞曠殑鏃舵湡锛屼絾鐩墠杩樺浜庡鍛间綔涓氬垵绾ч樁娈点?寰堝杩愯惀鍟嗗湪杩涜澶栧懠浣滀笟鏃讹紝鏄负澶栧懠鑰屽鍛硷紝鍙鏈夐儴闂ㄦ彁鍑哄鍛肩敵璇凤紙鐢氳嚦灏辨槸鐩存帴涓嬭揪澶栧懠浠诲姟锛夌粰瀹㈡湇閮ㄩ棬锛屽鏈嶉儴闂ㄥ氨寮?杩涜澶栧懠浣滀笟锛岄」鐩畬鎴愬悗锛屾妸澶栧懠缁撴灉鎶ョ粰鐩稿叧閮ㄩ棬灏辩畻缁撴潫锛屽叾涓己灏戝緢澶氬繀瑕佺殑澶栧懠浣滀笟娴佺▼锛岃繖鏍锋瘡涓?鐨勫鍛间綔涓氶兘寰堥毦鐪熸鎴愬姛锛屾洿璋堜笉涓婂鍛奸」鐩箣闂寸殑鐩稿叧鎬с?浜嬪疄涓婂鍛间綔涓氬簲璇ヤ綔涓烘暣涓紒涓氳惀閿?殑涓?釜鏈夋満缁勬垚閮ㄥ垎锛屽苟闈炵嫭绔嬬殑涓?釜绯荤粺鏉ヨ繍浣溿?

銆??瑕佹兂杈冨揩鐨勬彁楂樿繍钀ュ晢鐨勫鍛兼按骞筹紝鎴戣涓哄簲璇ヨ繍钀ュ晢棣栧厛璁ゆ竻鑷繁鐨勪紭鍔垮拰搴旇閫夋嫨浣滀笟妯″紡銆傚湪鐩墠鐨勫熀纭?笂寮?睍涓?簺鎿嶄綔鐩稿绠?崟銆佸疄鏂介毦搴﹁緝灏忕殑澶栧懠浣滀笟锛屽湪绉疮鏇村鐨勭粡楠岋紝瀵瑰鍛间綔涓氭湁浜嗘洿娣变竴姝ョ殑璁よ瘑涔嬪悗锛屽啀鍏ㄦ柊瑙勫垝澶栧懠浣滀笟鎵嶈兘鏈?ぇ闄愬害鍙戞尌澶栧懠鐨勫▉鍔涖?鎻愬崌澶栧懠浣滀笟鏁堟灉搴旇鏄竴涓暱鏈熺Н绱拰寰簭娓愯繘鐨勮繃绋嬶紝鍦ㄦ搷浣滀腑闈炲父閲嶈鐨勪竴鐐规槸瀵规瘡涓?鐨勫鍛间綔涓氫竴瀹氳鍋氬ソ鎬荤粨锛岄棶涓?棶杩欐澶栧懠闄や簡鎴愬姛鐜囨湁澶氶珮涔嬪杩樻湁浠?箞鏇村鐨勬敹鑾凤紵

澶栧懠璧勬簮鍒嗘瀽

銆??鍦ㄥ鍛间綔涓氱殑鎿嶄綔骞冲彴鏂归潰锛氳繍钀ュ晢浣滀负鍥藉唴鍛煎彨涓績鏈?棭鍜屾渶瀹屽杽鐨勫缓璁捐?锛屽湪澶栧懠鐨勮蒋纭欢鏂归潰閮芥湁鐫?緱澶╃嫭鍘氱殑浼樺娍锛屼竴鑸殑鍦板競绾ц繍钀ュ晢閮藉缓鏈夊姛鑳藉己澶у懠鍙腑蹇冨钩鍙帮紝鍧愬腑鏂归潰涔熶汉鎵嬪厖瓒炽?姝ゅ杩欎簺浼佷笟鎷ユ湁涓板瘜鐨勭數淇¤祫婧愶紝鏃犺鏄綉缁溿?涓户銆佸彿鐮佽祫婧愰兘鑳藉婊¤冻鍑犱箮浠讳綍褰㈠紡鐨勫鍛间綔涓氥?

