Thursday, October 21, 2010

By China's first EasyPoint62 NCR ATM order to facilitate


MANHASSET, NCR Corporation (NYSE: NCR) announced late last year in China just launched the latest EasyPoint62 convenient ATM, Minsheng Bank Shanghai Branch was the first order, and plans to be announced into the malls, supermarkets and other convenient places Minsheng Bank to help provide more convenience for consumers of financial self-service.

"Minsheng Bank Shanghai Branch continue to strengthen the self-service network, increase the self-service outlets, not only provide consumers with more convenient and efficient service, improve service quality, but also enhanced their competitiveness and increase the cross-bank transaction fees." Livelihood Bank Shanghai Branch, said the project leader. "Minsheng Bank Shanghai Branch of the latest reason why the selected NCR EasyPoint62 ATM, because ATM occupies an area this small, low cost of ownership, low energy consumption, the most advanced security features and ease of deployment, in particular, to make us put on cloth Some of Shanghai, to facilitate the establishment of low flow. "

"NCR has been an important supplier of Minsheng Bank, has long been providing a large number of Personas series ATM. We are very pleased to Minsheng Bank's ATM in the traditional cloth placed, add EasyPoint62 this convenient ATM, ATM to their cloth placed more strategically, to achieve better efficiency, while meeting consumer demand. "NCR Financial Solutions Division in the regional general manager of Hua Donghua Wang Xinhua said. "NCR EasyPoint62 convenient ATM is the technology transfer through the Scottish plant, a joint venture factory direct from Beijing R & D and production, interface design meets the requirements of Chinese consumers."

NCR's EasyPoint 62 runs in the Windows XP platform, using NCR's APTRA 鈩?software, the ATM can run a unified software platform, so EasyPonit 62 can be integrated with other network equipment to provide a consistent brand image and messaging. Particularly in security, EasyPoint62 keyboard in addition to encryption and support for each ATM remote download only key, but also using the latest fraud prevention technology with NCR readers and the money I, with enhanced safety performance.

NCR in November last year, the company commissioned AC Nielson in Beijing, Shanghai and Guangzhou three cities to conduct a survey showed that almost all consumers are very much like in hospitals, supermarkets, and more convenient locations laying ATM, which for their convenience. To facilitate the bank's future financial self-service trends. Minsheng Bank Shanghai Branch of the buying, greater self-help services, while further, more extensive for the next step in the development of more convenience Yinxing laying of Chenggong 缁忛獙.

"In the future, NCR will continue to use its advanced technology and extensive experience with domestic banks to develop convenient banking." Wang Xinhua said.






相关链接:



dell inspiron mini 12 intel atom Processor



Environmental regeneration of computer donations to needy students



Top Animation Tools



For the B / S structure, to understand the Point



Sold 250 million shares of Stone would definitely quit Sina Sina



Web Servers Wizard



MOV to MP4



Session of the value of the share in the JSP and Asp.net



OGM CONVERTER



Auto Attendant Computer Operator



Opera 8.01: Characteristics of a Surprise truck



The collective performance of PC giant slippery slope: Dell clutching straw



PRODUCTION activities yourself menu bar



SWF to MP4



Tuesday, October 5, 2010

CDP: Super snapshots - the ultimate ownership



From this article you can learn: the definition of two different CDP, each camp provides a firm and continuous data protection products and how the different snapshots.

Although continuous data protection (CDP) is a snapshot of the logical extension, but compare the two technologies have two questions. The first issue is the meaning of CDP is not yet determined; The second issue is CDP and snapshots of the current trend is the continuous integration. CDP provides a continuous, ongoing system of records stored in the state - an effective sustained continuously updated snapshot. And from time to time copies of data and storage data of different snapshots, CDP continued to capture and store data, save the changes in each store.

Many manufacturers offer a CDP product, but the characteristics of these products are different, they have differences about what is the CDP. Therefore, the storage administrator must study in detail each of these products and understand the features of the product manufacturer.

