Monday, October 25, 2010

Quick Start Guide for new computer Trojan Avira Daquan



Often in the river walk, how can we avoid wet feet? So sometimes the Internet a long time, it is likely to be attacked by a Trojan in the computer kind. How to know the computer has not been installed on your system then?

First, manual methods

1, check the network connectivity

As the number of Trojans will take the initiative to the listening port, or will connect a specific IP and port, so we can connect to the network without the normal case, the situation with the situation by examining the network to discover the existence of Trojan horses. Specific steps is to click "Start" -> "Run" -> "cmd", then enter the command netstat-an to see all, and to connect their computers and their computer IP listening port, which contains four parts - proto (connection), local address (local connection address), foreign address (the address of local connection), state (current port status). For more information through this order, we can completely control the computer's network connections.

2, view the currently running services

Service is a lot of Trojans in the system used to maintain its always to be running one of the methods. We can click on the "Start" -> "Run" -> "cmd", then enter "net start" to see what kind of services the system is turned on, if we find the open service is not their own, we can enter " Services "management tool" Services ", find the appropriate service, stop and disable it.

3, check the system startup items

Because the registry is more complicated for the average user, Trojan horses often prefer to hide here. Check the registry startup entry is as follows: Click "Start" -> "Run" -> "regedit", then check HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersion of all to "run" at the beginning of the key; HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersion of all to "run" at the beginning of the key value; HKEY-USERS.DefaultSoftwareMicrosoftWindowsCurrentVersion of all to "run" at the beginning of the key.

System.ini Windows installation directory is hidden places like Trojans. Open this file to see if, in the file [boot] field, is not a shell = Explorer.exe file.exe such content, if any such content, it is the Trojans here file.exe it!

4, check the system account

Hi malicious attacker left an account on the computer way to control your computer. They used a system is to activate the default account, but rarely use the account and then upgrade the account administrator access permissions, the account will be the system's biggest security risk. Malicious attacker can arbitrarily control the account on your computer. In view of this situation, you can use these methods account for testing.

Click the "Start" -> "Run" -> "cmd", then enter the command line net user, see what the computer user, and then use "net user username" see what the user permissions are , General Administrator is the administrators group in addition to the other should not belong to administrators group, if you find a system built-in user belongs to administrators group, it is almost certain that you have been invaded. Quick to use "net user username / del" to delete the user it!

If you check out the existence of a Trojan can be killed by subsequent steps Trojan work.

1, run Task Manager, kill the Trojan process.

2, check the registry RUN, RUNSERVEICE and other items, the first backup, you can start the key note address, then delete the suspicious.

3, delete the key suspect in the implementation of the file on your hard drive.

4, the general of this document are in WINNT, SYSTEM, SYSTEM32 folder such, they generally will not exist, is likely to have a master copy files over, and check the C, D, E 绛?Pan no suspicious circumstances under of. exe,. com or. bat file, there are deleted.

5, check the registry HKEY_LOCAL_MACHINE and HKEY_CURRENT_USERSOFTWAREMicrosoftInternet ExplorerMain in several (eg, Local Page), if modified, can be changed back.

6, check HKEY_CLASSES_ROOTtxtfileshellopencommand and HKEY_CLASSES_ROOTtxtfileshell

opencommand several common file types, etc. The default open procedures were changed. This must be changed back. Many viruses is by modifying the. Txt files by default program for the virus in the user opens a text file loaded.

Second, use of tools

Avira Trojan tools are LockDown, The Clean, Trojan nemesis, Kingsoft Trojan specifically kill, trojan remove master, Trojans and other analysts, some of which tools, if you want to use all the features necessary to pay certain costs, Trojan analysts is license free use.







相关链接:



CMM assessment in China Suggestions



most common LAPTOP repairs amp their prices



DAT to MP4



MOD Converter



The new VPN strength



SEE this bigger than the SONY



Photoshop mouse painted illustration major combat (3): Draw Butterfly



Hot Standby knowledge



GPS positioning world



The backbone of retail business personal



Chemistry teachers and multimedia courseware



The Dell Notebook Battery Recall A Few Questions And Answers



MOD to MPG



Easy to use Server Applications



Catalogs Audio CD Players



My favorite XML Or CSS Tools



Best Server Applications



Friday, October 15, 2010

View open ports: Let Trojan True Features


Currently the most common Trojan is usually based on TCP / UDP protocol for client-side and server-side communication between, since the use of the two agreements will, inevitably, to the server-side (that is, the machine is kind of a Trojan horse was) open listening port to wait for the connection. For example, using the famous glaciers listen port is 7626, Back Orifice 2000 is the use of 54320 and so on. So, we can use the view of the machine open ports to check whether they have been kind of a Trojan horse or other hacker programs. The following is a detailed method description.

1. Windows itself comes with the netstat command

On the netstat command, we first look at windows help file description:

Netstat

Display protocol statistics and current TCP / IP network connection. This command is only installed TCP / IP protocol before they can use.

netstat [-a] [-e] [-n] [-s] [-p protocol] [-r] [interval]

Parameter

-A

Show all connections and listening ports. Server connection does not usually.

-E

Display Ethernet statistics. This parameter can be used in conjunction with the-s option.

-N

In digital format address and port number (instead of trying to find the name).

-S

Show the statistics for each protocol. By default, the display TCP, UDP, ICMP and IP statistics. -P option can be used to specify the default subset.

-P protocol

Protocol specified by the agreement shows the connection; protocol can be tcp or udp. If used in conjunction with the-s option to display statistics for each protocol, protocol can be tcp, udp, icmp, or ip.

