Sunday, October 24, 2010

SP chaos: Peace and Prosperity of the market or into



As the second-listed SP, despite the success of landing the Shenzhen Stock Exchange's small board and have a good performance, but still troubled recently Talkweb information. Because the prospectuses of a business, Talkweb information has been vocal opposition of many media.

"Hidden messages" in Puzzle

This caused great concern in the business is Talkweb information in the prospectus to investors recommended stealth key messages. According to introduce the user to use this service will enable users to hide the calling number, and provide call management features such as call screening, Talkweb claim this business to "help improve communication efficiency, improve relationships, so that the user's communications more for the self. "

Talkweb Information Secretary of the Board Xu Yutang In an interview with "communications industry newspaper" reporters, said the company strictly in accordance with the relevant provisions of Talkweb, users can only use this service to send to registered users. But he refused to disclose the information to the business Talkweb enrollment.

But stakeholders say suspected Talkweb, an industry spokesman told reporters that the business in its core business, "wireless value-added" income share of more than one third of the total wireless value-added business income ratio Talkweb Information Up to 68%, if only to send the people concentrated in a few users, the business is difficult to extend to such a large scale.

Xu Yutang August 13 to the "communications industry newspaper" journalist said that the current Talkweb not received any advice from the operator's handling, and has no plans to make any changes on the business.

VS profit regulation

Although SP has been operating a hundred types of business, but profits are still concentrated in the traditional focus on 2G era of text messaging and other services. "The current SP homogenization of competition is very serious, we are not too good means of profit." States Securities analyst responsible for the field of telecommunications value-added Ying Jiang told reporters.

Thus, setting all kinds of "smoke charge trap" on a number of SP in order to survive the risky. "Violation is the court death, to die is not illegal." Industry, a SP told reporters.

"Imperfect system of the actual value of the whole telecom market as a source of chaos." An SP who told reporters. For technical reasons, were supposed to be responsible for monitoring the telecommunications market, the Ministry of Industry and Information channels are not too many real-time monitoring.

Topway an example to the reporter called Hunan Telecom Authority stakeholders expressed the details of this incident do not know. "If the actual supervision to be able to move up (to the Ministry of Industry and Information Technology), the survival of the current predicament of SP will be improved." Jiang Ying, told reporters.

Mirror listed

Although Topway "stealth message" event right and wrong has not yet finalized, but the chaos in the already numerous and reveal a thoroughfare.

It is the root of this incident because Talkweb listing under the magnifying glass placed in community supervision, while the telecommunications value-added industries have been frequent violations, but the listed companies for their own share price performance, not turning a blind eye to public demand.

In fact Topway have realized that, according to its prospectus to the results, the public listing of the majority of the funds raised will be invested in emerging markets such as mobile phone animation, precisely in order to avoid the traditional business of compliance risk. The air before the network went overseas listing, delisting of Hurray even have TOM Online, both are true. Transformation of the air network wireless gateway, Hurray will extend the industrial chain to the upstream CP, TOM Online together eBay, is to avoid the risk of traditional business operations.

If the SP in the first golden age of fish in troubled waters if the majority in the future 3G market will exist not only survival of the fittest, will reshape the market competition rules. This is necessary for the development of telecom value-added market.







Recommended links:



Flash to MPEG



MINISTRY of Industry and the financial allocation in 2010 was 11.3 billion



Articles about Development



DVR-MS To MPG



Not necessarily the shortest line between TWO points



Patriot mp3 Fashion stakes



A very nice MP3 TOOLS



New System UTILITIES



SWF To MP4



Advanced Traceability - to meet the argument



Open-source Framework For Thinking About [2]



New Curriculum for primary and secondary breakthrough Multi-media teaching



C # And Class Differences In The Structure



dirt executable has stopped working eliminate



Thursday, October 14, 2010

MP4 standard expected by the end of line introduced to avoid repeating the mistakes MP3


Due to lack of industry-standard, MP3 is experiencing cold

Yesterday, the French Archos ZHANG Ya-ling, director of Asia accept the "Daily Economic News" interview, said, "is currently being discussed with the Ministry of Information Industry and other departments to formulate an industry standard MP4, MP3 to avoid repeating the disastrous domestic MP4. MP4 industry standard is expected to introduce before the end. "MP4 French Archos is the founder of the industry, only three years to hit Europe and the United States market, and two years ago to enter the domestic market.

