Friday, October 22, 2010

Red Hat continues international expansion path of new R & D centers Czech Republic


EST on January 10 (Beijing time on January 11) news: According to media reports, the world's largest Linux vendor Red Hat in the Czech Republic opened a new R & D center.

The R & D center is located in the Czech Republic's second largest city Brno, Red Hat intends to invest in the R & D center 1.7 million U.S. dollars, employs 200 staff.

The center is a series of international expansion of Red Hat's latest move, last year it has been founded in India and South America, a wholly owned subsidiary.







Recommended links:



Benchmarking Wizard



Image Format Headquarters



Repair ntkrnlpa exe easy fix



Shell Tools brief



AVI to 3GP



FLV to iPhone



The SMTP user authentication based on QMail Setup Guide (Part One)



SEVERAL important concepts of object-oriented [1]



TS to WMV



New Curriculum for primary and secondary breakthrough multi-media teaching



Sony To restore dominance: Farewell Idei



New accounting standards and tax law differences on HOW to coordinate



Dell's former high-ranking as Li Ning Zhong Yi Qi Chief Financial Officer



Evaluate Screen Capture



Wednesday, October 20, 2010

View open ports: Let Trojan True Features


Currently the most common Trojan is usually based on TCP / UDP protocol for client-side and server-side communication between, since the use of the two agreements will, inevitably, to the server-side (that is, the machine is kind of a Trojan horse was) open listening port to wait for the connection. For example, using the famous glaciers listen port is 7626, Back Orifice 2000 is the use of 54320 and so on. So, we can use the view of the machine open ports to check whether they have been kind of a Trojan horse or other hacker programs. The following is a detailed method description.

1. Windows itself comes with the netstat command

On the netstat command, we first look at windows help file description:

Netstat

Display protocol statistics and current TCP / IP network connection. This command is only installed TCP / IP protocol before they can use.

netstat [-a] [-e] [-n] [-s] [-p protocol] [-r] [interval]

Parameter

-A

Show all connections and listening ports. Server connection does not usually.

-E

Display Ethernet statistics. This parameter can be used in conjunction with the-s option.

-N

In digital format address and port number (instead of trying to find the name).

-S

Show the statistics for each protocol. By default, the display TCP, UDP, ICMP and IP statistics. -P option can be used to specify the default subset.

-P protocol

Protocol specified by the agreement shows the connection; protocol can be tcp or udp. If used in conjunction with the-s option to display statistics for each protocol, protocol can be tcp, udp, icmp, or ip.

-R

Display routing table contents.

interval

Re-display the selected statistics, pausing between each display interval seconds. Press CTRL + B to stop re-display statistics. If this parameter is omitted, netstat will print the current configuration information once.

Well, read the help file, we should understand to use the netstat command. Let us now study the current use, use this command to look at open ports on your machine. Access to the command line, use the netstat command of a and n are two parameters:

C:> netstat-an

Active Connections

Proto Local Address Foreign Address State
TCP 0.0.0.0:80 0.0.0.0:0 LISTENING
TCP 0.0.0.0:21 0.0.0.0:0 LISTENING
TCP 0.0.0.0:7626 0.0.0.0:0 LISTENING
UDP 0.0.0.0:445 0.0.0.0:0
UDP 0.0.0.0:1046 0.0.0.0:0
UDP 0.0.0.0:1047 0.0.0.0:0

Explain, Active Connections is the current active connection of the machine, Proto is the protocol used to connect the name, Local Address is the local computer's IP address and port number being used to connect, Foreign Address is connected to the port of the remote computer's IP address and port number, State is that the state of TCP connections, you can see three rows behind the listening port is UDP protocol, so there is no State that state. Look! My machine's 7626 port is already open, is listening to wait for connections, like this case very likely have been infected with the ice! Quickly disconnected from the network, killing the virus with anti-virus software is the right approach.




[Next]



2. Work under the command line in windows2000 tool fport

Using windows2000 friend than use windows9X lucky, because you can use fport this program to display open ports and process the native correspondence.

Fport is FoundStone produced a system to list all open TCP / IP and UDP ports, and their corresponding application's full path, PID logos, names and other information of the software process. Use the command line, see example:

D:> fport.exe
FPort v1.33 - TCP / IP Process to Port Mapper
Copyright 2000 by Foundstone, Inc.
http://www.foundstone.com

Pid Process Port Proto Path
748 tcpsvcs -> 7 TCP C: WINNTSystem32 tcpsvcs.exe
748 tcpsvcs -> 9 TCP C: WINNTSystem32tcpsvcs.exe
748 tcpsvcs -> 19 TCP C: WINNTSystem32tcpsvcs.exe
416 svchost -> 135 TCP C: WINNTsystem32svchost.exe

Is not readily seen. This time, what is the procedure in all ports open to all under the eyes of you. If there is a suspicious program opens a suspicious port, be sure not to the effect that Oh, maybe that is a sly Trojan Horse!

Fport the latest version is 2.0. In many sites available for download, but for safety reasons, of course, it is best to go home under: http://www.foundstone.com/knowledge/zips/fport.zip

3. Fport function with graphical interface tools like Active Ports

Active Ports produced as SmartLine, you can use to monitor the computer all open TCP / IP / UDP port, not only will you be shown all the ports, all ports are also shown where the path corresponding procedures, the local IP and remote IP (attempting to connect to your computer IP) whether it is activities.