There are two definitions for the CDP, each definition has its corresponding supporters. The first camp by some mainstream, new and small CDP vendors, such as Mendocino Software and Revivio companies they think have a certain point in time reconstruction of the function is very important for the definition of CDP; The other camp, including Veritas, EMC company, that CDP is a snapshot with data replication function.

Revivio CDP is a typical small-company representatives. His product, called continuous protection system (CPS), the time when the data changes, the block-level data replication and data records to track when the time stamp was changed. When the reconstruction of the event trigger, the Storage Manager, select the specific event to reconstruct the data. Revivio system was rewritten by those who do not block data and block data altered the composition of the two together constitute the system's image. When the administrator verify that the image is correct when the application is usually run in the background to rebuild the system data. When reconstruction is complete, the system again to change back to the monitor and store the status block.

You might think CDP is actually a snapshot of a more mature features, and comes with a number of other features, such as from a certain point in time reconstruction of data. This is to CDP for many storage administrators are very attractive. However, CDP has some typical shortcomings. For example, it is not a snapshot, as different systems require different storage CDP and CDP applications require different.

Perhaps the greatest disadvantage for the CDP is that it is still a new thing, and a lot of things not yet conclusive. Perhaps in another 1 year to 2 years, we can expect the market to provide some more standard CDP products and features, and product data snapshot can be obtained from the CDP more features.







Recommended links:



3GP to MPEG



VOB to SWF



COMPARISON of windows and linux systems



FLV TO Zune



Thursday, September 23, 2010

How to promote sales will not die


For a long time, "not to die promotions, promotional court death", that is popular with the FMCG market, in particular, many manufacturers and distributors drinks beverages unit, which is enshrined as the law of the industry, perhaps to really taste the bitterness scared, and many drinks beverage distributors on the promotion is the love-hate relationship. Recently, I drink beverages on the market investigation, draw some conclusions of their own, only some reference.
How to promote sales will not die

Why promote sales will become dead?

First, the promoters erroneously narrow understanding of marketing to promote behavior led to the failure.

Many of the practitioners of the trade promotion in the understanding of the term, they often will simply be understood as "bargains", "buy a gift," "bundled sales" opportunities for all of the marketing practices all around such a theme. Is the concept of promotion is only limited to it? This is obviously not true. But if we just think this promotion is just for all N repetitions, businesses and consumers have no passion and interest in, promotions can only be reduced to "promote the dead."

In fact, before long, the industry's predecessors have long had a detailed marketing strategy and research division, summed up down roughly into the following eight:

1. For free promotion: refers to the target customers of charge as a promotional tool. It includes two forms:

A, free bonus - a "reward package" main. For example: buy a big bottle of liquor products gift bottle, washing powder regularly

"Adopted dosage does not increase," and so on.

B, free trial - "free sample" main. For example: paper towels, shampoo and other frequently used test issued the streets

Use.

2. Favors promotion: refers to the target customers to buy products in a kind of preferential treatment given promotions. For example: liquor in the season, usually using the "buy two get one free" form.

3. Discount promotions: refers to the target customers to buy products, given the price discounts of different forms of promotions.

For example: the cosmetics industry often uses the form of promotional discounts.

4. Contest promotions: refers to the use of people's Victory and curiosity, through the organization of interesting and intellectual competition, to attract target customers, as a promotional tool. For example: advertising language collection, logo design collection, essay contests, translation contest belong to such promotions.

5. Activities Promotion: refers to the product sales through the organization of related activities to attract more customer attention and participation in the promotions. For example: pulse, strength and other functional drinks running in the street dance competition held across the country and the other in basketball.

6. A win-win promotion: refers to two or more markets through joint promotion of the main ways to achieve mutual benefits of promotions. For example: a particular brand of ice tea drinks Lenovo mobile phone combined with a series of promotional activities.

7. Services Promotions: refers to protect customer interests and to provide a preferential service for customers and facilitate customers to buy and consumer promotions. For example: In the wedding wine, the number of manufacturers will offer free home delivery service.

