Monday, October 25, 2010

"Dragon Century: The Origin of" combat experience to know the 10 o'clock



"Dragon Century: The Origin of" combat experience to know the ten-point: to play the 2 days of HARD difficulty DAO, beginning with the thieves, later changed to play the Master, I feel this game is very challenging ... fighting talk here Some say my experience, the right hand suffered when to English people or novice RPG suggestions it:

1. To keep in mind this game is the RPG, not the ACT! Space is to always press, and his teammates also want to switch at any time, do not operate a fantasy figure what to use to go places open up relations skills ...

2. DAO skills for each character, not much, with the very important battle shield to attack the enemy archers Master or taken away, the Master Control archers or BOSS These are the basic principles

3. Because there DAO determine the impact, the card position is very important, especially in the indoor ... two soldiers gatekeepers can often be more effective, sometimes not four individuals playing an enemy, close combat, then if all you will find several teammates be stopped ...

4. Narrow the angle for the individual operation, the situation can be observed widening of the distribution of his teammates

5. Careful trap! AI is very clever often lead you into traps, if you see an enemy to fight a few turned to run it must take care ....

6. To all the scope of magic will accidentally injure teammates! But do not dare to use, with a good range of magic words is often the key to reversing the situation of the war

7. Although the spell does not need to sleep and memory, but must remember the magic of energy can not you think so much! Strict budgeting skills each of your release (wash down medicine can solve some problems, but not entirely wash down medicine)

8. At the tactical setting with their own blood in less than 25% when the automatic wash down medicine, it makes you a lot ... not easy to not want to wash down medicine! Particular characters did not heal once the case ... do not fall over if the Chapter a success of a

9. Spells and bows and arrows are trajectories, and wood, stone, shrubs, and even terrain are likely to block your attacks, be careful of their stations

10. This game BOSS is not terrible, terrible thing is the 4 on the N of the field, you do not want to repeat again and again the words of dialogue, remember that before the war record ...







Recommended links:



Mito Xiu love-postcards own DIY



Easy Personal Interest



Automatically Change The Control Once And For All So That The Size Of VB



HTML 5 will be discarded, and the elements will be enhanced



MPG To Flash



Thunder piracy to Beijing Sohu the court counterclaim



ABC classification of goods



Compare Personal Interest



RUP anti-pattern



SPECIALIST Games Arcade



E-Mail Clients Introduction



MOV to MPEG4



MOV to MP4



With confidence that Cisco has embarked on the road to recovery



FIREWORKS 4.0 Zhe Zhao Zhe Zhao Daquan ---- 11th Section Editor (II)



dell xps m1210 laptop review



Who stand up anti-monopoly



Wednesday, October 13, 2010

Axis celebrate the 25th anniversary of the company



The global network video market leader Axis (Axis Communications) in 2009 celebrated its 25th anniversary. The company is headquartered in Sweden, in the field of online video experience and innovative solutions, has been working to promote the video surveillance from analog to digital conversion of video surveillance.

Create An idea of hearing persons born in 1984 in Lund, Sweden, a student dormitory, two students at the time (later became the founder of Axis) Martin Gren and Mikael Karlsson was born in considering the possibility of IT era. They soon discovered the print area is the fastest growing areas of intervention, so they decided to develop and sell new products. In fact, from the beginning, they will focus on the network. The company's first product is a print server, it is the IBM protocol converter upgrade, for the first time in the same building so that multiple users use the same printer as possible. In 1996, the two founders of germination of the cameras connected to the network of ideas, so Axis network cameras began to engage in research and development, development of the world's first network camera company.

Now, 25 years later, Axis has made progress in many areas. Axis president Mr. Lu Weipeng North Asia, said: "An initial hearing persons only two people from small companies to develop into Axis now in more than 20 countries and regions have set up branches, its network of cameras around the world installed capacity already exceeded 100 million units. Axis has been the "network" as the company's business model. On hearing disabilities by virtue of their experience has been, and global system integrators and distributors to establish a system of corporate loyalty, and has more than 20 branches and system integrators and distributors to establish a good relationship now and more than 24,000 homes have been partners in business networks. while Axis at Lund University is also a well known local company , R & D operations at its headquarters and most of the work completed at the university. "

Axis is a young and modern IT companies in the network video product development has been a leader, is currently in expansion. In 2008, the Axis in the new global recruited 150 new employees, and in Moscow, Beijing and Sao Paulo offices set up. Also includes megapixels, new technologies such as compression and intelligent product line also increased. Axis launched a new self-developed using H.264 compression standard ARTPEC-3 chip, ensuring the image quality can also store and send more information.

With its 25 years of product and partner network to establish extensive experience, Axis become market leader. According to IMS forecast in the next five years, online video will grow 35%, thereby Axis provides greater development space and more opportunities should be expected.







Recommended links:



Fix Ccsvchst Exe Quick Solution To These Errors



Next-generation iPhone were reviewed by the Ministry of Industry



Comparison Religion



How far are we from lean manufacturing?



Report Shell Tools



WMV To Zune



QuickTime to MPG



Maxthon In Those Humble Little "trick"



A fully CG production process - the first draft (the original painting)



YOUTUBE to WMV



Qihoo give the flag to win USERS for free



Neusoft Interpretation Of "child Swallow Mother" Listed As A Whole Integration Scheme



Reflection: Dealers genuinely listened to RECRUITMENT



Articles About Music Composers



UT Starcom Orders By The Indian IPTV Operator



Thursday, October 7, 2010

JSF and Struts framework for error control and package handling



In the struts, the commonly used global error control mode is to build a baseAction, in its execute method, complete front operations to return method of dispatch by the try ... ... catch ... ... catch error, realize the error of the control and display. A typical BaseAction examples are:

Code

public ActionForward execute (ActionMapping mapping, ActionForm form,

HttpServletRequest request, HttpServletResponse response) (

... ...

ActionForward forwardPage = null;

try (

String parameter = mapping.getParameter ();

if (parameter == null) (

String message = messages.getMessage ("dispatch.handler", mapping.getPath ());

response.sendError (500, message);

return null;

)

String name = processReqCode (request.getParameter (parameter));

forwardPage = dispatchMethod (mapping, form, request, response, name);

) Catch (BaseException ex) (

if (log.isDebugEnabled ())

log.debug ("Error:", ex);

forwardPage = processBaseException (request, mapping, ex);

) Catch (Throwable ex) (

log.error ("Error:", ex);

ActionMessages errors = new ActionMessages ();

ByteArrayOutputStream ostr = new ByteArrayOutputStream ();

ex.printStackTrace (new PrintStream (ostr));

errors.add ("org.apache.struts.action.GLOBAL_MESSAGE", new ActionMessage

(Ostr.toString ()));

saveErrors (request, errors);

forwardPage = mapping.findForward ("syserror");

output.setStatus ("fail");

output.setError (ex.getMessage ());

)

... ...

)

Used as JSF managed bean, JSP page directly by calling managed bean method in the completion of data exchange, not the same as the struts through the capture dispatch operation to complete throws exception error handling (because there is no dispatch method), seems to jsf do not support the global error handling.

