Monday, October 11, 2010

The SMTP user authentication based on QMail Setup Guide (Part One)


There are many users in the SMTP service do QMail user authentication, see the total domestic articles has some problems more or less.

The following article I will summarize the previous question, and write my own detailed methodology.

I, on the previous article, a summary of the problem:

The following is ideal and taoran two predecessors article:

http://www.linuxaid.com.cn/support/showfom.jsp?i=1703 of: ideal
http://www.linuxforum.net/doc/QMail-auth.html of: taoran

Note that, QMail SMTP authentication of users has more than one patch, the above two articles were used in two patches.

Respectively:

http://members.elysium.pl/brush/QMail-SMTPd-auth/ and
www.nimh.org / hacks / QMail-SMTPd.c.

In contrast, the second patch of some simple easy to use. There is a difference between the two patches is: The first requires additional host name (domain name), and the second will not rise, that can not be verified: (too strange. In accordance with the first article to be configured ideal if the first the problem is that you and other clients as long as the outlook select My server requires authentication, you can continue to send, regardless of whether the account on the server. Please come test is not really the issue, I see documentation form this problem, primarily because the host name (domain name) of the problem. details, please read QMail-SMTPd-auth-0.30 of README.auth; second question then, is a total of two articles, is the setuid problem, see :

This is fatbear friend experience, but to note that only the vchkpw vpopmail needs of 6755.

These are my own experience, the majority of users have to test. If there are ideal and taoran two predecessors, or other users to know the real cause of these problems or have different views, please tell me, my E-mail is: hailwind@china.com, criticism welcome correction.

Second, the installation process in detail

The following is my detailed installation process, if using a QMail-SMTPd-auth-0.30, to pay attention to the host name and setuid problem, if using QMail-SMTPd.c then it would only pay attention to the problems on the line setuid. If your system has been installed over, if it is in use See the above two articles, use the. / Comple. / Load the kind of way, where I did not write.

Needed software:

checkpassword-0.90.tar.gz or QMail-SMTPd.c Address: In the beginning of this article there.
銆??銆?md5checkpw-0.22.tar.gz 鍦板潃锛歨ttp://members.elysium.pl/brush/cmd5checkpw/
銆??銆?cspi-tcp-0.88.tar.gz
銆??銆?Mail-SMTPd-auth-0.30.tar.gz
銆??銆?Mail-1.03.tar.gz
銆??銆?popmail-4.9.10.tar.gz


銆??杩欏嚑涓ぇ瀹堕兘鏈夊惂锛熷鏋滀綘娌℃湁鐨勮瘽鍛紝灏辩洿鎺ユ妸鏂囦欢鍚嶈创鍒癵oogle.com涓婂幓锛岀洿鎺ユ悳绱㈠氨鑳芥壘寰楀埌銆?br />鍒嗗埆瀹夎瀹冧滑锛?br />
銆??tar zxvf checkpassword-0.90.tar.gz
銆??cd checkpassword-0.90
銆??make
make setup check

銆??tar zxvf cmd5checkpw-0.22.tar.gz
銆??mkdir /usr/man
銆??mkdir /usr/man/man8
銆??cd cmd5checkpw-0.22
銆??make
make install

銆??tar zxvf ucspi-tcp-0.88.tar.gz
銆??cd ucspi-tcp-0.88
銆??make
make setup check

銆??涓嬮潰鎸夊畨瑁匭Mail-1.03锛堟墦auth琛ヤ竵锛?锛?br />
銆??tar zxvf QMail-1.03.tar.gz


Using the first patch:

銆??tar zxvf QMail-SMTPd-auth-0.30.tar.gz
銆??cd QMail-SMTPd-auth-0.30
銆??cp base64.c base64.h README.auth ../QMail-1.03/
銆??patch -d ../QMail-1.03 < auth.patch

Use the second patch:

銆??cp QMail-SMTPd.c QMail-1.03/
銆??瑕嗙洊婧愭枃浠?br />
銆??涓嬮潰娣诲姞鐢ㄦ埛

銆??mkdir /var/QMail
銆??groupadd nofiles
銆??useradd -g nofiles -d /var/QMail/alias alias
銆??useradd -g nofiles -d /var/QMail QMaild
銆??useradd -g nofiles -d /var/QMail QMaill
銆??useradd -g nofiles -d /var/QMail QMailp
銆??groupadd QMail
銆??useradd -g QMail -d /var/QMail QMailq
銆??useradd -g QMail -d /var/QMail QMailr
銆??useradd -g QMail -d /var/QMail QMails







相关链接:



Picked Games And ENTERTAINMENT



MTS TO AVI



DAT to 3GP



evaluation Audio Video Tools



Numbers Will Be Allocated To The Concept Of The Sword The Veil Of Players



PHOTOSHOP - Neon Text



Several international marriages total defeat BenQ alerts



Practical architecture: logic layer [3]



7 Steps to escort your USB Device



"Black, then it" is not very "black"



e-cology in the Pan Micro Series 15



DivX To Zune



Ppp point to point protocol



Monday, September 27, 2010

Find driving force behind IPv6


Editor's Note: In the course of further development of IPv6, the lack of impetus from the application of IPv6 will likely be a major obstacle to business - this is the recently held "2006 Global IPv6 Summit" to deliver us the most important information.

April 13, the annual global IPv6 event - the "2006 Global IPv6 Summit" in Beijing International Convention Centre. It was at this same location, the same event is already the fifth held. IPv6 Summit, and compared to previous years, this year's meeting site a lot of lonely, but experts and vendors still has had some exciting news: the domestic IPv6 network infrastructure of getting better, narrow the gap between domestic and foreign firms are the gap between manufacturers. More importantly, IPv6 will begin commercial service in 2008, attempts to provide a full range of services to the Beijing Olympics.

Has been the development of our country are based on the Government to promote IPv6-based. For example, the "Eleventh Five-Year Plan proposal" highlighted, to "strengthen the broadband communications network, Internet, digital television and next-generation information infrastructure"; National Development and Reform Commission also issued in 2003, "China Next Generation Internet Project ", which CNGI project. From the government to support and promote the development of IPv6 tremendous momentum.

However, with IPv6 network construction and application development to start, followed by some of the problems began: in the already completed and under construction IPv6 network, the application is still the main contents of the original IPv4; many users and operators investment in the IPv6 network is not out of business and applications. Originally, the business and application development should be the fundamental driving force for IPv6, but the current situation not the case. Some experts believe that with further development of IPv6, this lack of impetus from the application of IPv6 will likely be a major obstacle to business.

Getting better

IPv6 in addition to the IP address once and for all solve the shortage, but also considered bad IPv4 address various other issues, such as end to end IP connectivity, quality of service (QoS), mobility and so on. Based on strong technological advantages, IPv6 will become the mainstream of the field of data communication trends, and become the core technology of next generation network. At the summit, the Chinese project, said Wu Hequan clear: "development of the Internet has come to a crossroads, need a new starting point." In his view, the Internet is the new starting point for IPv6.

Back in 1998, China on the establishment of the first IPv6 trial network CERNET-IPv6. After that, IPv6 development concern, but the development of Debu bland. However, there are some new progress in the recent bear CNGI project six units, in addition to slightly lag China Netcom, China Telecom, China Unicom, China Mobile, China Railcom and Education Network CERNET2 other five have completed the equipment bidding. Which, CERNET2 is has completed the transformation of five key nodes, and smooth the overall translation of business.

All along, our cutting-edge technology on the Internet for research and development are mostly borne by the education industry, in the IPv6 research and development, the education sector also plays a very important role. According to the network director of the Center of Tsinghua University, CERNET Expert Committee Wu Jianping, director introduced, CERNET2's goal is to seize the opportunities the Internet replacement for the current Internet, the main technical issues of international cooperation in the design and construction of new generation Internet architecture.

The layout of the entire CNGI core objective is to connect 20 major cities located in the core nodes. In these 20 cities, 25 central universities to become a major node, high-speed connection of more than 100 research universities and qualified research institutions and R & D center, the minimum required bandwidth is 1G, and achieve the other core backbone network High-speed Internet. It also bears in North America, Europe, Asia-Pacific international next-generation high-speed Internet connectivity tasks.