-R

Display routing table contents.

interval

Re-display the selected statistics, pausing between each display interval seconds. Press CTRL + B to stop re-display statistics. If this parameter is omitted, netstat will print the current configuration information once.

Well, read the help file, we should understand to use the netstat command. Let us now study the current use, use this command to look at open ports on your machine. Access to the command line, use the netstat command of a and n are two parameters:

C:> netstat-an

Active Connections

Proto Local Address Foreign Address State
TCP 0.0.0.0:80 0.0.0.0:0 LISTENING
TCP 0.0.0.0:21 0.0.0.0:0 LISTENING
TCP 0.0.0.0:7626 0.0.0.0:0 LISTENING
UDP 0.0.0.0:445 0.0.0.0:0
UDP 0.0.0.0:1046 0.0.0.0:0
UDP 0.0.0.0:1047 0.0.0.0:0

Explain, Active Connections is the current active connection of the machine, Proto is the protocol used to connect the name, Local Address is the local computer's IP address and port number being used to connect, Foreign Address is connected to the port of the remote computer's IP address and port number, State is that the state of TCP connections, you can see three rows behind the listening port is UDP protocol, so there is no State that state. Look! My machine's 7626 port is already open, is listening to wait for connections, like this case very likely have been infected with the ice! Quickly disconnected from the network, killing the virus with anti-virus software is the right approach.




[Next]



2. Work under the command line in windows2000 tool fport

Using windows2000 friend than use windows9X lucky, because you can use fport this program to display open ports and process the native correspondence.

Fport is FoundStone produced a system to list all open TCP / IP and UDP ports, and their corresponding application's full path, PID logos, names and other information of the software process. Use the command line, see example:

D:> fport.exe
FPort v1.33 - TCP / IP Process to Port Mapper
Copyright 2000 by Foundstone, Inc.
http://www.foundstone.com

Pid Process Port Proto Path
748 tcpsvcs -> 7 TCP C: WINNTSystem32 tcpsvcs.exe
748 tcpsvcs -> 9 TCP C: WINNTSystem32tcpsvcs.exe
748 tcpsvcs -> 19 TCP C: WINNTSystem32tcpsvcs.exe
416 svchost -> 135 TCP C: WINNTsystem32svchost.exe

Is not readily seen. This time, what is the procedure in all ports open to all under the eyes of you. If there is a suspicious program opens a suspicious port, be sure not to the effect that Oh, maybe that is a sly Trojan Horse!

Fport the latest version is 2.0. In many sites available for download, but for safety reasons, of course, it is best to go home under: http://www.foundstone.com/knowledge/zips/fport.zip

3. Fport function with graphical interface tools like Active Ports

Active Ports produced as SmartLine, you can use to monitor the computer all open TCP / IP / UDP port, not only will you be shown all the ports, all ports are also shown where the path corresponding procedures, the local IP and remote IP (attempting to connect to your computer IP) whether it is activities.

Is not very intuitive? Even better, it also provides a closed port function, use it to find your horse in the open port, you can immediately shut down the port. The software work in Windows NT/2000/XP platforms. You can get it in http://www.smartline.ru/software/aports.zip.

In fact, users do not use windows xp with other software that can be correspondence between the port and the process, because the windows xp brought the netstat command more than the previous version of an O parameter, this parameter can be obtained using the port and the corresponding process years.

See above description of several local open ports, and the corresponding relationship between the port and process methods, these methods can be easily found based on TCP / UDP protocol Trojans hope that I can help you bring the love machine. But the emphasis on the Trojans against, and if the Trojans run into a rebound port, use the driver and dynamic link library technical production of a new Trojan horse, the above method is difficult to identify traces of a Trojan. Therefore, we must develop good surfing habits, do not run email attachments free, install a antivirus software, such as domestic Rising killing viruses and Trojan horses is a good helper. Download the software from the Internet first, again with antivirus software and re-use, open the network when the Internet firewall and virus real-time monitoring, to protect their machines are not hateful Trojan invasion.






Recommended links:



3G2 to MOV



Make a IPhunter



Hot Geography EDUCATION



Top Registry Tools



Unified Modeling Language UML Overview



Excellence comes from quality, three-dimensional INTERPRETATION PTC Shipbuilding



C + + / CLI object of speculation recorded the Object Layout



Any instrument cable digital tv in iptv



Feeling so steady and VB API (1)



INTRODUCTION Audio Presentation Tools



FrontPage easy to adjust inside the framework of the margins



M2TS to MKV



Precise, accurate, precise GIS successful in distant



News ABOUT Hobby



SWF to MP4



COREL KNOCKOUT matting examples Guide (6)



Wednesday, October 6, 2010

Zack Rusin interviewed the beauty and magic of KDE


This year's KDE World Summit (KDE World Summit, more well-known name is aKademy) at the University of Malaga in Spain, the conference is the most anticipated KDE developer Zack Rusin fascinating presentation "Beauty and Magic for KDE developers . " He has long been the main KDE developer, recently admitted to the Qt graphical user interface library of developer Trolltech, employ full-time developers. With the deepening of the meeting, participants heard more and more Zack will demonstrate the amazing visual effects. So a lot of the audience crowded in a lecture theater, the wait for this exciting presentation. But they are disappointed that speech to be delayed due to technical problems two days, we are anxious heart itching. Finally solved the problem, Zack made a whirlwind presentation on Unix / Linux graphical development status and future direction.

Zack during the meeting accepted the KDE organization's "comrades in arms with the trenches" Daniel Molkentin interview, detailing his KDE development.

1) Please briefly introduce myself.