銆??鍦ㄥ鍛间綔涓氱殑瀹㈡埛璧勬簮鏂归潰锛氱粡杩囧骞寸殑杩愪綔锛岃繍钀ュ晢绉疮浜嗛潪甯镐赴瀵岀殑瀹㈡埛璧勬簮锛屽鎴峰悕鍗曟暟閲忓簽澶э紝鏇撮噸瑕佺殑鏄繍钀ュ晢杩樻嫢鏈夎繖浜涘鎴风殑鍚勭璇︾粏璧勬枡锛屼釜浜轰俊鎭紝涓氬姟淇℃伅绛夈?闈炲父閫傚悎寮?睍澶栧懠浣滀笟銆傝櫧鐒跺姝わ紝浣嗗湪瀹為檯鎿嶄綔涓鎴疯祫婧愮殑浼樺娍缁忓父娌℃湁寰楀埌寰堝ソ鐨勫埄鐢紝寰堝澶栧懠椤圭洰鍏剁洰鐨勬?骞朵笉瀹屾暣銆傚鍛肩殑鎵ц閮ㄩ棬鎷垮埌鍚嶅崟鍚庢病鏈夎繘琛屽垎鏋愪究闅忔満娲惧彂缁欐瘡涓?釜鍧愬腑杩涜澶栧懠銆傚鍛煎悗瀵逛簬瀹㈡埛鍚屾牱寰堝皯杩涜杩涗竴姝ョ殑澶勭悊锛屾槸鍚﹂渶瑕佹洿鏂拌祫鏂欙紝鏄惁鍊煎緱璺熻繘锛屾槸鍚﹁瀹㈡埛涓嶉?鍚堢數璇濅綔涓氾紝绛夌瓑鐜妭鍧囪鐪佺暐锛屼笅涓?澶栧懠鏃朵粛鐒舵槸杩欐牱閲嶅锛屽浜庡鍛兼牴鏈Н绱紝涔熷氨璋堜笉涓婃彁楂樸?

銆??绗旇?璁や负锛屽鍛艰祫婧愬悓鏍峰拰鎿嶄綔缁忛獙涓?牱鏄釜涓嶆柇绉疮鐨勮繃绋嬶紝姣忎竴娆$殑澶栧懠浣滀笟閮戒細瀵瑰凡鏈夎祫婧愪骇鐢熷奖鍝嶏紝灏ゅ叾鏄鎴疯祫婧愩?鍙湁鍦ㄨ祫婧愭柟闈笉鏂Н绱紝鎵嶈兘鍦ㄤ笅涓?鐨勫鍛间綔涓氭椂鏈夋洿濂界殑鏇撮?鍚堢殑璧勬簮鍙互鍒╃敤锛屽仛鍒拌兏鏈夋垚绔癸紝浜嬪崐鍔熷?銆?br />
澶栧懠浣滀笟绫诲瀷

銆??澶栧懠浣滀笟鎬讳綋涓婂彲浠ュ垎涓猴細钀ラ攢鍨嬪鍛笺?鏈嶅姟鍨嬪鍛笺?鐩戠潱鍨嬪鍛间互鍙婅皟鏌ュ瀷澶栧懠鍥涘ぇ绫汇?鎸夊叾涓氬姟灞炴?鍙垎涓哄崄鏁扮涓氬姟绫诲瀷锛氬鎴锋尳鐣欍?瀹㈡埛鍏虫?銆佸鎴疯皟鏌ャ?鏈嶅姟钀ラ攢銆佸紑鎴峰洖璁裤?鎶曡瘔鍥炶銆佹柊涓氬姟鍥炶銆佽拷缂存瑺璐广?涓氬姟閫氱煡銆佽祫鏂欐牳瀵圭瓑銆?br />
銆??鐩墠杩愯惀鍟嗗紑灞曠殑涓氬姟绫诲瀷涓昏闆嗕腑鍦ㄨ惀閿?瀷澶栧懠鍜岃皟鏌ュ瀷澶栧懠鏂归潰锛屽紑灞曠殑涓氬姟涓昏鍖呮嫭锛氬鎴疯皟鏌ャ?鏈嶅姟钀ラ攢銆佹姇璇夊洖璁裤?杩界即娆犺垂銆佷笟鍔¢?鐭ュ嚑澶т笟鍔℃澘鍧椼?灏卞鍛间綔涓氱被鍨嬫潵鐪嬶紝杩愯惀鍟嗗嚑涔庨?鍚堜互涓婄殑鎵?湁澶栧懠浣滀笟锛屽鍛肩殑鎻愬崌绌洪棿杩橀潪甯稿ぇ銆傚叿浣撳浣曢?姝ュ紑灞曡繖浜涘鍛间綔涓氾紝鐢辨祬鍏ユ繁锛岀敱鐐瑰埌闈紝浠嶉渶瑕佹洿鍔犱笓涓氱殑瀹夋帓鍜岃鍒掋?