8. Combined sales: refers to two or more together with the use of sales promotion in order to achieve more efficient marketing tool. Between a variety of promotions, there will be a variety of links to the form of two or more together to play a more unpredictable role.

If we start before the promotion, it is fully conscious of the various promotions, and then scan the current common market promotions and marketing competing products form, this then choose their own based on market conditions and targeted promotions, the effect will be more with less.

Second, choose marketing tactics simply imitate rivals when the market trend or simply follow the copy.

Said sales on the imitation, or may not say what the "black land", as a low-end liquor brands, "black land" can be swept across the North China market. The "black land" use the best marketing tactics is the "free bonus" gifts of course, is lighter. "Black land" swept the North, the number of brands to see the lighter, they will be a period of time was all the wine can be made out lighter, but also a new style of hard, quality problems are prominent. Consumers now look at their total weight of the drawer to a few kilograms lighter also urge you to such promotions? So manufacturers of promotional items has changed, send cars baskets, delivering newspapers, and the milkman ... ...

Is simple to follow suit and imitate it, and no new ideas can not form a segment of the competitive products, Moreover, the market probably has long been cash-strapped former plundered. Even if some update is a new name, does not address the substantive issues, consumers are still at the "promotion fatigue" in the state. Therefore, the promotion had nothing wrong, but by a man with too much lost its effectiveness.

Again, the role of the market over staff promotions worship, relaxation processes of other marketing efforts, no systematic marketing plan, leading to unstable factors in the price system and, ultimately, fall short.

Lots of times, a number of marketing personnel in accordance with market conditions, try to figure out consumer psychology, and carefully make a nice big promotion strategy. However, the problem emerged, promotion strategy is too successful, a large number of consumers are mobilized. Or buy a gift or discount, or store activities, etc., the whole market Gaode full swing, suddenly raised the awareness of products, sales also increased. Thus, promoters that the market has started, as long as the completion of this phase of the promotion, market position can be initially established. The result is that sales and normal sales period over period of no good, the prices of products consumers actually have been a psychological orientation, when sales return to normal when no one actually pays the bill was.

Overall, the role of promotion include: shortening the process of product market; encourage consumers to buy the first time, to achieve the purpose of use; encourage users to purchase, build consumer habits; increase sales; aggression with aggression competition; bring relevant product market ; festival rewards and other aspects. No matter how to see, promotions are just a small part of the marketing process, if the time from the beginning of the promotion on the high hopes, neglecting other aspects of the convergence of marketing, will form a top-heavy situation. The more exciting promotions, the situation is more dangerous, when the promotion ended, the problems will be followed, the result becomes promotions "to promote death."

How to avoid promoting or dead?

When we "promote death," because a series of analysis, the crux of the problem would clear up, as long as we pay attention to their daily work, "to promote death" avoidable tragedy, or at least not quite dead rush.

1, system understanding, the use of promotions, marketing strategies to achieve the systematic, flexibility and diversity, to enhance their promotional innovation.

Understanding of the promotion system in the form and function, this treatment can clear the market in each sales boom, on a variety of promotions for flexible combination of the use or application. As Tian Ji race, as most of their own need to change the composition of elements, but what the market can make the most appropriate combination of elements to adjust, just like carbon so that it can be several hundred dollars a ton of coal, also can be a few hundred dollars per carat of diamonds, their fundamental difference is only a combination of different components of it.

In addition, is innovation. In fact, innovation can also have two: First, innovation and new marketing methods, tactics and even philosophy; second way is to have the use of innovation. The former is of course very difficult, it is equivalent to opening a new development in their path, and since the moment of birth that can produce a qualitative leap. The second is more easily implemented, the key is giving top priority, as the liquor industry from the initial to the final machine to send the fire send U.S. dollars to send Xin Matai travel, regardless of the ultimate outcome, is finally a breakthrough and most valuable innovation is from this attempt produced.

Second, a correct understanding of the role of marketing, sales promotion means clear where the appropriate stage in the introduction of policies for promotion.