ZHANG Ya-ling said the MP3 reason why the domestic industry as a whole experience "cold" because MP3 does not have a unified industry standard, plus access to MP3's technology low, causing many unlicensed vendors with some cheap, low quality products confuse the market.

The investigation agency show that China MP4 industry has been getting better, into the development of the fast lane, this MP4 to reach 300% market growth, industrial cake approaching 10 million. MP4 of the market the next few years is expected to reach 10 billion yuan, This is the MP3, digital camera, digital camera consumer digital products after the 4th largest consumer hot spot.

This cake has attracted huge industry Sony, Toshiba, Hitachi, Sharp and Samsung, some domestic manufacturers such as Tsinghua Unisplendour Strength, Little Swan, Changhong and other actions have been made. The face of the raging market entrants, ZHANG Ya-ling said, "We welcome competition, a manufacturer can not monopolize an industry, but in the current MP4 market, more powerful brands to join, would better promote a mature industry . "

ZHANG Ya-ling that, MP4 is not a lucrative industry, in its course of development, manufacturers and channels need to ensure a reasonable profit, I hope there are some good standard to ensure that competition is healthy.

MP4 is able to replace a major crisis facing the MP3 into the mainstream of consumer electronics products? ZHANG Ya-ling said that as the technology lead to expensive high threshold, MP4 in the country not as popular as the MP3 now.

But with the iPod video player as well as over 2000 songs, Pixar films and Disney TV series and the introduction of the Apple online store, Apple has begun to enter the field of free video. Archos how to face competition from iPod? ZHANG Ya-ling said, Archos will integrate TV resources, prepared to launch free to download TV shows to MP4 Pocket cinema services, these services are mainly concentrated in the channel can interact with inside.







Recommended links:



Objective view blog



Recommend Firewall And Proxy Servers



Railway



Jobs Leak Macworld Speech



Political Consultative Conference, said the computer is free to perform their DUTIES need to send



Pay up to see three major areas of someone's fastest



AVI to 3GP



how do inkjet printers work



ASF to MPG



Using tabs to align options



Shanghai REAL estate control policies introduced Countdown



Golden Abacus Settled In Wuhan Air "Gold Dealer"



PREMIER Download Managers



WMV to MPEG



Input text input is also on the all-powerful plug



Tuesday, October 5, 2010

Ridicule: the workplace, inoffensive "mantra"


From the people of the shunned to aspire to the right of a person's workplace plays a big role in surgery, workplace mantra is one of the important one, in the workplace, some mantra makes you unpleasant, and you , may also not aware of ......

Mantra of - "boring through the"

Colleagues nicknamed "Faye Wong", that gesture, a word - cool! "Faye Wong" mantra is also cool - "boring through," and said this time and make a sick human society, the earthly form, look just like a "Dream" in the Miao Yu.

About her clubbing, she said: "The New World, ah, no time to pop it! Hit to hit to all foreigners, boring, awful.
"About her eating, she said:" is Japanese food, ah, no point of how the new tricks! Shanghai, a Japanese restaurant did not authentic, not uncomfortable in the stomach every time they eat. Like spending so much money, might as well go to Japan to eat authentic, I shall be extremely fresh! In the end is flown in, and boring through the. "Asked her not to chat online chat, she said:" What Girl, frogs, and all are false, boring, awful. "Asked her to see the new popular book did not see," is not that thing, turned a few pages on the throw. Depends on the look original, the translation of the shares is less then charm, boring, awful. "Even my colleagues bought a new dress, she was not interested to see, said to be" the figure on her, what to wear international brands, even if the set of a brand universe may not be pretty! Xian Bai Bai smelly, boring through it! "However, these words only apply to those who can not afford her obvious brand.