If you throw in the managed bean in an exception (here AppException), look at the console log, we can see that the error is from an ActionListener implementations thrown (for myfaces, here is ActionListenerImpl), reference jsf lifecycle processes, methods out:

Code

public class GlobalActionListener extends ActionListenerImpl (

public void processAction (ActionEvent event) throws AbortProcessingException (

FacesContext facesContext = FacesContext.getCurrentInstance ();

Application application = facesContext.getApplication ();

ActionSource actionSource = (ActionSource) event.getComponent ();

MethodBinding methodBinding = actionSource.getAction ();

String fromAction = null; String outcome = null;

if (methodBinding! = null) (

fromAction = methodBinding.getExpressionString ();

try (

outcome = (String) methodBinding.invoke (facesContext, null);

) Catch (EvaluationException e) (

Throwable cause = e.getCause ();

if (cause! = null & & cause instanceof AppException) (

/ / It should be different according to the framework to determine whether an instance of the program throws the error manually

FacesUtils.addErrorMessage (event.getComponent (). GetClientId (facesContext),

cause.getMessage ());}

else (

throw (AbortProcessingException) cause;

)

) Catch (RuntimeException e) (

throw new FacesException ("Error calling action method of component with id" +

event.getComponent (). getClientId (facesContext), e);

)

NavigationHandler navigationHandler = application.getNavigationHandler ();

navigationHandler.handleNavigation (facesContext, fromAction, outcome);

/ / Render Response if needed

facesContext.renderResponse ();

)

)

Listener configuration, faces-config-application.xml:

Code

org.springframework.web.jsf.DelegatingVariableResolver

resources.application

en

org.snailportal.webframework.listener.GlobalActionListener

This, developers need only managed bean inside the action and based on business needs based on Lei Xing Zhi Ding throw the Exception instance, You BaseAction and ActionListener Wancheng the wrong package, Chu Li, and transmits it gave Qiantai 杩涜 that reveals less developed code, improving maintainability of the framework.







相关链接:



Congratulations to the formal establishment of the Pan-micro Jinan Branch



're Renting Buy A House In The Ascendant With



3G2 to WMV



How to sync iphone ringtone on mac



YUV to AVI



Introduction And Context Servlet Container



ASF Converter



Articles about Games Simulation



Introduction Games Sports



Premier Search Or LOOKUP Tools



The world's richest man Bill Gates: The BATTLE of retirement started Empire



Switch to the best period of 2 to 3 years



Test emergency response capacity of cities: urban emergency on the road



50% stake in MSN China, the main message would be easy to pass and then mad



Saturday, September 25, 2010

SCM eight core processes?



Successful supply chain management needs to change before we managed only a single process model, the need for a range of process management.

In many large companies, management experience and proven without first implementing the right business processes, they can not optimize the manufacturing process. A few experts believe that the use of the production process in the business supply chain management, the industry standard would not be uniform. The value of standardized business processes is to make supply chain management links all the company's managers can use a unified language and effective cooperation.

Implementation of the management, the eight core processes. The eight processes are: (1) customer relationship management, (2) Customer service management, (3) demand management, (4) order fulfillment, (5) manufacturing process management, (6) supplier relationship management, (7) product development and product commercialization, (8) Recovery Management

Customer Relationship Management

Customer relationship management processes and how to develop and maintain customer relationship approach. Through this step, identification of key clients and management to customers and their business plans as part of the company. Purpose of their classification based on customer value, and by providing customers with specialized for different customers personalized service to enhance customer loyalty.

Customer Service Management

Customer Service Manager said the company's attitude to customers. This is a step in the customer relationship management products and services developed by the client group key step in the package. Customer service functions through contact such as manufacturing and logistics, to provide customers they want to know the date and product availability on the transport aspects of the real-time information. Customer service process also includes applications to help customers understand the product.

Demand Management

Customer demand management is a balanced demand and supply capabilities. In the right place by using the correct procedures, this management can have predictably match demand and supply and make plans more effectively. Must be noted that this process not only refers to prediction. It also includes coordination of supply and demand, increase flexibility, reduce volatility. Needs a good management system, using point of sale and understand key customer data to reduce uncertainty, and the whole supply chain should be effectively supported. It is also effective coordination of market demand and production planning.

Completed orders

Supply chain refers to the process not only issued orders for instruction, it also includes the definition of customer needs, design the network, minimizing distribution costs in the basis of a series of activities to meet customer demand. Its purpose is to build a company from a supplier to, and from companies of different clients seamless system.

Production process management

Production management, including production-related activities with the following acts: raw materials acquisition, production, management of production processes and supply chain of products shipped out of the factory. The purpose of this process is given time to produce the lowest possible cost of the product as much as possible. In order to achieve the desired production requirements, planning and implementation of supply chain participants on the need for cooperation.

Supplier Relationship Management

Supplier relationship management process with suppliers about how to establish and maintain friendly relations. Can be understood from the literal meaning, a process similar to the process and customer relationship management. In short, supplier relationship management is to define and manage products and services package.

Product development and product commercialization

Supply chain management is about the process and customers and suppliers to develop products and bring products to market. Responsible for product design and business process and CRM team should be in the team process to identify customers and needs, should be and the SRM process team to select materials and suppliers, and production management team in the process of the market needs to develop new product technology.

Recovery Management

Recycling management process, including recycling and management, reverse logistics, gate control-related activities, including management of supply chain processes to avoid recovery. Due to implementation of the recovery management is not only to effectively manage product flow in the inferior, but also do not expect there to reduce the number of recycling products and to reuse the box and the like, such as the availability 寰幆 Products section of use. Effective recovery management is an important step in the supply chain management, allowing companies to achieve sustained competitiveness.

Eight steps of supply chain management have it every step of the strategic and operational - in other words, means the company has established strategic and strategic management of these steps, operability refers to the implementation of these steps the company . We will be marketing, sales, finance, production, procurement, logistics and research and development team composed of representatives of a cooperative by the team to achieve their strategic significance. The team primarily at the strategic level to design supply chain whether these processes and to monitor the implementation of their completion. The team also need to distinguish between strategic partners is to integrate the company's supply chain in the past. Operability of each process is the managers of each function in the specific actions taken.







相关链接:



09 'happy to steal food' in 2010 what we steal?



Number one TV manufacturer TCL profit fell 51 percent



Shared Experience Of Domestic Boutique Foxmail 5.0 (multi-map)



VBScript DateDiff FUNCTION



OGM to AVI



How to create Firefox extensions of Jetpack



Report Basic Or VB Or VB DotNet



DivX to iPod



Vista 39 s problem is a question of money



Make YOUR boss appreciate you 10 tips



jsp, servlet talk about Chinese issues



Report Audio Video Tools



Hot Themes And Wallpaper



Taobao Alipay betrayal?



ASF TO MPG



Tuesday, September 14, 2010

Yum 2007 "Ten key words"



In 2007, China's garment industry, a year of profound change. Fast Fashion brands are the past have come in the past should not have come, H & M, C & A, UNIQLO, NEXT you own a site in Shanghai, accounting for good, Zara has already opened first played at Beijing, Hangzhou shop. Venture capital and acquisition of the apparel industry in 2007, also surging, such as Kappa 100 million U.S. dollars to buy 2007 World Player of the Grand Slam winner Kaka portrait 100 years, the world-famous brand Pierre Cardin by SASAC. Many domestic brands are all listed, such as the good news Bird, Belle and so on. In addition, the new model is also a concern in 2007 words. Whether PPG, or ITAT, are all in subversion of tradition and competition in the market up again.