When we grasp the precise role and significance of marketing where the real will of course understand what kind of market launch stage of what kind of promotions. Morphine can be just as critical to help patients relieve pain, when to spend upset, but if the abuse is devastating human catastrophe. Therefore, understanding the full promotion, promotion of skilled grasp the different stages of the form and intensity in a better position to achieve the effectiveness of promotional behavior, but does not cause the situation to promote death.

Third, promotion is an active, aggressive market behavior, we should give full play to the operator's subjective initiative.

In the current FMCG market, more and more large stores embodiment of the superiority of its terminals, so the market position of large stores also gradually above the top suppliers. Every year, the store will be more competitive as a terminal or seasonal needs, holiday launch of a variety of factors such as large-scale promotional campaign, which usually makes such a promotional supplier in zero profits or negative profit situation. Faced with this situation is even more need for supplier sales representatives can fully play their own initiative, to plan for it ahead of time, such as the practice according to the store in advance to prepare for the market at the expense of non-mainstream products, or well in advance in the price of other remedial measures, which is a passive marketing as active attacks.

Fourth, do the normal sales promotion and linking.

Promotions always just one phase of market behavior, the reason why there are "promoting death" phenomenon also explains marketing itself showed double-edged sword form, while it can boost sales, but also to sacrifice a part of the profit or the product itself is the sacrifice of some invisible brand equity. Therefore, in order to avoid any marketing side effects, especially in new products, do a good job of promotion into normal and growth of sales prices and sales strategy, dealer strategy, promotional strategy and so need to have a good excessive and convergence. And this is often the cycle of market behavior, can converge properly, will be the guaranteed price system stability, a key selling as smooth.

5, appear to eliminate competitors targeted marketing strategies and market speculation there.

Not long ago I had seen such a message, a home appliance store in the local delivery of tens of thousands of promotional campaigns were actually being reported all the folders acquisition. Often before the instigation of some people there will be speculation rival dealers, promotional products on their own to "buy", and then took the opportunity to drop price of malice, causing the market price system instability. Although much of such things, but they are nothing but disaster can bring devastating, so had to prevent. To establish an effective market surveillance organization or necessary.






Recommended links:



Review Search Or Lookup Tools



company LOGO free 2



In SDH / SONET 155M on carrying IP packet solution



ASF To MPG



Wizard Religion



DivX to iPod



Xi Guohua, vice minister of MII: China's 3G licenses around Four factors



Storage Genealogy



China's Economy Remains To Be Seen Whether There Are Signs Of Rebound



National Copyright Administration Yan Xiaohong, deputy director of inspection Hao Chen CAD



Aspect-oriented (AOP) And Object-oriented (OOP) [3]



Calm "fixed monthly fee," such as: put off indefinitely



OGM to AVI



Hot Multimedia Creation Tools



Gateway Bank of China has become the odds



Invoicing "useful" is the real benefit



Thursday, September 16, 2010

e-cology in the Pan Micro Series 46



Each member has a clear pan-micro agenda: to help facilitate staff

Employees can know their work, whether that leadership has no time to go next week to meet, can easily understand the other at the same time do not have time tomorrow to help themselves to complete a task .... If you do not have a uniform time and task scheduling center

Basically impossible to accomplish these things.

Weaver defined the company's system, all employees must have a work plan provides that if there is no planning system can not generate the performance appraisal report, then there can be no bonus this month. So Weaver, all employees develop the plan in the e-cology habit of doing, because everyone has their own plans, so the company's personnel and coordination becomes a lot of effort.

As a subordinate, can only understand the timing of the immediate superior but can not know the specific matters; level class can see the correlation between the timing of the plan if it can be checked to see shared; superior to subordinate can learn not only the time distribution and can see all the specific issues.