CNGI project in assuming 6 units, the education network CERNET2 most significant achievements. According to reports, in March 2004, connecting Beijing, Shanghai and Guangzhou CERNET2 advancing slowly; in December 2004, connecting 20 cities in the CNGI-CERNET2 trunk advancing slowly, the network made a large-scale use of pure IPv6 routers present has been successfully running for over a year; the next step, CERNET2 plan the next generation of Internet technology for large-scale testing and application demonstration.

Wu Jianping, said: "China's CNGI backbone has been formed and the European Union, the United States about the size of the three major networks, the next generation of Internet research, network infrastructure, we have been going more toward the front of."

Mature domestic equipment

I remember a few years ago the global IPv6 Summit, the exhibition hall, almost all foreign manufacturers of display, there is no domestic manufacturers of the figure. However, in this conference, you can find Digital China, Huawei Technologies, CEC, good telecommunications and other domestic companies Snapshots show. After several years of development, domestic manufacturers and foreign manufacturers have narrowed the field in the IPv6 range.

As the starting point for the same R & D, coupled with technological homogeneity constraints, the field in the IPv6 routing, the overall performance of domestic and foreign manufacturers of equipment, not much difference. According to Wu Jianping introduction, completed five units of CNGI project tender, domestic equipment has become the biggest winner, with an average account for more than 80% share. This is known as the domestic equipment industry field in the IPv6 breakthrough achieved in one of the largest.

"As the number of foreign equipment vendors in the IPv4 and accumulated a considerable number of products and the advantages of technology, so IPv6 has not been able to become the focus of their development. While the domestic equipment manufacturers have an urgent need to seize this opportunity to catch up with IPv6 foreign companies, therefore, whether R & D or marketing strategies are extraordinarily positive. "Digital China Networks Limited Deputy General Manager and CTO, said the DPRK sunny. It is for this reason, Digital China IPv6 network in the field to speed up the pace, its self-developed DCRS-7600 Series IPv6 Gigabit Routing Switch product is a one-time through the "IPv6 Ready Phase-2" test. The Digital Network to help build the IPv6 Hainan Normal University, the summit also unveiled the campus network, and has attracted the concern of many participants.

IPv6 also some other areas of domestic manufacturers has made good results, although domestic manufacturers began research and development time IPv6 equipment later, but developing rapidly. According to reports, now the mainstream equipment manufacturers have been achieved in the core hardware support for IPv6, the forwarding of data has been relatively better. There are several models in RTNet laboratory model tests have reached the Ministry of Information Industry of the network license standards.

Currently, Juniper, Hitachi, Cisco and other companies have a full range of products to support the IPv6. In the domestic manufacturers, in addition to Digital China network, ZTE routers, switches, products also passed the IPv6 Forum IPv6_Ready test, and passed the China Telecom, China Mobile, China Netcom, China Unicom's IPv6 core network test equipment in interoperability testing. Huawei is also in the core routers and edge routers to provide full hardware support for IPv6.

However, while the functions of IPv6 equipment, better performance, but the stability of the equipment needs to be improved. IPv6 router device performance from the current point of view, its routing table capacity, hardware, wire-speed forwarding capability and strong, but these devices in the implementation of access control lists or unicast Reverse Path Forwarding strategies have an impact on the performance, extend the first performance poor stability of the equipment needs to be improved. In addition, the market switches with IPv6 functionality of three products less and IPv6 broadband access server, not much room for choice.

It is said that China-made equipment in the CNGI project bidding to become the biggest winner, not because of its leading edge technology, but for the policy of protection. Of course, affect the layout of future development of the Internet, CNGI tender protection of domestic equipment is understandable. But for domestic equipment makers, will undoubtedly further enhance the technological strength is the key.

Lack of killer applications

During this summit, Hainan Normal University, IPv6 IPv6 network construction as a typical case of high-profile appearance. The school through the construction of IPv6/IPv4 dual protocol network, to achieve large-scale IPv6 network, and the successful completion of large-scale migration of IPv4 to IPv6. However, this meeting shows most of the other cases also have stayed at the experimental stage.

Although this year has been to Hainan Normal University dormitory, library network access to the IPv6 network which, on the opening of a IPv6 network services to students, but most of the application and the application of the original IPv4 networks are not much different. IPv6 view of the whole building, such as VPN, home users online game, VOD, multicast, that require a large number of terminal equipment and address of the application and not universal, it also led to the needs of users of IPv6 is not so urgent. Wu Jianping appears in the current lack of innovative applications based on IPv6, IPv6 is impeding the development of one of the factors.

IGRS Information Technology Engineering Center, president of Sun Yuning, said: "In the next generation Internet development in China should be by the application to integrate, to bring the next generation of Internet application development." Vice president of China Telecom Beijing Research Hui-Ling Zhao, feels that the IPv6 development in technology, the barriers have been less obvious, its future development or market Xuqiu mainly face of the driving problems, it also requires a large number of innovative applications.

Currently, there are in the demonstration system and test the system in a very large number of IPv6 applications, has basically covered the range of people can imagine. Only in the home broadband demonstration network, there is a lot of applications: home appliances and terminals connected through a variety of networking technologies, through the living room media center experience of IPTV services, through the living room media center remote video phone, portable media center through the WLAN, USB, etc. from the PC to download content and play, home equipment, intelligent control. Moreover, the scientists also describe for us the broad prospects for the next generation Internet: support large-scale scientific computing, to support large-scale video conferencing, remote instrument control, real distance education.

"CNGI large-scale construction has started, but still no substantive commercial business, we hope that IPv6 can be driven CNGI application development." One expert as saying. Indeed, with the full roll out CNGI, IPv6 finally have our own place, and as a major hardware network routers have been able to achieve the hardware support for IPv6, the next step CNGI focus will be how to achieve and commercialization integration.

But good news is that, at the summit can be seen, the industry has begun to put more attention to IPv6 applications, covering the wireless devices, mobile multimedia terminals, monitors, home gateways and other fields. In the conference hall, there are also companies to bring video system based on IPv6. In addition, there is news that the application of standards for CNGI work is in progress. The above is undoubtedly conducive to promoting IPv6 commercial application.

Security issues still to be resolved
The summit demonstrated the many domestic manufacturers of equipment to support IPv6 and application.

In Wu Jianping view, only to replace IPv4 IPv6, only the problem of scalability issues, and security, many problems in real time now, and not well resolved. Wu Quan He also highlighted that, IPv6 encountered in improving the existing Internet security, scalability, quality assurance issues have some effect, but simply address the structural change can bring improvement is limited. "IPv6 Internet can fundamentally solve some of the existing fundamental issues. From this sense, IPv6 does not mean the next generation Internet."

Which, IPv6's security problems have raised concerns at the summit. IPv6 issue safety overseas experts warned that the next generation Internet architecture (IPv6), the hackers, viruses and other security issues will continue to plague the industry, even more serious.

Juniper Networks, Senior Network Architect Jeff Doyle said at the summit said that in IPv6, the security problem certainly exists, hackers, viruses and other problems will also exist, and there is no essential difference between the current Internet. "Some applications will be more attacks, such as the banking system will be more attacks for profit, this phenomenon may be very serious. In IPv6, the large number of P2P applications appear, it would increase attacks against the . "

Security experts believe, IPv6 is still unknown weaknesses. Foundstone Professional Services Security Advisor Cory Benninger previously said: "We believe in the IPv4 to IPv6 transition, the tunneling protocol may be vulnerable to attacks of weakness, and immaturity of IPv6 platform is the greatest weakness." For example, Cisco IOS IPv6 denial of service, Linux Kernel IPv6 Denial of Service, Windows operating system can easily become a target for IPv6 networks.

On the other hand, the transition from IPv4 to IPv6 implies the need to re-write software programs and install new hardware device, which also makes security issues become more apparent. Some experts said: "related to the safe operation of IPv6 network protocol conversion gateway and firewall products low, performance is also poor."