Today, I and a friend whom I respect a conversation, he said I unique is that things can not become a reality. This is what I heard the most flattering words. So my self-description is: I can not let things become a real person.

2) Your company has recently entered the Trolltech, the concrete is done about it?

I Trolltech's job is to create something that others can only dream of. Of course, the main interest in computer graphics, but not limited to - research and development company has given me full freedom.

3) the contribution of your past X.org What?

Main is a new acceleration architecture Render and Exa. Render is a new rendering model for X, it has a shadow, translucent, font anti-aliasing capabilities.

4) Exa in aKademy Assembly into focus, you can specifically tell us?

Exa is based on the KAA (Kdrive Acceleration Architecture, KDrive accelerating structure) of the simplified acceleration architecture. KDrive Keith Packard is a modular X server implementation, KAA KDrive can get. And before the old XAA (XFree86 Acceleration Architecture, XFree86 acceleration architecture) different, Exa has been designed to speed up the XRender, it is small, simple, flexible, and allows X developers to create various special effects.

5) before and Exa graphics acceleration technology to accelerate XRender What's the difference?

XRender developed by Keith Packard's new rendering technology, before that X can only rely on very limited primitive. In order to catch up with development needs, now or in the client application, rendering, and not to use these primitives (they only had to render the image transmitted to the X server), or by XRender. Unfortunately, XAA is mainly used to accelerate those old and unused primitives. The Exa the new model-specific acceleration, will no longer bother the old primitive.

6) everyone can benefit from Exa it?

Yes. Of course the premise that their drivers to support Exa (We have transplanted most of the driver).

7) You use Xgl demonstrates an astounding results. Do you think Xgl have a future?

Yes, Xgl promising. This is our long-term solution. I'm still not finished Xegl because I have a lot of work. With OpenGV and some new plug-ins, OpenGL has become very attractive to all of our 2D solution to the problem.

8) Please tell us about Xgl and Xegl difference.

Xegl is an independent server, but need to run the Xgl X server to start (set the modeline option and processing input are the two most important aspects). They share the same graphics acceleration code, but Xgl the modeline and enter the settings to do the work to another X server, which provides the OpenGL graphics acceleration to determine Xegl test basis.

9) KDE's cube effect of more and more like Apple's OS X, is not inspired by OS X?

I want to clarify that cube effect designed by Dave Reveman, I do not want to claim credit. As for your question, my answer is: I hope not.

Optical design of special effects is easy, but easy to use yet beautiful design of special effects is difficult. Effect on the desktop design, the excellent design and poor design is but one step away, KDE 4's Plasma one of the biggest challenges is to weigh the tradeoff between the two.

If you just copy the design, we can not be the best. Innovation is not dead, Plasma is our answer. In KDE's history, designers, developers and usability experts together for the first time to conduct an organized development. Three teams working in parallel, so graphic design and usability will not be like other open source projects as well just have to wait until additional software design up. They are now the core of our development model components.

10) You work in X.org to when they could be completed?

The new X.org Render and Exa has entered the. The next step is Xgl, then Xegl. Until X.org 7.0 is completed, we will start Xgl and Xegl project.

11) Since the X11 launch, has been a long time. Upcoming X.org 7.0, in which aspects of the revolutionary?

It is the first modular version, so very special. Drivers and servers do not have to integrate, we will release the driver and server.

12) the user can get from the modular X.org What are the benefits?

They do not have to go to upgrade when upgrading drivers the server. Driver upgrade independently. X.org 7.0 will reduce the novice to the development of fear of X, users will experience a significant performance upgrade, which will attract many users to upgrade to X.org 7.0.

13) To take full advantage of the new X.org technology, Qt What adjustment do?

Qt for me is the driving force behind the scenes, while the applications and the desktop environment is the motivation to promote the development server. But the server itself is no fun at all, its only purpose is to meet the needs of desktop development. We have engaged in anti-this time around the relationship between the server hard at solving the problem, we are now back on track, innovation is our real work.

14) you X.org, Qt, KDE, and Linux's future expectations?

I want people to bold innovation - afraid of surprise, fear can not do. We now have sufficiently advanced technology, and only the best ideas. Therefore, on the meaningful exchange and designers.

Obviously, vector graphics will gradually become popular. Qt will support the SVG 1.2 standard, and at different levels make use of this standard (including animation support). At present most of the SVG icon themes are developed with, but for performance reasons are converted to PNG format. This situation will soon change, since the image will not render SVG slower than the raster image rendering.






Recommended links:



Easy Kids Education



EFFECTIVE process improvement method must contain the elements



2007, the Chinese simulation years



SWF to MPEG4



Britain invented the robot can be SWALLOWED pills belly detection of cancer



3GP To MOV



Chip PC industry suppliers and the Evolution of two-man



To work without selection, the PROBLEM you thought about it?



FLV to M4V



Wang Quanguo: To "King Kong" Solid As A Rock



Hot Browsers



OEE overall equipment efficiency



Good Text Or Document Editors



Introduction Animation Tools



what are the best batteries for A digital camera



Monday, September 27, 2010

Sina's brilliant and bleak: 5 CEO change



Sina May 9 released the first quarter of 2006, the unaudited financial statements, total revenue 46.7 million U.S. dollars; the same period the total revenue of 66.1 million U.S. dollars NetEase, TOM 4858 million, while Baidu's rapid growth as the industry praise highly. Frequent CEO turnover, weak growth performance, and the spread of the acquired information from time to time, it all seems to indicate that Sina "overweening" era upstarts in the attack of old friends drift away.
Risk Investment Sina big as the first site in Chinese

Sina Sina predecessor company was founded in late 1998, the SRS Information Technology Co., Ltd. and Hua Fang Yuan IT company merger. Among them, the four-way share 60% of the total profit side, SinaNet 40% of total shares. Lee Stone Chinese side is a professional software product development, sales and service joint venture company, by the Stone Group, "Chinese Star" inventor Wang Zhidong, and CCDOS inventor Yan Yuanchao was co-founded in December 1993.