Recommended links:



.avi to .mp4 converter



Premier Launchers And Task Managers



What Is Avchd



The New Second Generation Of New ID Card Readers



Mxf Converter



U.S. scientists trained computer "understand" the human brain



HD DVD supports Dolby TrueHD New Firmware



COMPARE Personal Interest



Enhance The Concept Of Active Intrusion Prevention IPS Is Not Speculation



Five-stroke input method is not just pole



IDC how to CHARGE only reasonable



CONVERT mkv to ps3



A Clear definition of the ITU IPTV IPTV in China will affect the direction



U.S. stocks comment: Sun die-hard



Fans paradise - watch the game with three arms PPMate



Wednesday, August 4, 2010

IPS detection and prevention simultaneously


IPS detection and prevention simultaneously

With vulnerabilities continue to be discovered, enterprise network security threats facing more and more complicated. But despite these attacks can bypass traditional firewalls, set in the network perimeter or internal network intrusion prevention system (IPS) can still effectively prevent these attacks, for those who did not add the patch or provide protection for poorly configured servers.

While intrusion detection systems (IDS) can monitor network traffic and alert, but it does not block attacks. The IPS is able to carefully check all data packets, and immediately determine whether to authorize or prohibit access. IPS has some filters that can prevent the system on various types of vulnerability to attack. When a new vulnerability was discovered, IPS will create a new filter, and incorporated under the jurisdiction of their own to test any of these vulnerabilities malicious attack attempt will be blocked immediately.

If an attacker using Layer 2 (MAC) to Layer 7 (application) of the weaknesses of intrusion, IPS can detect from the data stream and stop these attacks. Traditional firewalls can only Layer 3 or Layer 4 inspection, but can not detect the application layer content.



IPS packet processing engine is a professional custom integrated circuits, you can check each packet in a byte. In contrast, the firewall's packet filtering technology does not check for each byte and, therefore, can not find attacks. IPS device using filters on the data stream to inspect the entire contents. All data packets have been classified, each filter is responsible for analyzing the corresponding packets. Only by examining the packets can move on. Classification is based on packet header information, such as source IP address and destination IP address, port number and applications domain.

Each filter contains a set of rules, only to meet these rules will be recognized as packets do not contain malicious content. In order to ensure the accuracy of these rules is very broadly defined. Classify content in the transmission, the engine must refer to the information packet parameters, and their resolve to carry out a meaningful context of the domain. For example, in dealing with buffer overflow attacks, the engine gives an application layer in the buffer parameter, and then evaluate the characteristics used to detect the existence of attacks. In order to prevent the attack to reach targeted, in a data stream is identified as a malicious attack, is the data flow of all data packets will be discarded.

Detect weaknesses in the different mining system attacks, IPS require different filters. Some of the known characteristics of the attack or by attempts to match the form of filters to detect. As for other attacks such as buffer overflow attacks, IPS needs more complex filters. This complex filters can be used protocols and application-level decoder to set the rules. For "network clean" and "packet overflow" attacks such as multi-stream, IPS will need to filter the collection of statistical information to detect anomalies.

Filter engine combines water and large-scale parallel processing hardware, can also handle thousands of data packet filter inspection. Parallel processing ensures that packet filters can be continuously and as quickly through the system, not on the speed of impact. This hardware acceleration technology for the IPS is important, because the traditional software solutions must check one by one filter will result in greatly reduced system performance.

As a transparent device, intrusion prevention system is part of the network connection. In order to prevent the IPS as the weak link in the network performance, IPS needs to have excellent in redundancy and failover mechanisms, so that you can ensure that the network Zai failure can still be normal Yun Xing. In addition to being defensive front, IPS or network cleaning tool that can eliminate malformed packets and non-mission critical applications, so network bandwidth is protected. For example, IPS can block peer file sharing applications, the illegal transfer of copyright files.