At present, no IPv6, security incidents do not know how to assess the safety topic IPv6 organization, but that does not mean that the future of the Internet more secure. Appear in the experts, IPv6 also provides more security for the user the opportunity, and along with the development of IPv6, there will be more security mechanisms to prevent this from happening. In addition, some equipment manufacturers have stepped up security in IPv6 input, such as Digital China network security by developing SAOP linkage agreement, with the agreement to ensure the controllability of the entire network, credible, evidence.

Judging from all the above, China's IPv6 building although getting better, but the whole industry is still in its infancy, Huan need government departments, research and development institutions, network operators, equipment manufacturers and service provider's full participation.






Recommended links:



MP4 to Flash



"Blue Screen" Hardware Reasons And Solutions



Expert Delphi



Types of Trojan horse



MP4 to 3GP



Design Reports 2



3GPP converter



Enhance THE "soft environment" out of the performance appraisal errors [1]



BRIEF Vehicles - Screen Savers



Wave escort firm in Hefei



How the Blaze was accompanied by low encirclement



Business Databases And Tools REVIEWS



Thought To Help In The Day To Enjoy From Under The Rising Voices



Fireworks In The Fade In Animation Production



A record OF random access Recordset



Friday, September 17, 2010

Carried out in the end to P2P: the story about the Jxta (2)



In Jxta 1.0 specification, a running service instance is always associated with an equivalent machine (you can imagine it is a peer "server" in charge of). In a peer group, only one service instance and the specified link on the other machine. This type of service is regarded as such services; If on the other services in charge of the machine when the machine on the other, then will not have access to the service. On the other hand, multiple instances of the same service to be installed in a redundant peer group multiple of the other machine, which is known as peer group services. Peer group service is Jxta network high-availability and fault tolerance of the key. Jxta application implementation is free to put any Jxta services such as services or as a peer group service for installation. Plumbing services, and other communications shall be provided on the abstract logic of the core Jxta pipeline services, often as a service to achieve peer group to ensure its always available.

Pipeline as Jxta specification defines, in the transmission of data between such machines, files, information, code or a way multimedia content is through the logical channel. Jxta pipeline used to send messages between machines on the other (which can take any content).

A pipe instance, logically, is such a resource within the group. The actual realization of pipeline instance is usually done through the pipe service. Traditional (like UNIX's) system of different, Jxta pipeline is one-way, asynchronous. Require two-way communication two equal machines will have to create two separate instances of the pipeline. Also with the traditional mechanisms like UNIX pipes or TCP / IP sockets different, Jxta end of pipe can be connected at different times to different on other machines, or do not connect. P2P networks for service providers to achieve redundancy, the only this one single concept is a revolutionary step. On the other machine at any point in time can be logically "pick up" channels. For example, imagine you want to use a spell checker service on the other machine. It can connect to a peer group's spell checker pipeline (the pipeline is used as redundancy to achieve peer group services) on. In this case, as long as at least one instance of the spelling checker in the peer group is still somewhere within the run, the machine will also be on other services.

Jxta 1.0 specification provides two general types of channels: point to point and broadcast (propagate).

On the other machine can use pipes to connect to another point on the other machine and one-way transmission message. On the other machine can use the radio channel connected to one or more other peer transmit a message to them all. In essence, the point is one to one message transmission pipeline system, radio channels is one to many message delivery mechanism. Jxta community-many message delivery mechanism is being efforts; this mechanism has been named Jxta conductor (wire). No matter what type of pipe, through a pipe containing the information pieces are sent as Jxta news. So, the exact format of these messages is like?

News Jxta message is piped from a peer to another peer transfer of data bundle. Here, Jxta standard once again in general to adapt themselves as much as possible, so as not to inadvertently introduce the definition of the message depends on the implementation of any strategy. Message is defined as the envelope and body composition of any size beam. Envelope is a standard format that includes:

Header
Source endpoint information (URI format)
Destination endpoint information (URI format)
Message Digest (optional for security purposes)
Message body length is arbitrary, the trust can include an optional form (for security purposes) and content.

Please note, Jxta very loose definition of news. Taking into account our daily generally are reliable, broadband TCP / IP network operations, the need to do so is not immediately clear. But Jxta message format must be flexible, good at adapting to the new environment, because it may have to achieve all types of networks, not just in the TCP / IP on. Envisaged in a 256-byte packet transmission network is not reliable (like a traditional packet-based wireless network) on a Jxta to achieve, you'll define a simple message on the Jxta how to adapt itself to such an adverse environment such as appreciated.

In order to provide a standard, easy to analyze syntax, common coding scheme, Jxta message XML document format currently used. Jxta advantage of XML's universal accessibility and ease of use, easy programming, which means Jxta can use most of the programming language in most of the platform is easy to achieve. As long as the XML parser, and generate database is available there. However, Jxta of the design was to write a message code is not dependent on the use of XML. While it's unlikely, but Jxta communities included in a future version of specification (or requirements) based on non-XML message is entirely possible.

Identifier from the potential of speaking on Jxta, on the whole peer group might be linked with the universe as large. In the name of such a large space for any matters that the only name is a challenge. To address this problem, Jxta to Jxta components can be set to address each instance is assigned an internal identifier. This identification is carried out by a UUID, UUID is used to ensure that time and space are very high probability of the algorithm to generate only 64 bytes of digital. Jxta identifier is a URN (Uniform Resource Name) format, and is embedded in the advertisement for internal use. Defines four types of identifiers currently used to identify peer group, on the other machine, pipe and code / data (code / data) (abbreviated as codat).

Advertisement
Advertising messages a bit like "cousin." Jxta ads using XML document format. Describe the content of advertising, such as peer, peer group, pipe or service Jxta component instance properties. For example, you can visit another ad on the other machine on the other machine can try to connect directly to the peer machines; can access a peer group of ads on other machines can join the peer group advertisement. The current Internet with ads similar to what is the DNS domain name and Web site records. Jxta specification does not stipulate how to create, disseminate, or destruction of advertising.

The basis for interoperability: Jxta protocol interoperability Another key is the fact that: the core Jxta peer interaction model is fully represented in the underlying network transmission of a simple protocol. In other words, since the protocol and message format is well-defined, then Jxta-based interoperability between systems are fully capable of Daoxian level reached.

For example, a simple PDA (8-bit processors, based on C language programming) can be a running packet-based wireless networks Jxta on the other machine, it can be the same peer group with a variety of systems, from PC servers to mainframes, to interact. If on the other machines to share a public network (Carrier) and is using Jxta communication protocol and message format, which can be done.

Sun has provided a preliminary Jxta Java language. Jxta community now has the reference implementation. The reference implementation for those who want to start the Java programmers to use Jxta things become simple. If you are non-Java platform to achieve Jxta, then the understanding of these agreements is very important. Table 2 briefly describes the core set of Jxta agreement, covering the discovery (on the other machine how to find each other), advertising (on the other machine on the other machine how to understand the other peer groups, pipes and other information), through the communication pipe and peer group membership handling. All of the following agreements are based on XML message exchange transmitter on the basis of. Similarly, they can use almost any programming language implemented on almost all platforms.

Table 2. Jxta core protocol

Jxta specification does not require such machines to achieve all of the above agreements. Any particular realization of the other machine only to those who actually use the protocol.

Jxta system based on some interesting properties
Now that you have a theoretical component of the Jxta platform have a basic understanding, we have to discuss the design results as Jxta some interesting properties.

"Electronic heart" of anything can become a Jxta on the other machine, theoretically, there is a text string generated the most simple equipment capacity can be added (although not in every P2P applications are necessary) to Jxta network. This is how it possible?

In P2P networks, over-simplified the equipment needs of the other agents. The agents can represent the simplified device (or more simplified device) implementation, the advertising and communications. Agent can be rigidly fixed in position simplified equipment. Thus, an agent with the help of simplified equipment on the network can be Jxta fully qualified peer. For example, a body tied to a turtle and to wirelessly send the location information with GPS Locator Jxta message, the network can be Jxta a peer.