銆??鐩墠澶у鏁扮殑澶栧懠绯荤粺浠嶇劧杈冨鐨勫仠鐣欏湪鎶?湳灞傞潰锛岃?鐪熸鐨勫鎴蜂笟鍔″垎鏋愬仛寰椾笉澶熼?褰伙紝浜嬪疄涓婃妧鏈案杩滄槸涓轰笟鍔℃湇鍔★紝鍞妧鏈?鎶?湳鐨勫仛娉曞崄鏈夊叓涔濆緱涓嶅埌浠や汉婊℃剰鐨勬晥鏋溿?绗旇?璁や负锛岃繍钀ュ晢搴旇鏇村鐨勪粠鑷韩涓氬姟鐨勮搴﹀嚭鍙戯紝璁ゆ竻鑷韩鐨勯渶姹傚拰鐩墠鎵?鐨勫鍛奸樁娈碉紝鍚堢悊鐨勫畨鎺掑鍛间綔涓氾紝閫夋嫨鐪熸鍚堥?鐨勫鍛煎伐鍏烽潪甯搁噸瑕侊紝灏ゅ叾鍦ㄥ垰寮?杩涜澶栧懠浣滀笟鐨勯樁娈碉紝鐩茬洰鐨勮拷姹傚ぇ鑰屽叏鐨勫仛娉曚箖鏄繘琛屽鍛间綔涓氱殑澶у繉锛屽甫鏉ョ殑鍚庢灉鏄姇璧勬氮璐逛弗閲嶏紝鐢氳嚦瀵瑰鍛间綔涓氫抚澶变俊蹇冿紝浜х敓鎶佃Е銆?br />
澶栧懠妯″紡鍒嗘瀽