Recommended links:



News About Hobby



windows 7 rmvb



PowerBuilder menu creation



Ten Rational Unified modeling elements [3]



Failure From shutdown trouble



Happy Dragon Boat Challenge embroidered non-mainstream "brown" to mobilize



Convert mp4 avi



mp3 to aac



.ape files



Specialist Benchmarking



Picked AUDIO Recorders



XHTML basic questions and answers - for beginners



Recommend Audio Recorders



IPTV will be better than "the right to license the Move"



Flex open source framework summary



Tuesday, July 27, 2010

XHTML basic questions and answers - for beginners


HTML language is a tool to create web pages, it appears from the developed to standardize the continuous improvement and more powerful. But there are still flaws and shortcomings, people still continued to improve it, make it more easy to control and have flexibility to adapt to changing network applications. The end of 2000, the International W3C (World Wide Web Consortium) organization issued a public version of XHTML 1.0, XHTML and HTML, XML any different from what it added new features to an initial understanding of today, let's look at XHTML.

XHTML 1.0 is a basis in the HTML 4.0 Optimization and improvement of the new language, aimed at XML-based applications. XHTML is an increased of HTML, its scalability and flexibility to accommodate future network applications demand more. The following are W3C's HTML Working Group Chairman Steven Pemberton answer basic questions about the common XHTML.

Q: What is XHTML?

A: XHTML is an XML and reinvented to adapt to the HTML. As XML is increasingly becoming a trend, the question arises: if we have the XML, we still need HTML? To answer this question, in May 1998 we had two days in San Francisco Kai's working meeting The conclusion is: Yes. We still need to use HTML. Because a lot of people have been accustomed to using HTML as their language, and has hundreds of millions of pages are written using HTML.

Q: Why is HTML 4.0 XHTML 1.0 is relatively independent development?

Answer: not the case. XHTML is HTML 4.0 is precisely the re-organization, (the exact it is HTML 4.01, is a modified version of HTML 4.0, XHTML 1.0 is just to name the issue.) XML in their interpretation will be some necessary differences, but others On the one hand, they are still very similar, we can work as XHTML is HTML 4.0 based on continuity.

Q: XHTML 1.0 How XML standards?

A: XHTML is a XML application. It uses XML, DTD file format definition, and run the system in support of XML. Here thanks to XML, Namespaces functionality, browser makers do not need to create a new private labels (tags), they only need to include in the XHTML code in XML code fragments, XHTML or XML code in the code fragment contains.

Q: XHTML 1.0 The main strengths?

Answer: XML is a web development trends, so people eager to join the trend of XML. Use XHTML 1.0, as long as you carefully follow some simple rules, you can design a system both for XML, but also most of the HTML for the current browser page. This means is that you can use immediately design XML, without having to wait until people are used to support XML browser. The guidelines allow web smooth transition to XML.

Another advantage of using XHTML is: it is very tight. The current network situation shocking bad HTML, the early HTML browser to accept private label, so people in page design must be used after the detection of a variety of browser pages to see if compatible, there are many unexplained differences People have to modify the design to adapt to a different browser.

Using XML we can re-establish the system of joint use of the browser manufacturers, "a strict standard error defense", if the XML code is not compatible, the browser refused to display the page, so the design must be revised before the release of each error.

Q: Using XHTML, and HTML page designers will face the same browser compatibility problem?

A: I hope not. "Stringent standard error defense" will help the browser to respond to the same code, XML's namespaces feature allows you to increase your own new label without requiring special browser support. Now we need to be assured of is that: all browser developers to fully comply with our agreement and the development of CSS. Write to your browser manufacturer, told the CSS specification you need, you can even detect if the browser is to follow your design.

Q: XHTML is very difficult to learn?

A: Not at all!

Q: Who can design using XHTML 1.0?

A: Because XHTML is very simple and easy to implement, so any people who will use the HTML can be easy to use XHTML. When using the XML browser on it increasingly more and more work will be recommended to use XML, then Hussein may have to use XHTML.

Q: When XHTML Web site popular?

A: Good question. I've seen some sites built using XHTML, even in XHTML 1.0 release before. I believe it will be a big development, because it is too easy.

Q: How do we convert existing HTMl XHTML?

A: Very simple, because they are very similar. In the W3C (www.w3c.org) site has an open source code (open-source) software called HTML Tidy, can help you direct conversion.

Q: XHTML What about the future?

A: XHTML1.0 just the first step in this new HTML language. The new version will not have backwards compatibility with older browsers constraints, can have more space for development.