Stone Libya in September 1997 successfully introduced three of Walden International Investment Group and other international high-tech venture capital firm, the implementation of international transformation, is the first to introduce risk investment mechanism and management of software companies in Silicon Valley. The introduction of venture capital, not only for the SINA provides the funds needed for development, but also introduced international advanced management concepts, Sina bigger brand for the future foundation, but also the dispersion of equity for the future foreshadowed.

Sina News of the success of the original sports Sharon Stone Libya site moderator, vice president of Sina, editor in chief Chen Tong inseparable. Early, Chen Tong recognized the Internet as a communication platform for sporting events, and other traditional media, compared with time-sensitive features. World Cup 1997 Top 10 race in Asia, Chen Tong through various means, to establish contacts with users in all arenas, through the various competitions around the correspondents to gather information, create a precedent for the webcast, so the number of visits increased substantially in the short term, the establishment of China's first soccer website status. In addition, the editorial team of some of Sina from the "China Youth Daily" and other traditional media, news sensitivities. Advantage team under the leadership of a high-quality news Sina important reason for success.

Sina's World Cup in France in 1998 to report on the blockbuster. After the Sina news center in the Kosovo war, the Taiwan earthquake, China's accession to WTO, the Sydney Olympic Games, "911" and other major events of the reports was a great success, firmly established in the global Chinese website Sina's powerful advantage.

The Sina Sina news by virtue of the strong sentiment to gather together, in one fell swoop became the first Chinese portal site, and successfully into the economy of this attention tremendous business value. First quarter of 2006, SINA net revenue 46.7 million U.S. dollars, of which advertising revenue 22.2 million U.S. dollars, net profit of seven million U.S. dollars, net profit margin as high as 15% on corporate accounts is to have 300 million U.S. dollars more in cash.

CEO for five years developing embarrassed

Sina CEO is not known from the 1999 sand Masaharu beginning to surgery, specializing in Lots of good dance Mao Daolin capital, prime retreat of Wang Yan, the financial background of Charles Chao, has been replaced within a short span of seven years had five. Meanwhile, the same dramatic change in the board of directors.瀵逛簬涓?釜骞存敹鍏ョ害涓や嚎缇庡厓鐨勪笂甯傚叕鍙革紝濡傛棰戠箒鐨勯珮绠″彉鍔紝浼间箮涓嶈兘瀹屽叏鐢ㄤ簰鑱旂綉鍙樺够鑾祴銆佽涓氱壒鎬х悍绻佸鏉傛潵瑙i噴锛屾洿涓嶈濡傛柊娴懀浜嬮暱娈垫案鍩烘墍瑷??杩欏緢姝e父鈥濄?

銆?浠籆EO鐜嬪織涓滅殑杈炶亴涓昏鏄洜涓猴細鍏徃鑲′环鎸佺画璧颁綆锛屼笌钁d簨浼氭矡閫氫笉鐣咃紝钁d簨浼氬煁鎬ㄧ帇蹇椾笢鎷夸笉鍑轰竴涓叿浣撶殑鍙墽琛岀殑璧㈠埄鏂规锛屼粠鑰屽鑷翠簡鐜嬪織涓滅殑绂诲紑銆備絾鏄紝鍊煎緱涓?彁鐨勬槸2000骞磋嚦2001骞达紝姝f槸涓浗浜掕仈缃戣涓氭场娌牬鐏湡锛屾暣涓涓氳偂浠峰浜庤蛋浣庣姸鎬併?鍏徃鑲′环鐨勬寔缁蛋浣庯紝骞朵笉鏄釜浣撴墍鑳介樆鎸$殑銆?br />
銆??鑰岀浜屼换CEO鑼呴亾涓寸鑱屽悓鏍锋槸涓氱哗娆犱匠锛氬湪鏂板叴涓氬姟涓婏紝鐢典俊澧炲?涓庡湪绾挎父鎴忥紝鏂版氮璧锋閮芥槸鏈?櫄鐨勶紝瀵艰嚧鏂版氮娌¤兘鍦ㄨ繖涓ゆ柟闈㈡湁鎵?缓鏍戯紱濮滀赴骞存浘褰撶潃鑼呴亾涓寸殑闈㈡嬁璧风數璇濓紝涓?釜涓?釜鍚戠鐞嗗眰寰佽鎰忚鏃讹紝闄や簡鎶?湳鎬荤洃涓ユ彺鏈濇病鏈夎〃鎬佸锛屽嚑涔庢墍鏈夌殑绠$悊灞傞兘鍋氬嚭浜嗏?鍊掕寘鈥濈殑琛ㄧず銆傛渶鍚庯紝钁d簨浼氫互鍥涚エ瀵逛笁绁ㄢ?鍚屾剰鈥濅簡鑼呴亾鏋楄緸鑱岀殑鍐冲畾銆?br />
銆??鑷充簬姹欢鐨勭洓骞撮殣閫?紝涓昏褰掔粨浜庝笉鏂鏀惰喘鐨勪紶闂诲拰涓氬姟涓嬫粦銆傝?鏂版氮2006骞翠竴瀛e害璐㈡姤鏄剧ず锛屽埄娑﹀悓姣斾笅璺?2%鐨勪簨瀹烇紝涔熶娇姹欢鐨勭寮?灏戝甫鏈変竴浜涒?寮曞拵鈥濈殑鎰忓懗銆?br />