Uncertain network topology in the order
Another typical Jxta network charming aspect is its inherent uncertainty of the topology / response structure. Computer users are often used to determine the nature, the synchronization of the computer system, and that this is a standard structure. For example, when we issued a Web page the browser requests a URL, we expect the output will appear immediately. We also hope that everyone in the world can use the same URL from the same Web server to retrieve the same page.

In Jxta world, not a specific request for resources in a few minutes, hours or even days to return; In fact, it may simply not return. In addition, request the same resources, people around the world are likely to get is completely different from the resources of the server copy. This raises a question: uncertainty system any good?

Inspiration from the grassroots software revolution
We only have to look like Napster and Gnutella P2P systems such as pop can find the answer. Here are some additional advantages of their features (which make the loss of synchronization and uncertainty have become worth):

Content availability.
On the other machine can access content from multiple servers, ideally close to boot from a server running gain. Original source of the other machines do not have a resource request for each service; In fact, it is not even switched on. The most optimal use of network bandwidth.
Typical of today's Web, local traffic congestion will not affect the concentration of lead in the P2P network.

Lower the cost of content distribution.
P2P networks can absorb the contents and copy it to make it easy to access.

From the network, each node of the computing power of balance.
Asynchronous operation, you can issue a number of resources or service requests, and then let the network for you to complete the work.

Unlimited scalability.
A well-designed P2P application can not affect the scalability limits which connects across the entire known universe; which is concentrated in any type model is completely impossible.

Jxta in perfect world, we will not perform asynchronous request deterministic networks. Weird do you think of this idea? Let us use an example to illustrate. Imagine a P2P network based on Jxta of running Web-based music request service. On the other machine submitted several requests for music files and some time to verify the group's request for such service is to find these files. When we check in for some time to music request service, some of the requested documents have been found, but others can not locate. Service response to those documents are: the choice and availability of music is constantly changing; Please try your request again later. This is an acceptable uncertainty of the results: Although the service could not find a file, but if we submit the same request again later, perhaps that file available, because we want the head of the file on other machines Then maybe a line.

When placed in the context of a specific time, the concept of uncertainty in the network no longer seem so strange. In fact, most of us probably will accept and use such a music request service. Some of us are even willing to pay for such a little cost of the automatic proxy, such proxy will continue to monitor the availability of the selected file, and then for us to take and store a copy of them. P2P computing is one of the great charm: a balanced and shared all over the world the ability to connect with the resources, I hope is an orderly and civilized manner.

The talk is finished, but the first few commercial breakthrough Jxta/P2P application was probably because of the certainty and synchronization as the main features of their pride. This is a necessary transition, because the user's habits and market orientation will not change overnight. If there is no mandatory reason, then the future will not change. The new P2P model will slowly emerge, at first may be based on a mixture of forms. A current example: Edge Communication (edge-propagation-based) network caching technology, such as Akamai, is deterministic, centralized Web on the specification. These techniques use the concept of P2P-style centralized server in the world to achieve optimization of content delivery.

Sun does not set out strategy to achieve its Jxta decision to make it free to move on and eliminate these arguments, pass the buck on who pioneered the content delivery technology pioneer Jxta their shoulders. However, at this stage, Jxta technology is based on the potential of community development make it the global control of IP (intellectual property) owners and the public good balance. Open Jxta community could serve as a forum, IP (intellectual property) owners and technical experts in this forum to resolve their differences.

Perspective Jxta, it is how. Net and Jini contest
Since Jxta are introduced, and it has been brought, and each can imagine comparing the network technology. Even the prestigious business magazine, has inadvertently left out of this innovation, because it obviously does not and the main competitor's flagship product hype contest. Jxta project is a unique "monster." In discussing the time it will not have any ready reference. Therefore, it must be evaluated independently.

To be sure, Jxta XML-based messaging and Microsoft (Microsoft)'s. Net and SOAP technology is similar. However, this relatively weak basis for comparison. As more and more third-party agreements used XML, it is clear only XML as the message format for the actual network technology and can not show much. The high-level, policy-rich, Web-based services based structure. Net and essentially low-level, basic, neutral Jxta strategy compared to pieces of meaningless things.

Jxta works and Jini projects are fundamentally different. They are both at a high level of interaction have some similarities, are able to achieve truly distributed computing network. However, a parallel was there came to an end. Because the real future of distributed computing is still only an idea, so it is easy to underestimate the Jxta and the difference between the Jini project, despite the fact that we have established in the relatively more client / server or multi-server technology is not realized will do the same thing.

Both the clear differences in strategy are: Jxta at the outset to fully interoperable technologies (any platform, any programming language, any vendor) of the face appears. Sun is the only company engaged in the community. Jini is a Java-centric technologies as a strategy, Sun will integrate and apply it to provide products in the future. Sun Jini development will maintain a certain degree of control.

No Java platform (code flexibility, RMI, etc.) support, Jini's relevance will be limited; on the other hand, Jxta is completely independent of Java's decoration. From another perspective: Sun Jxta only in promoting the growth orientation, while the Sun and Jini is there between the growth of more interest. Over time, Jini will be Jxta's "increasingly inward-looking cousins"; it as an embedded technology is used to enable the deployment of many products. Jxta fate, on the other hand, will depend on the technology involved in the opening members of the community's enthusiasm and creativity.

Jxta versatility
Mechanism rather than requiring the provision of infrastructure strategy, Jxta foundation for many P2P applications are available and valuable. Here are three other common Case Study:

On the other machine's users to search and share files within the peer group, information and content
Peer to peer group to use only in this particular peer group can be used for specific services
Peer group on the other machine through the gateway and between peer groups through the instant messaging system
Of course, the possible applications are endless, many of which have yet to be developed or even conceived.






Recommended links:



"Storm the 1st" Crazy transmitted infections rose sharply to 100 000



Customize The "Send To" Menu



Best Religion



My favorite Java And JavaScript



10 tips to help you pass The interview off



avi to PS3



Jinshan Jinshan Nu Pi typing through repeated fake "Li GUI," poisonous pit Users



Macro and micro dogs the Difference between a dog



My favorite Web SERVERS



Ps3 Video Format



Good Efficacy Is The Man Manao Out



MicroStrategy to support Apple? IPhone?



mkv to divx



Cool song found the Dog's omnipotent tool



mts CONVERSION



Thursday, July 29, 2010

Hot stocks head invasion: with input for the stock market frenzy



Today, vast land on the rise to an "All stock" of the boom, "you open an account yet? Earned many times over?" After meeting has become a common greeting. The popularity of the Internet today, Internet stocks have become shareholders are the favorite stocks of the most convenient way, not only can be done without going to buy sell trade, but also on the network and friends from all over the world " Tangulunjin "stock exchange of experience.

The use of online communication and ultimately the natural character input method, Pinyin input method is able to get started without having to learn the characteristics of some of the stock market and access to computers for a friend who is undoubtedly the best choice. In this article I will share with you friends investors Sogou Pinyin input method in the course of a few stocks Magical.

1, "soaring bull market," to discuss a color head skin

Many investors like to discuss the score, for example, many stocks of friends, like red and hate green, this is not entirely a superstition, but in a good mood yourself.

Sogou input method to understand friends all know that it supports skins, so I am pleased that the small investors is the official band of the skin, there is a "bull sky" skin.






Figure 1, the bull market raging discussion luck

Set is simple, click on Sogou Pinyin input method to set the status bar button, select the replacement skin銆?銆?銆?銆恇ull market soaring on it. If the additional skin like this to set the font and size, then set the property from the銆?銆怉ppearance tab set.

2, the stock name, code fast input

Investors often through instant chat friends stock exchange experiences and lessons learned, and requested the master of their own stock for pointing analysis. How to quickly enter their name and attention to the stock code to get the most efficient communication or instructions, they can use Sogou Pinyin input method in a custom phrase function.

Give an example, I have in hand Shandong Expressway (600 350), one vote, in order to achieve fast input "Shandong Expressway (600 350)" The purpose of open Sogou Pinyin input method setting window銆?from 銆怉dvanced tab to find custom phrase section, click the Settings button on the back, the pop-up window, click 銆愩? to add a new definition, in the short part of the input "sdgs", then enter in the content part of the "Shandong Expressway (600350)", save the settings. When we ask people again to the shares on the contents of Shandong high-speed, only need to enter "sdgs" on it.