You usually have to really ask her doing, experiencing a good mood when she will tell you. "Cargo that kid tried several times to call about me, and did not want to go, not the watch face on the company's business, woven reluctantly agreed. You know, he was the man, boring through, and actually dare to pick open Santana I dared not rise has caused me along the way, fear of being acquaintances see more humiliating it! restaurant is, not even playing the violin, but also two or three thousand dollars a meal, boring, awful. after eating snails in France to 'Jinmao''dancing, broken place that I have to bother, and said not a still non-drag me to one night, did not drink much wine, we opened a bottle of Louis XVI, opinions on that drink drink taste, boring through the ......" this person really is boring through it! (Camplainee: Amay customs staff)

Mantra of - "Let relationship between how"

This is a colleague of Song of a mantra. Usually finish the sentence, ranging from your answer, Song himself has added, "Yes it, is not it?"

I just arrived here on the third day, Song said to me on. At that time very little gratitude, and quickly nodded, this first point, had a great party to meet the requirements of Song - lent him 100 yuan. A few days later, Song also had my 90, said he was a little tight in hand, leaving the 10 dollars a few days and then returning. I was a Paixiong Fu, courtesy of a very hypocritical manner, said: "Who is Who We two, then 10 dollars on restaurant two blocks away when I give you a." Song was really no mention of the 10-dollar things.

Later learned, these words Song Feng Renjiu said. Looking at the two joints of his smile into a small eye, who nerve to deny it? Since iron is a good buddy child relationship, children have to look like a buddy. For example, no tobacco smoked, Song will endure the table to search the drawer to see who is there, whether it be semi-box or a box, seize the equipment to their own pockets; at work was thirsty, no matter who's tea cup, put that on the drink; the most exasperating is that he did not even shave knife today with this, and tomorrow, with the of. Whoever is unhappy, the phrase into a mantra from the laughing Buddha out of the mouth, are not you crying, laughing no. Our unit who secretly about Song Waving could not help but shake his head.



Later, in the dream, the smiling faces of every song with his pet phrase of blossoming in front of me, I will answer him coldly: "We two you are you I am me, a small cotton up with me." To work , the face of Song, is how the rhetoric of the dream would not come. (Complain Person: Mr SOEs Clerk)

The mantra - "When dine with me"

Lee is a special atmosphere of the people there, and his active, if more, never stage fright. But he did not associate a few words are usually not familiar with him, especially an easy mark. For instance, he said, "I take you back to work", you should never do so, he has owned vehicles, but often is as true of people in the office long-awaited, then his wife went back. Until the recall did not see him come and go car park ride in the car, could not help but call when asked, he got home. Mistaken attitude is very good, "I'll come out, made a special trip to send you home." No one can really let people deliberately embarrassed out Yeah, give up the idea. If you blame him the next day, his injustice than you: "Did not I say to meet you the only thing that he can not wait, but also to blame me!"

The most gullible is the food problem. Lee has a mantra - when a meal with it. His friends are not familiar with his words seriously. Generally only provided when the first 5 times so when it shows that he is really old people with you to prepare lunch. If the 6th, he issued the invitation, this meal is conclusive, not only conclusive, and certainly he pays the bill.

Of course, such a situation, when you have received the invitation of his five, is waiting for Susan fasting 6th, he suddenly disappeared, long time no news. If this is the case, when he issued the invitation to you again, before the count on the invalid, and must account from scratch. (Stella property staff)

Mantra of - "rip", "Tut"

Finance people fat, so my words are simple, even the pet phrase of at least streamline the number of words.

"Rip" is used to express discontent. Made this "rip" the sound is to a little skill - the tongue up against the palate, throat out of a gas, will be open red tongue, is commanded in short powerful "rip." Say the word when the financial often Xiezhuo Yan Man, nearest approach to a face full of contempt, that out "rip" is even more contemptuous of the effect of this increase, pounded his desk without her, I know, who of incorrectly claims the.