銆?垬鐣ユ憞鎽嗕笉瀹?澶氬厓鍖栫瓥鐣ュ薄灞″彈鎸?br />
銆??CEO鐨勫彉鏇存墍瀵艰嚧鐨勪竴涓壇浜у搧锛屾槸鏂版氮鎴樼暐鐨勬憞鎽嗕笉瀹氥?鍥為【鏂版氮鐨勫彂灞曞彶锛氱帇蹇椾笢浣滀负鏂版氮鍓嶈韩鍥涢?鍒╂柟鍏徃鐨勫垱濮嬩汉銆佸叕鍙稿彂灞曞垵鏈熷綋瀹朵骇鍝佺殑鍙戞槑浜猴紝鍏跺彂灞曟垬鐣ヤ腑甯︽湁鏄庢樉鐨勬妧鏈鍚戙?鐒惰?锛岄殢鐫?帇蹇椾笢鐨勫嚭灞?紝鏂版氮閭d釜鎶?湳鑷充笂鐨勫勾浠d篃闅忎箣杩滃幓銆?br />
銆??浠ヨ祫鏈繍浣滆闀跨殑鑼呴亾涓?001骞?鏈堝湪涓婁换鏂版氮CEO涓嶄箙鍚庯紝渚垮紑濮嬩簡涓?郴鍒楃溂鑺辩辑涔辩殑骞惰喘琛屽姩锛屼緥濡傦紝璐叆闃冲厜鍗29%鐨勮偂浠界瓑锛屾剰鍥鹃?杩囪法濯掍綋鎴樼暐锛屾墦閫犲甯︽椂浠g殑缃戠粶闂ㄦ埛銆傚悎骞跺悗鍘熼槼鍏夋枃鍖栨?瑁併?鏃朵换鏂版氮钁d簨浼氳仈鍚堜富甯殑鍚村緛锛屼篃鏇捐笇韬囨弧蹇楀湴琛ㄧず锛屾柊娴槼鍏夋湭鏉ュ皢鍦ㄨ法濯掍綋閬撹矾涓婄户缁墠杩涖?

銆??鐒惰?锛屽浗鍐呭甯︾綉缁滃簲鐢ㄥ皻涓嶆櫙姘旂殑鐜扮姸鍜屽浗瀹剁殑绉嶇鏀跨瓥澹佸瀿锛屼娇鏂版氮鐨勮法濯掍綋鎴樼暐骞舵湭鑳藉彇寰楅鏈熸晥鏋溿?涓?勾鍚庯紝闃冲厜鍗鍚村緛杈炲幓鏂版氮钁d簨鍙婅仈甯富甯亴浣嶏紝鏍囧織鐫?柊娴法濯掍綋鎴樼暐鐨勫交搴曠粓缁撱?

銆??闅忓悗锛屾柊娴倓鎮勬壄杞簡鏂瑰悜锛岃浆鍚戜紒涓氭湇鍔″钩鍙伴鍩熴?2002骞?鏈?5鏃ワ紝鏂版氮瀹e竷杩涘叆浼佷笟淇℃伅鍖栨湇鍔¢鍩熴?鍚屽勾4鏈?鏃ワ紝鑼呴亾涓村湪缇庡浗瀹e竷浜嗘柊娴湭鏉ョ殑鍙戝睍鏂瑰悜銆傛柊娴綉鏇村悕涓烘柊娴紝涓嬭緰鏂版氮缃戯紙SINA.com锛夈?鏂版氮浼佷笟鏈嶅姟锛圫INA.net锛夈?鏂版氮鍦ㄧ嚎Sol锛?SINA Online锛夌瓑涓変釜鐙珛浜嬩笟浣撱?鍏朵腑锛屾柊娴綉鎻愪緵缃戠粶濯掍綋鍙婂ū涔愭湇鍔★紱鏂版氮浼佷笟鏈嶅姟鍒囧叆鏀垮簻銆佷紒涓氱殑鍏ㄩ潰鍖栫綉缁滄湇鍔¢鍩燂紝涓轰紒涓氭彁渚涘叏濂楃綉缁滆В鍐虫柟妗堬紱鏂版氮鐑嚎灏嗗湪绐勫甫銆佸甯︺?鏃犵嚎绛夐鍩燂紝鎺ㄥ嚭鏇村鍏ㄦ柊闈㈠悜缃戠粶鐢ㄦ埛鐨勫鍊间俊鎭湇鍔℃ā寮忋?

銆??鏂版氮鍒?003骞存敹鍏ヤ富瑕佷緷闈犳棤闄愬鍊兼湇鍔′笌骞垮憡銆傛豹寤跺嚭浠籆EO涔嬪悗锛屼竴鐩磋瘯鍥惧湪涓烘柊娴鎵炬柊闂讳笌鏃犵嚎涔嬪鐨勭涓夊彧瑙﹁銆傛豹寤舵浘杩欐牱鎻忕粯鏂版氮鐨勫彂灞曡剦缁滐細鈥滀互鍓嶏紝鏂版氮鏄竴涓妧鏈负瀵煎悜鐨勮蒋浠跺叕鍙革紝鐒跺悗杞瀷鎴愪互鍝佺墝鍜屽唴瀹逛负浼樺娍鐨勫叕鍙革紝鐜板湪瑕佽浆鍚戜互甯傚満闇?眰涓哄鍚戠殑甯傚満钀ラ攢闆嗗洟銆傗?鏂版氮2003骞村厛鏄甯冧笌闊╁浗缃戠粶娓告垙鍏徃NCSoft鎴愮珛鍚堣祫鍏徃锛屽悓骞村張閫氳繃鏀惰喘璐㈠瘜涔嬫梾杩涘叆鍦ㄧ嚎鏃呮父锛?004骞?鏈堬紝鏂版氮涓庨泤铏庡悎璧勬垚绔嬩竴鎷嶇綉锛岃繘鍏ョ數瀛愬晢鍔¢鍩燂紝鍏跺悗鍦?鏈堝甯冩敹璐璘C鍗虫椂閫氳鎶?湳骞冲彴銆傜劧鑰岋紝闄や簡UC鍙栧緱涓?畾鐨勫彂灞曚箣澶栵紝杩欎簺鏂颁笟鍔″潎鏈彇寰楁垚鍔熴?