Changes in the apparel industry so for the apparel field of information technology has brought great opportunities and challenges, opportunities and competition along with changes in market structure, technology-based IT management is more apparel companies pay attention to, the challenge is that these markets changes brought more individual needs and areas.

As a local clothing company leading the field of information technology, Yum in 2007 to strengthen the research on the industry, ongoing communication with the industry to continuously innovate and improve products, enhance customer service quality, which continue to maintain strong growth, an increase of 100 Sheng-time highs. Yum inventory development in 2007, we summarized the 10 key words.

The first word is "innovation" During the year, Yum company not only dare to innovate in products in the market the same creativity. Invoicing in the early release BS365 apparel products, and that "a dollar a day, manage Invoicing" so loud slogans, launched to the popularity of low-end market turmoil. Mobile POS products in the industry rise to an upsurge of terminal information, 9, animal husbandry, has been the king and other enterprises to conduct mobile shop on-line system.

The second word is "e" for e-commerce in 2007, Network Marketing as the industry popular model, Yum been developed after extensive research system based on BSERP BtoC system that sets ERP, call center, online direct three major feature in one, for the direct sales model to provide complete network system support, can also be carried out for the traditional network of direct sales apparel company to provide systems support.

The third word is "Integrity" Integrity is the fundamental Yum company's development projects. Huang Fei, general manager of Yum asked all employees to the company not only the integrity of colleagues in good faith, but also to the customers integrity, honesty partners. And stressed that "good faith" is the most Yum core values on which the development will forever guide our work behavior.

The fourth word is "service" in 2007 is Yum "service to upgrade the" in whole years, Yum has done a lot in improving customer service improvements, have developed a "service manual Starlink body", "service personnel standards manual "and other management manual, and uniform across the country to promote the implementation of Star Alliance institutions. In addition to the system, Yum based platform also spared no effort and investment to establish a national call center, Internet service platform put into use one after another, these measures greatly improved customer service quality.

The fifth word is "cooperation" with multiple partners, Yum-depth market and technical cooperation with Motorola in technology, market, extensive cooperation, at the end of the world's leading information technology companies in Hong Kong garment manufacturers MSC cooperation, joint efforts RFID garment manufacturing production management system widely adopted.

The sixth word is "terminal" 2007 "won in the end," Yum retail terminal solution means a national tour exhibition in Shanghai, Beijing, Shenzhen, Quanzhou, Hangzhou, Beijing and other cities, access to the industry repercussions. A lot of media coverage the event. In 2008 also planning in Wuhan, Zhuzhou, Guiyang, Urumqi, Wenzhou, Shenyang, Jinan, 12 cities held "win in the end" market activities.

Seventh word for "image" released in 2007, Yum Yum VI visual identity manual, which was designed delay 8 months, repeatedly revise and perfect the project specifications and the promotion of the Yum brand image, for the establishment of ERP industry laid the foundation for a strong brand.

The eighth word is "qualified" Yum in 2007 to become director unit of China National Garment Association, becoming the first area of information approved by China National Garment Association ERP vendors, this is of great significance, marking the Yum 8 years focused on the apparel industry, has been the industry agree. During the year, Yum also have access to "national high-tech certification" and other honors.

Ninth word for "education" Yum College in 2007 after another and Dalian Polytechnic University, Shaanxi Institute of the Arts apparel partnership, Yum ERP experiments have established centers, and officially start the Talent Training Programme, training for the Chinese apparel industry high-quality and high capacity personnel.

Tenth word for "channel" Yum channels in 2007 extended to more concentrated urban apparel industry, now Yum has more than 50 cities in the satellite joint institutions, and through various training and support ways of stars Alliance can develop into a set of marketing and service in one branch, as Yum market into a powerful force.







Recommended links:



real player FORMAT



qt BLACKBERRY



convert m4v to mpeg



Rmvb to dvd



Thursday, July 29, 2010

IM: Decisive Force's crowded



Currently, instant messaging has become the phone, fax, E-mail after one of the most important way of communication and exchange. Compared to more traditional means of communication, IM is no doubt in the communication, collaboration has a more convenient speed. However, inherent personal IM security, and poor management of many problems, making enterprises, government organizations and institutions such as the user sticks in the throat, thereby specifically for enterprise applications, enterprise instant messaging (EIM) demand is becoming strong.

According to statistics, in 2008 China's enterprise instant messaging market reached 22.36 million end-users, due to the global financial crisis, China's enterprise instant messaging market growth has slowed, relative to the full personal instant messaging and mobile instant messaging hot, Enterprise instant messaging is still going strong development.

Personalized personalized design configuration

Enterprise instant messaging products still in its infancy in China, whether Tencent's QQ, or Microsoft's MSN, Yahoo Messenger, to meet the business from the independent, free use of the demand point of view, these software are passive use for the enterprise. QQ's success lies in its people do not know the instant communication, when he "pager network" concept spread; MSN's growth is its strong entertainment purposes such software QQ under the present conditions, to provide an office relatively specialized for work use instant messaging software. However, with the use of QQ, MSN users increased, the further away from the needs of business users. How to avoid the use of IM at work of employees in private communication, instant messaging into the enterprise to become an important issue to be resolved? While most enterprise instant messaging software, has text, voice, video and other functions, also can file transfer and sharing, The software itself does not provide additional functionality to achieve the configuration of humanity?

Currently, businesses can have a good real-time communication system, as found a handy business secretary. However, the review of the current enterprise instant messaging market, the homogeneity of the instant messaging software abound, and enable enterprises to truly customize according to their own needs on demand, human development has very little real-time communication system.

Sectors of the business needs of a human custom, free to use rather than the passive use of the instant messaging system that allows companies to use to free from the passive configuration changes. Currently, there are already a small part of business needs software providers began to come to the front, they are trying to create a free and independent businesses, personalized configuration of the software environment. For example, King Abacus Software (www.eabax.com) the timely availability and real-time Shangwutong "BIM", is the current situation in this market a natural product. The software for the user to create a free and independent, stable and secure instant messaging software environment. Not only provides users exchange text, voice communication and mobile phone text messaging, file transfer and other diversified information-sharing, while also providing powerful plug-ins, users can customize news, weather, stock inquiries, search engines, office software learning software and other services. The same time, focus on product features and details of the human design. For example: server remote monitoring capabilities, to reflect the IT managers of human care.

Leading the trend of SaaS applications

As a professional enterprise instant messaging IM services must reflect the individual significant differences in instant messaging products. In the enterprise instant messaging market, Tencent RTX, Microsoft LCS, IBM Sametime and other products account for most market share, but LCS, Sametime non-localized products, corporate instant messaging product associated with the overall business system solutions and high, dependent , which also makes its product prices and higher total cost of ownership, while three types of products dearly. In addition, the deployment of the implementation of complex and serious impact on the development of their products. Therefore, the future of enterprise instant messaging product is not a simple technical issue, but an application problem.