銆??鐩墠涓昏鐨勫鍛兼柟寮忓寘鎷嚜鍔ㄥ鍛笺?浜哄伐澶栧懠銆侀瑙堝鍛间互鍙婄郴缁熼娴嬪鍛肩瓑銆傜瑪鑰呰涓猴紝杩愯惀鍟嗗湪杩涜澶栧懠鏂瑰紡鐨勯?鎷╁悓鏍烽渶瑕佺瀛︾殑鍒嗘瀽銆?br />
銆??鏈?匠鐨勫鍛兼柟寮忓綋鐒舵槸鍚勭澶栧懠妯″紡鐩哥粨鍚堢殑鏂瑰紡锛屽洜涓烘瘡涓?澶栧懠妯″紡鍧囨湁鑷韩鐨勭壒鐐癸紝閫傚悎涓嶅悓鐨勫鎴峰璞″拰涓嶅悓鐨勫鍛间笟鍔$被鍨嬨?渚嬪瀵逛簬VIP瀹㈡埛鐨勫鍛间綔涓氬敖閲忛?鎷╅瑙堝鍛硷紝鍥犱负杩欓儴鍒嗗鎴锋槸缁欒繍钀ュ晢甯︽潵鏈?ぇ鏀剁泭鐨勫鎴凤紝鍦ㄧ淮绯诲鎴锋弧鎰忓害绛夋柟闈㈠簲璇ュ仛鍒版洿鍔犱汉鎬у寲鍜屼釜鎬у寲锛岄瑙堝鍛煎垯鍙互鏇村ソ鐨勪簡瑙e鎴凤紝鎶婃彙瀹㈡埛鐨勬儏鍐靛拰蹇冩?锛屽ソ鐨勯瑙堝鍛肩敋鑷宠兘澶熶簡瑙e埌璇ュ鎴风殑蹇冪悊锛堝ソ鐨勯瑙堝鍛肩郴缁熷簲褰撴彁渚涘鎴蜂俊鎭殑鍏ㄩ潰璁板綍鍜屾绱㈠姛鑳斤級銆傝?瀵逛簬寮哄娍澶栧懠浣滀笟绫诲瀷锛屾瘮濡傛櫘閫氳皟鏌ワ紝绠?崟鐨勪笟鍔℃帹閫佺瓑浣滀笟锛屽彲浠ラ?鎷╃郴缁熼娴嬪鍛硷紝鍥犱负杩欎簺澶栧懠浣滀笟鐨勭洰鐨勬槸鏈?ぇ鍙兘鐨勬帴瑙﹀彈浼楋紝鎻愰珮鍧愬腑鏁堢巼銆?br />
銆??鍦ㄥ鍛间綔涓氱殑涓嶅悓闃舵锛屽浜庡鍛间綔涓氱殑妯″紡閫夋嫨涔熶笉灏界浉鍚屻?绗旇?璁や负鍦ㄥ鍛间綔涓氱殑鍒濈骇闃舵锛堜篃灏辨槸鍒氬紑灞曞鍛间綔涓氱殑闃舵锛夊敖閲忛噰鐢ㄤ汉宸ュ鍛煎拰棰勮澶栧懠锛屽叾鍘熷洜鏄繖涓ょ澶栧懠浣滀笟妯″紡鑳藉鏈?ぇ鍙兘鐨勫幓浣撲細澶栧懠浣滀笟鐨勫唴娑碉紝鏈?ぇ鍙兘鐨勬妸鎻″鍛间綔涓氱殑姣忎竴涓幆鑺傚拰缁撴灉锛屽苟涓旇兘澶熷湪闈炲父灏忕殑鎶曡祫涓嬪氨瀹屾垚鍘熸湁绯荤粺鐨勬敼閫狅紙鐢氳嚦鏃犻渶鍋氫换浣曟敼鍔級銆傚綋鎮ㄩ?杩囦竴浜涘鍛间綔涓氫箣鍚庯紝瀵瑰鍛兼湁浜嗕竴瀹氱殑璁よ瘑鍜岀Н绱箣鍚庯紝鍙互寮?睍鏇村鐨勫鍛兼ā寮忓拰澶栧懠涓氬姟绫诲瀷銆?br />
銆??鎬昏?瑷?箣锛岀瑪鑰呰涓哄湪杩涜澶栧懠浣滀笟鐨勬椂鍊欙紝搴斿綋閬靛惊娓愯繘鐨勮寰嬨?鐪熸濂界殑澶栧懠浣滀笟浠嶅簲璇ユ槸鍜岃皭鐨勩?娓愯繘鐨勫鍛间綔涓氥?






相关链接:



New Worm Floodnet (cute) Little Files



Converter Flv To 3gp



CorelDraw Technology Sea Cockle Pickers



Delicacy DVD Converter



Simple Password Managers



Introduction Ad Blockers



avi to mpeg converter



Video Format For Blackberry



X-Cloner DivX Converter



Comment GAMES Arcade



mp3 to 3g2



PTC announced the listing of CADDS 5i R14



CHRISTMASGIFT 3GP Converter



Infomation Cursors And Fonts



AAC to MP3 Mixer



Tuesday, July 6, 2010

Christmas-Idea DVD to Mobile 3G2

Christmas-Idea DVD to Mobile 3G2 is an All-in-One solution to create Mobile Phone 3GP movies from DVDs, TV shows and downloaded videos. The software combines DVD to Mobile 3G2 Converter and 3GP Video Converter in one package for discounted price. The software is easy to use. It features superb video audio quality and the fastest conversion techniques availabe on the market (Up to 3x faster).



Christmas-Idea DVD to Mobile 3G2 easy converts all popular video formats such as AVI, DivX/Xvid, WMV, RM, MPG, MOV, MPEG (and many more) videos into Mobile Phone 3GP format. Watch movies on the road. Support all mobile phones with 3GP video capability. The software is very easy to use. It compresses a full lengh movie into small size which can be fitted in a 128MB memory card. Carry your movie theater on the go! Watch movies anywhere, anytime - a new life style.