銆??涓庢柊娴殑澶氬厓鍖栫瓥鐣ュ薄灞″彈鎸舰鎴愰矞鏄庡姣旂殑鏄紝杩戝勾鏉ワ紝缃戞槗銆乀OM銆佺櫨搴︾瓑缃戠珯閫氳繃宸紓鍖栥?涓撲笟鍖栫瓥鐣ワ紝鍙戝睍杩呴?锛屽闀跨ǔ瀹氥?
缃戞槗銆乀OM銆佺櫨搴︾殑鎴愬姛鏃犱笉寰楃泭浜庡涓?」涓氬姟鐨勪笓娉ㄤ笌鎴樼暐鐨勭ǔ瀹氥?缃戞槗鑷?003骞村皢鑷繁瀹氫綅涓衡?涓浗棰嗗厛鐨勪簰鑱旂綉鎶?湳銆佸湪绾挎父鎴忓拰鏃犵嚎澧炲?涓氬姟鎻愪緵鍟嗏?浠ユ潵锛屾棤绾垮鍊间竴鐩存槸缃戞槗閲嶈鐨勬敹鍏ユ潵婧愩?浣嗘槸浠?005骞寸涓夊搴﹀紑濮嬶紝缃戞槗璐㈡姤涓殑鍏徃瀹氫綅鍘绘帀浜嗏?鏃犵嚎澧炲?鈥濓紝鏀逛负鈥滀腑鍥介鍏堢殑浜掕仈缃戞妧鏈?鍦ㄧ嚎娓告垙鏈嶅姟鎻愪緵鍟嗏?銆傝繖鏍囧織鐫?綉鏄撴寮忓壊鑸嶆棤绾夸笟鍔★紝涓撴敞浜庢父鎴忋?绀惧尯銆傚浠婏紝缃戞槗80%鐨勬敹鍏ユ潵婧愪簬鍦ㄧ嚎娓告垙銆?br />
銆??铏界劧锛?005骞村垵涓ユ牸鐨勭洃绠$幆澧冨鍚勪釜缃戠珯鐨勬棤绾夸笟鍔′骇鐢熶簡涓嶅埄褰卞搷锛屼絾鏄疶OM浠嶈兘閫氳繃鏃犵嚎涓氬姟鐨勫闀夸繚鎸佹?钀ユ敹鐨勭ǔ瀹氬闀匡紝鍚屾牱婧愪簬涓撲笟鍖栫殑娣辫?銆傚氨鎷挎瓕鏇茬増鏉冩潵璇达紝TOM鐩墠宸茬粡寤虹珛璧疯嚜宸卞畬鍠勭殑鐗堟潈搴擄紝鎵?娇鐢ㄧ殑姣忎竴棣栨瓕閮芥湁涓変釜鐗堟潈鐘舵?鎶ュ憡锛屽寘鎷搩澹扮増鏉冦?姝屾洸鐗堟潈銆佸僵閾冪増鏉冦?

銆??鍙嶆敹璐潯娆捐缃垚鍙戝睍鐥囩粨

銆??浼撮殢鐫?珮绠″彉鍔ㄥ拰涓氱哗涓嶆尟锛屾柊娴偂涓滅粨鏋勪篃棰戦鍙戠敓闇囪崱銆傚厛鏄洓澶?005骞?鏈?9鏃ュ嚭鍏朵笉鎰忓湴瀹炴柦鏀惰喘锛屽皢19.5%鐨勮偂鏉冪撼鍏ュ泭涓紝涔嬪悗鏉ユ剰涓嶆槑鐨勫痉鍥戒汉Michael J.G. Gleissner涔颁笅浜?.4%鐨勮偂鏉冿紝鑰屽勾鍚庝笌TOM.com鐨勫悎骞朵篃鐢氬殻灏樹笂銆?br />
銆??鐩涘ぇ鍙婂叾鍏宠仈浼佷笟2005骞?鏈?9鏃ユ垚鍔熸敹璐簡鏂版氮19.5%鐨勮偂浠戒箣鍚庯紝鎴愪负鏂版氮鏈?ぇ鐨勮偂涓滐紝鐒惰?锛岀洓澶у嵈鑷充粖浠嶇劧缂哄腑钁d簨浼氥?鍏跺疄锛屾柊娴懀浜嬩細鍜岀鐞嗗眰浣滀负涓?釜鏁翠綋锛?005骞村垵鎬绘帶鍒惰偂鏈崰鏂版氮鎬昏偂鏈凡涓嶈冻10%銆傝繖鎰忓懗鐫?柊娴疄闄呬笂鏄敱鍗犲叾鑲′唤姣斾緥涓嶅埌10%鐨勮偂涓滆繘琛岀鐞嗐?