First, we will conduct a thorough cleaning, remove the HTML 4.0 elements are not compatible.

Secondly, we will XHTML modular, allowing people to use XHTML in XML application module (such as tables), to reduce duplication of development. Also allows developers to design special purpose, such as telephony applications, so long as belonging to a subset of XHTML can be compatible, people can create their own HTML.

Finally, in addressing the demand side, we will develop more of the form (Forms) feature that allows the client to perform more testing, to reduce the client - server network information transmission. In short, the more exciting features will be realized.






Recommended links:



Kunlun Hotel Liaocheng use Maxima



New worm Floodnet (cute) little files



Swf to flv



how to convert flv to 3gp



China Anti-Fraud Alliance in the fight should not be a person



With "color" to discuss and beauty attack "light"



"Random eight-digit" Beware OF your U disk



ILM concept Of competing



Compare Themes And Wallpaper



Kids Education INTRODUCTION



Lei Jun Served Its Purpose, Soul Shine Jinshan



Backup And Restore Directory



Launchers And Task Managers Wizard



M4a To M4r



CONVERT mkv



Monday, July 12, 2010

Eight high-risk incident response IDS


The author currently exist for the more serious vulnerabilities, security monitoring abnormal attacks eight high-risk events, the corresponding solutions to ensure that the intrusion detection system (IDS) to better play.

1. Microsoft Windows Messenger Service Remote Heap Overflow Vulnerability

Microsoft Windows XP, Windows NT, Windows ME, Windows 9X, Windows 2000, Windows 2003, etc. Almost all Windows operating systems are affected by this vulnerability. Windows Messenger service for server and client send each other a number of short messages. Microsoft Windows Messenger Service heap overflow issue exists, a remote attacker could exploit this vulnerability to system privileges on the target machine to execute arbitrary commands. Problems exist in the Messenger service program search-by-name function, the attacker to submit a specific sequence of strings to this function may cause heap overflow, well-constructed data may be submitted to the system privileges on the target machine to execute arbitrary commands. Submitted through the NetBIOS or RPC message to the messaging service, so you can close NETBIOS ports (137-139) and the use of UDP broadcast packet filtering firewall to block such messages.

Proposal

Temporary Solution: If you can not immediately install patches or upgrades, recommends the following measures to reduce the threat:

鈼?firewall or personal firewall at the border can not be trusted host access on the Prohibition of NETBIOS, and RPC ports 135,137,139 (TCP / UDP);

鈼?Disable the Messenger service. Open the "Start" (or open the "Settings") Click "Control Panel", then double-click "Administrative Tools", double-click "Services", locate and double-click "Messenger", in the "Startup Type" drop-down box choose "has been Disable ", then click" Stop ", then click" OK. "

Permanent solution: play system security bulletin MS03-043 patch.

2. Windows Exchange Server Remote Buffer Overflow Vulnerability

Windows 2000, Windows XP, Windows NT will be affected by this vulnerability. Microsoft Exchange Server is a Microsoft developed the mail service program. Exchange Server 2.5 and 2000 requests for malicious verb lack of adequate processing, remote attacker could exploit this vulnerability to Exchange Server process privileges to execute arbitrary commands on the system. Exchange Server 5.5涓湪Internet閭欢鏈嶅姟涓瓨鍦ㄤ竴涓畨鍏ㄩ棶棰橈紝鍏佽鏈獙璇佺敤鎴疯繛鎺xchange Server鐨凷MTP绔彛锛屽彂閫佺壒娈婃瀯寤虹殑鎵╁睍verb璇锋眰锛屽鑷村垎閰嶄竴涓秴澶у唴瀛橈紝杩欏彲鑳戒娇Internet閭欢鏈嶅姟鍏抽棴鎴栬?浣挎湇鍔″仠姝㈠搷搴斻?鍦‥xchange 2000 Server涓悓鏍峰瓨鍦ㄨ繖涓棶棰橈紝杩欑璇锋眰鍙紩璧风被浼糆xchange Server 5.5鐨勬嫆缁濇湇鍔°?鍙﹀濡傛灉鏀诲嚮鑰呯簿蹇冩瀯寤烘彁浜ゆ暟鎹紝鍙兘浠xchange Server杩涚▼鏉冮檺鍦ㄧ郴缁熶笂鎵ц浠绘剰鎸囦护銆?br />
Proposal