Today, SaaS-based enterprise instant messaging application product lead times. SaaS applications for its simple, personalized, cheap, professional features, a management software development. As a corporate office platform-based enterprise instant messaging is so simple to implement, to meet individual needs, cost-effective, professional office rental model real-time platform. At the same time, some software vendors started to pay attention to changes in consumer and intended to introduce some products at any time to adjust to new market conditions. For example: the above-mentioned gold abacus software company (www.eabax.com) introduced the application of BIM is SaaS-based enterprise instant messaging tool, more promotional package for SMEs Internet services that integrate with existing business systems , enterprises are not required to pay network access and other computer hardware and the high cost of infrastructure, you can achieve regional office, cross-enterprise collaboration. The establishment of real-time collaborative work areas, to achieve the business collaboration without time and space. Striking is that BIM also features according to the enterprises themselves, create different dimensions of organizational structure; the same time a high degree of integration throughout the Golden Abacus e-commerce platform (www.72ec.com), may be synergistic business management of the supply chain companies in the whole e-commerce platform (www.72ec.com) in search of customers and suppliers of resources simultaneously saved in the BIM, the convenience of customers and suppliers with real-time business communication and improve the competitiveness of each product.

Platform development trend

With the accelerated development of the Internet, especially Internet applications this year for more in-depth development, enterprise IM platform functions as a more protruding. EIM new era not only has all the functions and features of personal IM, and more requests can be made available to enterprises in management, communication on the controllability, efficiency and flexibility, it is more than just chat and transfer files, but a communication service platform.

As a mature and comprehensive platform for enterprise instant messaging, instant messaging to reach a mature product quality, including the stability of large-scale use to support text, voice, video and other communication capabilities, with the IM platform features; and have a good platform of ideas and design, reflects the openness and good scalability characteristics, rich and standardized interfaces, and to open API interfaces. Such as gold abacus BIM will open a lot of interfaces, applications for the future connection of the various operational systems open the door.

Therefore, the future use of EIM as a unified enterprise business systems and unified messaging platform, the entrance portal will be a new concept.

In the market is huge, good industrial environment in China IM market, how to grasp the direction of investment, seize market opportunities, how to instant messaging in the enterprise market, grabbed the first cup of soup, all the software service provider is bound to one of the issues to consider .

From a competitive point of view, who can provide enterprises with the free independent, stable and secure instant messaging system, who can adopt new ideas, new model for enterprise instant messaging to provide personalized service, who is likely to become the winning enterprise instant messaging market persons.

From a market point of view, meet the needs of enterprise instant messaging software system, of course, is through the appropriate way to maximize the "liberation" business needs to meet the business needs on-demand and personalized products for the enterprise, the enterprise and efficiency of communication among staff, only then can we save business costs, provide efficiency. So integration is the instant messaging product development means necessary.

Of course, as more and more the appearance of instant messaging products and business heats up demand for instant messaging, enterprise instant messaging market will continue to develop ideas into products and services from a thoroughly experienced the baptism of the market from childishness to maturity. We believe that with the development of enterprise instant messaging technology, enterprise instant messaging system, users will also be changed using the previous model. The future, an open instant messaging system for the new office hub of the enterprise platform, with the popularization of network applications become a reality.







Recommended links:



Vertical Market Apps Shop



Mp3 to mp4



Dialog box for further study



Swf to flv



Unicom frankly difficult to govern without legal constraint SP is critical violations



Lists Dictionaries Education



Kingston NEW-MINISD impression



Five reasons for changing jobs frequently lead to UNIVERSITY graduates



Mp3 To 3g2



Why engage in career planning?



Risk leaving the Confused



BLACKBERRY format



Premier Education



God Used to measure BI



Sunday, July 25, 2010

IDS weaknesses and limitations (2)




1.2.5 Intrusion variant
1.2.5.1 HTTP attack variant
Repeat the directory separator ,'/'' into'//''銆?br />The current directory, '/ cgi-bin/phf''into the' / cgi-bin/./phf''.
Parent directory, '/ cgi-bin/phf''into the' / cgi-bin/xxx/../phf''.
URL encoding, '/ cgi-bin /''becomes'% 2fcgi-bin /''.
Use TAB instead of spaces and other separators.
NULL method, 'GET% 00/cgi-bin/phf''.
GET outside use other methods such as POST.
Change the parameters of the order, add the unwanted parameters.
For IIS, there are the following:
DOS / Win under the directory separator, '/ winnt/system32/cmd.exe''into the' / winntsystem32cmd.exe''.
Case conversion, such as cmd.exe into CMD.EXE.
IIS second decoder, such as cmd.exe into% 2563md.exe,% 25 and then decoded to decode% 63''%'', as''c''.
UNICODE encoding, such as cmd.exe into the% c0% 63md.exe. UNICODE encoding more complex because there are very few NIDS can decode it.

1.2.5.2 Telnet attack variant
Use the backspace key.
Using the Tab key for command padded.
Use Shell to execute attack code.
Using macros.
Add a useless argument.
In fact very difficult to detect those NIDS Telnet to connect to the server through the local after the attack.

1.2.6 TCP / IP protocol limitations
As TCP / IP design did not consider good security, so now IPV4 security is worrying, in addition to the above problems arising due to network structure, there are some limitations below.

1.2.6.1 IP fragmentation
Packet fragmentation, some NIDS can not restructure IP fragmentation, or more than its capacity, you can bypass the NIDS.
A maximum of 8192 IP datagram fragmentation, NIDS performance parameters of a reorganization shall be able to slice the largest number of IP.
NIDS every IP received a new IP datagram fragmentation when the fragment will start a restructuring process, after the reorganization is complete, or timeout (typically 15 seconds of overtime) Close this restructuring process, NIDS performance parameters of a shall simultaneously restructuring the number of IP packets.
An IP datagram maximum 64K, as ready to receive a IP datagram, NIDS will be ready enough memory to accommodate the upcoming follow-up fragments, NIDS performance parameters of a reorganization shall be to the largest IP datagram .
Combining above three parameters, namely, in the time-out time NIDS (for example 15 seconds) while preparing for maximum internal energy (for example, 64K) The number of IP datagram reorganization.
If the NIDS received packets over the limit, NIDS have packet loss, which occurred DoS attacks.

1.2.6.2 IP fragment overlap
IP packet fragmentation in the reorganization of the time, if met, then overlapping fragments, each operating system is not the same approach, for example, some systems will use the first received fragment (Windows and Solaris), some will be adopted after the closing to the slice (BSD and Linux), if the overlapping fragment of data is not the same thing, and NIDS approach is different with the protected host, it will lead to NIDS packet after the reorganization of the protected host and the packet is inconsistent, NIDS to bypass the detection.
For example, TCP or UDP can overlap the destination port, and then penetrate through most firewalls now, and may bypass the NIDS.
You can also overlap TCP flags, so that NIDS can not correctly detect the TCP FIN packet, so that NIDS soon to be able to simultaneously monitor the maximum number of TCP connections; to NIDS can not correctly detect TCP SYN packet, so that NIDS can not detect TCP connection due.