Figure 2, the custom software language quickly enter the stock name, code

How like? It is very convenient, in fact, this feature can be achieved using the function is very large, investors can take the time to pondering a friend, in principle, is for those who frequently need to enter a relatively long or complex phrases to simplify import.

Sogou Pinyin input method has another advantage is that the Internet thesaurus function, with further escalation of hot stocks, stock market-related terms are more and more appear on the network, also began to more search engines are included, but Sogou Pinyin input method on the preferred network of hot words with the word set has a lot of shareholders of my friends, this can greatly improve the accuracy of word choice to enhance input efficiency.

Finally large shareholders wish a friend gold from the stock market success, but also to remind our new friends in the market, "stock market risk, investment caution. "







相关链接:



EMC announced that Miss Yip pure novice to succeed President, Greater China



Picked XML Or CSS Tools



flac to MP3 converter free



Photo of Copper: FTTH Evolution of Road



Red Hat And Novell In The United States Were To Prosecute Violations



Lei Jun served its purpose, soul shine Jinshan



flv to mp3 CONVERTER



Yuv Format



Rising gods: a small pinch frame, more than busy for!



Format mkv



Recommend E-Commerce



Versed In Pop-up Window For ASP.NET



In 2006, China CMM / CMMI consulting agency announced the top five



Monday, July 26, 2010

Airborne managers how to hold to the "Token"?



Airborne case of failure of professional managers everywhere. Of course many reasons for its failure, but there is a, is mostly about power. Here include: How should the right manager, how to, how to license the right to speech. This article first talk about: professional managers after the airborne business, how to obtain proper authority, namely, how to hold the scepter?

Hand useless without a staff manager

I have met many professional managers, their failures were more or less about power.

Such a manager to enter a full-scale private enterprise, actually five years have not really come into contact with "token", and certainly no results. Results salary dropping lower and lower, and finally business owner can politely ask him to leave. One can practice to such a degree indeed commendable, indeed Turtles. In fact, I mean not just the manager who is the boss - can be patient and not a five-year performance of professional managers. So why the managers do not grasp the mace? There are many reasons, of course, can not complain too much, but the real reason is: This is the first professional manager inaugural private enterprises, had long been in the state-owned enterprises, foreign dry, mostly organized system of power rationing, suddenly jumped to private enterprises, not know how to get the power! Just do not get power to the key manager, how to activate the team car?

Sadness is the right to burn manager

Contrary to the above case, more power to professional managers are too early, excessive concentration of powers, excessive use of power, the results do not dry into, but hurt himself, the last sigh, sad parting.

I have a friend who recently left the foreign companies to do private enterprises in Jiangsu, a highly paid managers. Do not want to, a month back! Why? He said his boss was the mandate problem. Took time, business owners clearly explained, as a manager he can hand in dealing with all matters, and the presence of all the middle managers and above the surface, declared. An assurance, he gave orders to you with confidence, assigning tasks, repeated orders, issued when the boss orders the presence, but also did not object. Can not do anything after all that, or Polishing Yingkang. Private one inquired, they said: the chairman of the board have been referrals to friends, chairman of the board not to do so in another direction ... ... the chairman of the board under the red crown of my friends angry, Guayin away. Most people will think this is the fault of the boss, I would think not at all. The manager is also the wrong understanding of power is not enough. To the right is right, but he might win too early, used excessive force, their power play but were ignorant of.

So as a professional manager, the real grip on how to mace, and the exercise of power?

Wutou What is the power

What is power? Power is a necessary condition for it happen, but not sufficient. Using the power too soon will result in lone-depth and could not have the power, only to be eliminated were. Power used excessive force will break, not to mention airborne managers, compared to the original strength in a weak position, so rigid use of power, only their own scars, defeated. In fact, the boss should be a gradual decentralization process. If one up on Da Saba, do not go wrong when pigs fly.

Power not to come

Managers can not be right, can only be authorized by doing things for the boss. The quantity and quality of things made, the decision of the owner of the scope and size of the delegation of authority.

On the responsibilities, powers, relations between the interests of most people are paradoxical. We usually say "responsibilities, rights and interests," does not know that these three relations is not only a match, more order relations. Many managers took office, to show their power and prestige, first right, but without the responsibility of the right to say that a sufficient, but the responsibility does not mention, or mention of the responsibility should the right to put the two side by side. This is the order of the three relations do not understand.

After taking office as a professional manager, not anxious to right, should first live dry. Bear the responsibility, of course, there will be a corresponding power. Even if the responsibility, but also a little bit of receive. Correct approach is to: receive a first concrete thing dry, you are responsible for the things in the process, without the need for power into your hands naturally. When you use the power to make things pretty dry, the normal circumstances, this power is naturally yours. Not only that, you're likely to take over a similar issue and the next day and related matters. In the dry process, similar to the powers associated with naturally acquired. If you can do a good things, these powers are natural and are the property of you. And there will be more and bigger things waiting for you to do, naturally have more more power waiting for you to master. But if you did not do a good thing, even if the power received will be back soon. That took years of professional managers who have little power who do not reason.

Assumed office manager to keep in mind: Do not too many tasks at once led. Lead responsibility for too many, or crush his resignation leave, or to delay things, disgrace, forced to step down.

Trust decided to authorize the

The world is not born mean power of the boss. Not authorized because of no confidence, trust is not enough. Trust is authorized by the precondition of trust is built up step by step, by no means simple contracts and agreements. The trust of the professional managers, including the ability to trust in both trust and loyalty, which is on the professional and professional confidence. Ability to win the trust of the boss of the easier performance can depend on. But loyalty to the trust is not so simple. These are two indicators are not related, yet associated with the degree of authority.

From the boss's point of view, analysis of professional managers loyalty (ie, professional level), the boss may worry that professional managers to do four things: First country ambition, and second, the loss of wealth, The third is the transfer of resources, four are deliberately disruptive. As a professional manager who can break through the hearts of these four threshold boss, you win the boss's loyalty to the trust, plus you can get the boss on your ability to trust, then the mandate is simply not a problem. Instead, authorized only a dream. Therefore it is easy to understand, you just arrived a professional manager, so how can let the boss handed over power to you?


Confidence level, roughly consistent with the closeness. So as airborne manager confidence index in the eyes of the boss and how much? Depends primarily on the following six areas:

First, with the managers of occupational level proportional to the past. In principle, the higher the level of professional managers, the higher the level of professionalism, otherwise difficult to dry up. Therefore, the level of professional managers in the past, is to test its important indicator of the degree of occupation.

Second, with the proportional size of enterprise and brand. More brands and size of enterprises, the higher the level of professionalism. Well-known foreign companies, particularly the occupational level, relatively high.

Third, and directly proportional to education level.

4 is proportional to age. This is mainly the result of curing values.

Fifth, good or bad is proportional to the family and cultural background.

Sixth, with the search firm's longevity is proportional to the degree. As the size of the business bigger and bigger, higher and higher employment levels, the traditional personal connections alone can not meet the company introduced development, and open recruitment to the people whose trust is the lowest. So the emergence of specialized human resources executive search firm. The more the brand, the longer the establishment of the executive search firm, its recommended trust in professional managers higher. Because of the longer survival of the executive search firm, its stock more careful consideration of talents. This is why senior professional managers through executive search firm must come to work, rather than their own personal reasons to candidates.

Of course, these are only those that the degree of your past career, but also confidence index theory. We should trust these theories into practice, the confidence index index, they rely on the words and deeds into the company after the real, a trivial thing to verify and consolidate. Saying goes: "A distance tests a horse, time will tell."

Decide to trust the competence and integrity

Under normal circumstances the boss authorized to comply with this mandate principles: the ability not to pursue the big users, can not afford not to pursue the use of their loyalty, have the ability to pursue the limited use, there is no ability to pursue the firm do not.