Run into this situation, timid, and not words will be the first one back in the heart tremble. Hard not to eat soft food met the guy, will be more fiercely across one go: "Well! Who do you think you are. What we will, but also you to do."

Proud of them, will send "tut" sound. Difficult to come! Mouth front end hard, will absorb the tongue against the palate. Soon as after this, will be boasting or bragging, proud face color, "Tut" is just an introduction, a foreshadowing, will lead to the back of the surging "river."

Of course, this "tut" is sometimes said that a kind of admiration, but this admiration is similar to the flatter, like the "editorial story" in the Geling boast cattle Sister "old revolutionary" was not convinced in good faith. (Complain Person: Miss Zhang primary school teachers)







Recommended links:



MKV to MOV



YouTube to FLV



VOB to WMV



firmware update of the nokia e71 mobile phone



Tuesday, September 28, 2010

Quality control in the "Statistics" several concepts


1, "statistical methods" means
At present, some enterprises in the distribution functions, the use of statistical methods in the Finance department in charge of setting the ground that the whole plant accountants and statisticians in business leadership by the Finance Division. Some enterprises in the quality manual clearly writes: "Our" PRC Statistics Law "Application of statistical techniques ... ...." Obviously, not out to understand the meaning of statistical techniques. Statistical techniques (statistical methods) is the theoretical basis of probability theory a branch of applied mathematics. Random phenomena in the study to determine the mathematical laws of a mathematical discipline. Statistical techniques, including statistical inference and statistical control of two components.

Second, statistical inference and statistical control
Statistical inference is based on data collected (large samples or small samples) of analysis and statistical calculations are the eigenvalues of materials used to predict and infer technologies, such as the application of statistical sampling. Statistical control is based on data collected (large samples or small samples) of analysis and statistical computing eigenvalue obtained is used to predict and control things technical, such as the control diagram. Shows that the quality of statistical techniques in the production of the whole process of the formation and implementation, in every aspect will have its uses. In GB / T 19004.1-1994 idt ISO 9004-1:1994 standard, "20.1 Applications", he wrote: to identify and correct application of modern statistical methods to control every stage of the process of the organization an important factor. Shall establish and maintain a selection of statistical methods and their use for the following work documented procedures: a) market analysis; b) product design; c) credibility of the specification, the longevity and durability prediction; d) process control and process capability research; e) sampling program to determine the level of quality; f) data analysis, performance evaluation and failure analysis; g) process improvement; h) safety evaluation and risk analysis. Can be seen that any one organization does not exist the question whether the application of statistical techniques. Recognizing the importance of statistical techniques, the quality of rings can all be applied at any stage.

Third, statistical methods in the several concepts should be clear
1. Statistical method is the statistical rule, whether natural or social science, there are regular problems. Statistical techniques, is an important method of one of its laws. Broadly speaking, the experience of statistics, common sense is also the statistics, statistics is the law. It is said that some of the old craftsmen, there is no culture of the statistical methods do not know, but they can produce highly skilled crafts. In fact, this is the master of the law, but the results, but to master the process of the law to spend a lot of resources and energy to his life Besides not everyone can. However, if the real master of the statistical techniques, the use of statistical techniques to master the rules, you can learn in a short time, control of product quality. Therefore, application of statistical techniques to obtain better and more economical results. Application of statistical techniques can be better and more economical access to statistical laws. In process control, statistical techniques can be abnormal fluctuations in time to capture a precursor to the producers and managers to take prompt corrective measures to eliminate failure in the process, play a preventive role. Statistical techniques to capture an abnormal fluctuations in each sign, it allows us to eliminate an exception factor. Abnormal factors in the process is limited, so application of statistical techniques can make the process work to achieve the status of random factors only, namely, stability control. 2. Application of statistical methods to control the distribution theory of statistical methods to study random phenomena identified in the De mathematical laws of science, the mathematical laws that determine the quality of data reflected in the distribution. Many statistical methods of analysis and judgments are based on criteria established distribution theory. The most commonly used distribution is normal, there is binomial distribution, Poisson distribution. 3. Application of statistical methods to meet the law of large numbers of shows that only the average number of random phenomena only with a stable, that is law of large numbers. That is only a certain number of samples in the above results it is more accurate conclusions. Statistical law is built on the basis of large amounts of data can be obtained, such as throwing coins, words (or drawings) shows the probability of a large number of tests only to get close to 50%. 4. Application of the principle of small probability events.