1.2.6.3 TCP segmentation
If the NIDS can not be re-TCP stream, you can bypass the TCP segmentation to NIDS.
Some unusual TCP segmentation will confuse some of NIDS.

1.2.6.4 TCP un-sync
Sent the wrong in the TCP sequence number, send the duplicate serial number, reverse the order to send such, it is possible to bypass the NIDS.

1.2.6.5 OOB
Attacker to send OOB data is protected if the host application can handle OOB, as NIDS can not predict the protected buffer when the host received OOB data in the number of normal, they may bypass the NIDS.
Some systems, when dealing with OOB will be the beginning of a byte of data discarded (such as Linux, the Apache, but IIS is not), then by sending in more than one TCP segment, including options with OOB TCP segment, then NIDS may lead to the data stream after the reorganization of the host and the protected application is inconsistent, and thus bypass the NIDS.

1.2.6.6 T / TCP
If the destination host can handle things TCP (currently very few systems support), an attacker can send transaction TCP, NIDS may not be protected with the host application on the same treatment, which may bypass the NIDS.

1.3 Resource and capacity constraints

The DoS attack against the NIDS 1.3.1.

1.3.1.1 the impact of high flow
Attacker to the protected network to send large amounts of data, more than NIDS processing power is limited, the situation of packet loss will occur, which may lead to acts of omission of the invasion.
NIDS network packet capture capabilities associated with a number of factors. For example, 1500 bytes in each packet case, NIDS will be over 100MB / s of processing power, even to more than 500MB / s of processing power, but if only 50 bytes per packet, 100MB / s of traffic means that 2 million package / s, most of which will exceed the current handling capacity of cards and switches.

1.3.1.2 IP fragmentation attacks
Attacker to the protected network to send a large number of IP fragments (such as TARGA3 attacks), more than NIDS IP fragments can be simultaneously restructuring capacity, leading technology through IP fragmentation attacks omitted.

1.3.1.3 TCP Connect Flooding
Attacker to create or simulate a large number of TCP connections (described by the above method of IP fragment overlap), while more than NIDS to monitor the maximum number of TCP connections, resulting in unnecessary TCP connection can not be monitored.

1.3.1.4 Alert Flooding
Attacker can detect the light of the rules posted on the network, while the attack would deliberately send a large number of alarm caused by NIDS data (such as stick attack), may exceed the speed NIDS to send alarm, resulting in omission, and to network received a large number of alarm, it is difficult to distinguish real attacks.
If you send 100 bytes can generate an alarm, you can generate per second through dial-up 50 police, 10M LAN can produce 10 thousand per second alarm.

1.3.1.5 Log Flooding
The attacker will send large amounts of data caused by NIDS alarms and eventually led to the space NIDS to be depleted Log, Log to delete the previous record.

1.3.2 RAM and hard drive limit
If the NIDS to improving the ability to process the IP fragments and TCP connection monitoring capabilities restructuring, which will require more memory to do the buffer, if the NIDS's memory allocation and management is not good, will the system cost a lot of exceptional circumstances memory, if the start using virtual memory, it will shake the memory may occur.
Hard drive speed is usually far less than the speed of the network, if the alarm system to produce a large number of records to the hard drive, will cost enormous amounts of system capacity, if the system records the original network data, save a large and high-speed network data will require expensive large-capacity RAID.

1.4 NIDS related to the vulnerability of the system
NIDS itself should have very high security, generally used for monitoring the network cards are not IP addresses, and other card will not open any ports. However, associated with the NIDS system may be attacked.

1.4.1 Console host of security vulnerabilities
Some systems have a separate console, if the attacker can control the console to the host computer, you can control the entire NIDS system.

1.4.2 Sensor and the vulnerability of the console communication
If the communication between sensors and the console may be attacked by a successful attack, will affect the normal use of the system. Such as conducting ARP deception or SYN_Flooding.
If the communication between sensors and console explicit communication or simply use encryption, you may be subject to IP spoofing or replay attacks.

1.4.3 and the system alarm and other equipment related to the vulnerability of communications
If an attacker can successfully attack the system alarm and other related equipment, such as mail servers and so on, will affect the alarm message is sent.

2 HIDS weaknesses and limitations

2.1 Resource constraints
As HIDS installed on protected hosts, so the resources can not be too much occupied, thus limiting the detection method used and the processing performance.

2.2 operating system limitations
Unlike NIDS, manufacturers can customize their own operating system, a sufficient security to ensure their own security NIDS, HIDS where the security of the host operating system under its security restrictions, if the host system is compromised, HIDS will soon be cleared. If the HIDS as stand-alone, it is basically not successful attack can only be detected if the HIDS for the sensor / control panel structure, will be faced with the same NIDS attack on the related systems.
Some HIDS will consider increasing the security of the operating system itself (such as LIDS).

2.3 System log limit
HIDS will monitor the system log to discover through the suspicious behavior, but some procedures are not sufficiently detailed system logs, or no logs. Some of the invasion would not in itself be a system log of the proceedings recorded.
If the system does not install third-party logging system, the system's own log system will soon be intruders or modified, and intrusion detection systems typically do not support third-party logging systems.
If there is no real-time inspection system HIDS log, then use automated tools to attack will be entirely possible to complete the inspection interval and clear of all the attack works in the system log traces.

2.4 The core of the system was modified to fool the paper check
If an intruder to modify the system core, you can fool a tool based on file consistency check. It's like the beginning of certain viruses, when they think that by the time of inspection or to track the original documents or data will be available to the inspection tool or tracking tool.

Detection limit of 2.5 Network
Some HIDS can check the network status, but will face many problems facing the NIDS.







相关链接:



Easy Hobby



BROWSER Tools for you



Wmv



Make A IPhunter



HP and Novell reach a new exclusive alliance agreement



Overcome stage fright interview the 10 candidates recruited nirvana



Ma, "New York Times" Published A Signed Article: Small Is Beautiful Because



Swf file



Simple Network Monitoring



Lei Jun Served Its Purpose, Soul Shine Jinshan



Own use A MVC Pager



For screen capture program with VC



How To Convert M4v To Mp4



Vob File



Learning Regular Expressions Entirely Manual: Getting Started Guide Rookie



Thursday, July 22, 2010

CSS box model



CSS box model

Web design is a rectangular box for each element. What is the exact size of the box calculated, see the following figure:






If the user then Firebug (basic and front end will use the Firebug bar - sugar with tomatoes), will be very familiar with the chart below the.

This chart shows the role very well on any box on the page value.






Note that the above two examples, margin is white. Margin rather special, it does not affect the size of the box itself, but it will affect and the other contents of the box, so margin a box model of an important part.

The size of the box itself is calculated:

Width width + padding-left + padding-right + border-left + border-right

Height height + padding-top + padding-bottom + border-top + border-bottom

Value is not the case statement

If you do not declare padding or border, that they or the value is zero (css reset when used), or as the default browser (it may not be zero, especially those who often do not have to reset the form elements)

The default width of the block-level boxes

If you do not declare the width and the box is static or relative positioning, the width will remain 100% width, padding and border will promote inward rather than outward expansion.