Speaking of "use" is authorized to "seek" means the person's ambitions. Desire to do this is normal, but in most it is not the boss seems to occupation, the performance of infidelity, which is also China's traditional culture, the result of long-term impact, and will affect the manager's job stability.

Sometimes harvest declined more

So fresh on the twisted world: someone to power, the boss will not give; Do not power, but why employers sometimes try to turn the power to you.

How to face this situation do? Get detailed analysis: If the boss suddenly granted the power to you, beyond the normal scope of the trust, you feel a bit surprised, should be firmly rejected. If we are simply authorized, but not responsible for supporting, nor should, be rejected. If you have supporting responsibilities, responsibilities and rights match, the boss also true authority, but because it is the first time, you may worry that the power will give you trouble, you can politely declined. The more so, the more the boss will give you the power granted. Because you fear the power, not greedy for power, the boss will feel the power of knowledge to turn the fear of the power used with caution, not recklessness. In fact, some professional managers only character straightforward, to the right to direct that the purpose is pure, but the results have often backfired.

The right of first hit with a small victory

No earlier access to power, but late is out.

An airborne manager into a company, disrupting the distribution of power and interests of the original balance, many pairs of eyes staring wide, who have the hope, wait and see who has the to see who are the jokes, so children troublemakers trip more with them. In particular, the enterprise culture is not healthy, it is unpredictable people. If the power to back, can not afford their own use; if the power with power from time to time did not win, you will be accomplished anything, people will talk about and someone to stir up trouble, someone will not put you seriously. Therefore, as manager, when the firm shot shot, hit by several nice victory to win hearts and minds. Note that, just start doing things, do not do too big corruption and more to expand our success and victory, this time the most favorable side of things is that the boss will firmly stand by your side, to make full use of this advantage. Zhuge Liang by newly hatched Hill Bowang fire, wild fire two small victories in the new shock dose of "veterans" Guan Yu and Zhang Fei is a very successful model case.

Of course, power has been structured and the order of the state-owned enterprises and foreign enterprises do not need such energy, it is not simply a sit president of the throne, one hears you, serve you. Maybe you're right, but not necessarily prestige, but also continued to win the war through their own authority to lay accumulation, steady grip mace.







Recommended links:



Picked Audio Recorders



Different trust model



M4V



Vector graphics on the description of several CONCEPTS



PHS DELISTING who is in charge



Allocated Memory In An Object Structure



"Hybrid VPN" In progress



Swf Files



Download Flv To Mp3 Converter



mkv CONVERTER free



Terminal And Telnet Clients Storage



Share of non-reap



Your New Year with Photojoy Xiu Zhao



Interview with B & Q (China) Vice President, Human RESOURCES Director Miss Hu Weiyan



Wednesday, July 14, 2010

Workplace competitiveness "soft skills"


There are two types of job skills, professional skills is usually only the basic conditions, but also with soft skill, will work well.

Schools can teach you, nothing more than professional knowledge. However, the workplace, "hard lining" of professional knowledge but also with "soft skills" (soft skill), to its head.

Expertise in a job you have the basic conditions, but to have outstanding performance, in order to succeed, we must rely on soft skills.

For example, the "strategy independent thinking" can help you cope with the ever-changing competition, "Problem solving" can help you almost always overcome the problem, "service force" to help you win customer loyalty, "innovative thinking ability," you become the organization soul, "planning ability" to devise strategies you will be trained before, "leadership" is in charge of the road leading to the necessary conditions.

Strategic thinking ability 鈹?a turn to head

Innovative ideas of the times, only exercise its own strategy thinking ability, breaking the existing concepts and common sense to solve the difficult problem after another challenge.

To train "strategy of independent thinking", the most commonly used is the "Multiple Reflection Method."

In short, everything should not expect only one answer, but thought to be many, created the possibility of complex solutions.

A turn, a world different. To foster a pluralistic thinking, we must first abandon past habits, learn to stand in different positions and perspectives.

Sometimes, out of office workers may wish to frame their own role, from supervisors, customers or colleagues to rethink the position of competitors, will find their blind spot, the new strategy has emerged.

HP Enterprise Systems Group, Education and Training Manager Li Yi Liang suggested that the opportunity to be more and different world, departments, life backgrounds, to cooperate, not only expand the horizons, but also nurture pluralistic tolerance.

Cultivate the habit of thinking and writing at the edge, always record good idea, good ideas, but also help train multiple senses. Light in the head thinking, it is easy into a dead end, moving further narrow into a dead end, as the ideas are written down, allowing you to grasp the overall image of multi-angle.

Problem solving ability for problems solved 鈹?br />
Problem solving skills to train, the first step must be the logical reasoning ability to analyze problems.

Ability to look very abstract logic, in fact, from the daily life practice. For example, every day, many do, but things should be prioritized, how to arrange the order, so that the distribution of the time most do, is a practice opportunity.

"Telling Stories" and "writing" is also good training. Story, to put it orderly; write articles, to write and clarifies; this test of your logic in capacity.

In addition, the "logical tree" is also a great training tool. Through a clear tree structure, the matter of "the size of relations," "causal relationship" and "class relations" clearly show. Not only in the job, or even daily life problems, it can use logic tree, step by step to find causes and solutions.

Sophisticated services, the police force 鈹?facial, Care

When companies have to "customer service" as its highest guiding principles, service companies employing force has become popular features. Not only hotels, airlines and other traditional emphasis on service power service, the financial sector financial specialists, engineers, customer service industry, to have outstanding performance, also depend on the service force.

Service force, from the "Care" that is able to stand on customer needs, considerate of his needs. This is not simple enough enthusiasm wholehearted service, the police must also have subtle facial expressions, and the empathy of "empathy."

Grand Formosa Regent Taipei president Pansi Liang said, "the best service hotel is touched the hearts of customers, but from the heart, and always for the customer, is the best way." Such as Regent hotel room "pillow menu", is thoughtful business customers After a day to run around, can sleep safe and sound sweet to feel, so let the guests choose the most comfortable and most suitable pillow.

How to serve the power?蹇呴』鎶辨寔闅忔椂甯姪鍒汉鐨勭儹璇氾紝閫氫織鐨勮娉曞氨鏄鈥滈浮濠嗏?銆傛櫠鍗庨厭搴椾汉鍔涜祫婧愭毃绋芥牳鍗忕悊鏉庨潠鏂囦妇渚嬶紝褰撳浜轰竴韪忚繘椁愬巺锛屾湇鍔′汉鍛樺氨瑕佸療棰滆鑹诧紝浠庡鏂圭殑涓?妇涓?姩涓紝鍘绘帹鏁蹭粬鍦ㄦ兂浠?箞锛涘綋瀹汉鍦ㄩ妗屼笂鍑虹幇鍥版儜鐨勮〃鎯咃紝绉拌亴鐨勬湇鍔′汉鍛樺氨搴旇绔嬪埢璧颁笂鍓嶅幓璇㈤棶銆佸崗鍔╋紝鑰屼笉鏄瓑鍒板浜哄紑鍙f墠鏈夋墍鍔ㄤ綔銆?br />
銆??涓嶈繃锛屾潕闈栨枃涔熷潶瑷??浠ュ涓哄皧鈥濄?鈥滀汉闄呮晱鎰熲?鏄竴绉嶅緢闅捐璁粌鐨勮亴鑳斤紝鍞湁闈犺嚜鎴戣皟鏁村績鎬侊紝鐢辫》鍦颁粠鍐呭績寤虹珛璧峰鍒汉鐨勪綋璐村叧鎬??