Is not very intuitive? Even better, it also provides a closed port function, use it to find your horse in the open port, you can immediately shut down the port. The software work in Windows NT/2000/XP platforms. You can get it in http://www.smartline.ru/software/aports.zip.

In fact, users do not use windows xp with other software that can be correspondence between the port and the process, because the windows xp brought the netstat command more than the previous version of an O parameter, this parameter can be obtained using the port and the corresponding process years.

See above description of several local open ports, and the corresponding relationship between the port and process methods, these methods can be easily found based on TCP / UDP protocol Trojans hope that I can help you bring the love machine. But the emphasis on the Trojans against, and if the Trojans run into a rebound port, use the driver and dynamic link library technical production of a new Trojan horse, the above method is difficult to identify traces of a Trojan. Therefore, we must develop good surfing habits, do not run email attachments free, install a antivirus software, such as domestic Rising killing viruses and Trojan horses is a good helper. Download the software from the Internet first, again with antivirus software and re-use, open the network when the Internet firewall and virus real-time monitoring, to protect their machines are not hateful Trojan invasion.






Recommended links:



Special steps: maneuvers, decisive miles



MP4 to FLASH



Simple Accounting And Finance



Image Format headquarters



e-cology in the Pan Micro Series 14



Out errors to make your writing more Efficient CSS



Guide Teaching And Training Tools



DV TO AVI



Dreamweaver's CSS layout examples ul and li



Jiang Qiping Family Laboratory of Beijing University speech sounded "New Life Movement" horn



Fsck errors cause data loss in linux



"Sacred 2 Fallen Angel," Raiders Special Mounts Detailed Process



Single-core Conroe two SERIES were named Pentium, Celeron



Real To MP4



Evaluation Desktop



Pan On Why OO + Object-oriented Multi-layer Structure [2]



Monday, October 11, 2010

Who made the prosperity of reduced memory Zhongguancun



Each of 20 shops, have a close leave. This is the Zhongguancun electronics store - the nation's largest consumer electronics distribution center, now presented in a recession: Flow reduction, volume reduction, people go counter space.

Storms, the computer and other IT products at one time a year earlier profit fell 4 percentage points, and even the world's semiconductor giants China Taiwan UMC and SMIC is also a huge loss.

According to the survey, China had Qicheng people affected by the financial crisis, coupled with the stock plunged, housing prices decline, high unemployment rate increase, many consumers began to Wujin purse for the winter, as a non-necessities of life electronic products, its sales of natural not optimistic.

Upstream squeeze corporate profits, lower consumer purchasing power continues to decline, on concern lower risk of time, become overwhelming external economic market businesses in Zhongguancun electronics stores the last straw.

On the surface, this collapse of the financial crisis is behind a wave of "murderer", but in my opinion, quietly issued force competitors and that have long business management is the real "Gravedigger."

First, the internal troubles die-hard. For a long time, the price of Zhongguancun store is confusion and lack of integrity is obvious. The industry has eulogized the "buy a computer, to Zhongguancun," long superficial, and now, "Zaike, fake, Kengmengguaipian" Zhongguancun has become synonymous with electronic stores.

In addition, since 2006, Zhongguancun store's rent is almost 15% annual growth rate. Fleece, businesses can not Yingkang rent can only be passed on to consumers.

Therefore, "to deceive one is one, can kill a pair of a pair of" Zhongguancun business have become common psychological. Knowing that fraud makes credit loss, but to a pressing need, they have time to take into account the long-term interests. Means of changing the sales and marketing channels emerging today, Zhongguancun electronic stores starting to prove twilight.

Second, the opponents force. At present, Gome, Dazhong and Suning Appliance and so on from the traditional stores, into a collection of household appliances, computers, mobile phones and other 3C products, a comprehensive shopping mall. And the Zhongguancun model similar to that of Beijing Buynow also open the store, but online shopping has gradually come into fashion. These new sales model for streaming into their rival businesses in Zhongguancun. Large, if not formal B2C website, dispersed remnant-like network of dealers have also launched the Zhongguancun IT store price shocks.

Rome was not built in a day cold. Disorder, falling profits, living hard, these objective reasons, a considerable number of businesses are making false prices, cheating customers; Honesty is word of mouth brought deterioration, traffic reduction, collapse is inevitable. Can be said that the financial turmoil is a failure of Zhongguancun electronics store incentives, the key is the core competitiveness gradually disappear.

Store in response to the decline in the experience of nearly 10 years of rapid development, the Zhongguancun area of Computer City, the rent reduction for the first time, several supermarkets have started to release the product sales price. But this is only a "stop-gap" in the occasional move to improve the business category and business management, upgrade distributors and service quality and brand to resolve the crisis is the root of the problem.

This will need to include the Consumers Association, including multi-store and consumer efforts.







Recommended links:



Photoshop - Neon Text



Tencent said the prosecution did not rule out the Possibility 51.com



VOB to SWF



Evaluate Office Suites And Tools



REALDRAW help you reproduce wooden sound box (1)



Audio Speech comparison



Tissot Wave Through The "Dakar"



Zhang Chengdong: 3G "LICENSES" after



your computer can RUN faster by cleaning your



3GP To MPEG



Practical Architecture: Logic Layer [3]



Bitmap image synthesis model and channel together



Tissot wave through the "Dakar"



FLV to Zune