Principles of small probability event, also known as small probability event does not occur principle. That "if the probability of event A occurs is small (eg 0.01), but once or less a number of test events A actually occurred, have reason to think that this is unusual and should not happen." Criterion of statistical methods is a small probability event under the principle of get. Therefore, the application of statistical methods necessary risks, "small probability" is to judge the degree of risk [recorded as a>, and its opposite is the confidence level [denoted b>, the relationship between the two is a + b = 1.

4, application of statistical methods have the basic conditions required
1. More solid foundation for enterprise management, a normal management order, the product quality with traceability; 2. Production process is stable, the five factors of human-computer method has been standardized materials, processes controlled in a stable state; 3. The workers, especially full-time quality management and technical personnel have received training in statistical methods, systems, application of statistical methods with flexible capacity; 4. Have the necessary technical, material conditions, such as: with a variety of goods, show the value of accurate measuring instruments, equipment and advanced testing methods, with the necessary computing equipment and record forms.






Recommended links:



The basic principles of SSL



alternative to microsoft office word 39 s tools



Tencent Sued Staff: To Protest The Labor Contract Tencent Overlord



Easy Seasonal - Screen Savers



How To Revive The Old Floppy Drive?



Taobao Alipay betrayal?



Determine The Success Of EAI Concepts



Giant B & Q



MKV To VOB



MOD Converter



Sun rushes to the fore: All Free



evaluation People - Screen Savers



WMV to MPEG



Wednesday, September 15, 2010

New Year's gift wish Beijing won three business awards to


China Management Software Industry in 2006 AMT Academy Award is named Organization. AMT is the first neutral field of information technology management authority. Selection for companies doing business in China, including mainland China and Hong Kong, Macao and Taiwan, a total of ten selected areas of management software, Top 5, Top 10; China Business management software implementation of the Top 10; China's Management Software Top 100. Covers the areas covered all aspects of business management software.

鍦ㄦ娆¤瘎閫夎繃绋嬩腑锛屽寳浜晢鑳戒俊鎭妧鏈湁闄愬叕鍙稿嚟鍊?006骞撮獎浜虹殑涓氱哗锛屼互缃戠粶鎶曠エ銆佷笓瀹惰瘎瀹°?瀹㈡埛璁胯皥鏂归潰鐨勭粷瀵逛紭鍔胯崳鑾蜂笁椤瑰ぇ濂栥?

Awards are as follows:




2006 customer relationship management software vendor TOP 10


Customer relationship management, from the English translation from Customer Relationship Management, abbreviated as CRM. It Package


With management thinking, software products, management systems at three levels of meaning.浣滀负澶у瀷鐨勭鐞嗙郴缁燂紝瀹冨浼佷笟瀹㈡埛銆侀攢鍞槦浼嶃?甯傚満娲诲姩銆侀攢鍞嚎绱?閿?敭鏈轰細銆佹湇鍔¤姹傘?鏈嶅姟鍝嶅簲绛夎繘琛岀鐞嗐?瀹冧笌ERP銆佸垎閿?郴缁熴?缃戜笂璁㈠崟銆佺綉涓婃湇鍔$瓑鏈夌潃绱у瘑鐨勮仈绯汇?


According to the annual contract amount, staff size, the stability of business operations, customer word of mouth and other comprehensive evaluation, in 2006 China's customer relationship management software provider Top 10.


2006 China's management software industry's most promising companies in


According to the annual contract amount, staff size, stability operations, customer word of mouth and other comprehensive evaluation of business management software in China Top 100.