鎹?鍖楀ぇ鍟嗕笟璇勮銆嬪垎鏋愶紝闈㈠鐩涘ぇ鐨勬敹璐紝鏂版氮2005骞?鏈堝惎鐢ㄢ?姣掍父鈥濊鍒掞紝浠ラ樆鎸$洓澶х殑鎭舵剰鏀惰喘涓庢帶鍒躲?鏂版氮鍦ㄥ叕鍙哥珷绋嬩笂鍋氭枃绔狅紝鍒╃敤鍏徃绔犵▼涓煇浜涙潯娆剧殑瑙勫畾锛岄樆鍑绘敹璐柟杩涘叆钁d簨浼氾紝濡傚埄鐢ㄧ珷绋嬭缃懀浜嬫彁鍚嶆柟寮忋?璧勬牸瀹℃煡銆佷汉鏁伴檺鍒剁瓑闅滅銆傝繕鏈変汉鎸囷紝鏂版氮鍒╃敤钁d簨浼氳疆閫夊埗锛屾帶鍒剁洓澶ц繘鍏ユ柊娴殑钁d簨浜烘暟銆傞?杩囪缃洿鎹㈣懀浜嬬殑姣斾緥锛屽師鎺у埗浜哄彲淇濇寔鍦ㄨ懀浜嬩細鐨勪紭鍔垮湴浣嶃?鏀惰喘鏂硅櫧鍙栧緱鎺у埗鑲℃潈锛屼絾涓?椂涔熸棤娉曟煋鎸囪懀浜嬩細锛岄櫎闈炰慨鏀圭珷绋嬨?

銆??杩欐牱锛岀敱浜庢柊娴懀浜嬩細澶ц偂涓滈暱鏈熺己浣嶏紝涔熶娇寰楀叕鍙歌偂涓滅殑鍒╃泭鏃犳硶寰楀埌鏈夋晥淇濋殰銆備簬鏄紝鏄旀棩鐨勪腑鏂囩涓?獟浣撳湪缁忚繃涓冨勾鐨勬礂绀煎悗锛岃蛋杩囨様鏃ョ殑鑽h?鍜岃緣鐓岋紝鎷栫潃鏃犻檺鐣欐亱鐨勮剼姝ヨ蛋鍚戦化鐒剁殑鍓嶆柟銆?br />









相关链接:



Storage Astronomy



The "Page Setup" Come Right menu



IDC how to Charge only reasonable



ASF to MOV



MPG to 3GP



China's attitude towards certain of HL7



restore from network 3



Clear links in the production of hidden "oil tiger"



Comments Helpdesk And Remote PC



M2TS converter



Stan Shih: I would like to share my experience



Flash HIGHLIGHTS examples of forms produced (6)



Articles about Science - Screen Savers



Expert Gallery And Cataloging Tools



Make a transparent Background with Dreamweaver Flash



Sunday, September 19, 2010

Fun for your dealer



How to properly handle the relationship between manufacturers and distributors, manufacturers have been test marketing a new topic: To ensure the interests of manufacturers, too much interference on the dealer, dealer may walk out; If the dealer complete decentralization, and very easily by its restraint, loss of control of sale terminals. Smart companies should learn the following Fun distributor strategy to reach a mutually beneficial co-prosperity between the two relationships.

Do not spoil the dealer

A dealer doing pretty good from time to time to make this or that manufacturer's requirements, so that marketers often complain not chatter. Agreed to it, go back and do not know the boss's idea, not allow sales to decline in bonuses to bathing. Moreover, distributors for whatever things we are willing to go for the dealer to do, sometimes effort is not out to please.

Manufacturers and marketers want to give a word of advice: "customer is always right, but not every customer is required to do so for." This is to protect the interests of enterprises and maintain good customer relations and effective measure. Especially in the business before you and the customer reach, you should keep your hands permissions. You can solve some problems for customers, should not be too readily, or he will think that everything is justified. Let customers know that some of his demands is that you only realize after strenuous efforts, so customers would have the attitude of gratitude, that you not only brought him the opportunity to make money, you still continue to help him make money.

Manufacturers and dealers are in a boat, to coexist and Prosperity, will ultimately straighten and straighten out relations, policy formulation and dealer regulations, is to straighten out the relationship between the premise that this will achieve "first words after the indisputable" level. Of course, policy development, we must fully consider the other interests and spiritual motivation, and in the actual operation of the process to amend and improve, and gradually form a sound, scientific dealer policies to promote more long-term win-win. It should be remembered, do not spoil your dealer, the dealer has been spoiled all the time and you fell out, then big trouble.

First "villain" after the gentleman

Some marketers and customers because of good relations between the formation of a tacit understanding, or even most of the time verbal agreement, no written agreement on, causing a lot of unnecessary trouble.

"No rules no standards," under certain constraints, into the dealer policy is essential. Sales policy is to operate marketers an important basis for the organization, and this is the only way to sales success.

Our sales policy for the dealer, roughly the price policy and remittance policies, promotion policies, customer credit policies, in formulating policies according to the enterprise itself, combined with changes in the market to develop. Of course, the principles of policy development should have some flexibility, such as price, leave space, to ensure that the response to market changes. With the binding, the operation of all aspects of access, our company also placed them with healthy controls, under supervision, be possible to achieve better sales.

Do not blind to the dealer pressure

Always have a business idea, the dealer's sales tasks set too high, while the dealer wants the sale of businesses set to complete the task, the easier the better. In this confrontation, the company blind to the dealer pressure, results of non-performing dealers, and sell more and more interested in light, or the expense of business, because to re-develop a dealer and then not easy, but Moreover, there is a run-in period.