However, if you explicitly set the width of the box 100%, then the padding will extend outward.






The lesson here being that the default width of a box isn't really 100% but a less tangible "whatever is left". This is particularly valuable to know, since there are lots of circumstances where it is immensely useful to either set or not set a width.

Note that the default width of the box is not really 100%, but the rest of the possible values (should be said that the width of the remaining real - sugar with tomatoes). Should understand the special value, because in many cases, it is to set / not set the width is very useful.

The biggest problem I encountered is the textarea (text box) elements, and they need to set the width to the desired "cols" attribute, and can not contain child elements. It is often necessary to set textarea width defined as 100%, but padding, they will extend the textarea width. Fixed-width environment, usually set to the appropriate pixel width, but widens the situation not so lucky.

The width of the box without absolute positioning

Not set the width of the performance of the absolute positioning of the box a little bit different. They just need to fit the width of the content they contain can be. Therefore, if the box is only one word, the box will be like as wide as the performance of that word. If the two words into the box width will increase accordingly. The situation is going to box the width of the width to 100% of the parent element (the nearest relative positioning of the parent element or browser window), then it will fold line.






On the box, the vertical expansion to accommodate the content contained is natural. Surprising, not only in the performance of different platforms with different text, different browsers handle this issue, there are many quirks.






No width of the floating box

Absolute positioning with no width as the box's performance. The width of the box contained only extended to the width of the content until the width of its parent element (parent element is not necessarily the relative positioning). As these non-vulnerability of the width of the box, we have to learn is the key mission mode when they can not rely, as the overall page layout. If floating a use as a sidebar, and expect that the internal elements (eg images) to be responsible for the width of containing it, you're asking for trouble.

Inline element is a box

Here has focused on block-level element box. It is easy to imagine the block-level elements of the box, but also inline element boxes. They can think for very long, narrow rectangle, they can have the same box as the other margin, padding he border






It looks bad to exercise off some understanding. As shown in the left margin to push the right side of the box, but only the first line effective, because it is the starting point of the box. the normal application of padding in the text of the upper or lower part, when folded it will ignore the row above the row to row padding and high (line-height) required position as a starting point. Transparent background effect to make look better.

Witnessed what

Composition of the page to see each individual "box" it? Try this line of code into the style sheet for the time being:

* (

border: 1px solid red! important;

)










Recommended links:



Merry DVD Ripper Platinum



WorldCup Flash To PSP



Brief Firewall And Proxy Servers



Youtube FLV to Xvid Utility



EMC Q3 earnings results ANNOUNCED revenue fell 5.3% over the same period



Was BRILLIANT: Ten-man weapon crack revealed inside story of classical



free download mp4 to MPEG converter



mpg to WMV converter



mp4 to mpeg converter free download



For You Recreation



Multimedia effect is good, But not indiscriminate



Ts video format



Analysis of pros and cons Of discount promotions



Bill - Bill Gates retirement after pitching in a number of patent applications



Shuo-side by side with the day thinking up the computer "settle down"



Tuesday, July 6, 2010

AlltoDVD DVD to RMVB

AlltoDVD DVD to RMVB is the best RealMedia converter software. easy convert Real Media files(.rm, .rmvb) to AVI, MPEG-1, MPEG-2, VCD, SVCD, DVD files. convert RM/RMVB to AVI DIVX XVID MPEG VCD SVCD DVD and burn to DVD/CD. You can change the codec/system type to PAL or NTSC, and adjust the video size of the output files . It supports to convert almost all video, such as: RM to AVI, RM to DIVX XVID, RM to MPEG-1, RM to MPEG-2, RM to WMV, RM to VCD, RM to DVD, RM to PSP Video, iPod Video, Zune Video, iPhone Video...

Support convert AVI, Divx, ASF, WMV, WMA, MPEG, MOV, QT, RM, RMVB, file to MPEG with all encode format such as VCD PAL/NTSC, SVCD PAL/NTSC, DVD PAL/NTSC, MPEG-1 standard, MPEG-2 standard etc. Support convert AVI, Divx, ASF, WMV, WMA, MPEG, MOV, QT, RM, RMVB, file to AVI with all encode format such as DIVX, XVID, Mircosoft MPEG-4 etc.



Recommand Link:



VOB



free download mp4 to 3gp



Hope SVCD Convert



Free Download Converter Mp4 To 3gp



Delphi Shop



SoundTaxi Platinum New!



Youtube Video to Cell Phone Guide



Daniusoft Video to Nokia Converter



TUNEBITE Music & Audiobook DRM converter



Swift VCD CREATOR



Expert Help Tools



Apex Apple TV Video Converter Home



Christmas-Idea VOB to Pocket PC



Mts To Vob



BRIEF Science Education



Youtube FLV to iphone Value



X-CLONER DVD Editor



Sunday, June 27, 2010

Explosion MPEG to iPod

Explosion MPEG to iPod is a powerful video conversion program and easy-to-use MPEG to DVD iPod Zune iPhone Converter, easy convert MPEG to MPG, AVI, WMV, MP4, 3GP, MOV, RM, VCD, DVD, SVCD formats. also can support batch video files conversion of different video formats such as DVD AVI MPEG ASF MOV SWF at the same time. Besides, it also can support to burn VCD SVCD DVD. And best of all, it has a powerful video decompress/compress engine that convert whole MPEG movie to DVD in 30 minutes! Except for converting AVI to iPod Video and converting Video to iPod,it also supports converting among MPG, WMV, MP4, 3GP, MOV, RM, PSP Video, iPod Video, Zune Video, iPhone Video!



Recommand Link:



Hot Remote Computing



How DO I convert HD to Sony NWZ-E443K



Softstunt RM RMVB Converter



Articles about Desktop



Happiness CD RM to M4P Copying



Flv to 3gp



Cyber RM Converter



How-to Youtube Converter



HiFi WAV OGG Converter



Apps 3GP Video Converter



Zune To MP2 Guide



Report Hobby



Pavtube DVD Copy



ps3 VIDEO formats



DVD to Sony NWZ S544 download



Sunday, June 20, 2010

LasVegas Flash Converter


LasVegas Flash Converter is a All-in-One powerful tool. Convert all popular video and audio formats, swf or flv to video, such as avi, mpeg, 3gp, mp4, mov, it offers the solutions to problems that many other flash to video converting tools cannot solve, such as video and audio asynchronization, loss of frames, audio distortion, the process of alpha channel, and the process of both internal and external Flash video(flv). With the leading audio and video codec, LasVegas Flash Converter lets you easily and fully enjoy the original effects of your Flash files on your PC, iPod, PSP, Zune, iPhone, DVD players and other portable devices. In conclusion, with easy-to-use interface, fast converting speed, powerful functions.