銆??鏈嶅姟锛岃鑲斁涓嬭韩娈点?鍏ㄥ渚垮埄鍟嗗簵浜轰簨涓撳憳闄堝穽鏈ㄨ〃绀猴紝鐜板湪骞磋交浜轰粠灏忓鍙楀懙鎶わ紝鍥犳鏈嶅姟鍒汉鏃讹紝韬寰堥毦鎷変笅鏉ワ紝鐢氳嚦鍦ㄥ簵閲屽枈鈥滄杩庡厜涓粹?锛岄兘瑙夊緱寰堜涪鑴革紝灏ゅ叾瀛﹀巻鎰堥珮锛岃韩娈垫剤鎷変笉涓嬫潵銆傚叾瀹烇紝鍙杞釜蹇靛ご锛屽皢鏈嶅姟褰撲綔涓?釜涔犳儻鏉ュ煿鍏伙紝灏变笉浼氳繖涔堝洶闅句簡銆?br />
銆??鏈嶅姟鍔涳紝瑕佷粠灏忓湴鏂圭潃鎵嬨?鈥滃澶勭暀蹇冪殕瀛﹂棶锛屸?璧勭敓鍫備細鍛樻湇鍔′腑蹇冨簵闀垮紶閲戠嚂琛ㄧず锛屾湇鍔″搧璐ㄥ叾瀹炴槸浠庢灄鏋楁?鎬荤殑寰皬缁嗚妭锛岀偣婊寸疮绉捣鏉ョ殑銆傚ス涓句緥锛屼负浜嗘彁渚涙渶骞插噣銆佽垝閫傜殑鐜娆惧緟浼氬憳锛岃祫鐢熷爞浼氬憳鏈嶅姟涓績鐨勫伐浣滀汉鍛樺嚑涔庝汉鎵嬩竴鍗疯兌甯︼紝鍙鍙戠幇鍦版涓婃湁鑴忎笢瑗匡紝灏辩珛鍒昏共鍦ㄥ湴涓婄敤鑳跺甫榛忚蛋锛岃鍦版骞插噣鍒拌繛涓?牴澶村彂銆佷竴鏋氶瀷鍗伴兘鐪嬩笉鍒般?

銆??鈥滄湇鍔″姏鏄搧璐ㄧ殑琛ㄧ幇锛屸?鏉庢?闈撹涓猴紝鏈嶅姟鐑勘铏界劧閲嶈锛屼絾鏇磋鏈夋湇鍔″搧璐紝鍥犳蹇呴』甯稿父璀︽儠鑷繁鍋氫簨鎬佸害瑕佺粏蹇冿紝璁╂瘡涓?鐨勬湇鍔★紝閮芥槸鏈?畬缇庣殑婕斿嚭銆?br />
聽聽聽 鍒涙柊鎬濊?鍔涒攢姣忓ぉ鍋氬ご鑴戜綋鎿?br />
銆??鍒涙剰鐐瑰瓙灏戙?鎬濊?鍔涗笉寮虹殑浜猴紝鍦ㄤ紒涓氱晫寰堝鏄撹娣樻卑銆傝濡備綍鎻愬崌鑷繁鐨勫垱鏂版?鑰冨姏鍛紵寮鸿揩鑷繁缁忓父鍋氳剳鍔涙縺鑽★紝鏄渶绠?崟鐨勬柟寮忋?

銆??鈥滃垱鏂版槸娌″姙娉曞涔犵殑锛屽敮鏈夐潬鏃跺父缁冧範锛屸?鏉庢?闈撳己璋冿紝鏅?浜虹偣瀛愪笉澶熷锛屼富瑕佹槸鍙椻?甯歌瘑鈥濅笌鈥滄垚瑙佲?鎵?眬闄愶紝鍥犳瑕佸父寮鸿揩鑷繁鍘绘兂鈥滅瀛愪互澶栫殑涓滆タ鈥濄?

銆??涓?紑濮嬶紝瑕佽鍚勭鏃犲涓嶆湁鐨勭偣瀛愬敖閲忚窇鍑烘潵锛岀敤鈥滃彂鏁f?鑰冣?鍙栦唬鏉″垪寮忕殑鎬濊?鏂瑰紡銆?br />
銆??鏉庢?闈撹〃绀猴紝鍙戞兂鏃跺彲浠ユ壘涓?紶鐧界焊锛屽皢涓婚鍐欏湪鐧界焊鐨勪腑闂达紝鐒跺悗寮?鑱旀兂涓庝富棰樼浉鍏崇殑浜恒?浜嬨?鐗╋紝鎰堝鎰堝ソ锛屽苟涓斿皢鎵?湁鐐瑰瓙璁板綍涓嬫潵銆?br />
銆??鑴戝姏婵?崱涔熷彲浠ョ敤妯′豢鈥滄帴榫欌?鐨勬柟寮忥紝灞?儴鏀硅壇鍒汉鐐瑰瓙锛屽舰鎴愭柊鐨勫垱鎰忋?

銆??姣斿锛岃璁衡?绌虹綈瀛愮殑浣跨敤鏂瑰紡鈥濊繖涓棰橈紝鏈変汉璇寸敤鏉モ?瑁呮按鈥濄?褰撲綔鑼舵澂銆傛鏃跺彲浠庘?瑁呪?杩欎釜瀛楋紝寤朵几鍙戞兂鍒颁笉鍙?瑁呮按鈥濓紝涔熷彲鈥滆鍦熲?锛屼篃灏辨槸褰撲綔鐩嗘牻銆傚悓鏍风殑閬撶悊锛屼篃鑳界敤鏉ヨ鑿哥伆锛屽彉鎴愨?鑿哥伆缂糕?绛夛紝璁╁垱鎰忕殑鍙兘鎬ф棤闄愬欢浼搞?

銆??璁板綍鏁寸悊濂芥墍鏈夌殑鐐瑰瓙锛屼笅涓?灏辨槸杩涜鈥滈噸鐐瑰寲鈥濅笌鈥滃垎绫烩?銆?br />
銆??鎵?皳鈥滈噸鐐瑰寲鈥濓紝棣栧厛搴旇鍖哄埆鈥滄湁鐢ㄧ殑鐐瑰瓙鈥濆拰鈥滄病鏈夌敤鐨勭偣瀛愨?锛屽苟涓斿皢鍚勪釜鐐瑰瓙鎺掑畾浼樺厛椤轰綅锛屾渶鏈夌敤鐨勫厛鎸戝嚭鏉ャ?鐒跺悗锛屽皢鎬ц川绫讳技鐨勬湁鐢ㄧ偣瀛愬綊鍒颁竴璧凤紝杩涜鈥滃垎绫烩?锛屼互娓呮鍛堢幇鐐瑰瓙鐨勭壒鑹层?

銆??鍒涙剰鎬濊?鍙互鍙樻垚涓?涔犳儻锛屼笉濡ㄦ瘡澶╄姳5鍒嗛挓缁冧範鑴戝姏婵?崱锛岄拡瀵逛竴涓富棰橈紝5鍒嗛挓鍐呮兂鍑?0涓В鍐虫柟娉曪紝寰簭娓愯繘璁╁ご鑴戞洿鐏靛厜銆?br />
銆??涓嶈繃锛孖BM宸ュ晢浜嬩笟缇ゆ?缁忕悊榛勬収鐝犳彁閱掞紝鍒涙剰涓嶅厜鏄敤鎯筹紝杩樿浠樿琛屽姩锛屽洜涓虹湡姝g殑鍒涙剰锛屽線寰?槸浠庡緢澶氭瀹為檯灏濊瘯鍜岄敊璇腑娣粌鑰屾潵锛屽苟涓嶆槸澶╅┈琛岀┖鏃犱腑鐢熸湁銆傚緢澶氣?鐏靛厜涔嶇幇鈥濈殑绮鹃噰鍒涙剰锛屽叾瀹炴槸瑕佺瓑寰呮棤鏁伴粦澶滄墠鍑虹幇鐨勯棯鍏夈?

聽聽聽 浼佸垝鍐欎綔鍔涒攢绾镐笂鎬濊?鐨勮壓鏈?br />
銆??鈥滀紒鍒掑姏鈥濇槸璁╁伐浣滀骇鐢熷垱鏂颁环鍊肩殑閲嶈鑳藉姏锛屼篃鏄悇琛屽悇涓氶兘蹇呴』鍏峰鐨勫叡閫氳兘鍔涖?