2006 the implementation of China's management software industry, business TOP 10


The implementation of the commercialization of mature package, that means the system is installed, operational and demand analysis, program Sheji, system configuration, Ercikaifa, Pei Xun Deng, Conger help users to its business in the package Zhong Yunzuo up.鎻愪緵杩欑鏈嶅姟鐨勪笓涓氭湇鍔″叕鍙革紝绉颁负绠$悊杞欢瀹炴柦鍟嗐?


鎹勾搴﹀悎鍚岄銆佷汉鍛樿妯°?浼佷笟缁忚惀鐨勭ǔ瀹氭?銆佸鎴峰彛纰戠瓑缁煎悎璇勪环锛?006 骞翠腑鍥界鐞嗚蒋


Pieces of implementation of the Top 10 ranked companies.








On business to Beijing


Business Information Technology Co., Ltd. Beijing can is a professional customer relationship management software and systems provider. The company has developed a group of professional and technical personnel engaged in CRM and business consultants, is the small and medium enterprises a leading provider of CRM software. CRM software market in China, MrCRM product market scored the highest, most advanced product features, the implementation of the most experienced, most of the leading brand advisory capacity.







相关链接:



PHOTOSHOP font effects - waffle words



UBUNTU 8.04 Active Directory: Likewise



SPRING Festival travel, then the insurance



Experts advise: The Dragon Boat Festival COMPUTERS do, "prevention" work



sony MKV



Service in the end after?



Fu Chong: the general trend of those who know great Things



Comment Games Arcade



"Football Manager 2009" The Legend Of People To Create A Legend



Qualcomm CEO: WiMax 3G will compete in the face of setbacks



Mkv to mp4 converter free



introduction Games And Entertainment



The Basic Principles Of SSL



ps3 Rmvb



Top Web Servers



convert m2ts to mkv



Audio Video Tools Directory



Wednesday, July 21, 2010

What is the ARP protocol? How to guard against ARP cheating Trojan?



What is ARP?

ARP (Address Resolution Protocol, Address Resolution Protocol) is the one in the TCP / IP protocol stack in the low-level protocol, responsible for IP address resolution into a corresponding MAC address.

What is ARP cheating?

00000000 from the smooth way affect the view of the network connection, ARP deception into two species, one is cheating the router ARP table; the other is the internal network of PC's gateway to deceive.

The first principle of ARP cheating is - the data intercepted by the gateway. It informs a series of wrong router MAC address within the network, and in accordance with a certain constant frequency, so that the real can not update the address information stored in the router, the results of all the data router can only send to the wrong MAC address, causing the normal PC can not receive the information. The second principle is that ARP deception - fake gateway. Its principle is to establish false gateway, so is it cheating gateway PC to send bogus data, rather than through the normal means of access routers. It seems the PC is unable to get online, "the network is down."

Recently, a new type of "ARP cheating" Trojan virus is spread campus network, has seriously affected the normal operation of the campus network. Infected with this Trojan computer trying to "ARP deception," where the means of interception of communications from other computers within the network information, and other computers within the network thus causing a breakdown in communications. ARP cheating Trojan toxicity as follows: use the campus network will suddenly dropped, after a period of time will return to normal. Example, client state frequently red, the user frequently broken network, IE browser, frequent errors, and some common software failure, etc.. If the campus network through the Internet authentication would suddenly be certified, but not the phenomenon of the Internet (can not ping through the gateway), reboot the machine or run under MS-DOS window after the command arp-d, but also to restore the Internet. ARP cheating is very rampant horse, harm is particularly large, the university campus, community networks, corporate networks and Internet cafes and other local area networks have suffered different degrees of disaster, bringing the network paralysis of the serious consequences of a large area. ARP cheating successfully infected with trojans just one computer, it could cause the entire LAN can not access, serious or even possible paralysis of the entire network. In addition to the Trojan attack will lead to other users within the same LAN Internet access appears intermittent phenomenon, but also to steal user passwords. Such as the theft of QQ passwords, steal passwords and account numbers of various online games to do money transactions, theft, online bank account to do illegal trade activities, this is horse's trick, to the user caused great inconvenience and huge economic loss.