Recommended links:



Picked Source Editors



Optional memory must answer Three questions



Convert mpg to ipod



m2ts to mkv



E-cology In The Pan Micro Series 66



Useful time of THE class



Mov to vob



Mts to mpg



LUOYANG Office "Social Security" No need to run errands



Reviews Adventure And Roleplay



Three ANTI-MONOPOLY law enforcement departments, year introduced several new deal soon



Evaluate Java And JavaScript



IDC How To Charge Only Reasonable



Exchange links NEED special attention



Paladin 4 tips off Willow House maze



Thunder look at real-time on-demand player in the player to build pan-



Wednesday, August 4, 2010

Silicon Valley Women difficult to seek higher


Reference to the global hi-tech zone, non-Silicon Valley is it. However, the world's first Science and Technology Industrial Park, in the sex "campaign" was behind in other areas. According to Agence France-Presse reported 17 University of California, recently found that many companies in Silicon Valley, members of the Board only 6.5% of women, while only 8.8% of these women can occupy the highest position the company.

The survey sample of 400 turnover of more than 100 million U.S. dollars of the company. The survey, only 10.2% of women in leading positions in the company.

The 400 companies in 103, based in Silicon Valley. According to the survey data, high-tech jobs in the promotion of women below the average of other commercial districts in California.

Silicon Valley companies, the proportion of female board members is 6.5%, while the overall California average of 8.8%; Silicon Valley company's percentage of female executives was 8.8%, while the overall average was 11.7% in California.

But even in California, these figures are lower than the U.S. average. Based research institutions Catalyst2005 professional women conducted in the two survey results, Nationwide, 14.3% of board members are women, while women occupied 15.7% of the top positions.

Some well-known Silicon Valley companies have begun to change this trend, such as computer giant Hewlett-Packard and software maker Hyperion. The two companies each hold about 31% of women leadership positions. "EBay" eBay's board members, 19% are women. In addition, the company since 1998, is headed by a woman - Meg Whitman - into the glorious era.

"In the Silicon Valley's top companies are mostly high-tech industries such as semiconductors, electronics, and communications. The survey data, these enterprises Bulun is Danren 钁d簨浼?members or executives of the women, the proportion was lower than other companies." Survey sponsors Carter Linuoaili told AFP.

President of Women Entrepreneurs Association of State Christopher Smale that women in fact have strong leadership skills. She said: "Women have superb communication skills, superior intuition, and excellent negotiation skills; we are willing to work with intuition, we are 'multi-tasking' operating system."

Catalyst research survey implemented in 2004 seems to support Meyer's point of view of State. Survey shows that senior positions in the company to increase the number of women, usually lead to better financial results.

This view has also been head of Hyperion Godfrey Sullivan, the company's support, he told reporters: "In my experience, the board and executive team in the gender balance can lead to better business results. team should maintain an outstanding diversity, without diversity, you can not better understand and serve the global market. "






相关链接:



Details determine success or failure: Lean Production (4)



Murdoch questioned the portal model Chinese wife supervise operations MYSPACE



Matroska Video File



Little village with a computer



Convert mpg to mov



Convert mpeg to avi



Depth: "Anti" monopoly prove safety



FreeBSD Dnstracer command description



Wizard Art - Screen Savers



Evaluation Multimedia Creation Tools



jsp, servlet Talk about Chinese issues



To do with Akoff Music Composer MIDI music (2)



Demo write on the slide



GIS WORK?



Psp video converter



Wednesday, July 21, 2010

e-cology in the Pan Micro Series 4



Business from outside the portal: do not do similar activities in the national tour, but the pan-Micro online orders from all over

Unlike many traditional software companies spend a lot of money to do all kinds of exhibitions or in the vast scale of the national tour, Weaver has been expensive activity that is not matched by results, so no such pan-micro-activities but through electronically to the Pan-Micro's products send information to our potential customers where potential customers through the public gateway to the Pan-micro-micro-companies and self-understanding of the Pan-Pan Micro products: collaborative commerce system, and this is to ensure the market cost of Touru effectiveness, but also enable the public gateway to the Pan-micro-client is the real potential customers.

CRM module from the Pan-Micro customers in the statistics that 80% of pan-micro-client resources to their Web site: www.weaver.com.cn customers all over the country through micro-site about pan-pan, and pan-micro-micro-business synergies products, and through micro-site pan-related products submitted for trial, so that real-time transfer to the pan to use for micro-customer service staff portal, but the customer service log in the system, the system will be reminded to the new external website Client applications, it is our customers staff will apply for the first time to contact clients and send the pan-Micro Product details for more information about our products.

When the customer service staff has confirmed the accuracy of customer data for later transfer to the pan put the micro-processes related to sales account managers on hand, the same client manager access the system, the system will immediately remind the client manager and new customers need to follow up ... ... so we finished quickly collected from the needs of key customers to track the entire process and ensure that all of these processes on the system are recorded and later in the staff appraisal as the basis for the time.

So by e-cology, our micro-site on the pan-only is just a publicity platform, more importantly, let this site become an important source of functional micro-business.

Therefore, through the Pan-Pan-micro-micro collaborative commerce system (e-cology) set up a public portal for the pan to bring a large number of micro-business, colleagues, and the pan from the customer an open micro-contact, and this work into a more efficient electronic operation!







Recommended links:



PERPETUALLY MPEG to AVI RM RMVB



Ts files



Best Astronomy



Avc converter



IBN WMV TO Video



Ever CD-R RM AC3 to VQF CREATOR



AlltoDVD MPG Converter



Green Dam accused of violating intellectual property rights and violation of open-source Agreement



flv to mov CONVERTER



for you Cartoons - Screen Savers



avi to iphone



SuperBurner DAT to DVD



PERPETUALLY DVD SVCD VCD Editing