Recommand Link:



Bluesea CD AAC WAV to CDA Recorder



Storage INVENTORY And Barcoding



Christmasgift DVD To IPod



Merry CDA CD-R M3U To AAC Backup



comparison Log Analysers



Articles About Art - Screen Savers



Amond 3GP Video Converter



Download video to Sony NWZ-E443 soft



X-Cloner DVD To MP4



M4P To PPC Backup



video to ZEN X-FI software



AaleSoft Mobile Video Converter



Youtube Video to QuickTime Help



Export Tfs Wi In Sharepoint Custom List



Thursday, May 27, 2010

Open DVD to FLV


Open DVD to FLV is a All-in-One powerful tool. Convert all popular video and audio formats to Youtube video, swf or flv to video, such as avi, mpeg, 3gp, mp4, mov, it offers the solutions to problems that many other flash to video converting tools cannot solve, such as video and audio asynchronization, loss of frames, audio distortion, the process of alpha channel, and the process of both internal and external Flash video(flv). With the leading audio and video codec, Open DVD to FLV lets you easily and fully enjoy the original effects of your Flash files on your PC, iPod, PSP, Zune, iPhone, DVD players and Youtube Video, Google video, Myspace Video. In conclusion, with easy-to-use interface, fast converting speed, powerful functions.



Recommand Link:



Ever AAC M4P To CD Editing



high quality shareware DOWNLOAD



Youtube Movie To Zune Mixer



Extra DVD COPY



Verysoft Mobile Video Converter



Directory Fax TOOLS



DVD-Audio OGG to Music



Super DVD Copying + Clone DVDS Suite



Youtube Movie To 3G2 Shareware



Hope VCD DAT Encode



Audio And Multimedia Storage



Uloysoft iPod Movie/Video Converter



New Vehicles - Screen Savers



Youtube Save + Player Home



Allok MOV Converter



Happiness MOV AOL Video MP4 Encode



Youtube MOVIE to Psion Help



Wednesday, May 26, 2010

Christmas-Idea MPEG to AVI

Christmas-Idea MPEG to AVI is a powerful video conversion program and easy-to-use MPEG to DVD iPod Zune iPhone Converter, easy convert MPEG to MPG, AVI, WMV, MP4, 3GP, MOV, RM, VCD, DVD, SVCD formats. also can support batch video files conversion of different video formats such as DVD AVI MPEG ASF MOV SWF at the same time. Besides, it also can support to burn VCD SVCD DVD. And best of all, it has a powerful video decompress/compress engine that convert whole MPEG movie to DVD in 30 minutes! Except for converting AVI to iPod Video and converting Video to iPod,it also supports converting among MPG, WMV, MP4, 3GP, MOV, RM, PSP Video, iPod Video, Zune Video, iPhone Video!



Recommand Link:



YOUTUBE Video to DVD Home



APE to M3U Player



Acala DVD Copy Ripper Bundle



cool PROGRAMS download site



Directory Graphic CAD



Youtube FLV to PS2 Live



Compilers And Interpreters Report



YOUTUBE FLV to Apple TV Home



SuperBurner DVD To MPG



Tansee iPod to PC Transfer 3.55



Open DVD to APPLE TV



QuickTime Converter



Compare Audio Players



Wednesday, May 12, 2010

Explosion DVD to 3GP

Explosion DVD to 3GP is an All-in-One solution to create Mobile Phone 3GP movies from DVDs, TV shows and downloaded videos. The software combines DVD to 3GP Converter and 3GP Video Converter in one package for discounted price. The software is easy to use. It features superb video audio quality and the fastest conversion techniques availabe on the market (Up to 3x faster).

Explosion DVD to 3GP easy converts all popular video formats such as AVI, DivX/Xvid, WMV, RM, MPG, MOV, MPEG (and many more) videos into Mobile Phone 3GP format. Watch movies on the road. Support all mobile phones with 3GP video capability. The software is very easy to use. It compresses a full lengh movie into small size which can be fitted in a 128MB memory card. Carry your movie theater on the go! Watch movies anywhere, anytime - a new life style.



Recommand Link:



LasVegas Wii Converter



application Software comparison



合文的家园



PPT2Flash Converter 2007



1st Lenogo DVD Movie To IPod Video Conve



Christmas-Idea DVD to AVI



Hot Video To PSP Converter Tools



韩的专栏



Youtube Converter + Player Ultra



Open AVI TO iPod



Merry CD WMA CD-R to Sound CREATOR



区的专栏



LasVegas Flash Converter



Coool Apple TV Suite Free Download



Happiness SWF Flash to DVD



Youtube Video to Cell Phone Popular



Tuesday, April 20, 2010

Christmasgift DVD Cloner


Christmasgift DVD Clone is a most popular powerful dvd movie clone software. It produces perfect copies every time, and does it quickly and efficiently. Video quality of copied discs is perfect, since there's no recompression or altering of the VOB files from the original disc. Christmasgift DVD Clone was designed to backup your precious DVD without any quality loss. backup you DVDs in 20 mins. Christmasgift DVD Clone comes complete with numerous customizable video/audio controls that can deliver the highest quality viewing and listening experience.

Christmasgift DVD Clone is Burn DVD Video Disc: you can duplicate the DVD or DVD disc which kept in DVD content folder to DVD disc,so that you can watch the DVD from a home DVD player. Duplicate DVD disc from a DVD disc directly, real 1:1 perfectly clone dvd. Copy DVD to the harddisk, so that you can edit or play the dvd from HDD, and burn it to the DVD disc later as a DVD video disc. Christmasgift DVD Clone offers feature-rich navigation controls, for a more interactive and tailored DVD experience. Christmasgift DVD Clone is guaranteed to deliver the highest quality and personalized DVD Copy experience possible on the PC today!



Recommand Link:



real player to mpeg4 codec



Monday, April 12, 2010

How-to MP4 Converter



How-to MP4 Converter is the best video to MP4 video software! This product converts all popular formats to iPod, PSP, Zune, iPhone, MP4 video/ movie, Easy Convert DVD, VCD, SVCD, AVI, MPEG, WMV, MOV, MP4, RM, RMVB, DivX, ASF, VOB, 3GP and etc. How-to MP4 Converter helps you watch your music videos and movies on your iPod, PSP, Zune, iPhone. In addition, you can also extracting audio from movie or music video and converting to iPod supported MP3 file format! How-to MP4 Converter is the fastest Rip DVD movie to iPod, PSP, Zune, iPhone, MP4 video, you can convert almost all kinds of DVD to MP44 format. Its conversion speed is far faster than real-time, converting one DVD movie only takes half an hour in some high-end computers. How-to MP4 Suite supports single-step conversion of DVD video into iPhone-ready MPEG-4 format while some other soft wares need two steps which wastes unnecessary time.



Recommand Link:



CHANGE wmv file type to ts



Thursday, April 1, 2010

SuperBurner AVI to MPEG


SuperBurner AVI to MPEG is a professional and easy-to-use AVI to iPod Zune iPhone Converter, convert AVI file to MPG, MPEG, WMV, MP4, 3GP, MOV, RM, VCD, DVD, SVCD, MPEG1/2/4 formats. also can support batch video files conversion of different video formats such as DVD AVI MPEG ASF MOV SWF at the same time. Besides, it also can support to burn VCD SVCD DVD. And best of all, it has a powerful video decompress/compress engine that convert whole AVI movie to DVD in 30 minutes! Except for converting AVI to iPod Video and converting Video to iPod,it also supports converting among MPG, WMV, MP4, 3GP, MOV, RM, PSP Video, iPod Video, Zune Video, iPhone Video!