銆??鍙版咕浼佸垝濉炬墽琛岄暱鏋椾繆寤锋寚鍑猴紝浼佸垝鍔涘叾瀹炰笉鏄?鍗曚竴鑳藉姏鈥濓紝鑰屾槸涓?鈥滄暣鍚堣兘鍔涒?锛岄噷闈㈠寘鎷瀵熷姏銆佸垽鏂姏銆佸垱閫犲姏銆佹墽琛屽姏銆?br />
銆??鈥滀紒鍒掓槸绾镐笂鎬濊?鐨勮壓鏈紝鈥濆彴婀句紒鍒掑【鐭ヨ瘑闀块儜鍚窛璁や负锛屼竴浠戒紒鍒掔殑濂藉潖锛屽線寰?槸鐢辨?鑰冨搧璐ㄦ潵鍐冲畾锛屼粠闂銆佺洰鏍囥?璧勬簮鍒版墽琛岋紝姣忎釜鐜妭閮借杩涜鍛ㄥ瘑鐨勬?鑰冦?

銆??鍦ㄦ挵鍐欎紒鍒掍功鏃讹紝涓嶄粎鐢ㄥ瓧瑕佺簿鍑嗐?閫昏緫鏋舵瀯瑕佷弗璋紝鏈?ソ杩樿兘鎼厤涓?簺绠?崟鏄撴噦鐨勫浘鍍忋?鐢ㄢ?鍥捐В鈥濈殑鏂瑰紡鏉ヤ紶杈炬剰蹇碉紝璇存湇鍔涜繙鑳滆繃闀跨瘒澶ц鐨勬枃瀛椼?

銆??鍙版咕寰蒋琛岄攢璧勬繁缁忕悊寮犺摀钑炬彁閱掞紝浼佸垝涓嶆槸闂棬閫犺溅锛岄櫎浜嗗鏂规悳闆嗘姤绔犳潅蹇椼?姝e紡鐨勭爺绌舵姤鍛婏紝鏈?悗涓?畾瑕佸疄鍦板幓瑙傚療锛屼紒鍒掓鎵嶄笉浼氫笌鐜板疄鑴辫妭銆?br />
聽聽聽 棰嗗鍔涒攢璁╀汉鐢樺績涓轰綘鏁堝懡

銆??棰嗗鍔涳紝绠?崟鏉ヨ灏辨槸鈥滃奖鍝嶅姏鈥濓紝璁╁懆閬汉鎰挎剰涓轰綘杈炬垚鐩爣銆?br />
銆??鈥滈瀵尖?鍑犱箮鏃犳墍涓嶅湪锛屾棤澶勪笉鐢ㄣ?鍙涓や汉浠ヤ笂鐨勫洟浣擄紝鏈夊叡鍚岀殑鐩爣锛屽氨鏈夆?棰嗗鈥濈殑蹇呰銆傚湪瀹堕噷锛岀埗姣嶅厔闀挎槸瀛愬コ鐨勯瀵艰?锛涘湪瀛︽牎锛岀彮闀挎槸鍚屽鐨勯瀵艰?锛涘湪鑱屽満涓婏紝鍒欐槸鑰佹澘涓庝富绠°?鍥犳锛岄瀵煎姏鐨勮缁冿紝涓嶅繀绛夊埌褰撲笂涓荤锛屼粠骞冲父鐢熸椿灏卞彲浠ュ紑濮嬨?

銆??鍦ㄧ鐞嗙晠閿?功銆婁粏浜猴細淇亾闄㈢殑棰嗗鍚ず褰曘?涓彁鍒帮紝棰嗗鐨勫熀纭?笉鍦ㄦ潈鍔涳紝鑰屽湪鎺堟潈锛涢瀵兼槸浠ヤ汉闄呭叧绯汇?鍏虫?銆佹湇鍔′笌濂夌尞涓哄嚭鍙戠偣鐨勩?涔︿腑寮鸿皟鐪熸鐨勯瀵硷紝鏃犲叧鎵嶈兘楂樹笅锛屼篃涓嶉渶瑕佹柊棰栫殑澶嶆潅鐞嗚锛岃?鏄墡鏍瑰湪鏃ュ父鐨勭敓娲婚噷锛屼粠灏婇噸銆佽礋璐d笌浣撹创浠栦汉寮?銆?br />
銆??鈥滈瀵煎姏闇?寰堥暱鐨勬椂闂撮厺閰裤?鍩瑰吇锛屸?鎯犳櫘绉戞妧鏈嶅姟浜嬩笟缇よ閿?毃绛栫暐澶勫壇鎬荤粡鐞嗛檲蹇犲紭琛ㄧず锛屼竴涓瀵艰?鎵?渶鐨勭壒璐紝涓嶈鏄俊鐢ㄣ?灏婇噸銆佸叕骞筹紝鎴栬?鍊惧惉銆佸洖搴旂殑鑳藉姏锛岄兘涓嶆槸涓?勾鍙強銆傚綋浣犺繕鏄熀灞傚憳宸ワ紝灏卞簲寮?閫愭鍩瑰吇鏈潵鎴愪负涓?釜棰嗗鑰呰鍏峰鐨勫櫒璇嗕笌鏍煎眬銆?br />
銆??涓嶆柇鎻愬崌鑷垜锛屾槸鎴愪负棰嗗鑰呯殑蹇呰鏉′欢銆傗?涓嶈涓鸿嚜宸辫闄愶紝鈥濇潕鎬¢潛琛ㄧず锛岄櫎浜嗗箍娉涙秹鐚庡悇绉嶇煡璇嗗锛屼富鍔ㄤ簤鍙栧巻缁冪殑鏈轰細锛屼篃鏄煿鍏婚瀵兼牸灞?殑鏂规硶銆?br />
銆??濂硅涓猴紝鏈夊織鍚戜笂鐨勪汉锛屽簲璇ヤ富鍔ㄤ簤鍙栧鏍$ぞ鍥㈡垨鍏徃鐗规畩缂栨淳鐨勪换鍔★紝涓嶈鏈夆?why me锛熲?锛堜负浣曟壘涓婃垜锛夌殑鎯虫硶銆傚洜涓猴紝姣斿埆浜哄涓?垎鍘嗙粌锛屽氨澶氫竴鍒嗗涔犵殑鏈轰細锛屼粠涓幏寰楃殑缁忛獙锛屾槸鍒汉鍋蜂笉璧扮殑銆?br />





相关链接:



Mkv To Avi Converter Free Download



Bliss DVD-Audio M3U AMR To AAC Creator



Vacations DVD COPY



Ipod touch video format



flv to 3gp



Jocsoft YouTube to iPhone Converter



Password Managers evaluation



Vacations DVD to Pocket PC



converter mp4 to 3GP free



Good-OK DVD to iPod MP4 MP3 AMR Ripper



Youtube To H264 Freeware



Premier Launchers And Task Managers



AlltoDVD SWF Converter



Thursday, July 1, 2010

Merry MPEG to DVD Converter

Merry MPEG to DVD Converter is a powerful video conversion program and easy-to-use MPEG to DVD iPod Zune iPhone Converter, easy convert MPEG to MPG, AVI, WMV, MP4, 3GP, MOV, RM, VCD, DVD, SVCD formats. also can support batch video files conversion of different video formats such as DVD AVI MPEG ASF MOV SWF at the same time. Besides, it also can support to burn VCD SVCD DVD. And best of all, it has a powerful video decompress/compress engine that convert whole MPEG movie to DVD in 30 minutes! Except for converting AVI to iPod Video and converting Video to iPod,it also supports converting among MPG, WMV, MP4, 3GP, MOV, RM, PSP Video, iPod Video, Zune Video, iPhone Video!



Recommand Link:



Lohan MP4 Converter



M3U MP2 TO iPod



Digital CDA M4P RA to WAV Copier



X-Cloner SWF Converter



Easy Video to PSP Converter



AaleSoft DVD Copy



HD to Sony NWZ-E438F converter



HD to Sony NWZ-S738F



Bluesea SVCD DVD VCD To IPhone



How to CREATOR PSP Backup



Good Active X



3gp



Easy Audio Presentation Tools



Guide Helpdesk And Remote PC



Perpetually MPG to FLV



Christmas-Idea DVD FLV Copier



Alice DVD to Mac iPod Converter