How to check and deal with "ARP cheating" Trojan horse approach

1. Check the machine's "ARP deception," Trojan exposure process

On the keyboard while holding down the "CTRL" and "ALT" key then press "DEL" key, select "Task Manager", click on the "process" tab. This one is a called "MIR0.dat" process. If yes, description has been poisoned. Right click this process and select "End Process."






2. Check network infection "ARP cheating" Trojan Infected Computer

In the "Start" - "Programs" - "Accessories" menu down the "Command Prompt." Enter and execute the following command:

ipconfig

Record gateway IP address, that "Default Gateway" corresponds to the value of, for example, "59.66.36.1". Enter and execute the following command:

arp-a

In the "Internet Address" on the next step to find the gateway IP address of record, record the corresponding physical address, or "Physical Address" value, such as "00-01-e8-1f-35-54". This is normal in the network gateway correct physical address of the network by "ARP cheating" without affecting the normal horse, it is the Trojan physical address where the computer's network card.

Can also scan the entire IP address within the subnet, and then check ARP table. If there is a corresponding physical IP address and gateway the same, then the IP address and physical address of the computer's IP address is poisoning and physical address of network card.

3. Set ARP table to avoid the "ARP cheating" Trojan negative impact on

This method can reduce to some extent in the other computer Trojans the impact of the machine. Introduced the method used on top to determine the correct gateway IP address and gateway physical address, and then in the "Command Prompt" window, enter and execute the following command:

arp-s physical address of the gateway IP Gateway

4, dynamic ARP binding Gateway

Step 1:

To normal when the Internet into the MS-DOS window, type the command: arp-a, view the IP gateway corresponding MAC address correct and it is recorded.

NOTE: If you have no Internet access, you start to run a command arp arp-d to delete the contents of the cache space, the computer can temporarily restore the Internet (attack if you do not stop it). Once you can access the network immediately broken (disable network card or unplug the network cable), then run the arp-a.

Step 2:

If the computer has the correct gateway MAC address, the Internet simply can not manually correct the gateway IP and MAC address binding, you can ensure that the computer no longer be deceived attack.

To hand-bound, can be run under MS-DOS window the following command:

arp-s IP Gateway Gateway MAC

For example: if the computer segment in which gateway is 192.168.1.1, the machine address of 192.168.1.5, the computer after running arp-a output is as follows:

Cocuments and Settings> arp-a

Interface: 192.168.1.5 --- 0x2

Internet Address Physical Address Type

192.168.1.100-01-02-03-04-05 dynamic

One ,00-01-02-03-04-05 is the gateway 192.168.1.1 corresponding MAC address, type dynamic (dynamic), and therefore can be changed.

After the attack, then the command view, you will find that the MAC has been replaced by attacks on the machine MAC. If you want to find the attack machine, the complete eradication of attacks, the MAC can be recorded at this time, look for the future preparation of the attack machine.

Hand-bound command is:

arp-s 192.168.1.100-01-02-03-04-05

Binding complete, reusable arp-a view arp cache:

Cocuments and Settings> arp-a

Interface: 192.168.1.5 --- 0x2

Internet Address Physical Address Type

192.168.1.100-01-02-03-04-05 static

Then, type into a static (static), the impact will not be further attacks.

However, a description is bound by hand after the restart the computer will shutdown failure, need to bind again. Therefore, to eradicate attacks, only to find the virus infected the computer network segment, to kill the virus, which is the real problem.

5. Make a batch file

The client to do on the gateway arp binding, specific steps are as follows:

Step 1:

Find Ben Wang segment gateway address, such as 192.168.1.1, the following example in this gateway. In the normal Internet, the "Start 鈫?Run 鈫?cmd 鈫?OK", enter: arp-a, point enter, view the gateway corresponding Physical Address.

For example: gateway 192.168.1.1 corresponds to 00-01-02-03-04-05.