Recommand Link:



change mp4 to ts extension



Wednesday, March 31, 2010

Lohan VOB to MPEG


Lohan VOB to MPEG is easy and fast DVD VOB to MPEG software with powerful and integrative functions. Easy convert VOB files to all popular video and audio formats with easy. It includes features of both VOB Ripper and VOB to Audio Ripper. With it, you can easily rip your VOB Files to all popular video formats such as AVI, MPEG, WMV, DivX, RM, MOV, MP4, 3GP, 3G2, Xvid, ASF, etc., and convert VOB to audio formats including MP3, WAV, WMA, AAC, AC3, M4A, MP2, OGG, etc. It can support many personal multimedia devices such as PSP, iPod, Zune, iPhone, PDA and MP4 player, with the fastest speed.



Recommand Link:



converting asf to mkv



Sunday, March 14, 2010

LasVegas VOB to MPEG


LasVegas VOB to MPEG is easy and fast DVD VOB to MPEG software with powerful and integrative functions. Easy convert VOB files to all popular video and audio formats with easy. It includes features of both VOB Ripper and VOB to Audio Ripper. With it, you can easily rip your VOB Files to all popular video formats such as AVI, MPEG, WMV, DivX, RM, MOV, MP4, 3GP, 3G2, Xvid, ASF, etc., and convert VOB to audio formats including MP3, WAV, WMA, AAC, AC3, M4A, MP2, OGG, etc. It can support many personal multimedia devices such as PSP, iPod, Zune, iPhone, PDA and MP4 player, with the fastest speed.



Recommand Link:



Change Tod Movie To H.263



Sunday, March 7, 2010

Lohan DVD Creator


Lohan DVD Creator is an easy-to-use and high speed All-in-One DVD creator and DVD burner. It can converts ALL formats of video files directly to DVD disk, including DivX, Xvid, AVI, MPEG, WMV, QuickTime, Real Video format, etc. With only a few clicks, you can convert your internet video collection to a DVD R/RW disk and then replay your collection on your home DVD player/car DVD player. Share your collection with your family, your friends on TV. It supports both NTSC and PAL TV standards. It supports both 4:3 TV and 16:9 widescreen TV. It already includes DVD encoder and DVD burner. You don't need any other software to make it work. The copied disc works well with most DVD player, being completely same as the DVD movie you bought. Now you can enjoy Hollywood film at home now!



Recommand Link:



CHANGE mp4 file type to mpeg



Tuesday, February 23, 2010

Happiness WMV to DVD


Happiness WMV to DVD fast convert WMV files to all popular video formats such as DVD, VCD, SVCD, AVI, MPEG, WMV, DivX, RM, MOV, MP4, 3GP, 3G2, Xvid, ASF, etc. easily, and convert DVD to audio formats including MP3, WAV, WMA, AAC, AC3, M4A, MP2, OGG, etc. It can support many personal multimedia devices such as PSP, iPod, Zune, iPhone, PDA and MP4 player.



Happiness WMV to DVD is powerful, easy to use DVD to WMV converter and DVD to WMA converter software which helps you rip and convert DVD to WMV video file formats or extract to WMA audio file formats with excellent quality.



Recommand Link:



Windows avchd to avi



Saturday, February 20, 2010

How-to MPEG Converter


How-to MPEG Converter is a powerful video conversion program and easy-to-use MPEG to DVD iPod Zune iPhone Converter. Convert MPEG to MPG, AVI, WMV, MP4, 3GP, MOV, RM, VCD, DVD, SVCD formats easily. It can support batch video files conversion of different video formats such as DVD AVI MPEG ASF MOV SWF at the same time. Besides, it also can burn VCD SVCD DVD. And best of all, it has a powerful video decompress/compress engine that convert whole MPEG movie to DVD in 30 minutes! Except for converting AVI to iPod Video and converting Video to iPod, it also supports convertion between MPG, WMV, MP4, 3GP, MOV, RM, PSP Video, iPod Video, Zune Video, iPhone Video!



Recommand Link:



Change Mkv To Ts Extension



Thursday, February 11, 2010

Open MPEG Converter


Open MPEG Converter is a powerful video conversion program and easy-to-use MPEG to DVD iPod Zune iPhone Converter, easy convert MPEG to MPG, AVI, WMV, MP4, 3GP, MOV, RM, VCD, DVD, SVCD formats. also can support batch video files conversion of different video formats such as DVD AVI MPEG ASF MOV SWF at the same time. Besides, it also can support to burn VCD SVCD DVD. And best of all, it has a powerful video decompress/compress engine that convert whole MPEG movie to DVD in 30 minutes! Except for converting AVI to iPod Video and converting Video to iPod,it also supports converting among MPG, WMV, MP4, 3GP, MOV, RM, PSP Video, iPod Video, Zune Video, iPhone Video!



Recommand Link:



converting M2TS to mov



Sunday, January 31, 2010

SuperBurner Flash to Blackberry


SuperBurner Flash to Blackberry is a professional video converter to convert Flash to Blackberry, and convert almost all popular video/movie formats to Blackberry MP4 format. The output iPhone MP4 video files can be played on your Blackberry. All popular video/movie formats are supported, including AVI, MPEG/MPG/DAT, WMV, ASF, MP4, M4V, 3GP, 3G2, H264, MPEG4, AVC, MOV, QT, DivX, XviD, VOB, FLV, etc. The amazing output quality with super fast conversion speed is brough you by the built-in power MPEG4 encoder. All the output iPhone MP4 videos fit your Blackberry.



Recommand Link:



Quickly Change Yuv To Google Video



Sunday, January 24, 2010

How-to Flash Converter



How-to Flash Converter is a All-in-One powerful tool. Convert all popular video and audio formats, swf or flv to video, such as avi, mpeg, 3gp, mp4, mov, it offers the solutions to problems that many other flash to video converting tools cannot solve, such as video and audio asynchronization, loss of frames, audio distortion, the process of alpha channel, and the process of both internal and external Flash video(flv). With the leading audio and video codec, How-to Flash Converter lets you easily and fully enjoy the original effects of your Flash files on your PC, iPod, PSP, Zune, iPhone, DVD players and other portable devices. In conclusion, with easy-to-use interface, fast converting speed, powerful functions.



Recommand Link:



quickly change yuv to google video



Monday, January 18, 2010

Perpetually MPEG MPEG4 Conversion


Perpetually MPEG MPEG4 Conversion fast convert WMV files to all popular video formats such as DVD, VCD, SVCD, AVI, MPEG, WMV, DivX, RM, MOV, MP4, 3GP, 3G2, Xvid, ASF, etc. easily, and convert DVD to audio formats including MP3, WAV, WMA, AAC, AC3, M4A, MP2, OGG, etc. It can support many personal multimedia devices such as PSP, iPod, Zune, iPhone, PDA and MP4 player.



Perpetually MPEG MPEG4 Conversion is powerful, easy to use DVD to WMV converter and DVD to WMA converter software which helps you rip and convert DVD to WMV video file formats or extract to WMA audio file formats with excellent quality.



Recommand Link:



jyxsheng