Step 2:

Write a batch file rarp.bat, reads as follows:

@ Echo off

arp-d

arp-s192.168.1.100-01-02-03-04-05

Save: rarp.bat.

Step 3:

This batch file will run the batch file to "Windows 鈫?Start 鈫?Programs 鈫?start", if you need immediate effect, run the file.

Note: The above configuration requires the network to conduct normal

6. To use security tools

Download Anti ARP Sniffer software in a timely manner to protect the local computer running. Specific use in online search.

If you already have the MAC address of the computer viruses, such software can be used to identify network segment NBTSCAN with the MAC address corresponding to IP, which infected computers IP address, and then report to their units were sealed hub.

Or use the unit to provide centralized network anti-virus systems to unified killing Trojans. Trojans can also be used to kill off killing other security tools.

7. Emergency plan

Managers use network management described above ARP Trojan detection methods found in the LAN switch ports infected with the virus after the virus immediately shut down the port, the port identified by the corresponding user and inform the complete killing virus. Then, do a good job against stand-alone, completely killing the virus before its opening the corresponding switch port, re-open Internet.

Tsinghua University Campus Network Security Response Team, a small program

Download: ftp://166.111.8.243/tools/ArpFix.rar

Tsinghua University Campus Network Security Response Team, a small program that can protect your computer in the same internal LAN computer Trojan ARP cheating attack, maintaining a normal Internet access. Specific use:

1, Please select the card after the program runs, select the network card and click "select" button.

2, the selected card after the program automatically obtain a gateway address of your machine.

3, access to the gateway address for MAC address, click the button to obtain the correct MAC address of the gateway.

4, confirm that the gateway MAC address, please click the link protection, the program to start protecting your machine.

5, click on the upper right corner of the fork process, the program automatically hide the system tray.

6, to completely exit the program in your system tray in the right-click the program icon choose EXIT.

Note:

1, this procedure is only a ARP attack protection program, that Trojan horse attack by ARP to maintain the computer's MAC address is not their own malicious tampering, and thus the network will not be interrupted during the attack. This procedure does not clear the ARP have been infected with the Trojan, to prevent infection or death than genuine horse you install anti-virus software!

Anti Arp Sniffer usage

Download: http://www.wipe.edu.cn/Files/wlzx/Antiarp.rar

Double-click Antiarp file dialog box appears as shown in Figure 2.






Figure 2

Enter the gateway address (the gateway address access method: [Start] -> [Programs] -> [Accessories] menu down the "Command Prompt", type ipconfig, which shall be the gateway address Default Gateway); Click for the gateway MAC address, click Auto-Protect to ensure the current card and gateway communication is not a third party monitor.

Click Restore Default, and then click to prevent address conflicts such as IP address conflicts occur frequently, indicating frequent attacker to send ARP packets to deceive.






Right-click [My Computer ]-->[ Management] -> click [Event Viewer] -> Click [System] -> view source [TcpIP ]---> double-click events can see the display address conflicts, and record the MAC address, please copy the MAC address and fill in the Anti ARP Sniffer local MAC address input box (Please note: converted to -), input is complete click [Protective address conflicts ], in order to disable the MAC address of entry into force of the local network card and then enable the network card, the CMD command line, type Ipconfig / all, see the current MAC address is MAC address with the local MAC address input box in line, if successful, will no longer be displayed address conflict.

Note: 1, if you want to restore the default MAC address, click [Restore Defaults], in order to disable the MAC address of entry into force of the local network card and then enable the network card; this software does not support multiple network cards, some cards may change the MAC will be invalid.







相关链接:



Perpetually Divx Xvid to MP4



blackberry video FORMATS



SuperBurner VCD to DVD



Converting Flac To Mp3



Dvd ripper



QuickTime Converter



Youtube Video To PSP Home



Brief Icons



EZuse DVD TO WMV Converter



"Su Health" Simple completely Raiders



convert mp4 To avi



WorldCup DVD To PDA



Who Can resist the layoffs hit the door



Comments Desktop