涓存椂瑙e喅鏂规硶锛?br />
鈼?鐢⊿MTP鍗忚妫?祴杩囨护SMTP鍗忚鎵╁睍锛?br />
鈼?浣跨敤闃茬伀澧欓檺鍒禨MTP鐨勪娇鐢紱

鈼?鍙帴鏀堕獙璇佽繃鐨凷MTP浼氳瘽锛岄?杩囦娇鐢⊿MTP AUTH鍛戒护闄愬埗鍙帴鏀堕獙璇佽繃鐨勪細璇濄?

姘镐箙瑙e喅鍔炴硶锛氭墦绯荤粺琛ヤ竵銆?br />
3. Microsoft MSN Messenger杩滅▼淇℃伅娉勯湶婕忔礊

Microsoft MSN Messenger Service浼氬彈姝ゆ紡娲炲奖鍝嶃? MSN Messenger鍦ㄥ鐞嗘枃浠惰姹傛椂瀛樺湪瀹夊叏闂锛岃繙绋嬫敾鍑昏?鍙互鍒╃敤杩欎釜婕忔礊鑾峰緱绯荤粺涓枃浠跺唴瀹广?鏀诲嚮鑰呭彲浠ュ彂閫佺壒娈婃瀯寤虹殑鏂囦欢璇锋眰杩炴帴杩愯MSN Messenger鐨勭敤鎴锋潵瑙﹀彂姝ゆ紡娲烇紝鎴愬姛鍒╃敤姝ゆ紡娲烇紝鏀诲嚮鑰呭彲浠ュ湪娌℃湁鐢ㄦ埛鐭ユ檽涓嬫煡鐪嬬‖鐩樹笂鏂囦欢鍐呭銆備笉杩囨敾鍑昏?蹇呴』鐭ラ亾鏂囦欢鍦ㄧ郴缁熶笂鐨勪綅缃?

Proposal

涓存椂瑙e喅鏂规硶锛氬缓璁噰鍙栦娇鐢ㄩ槻鐏杩囨护7007鍜?008绔彛浠ラ檷浣庡▉鑳併?

姘镐箙瑙e喅鍔炴硶锛氭墦绯荤粺瀹夊叏鍏憡MS04-010鐩稿簲鐨勮ˉ涓併?

4. Windows Help鍜孲upport Center杩滅▼缂撳啿鍖烘孩鍑烘紡娲?br />
Windows XP銆乄indows 2000銆乄indows 2003銆乄indows NT浼氬彈姝ゆ紡娲炲奖鍝嶃?

Proposal

涓存椂瑙e喅鏂规硶锛氬彇娑圚CP鍗忚鐨勬敞鍐岋紝鍒犻櫎HKEY_CLASSES_ROOTHCP娉ㄥ唽琛ㄩ敭鍊煎彲鍙栨秷HCP鍗忚鐨勬敞鍐屻?

姘镐箙瑙e喅鍔炴硶锛氭墦寰蒋MS03-044鍏憡鐩稿簲鐨勮ˉ涓併?

5. Netscreen杩滅▼鎷掔粷鏈嶅姟鏀诲嚮婕忔礊

NetScreen ScreenOS浼氬彈姝ゆ紡娲炲奖鍝嶃?Netscreen鏄竴娆惧鐞嗛槻鐏瀹夊叏瑙e喅鏂规锛屽疄鐜扮嚎閫熸暟鎹寘澶勭悊鑳藉姏銆侼etscreen瀛樺湪SSH1 CRC32鐩稿叧闂锛岃繙绋嬫敾鍑昏?鍙互鍒╃敤杩欎釜婕忔礊杩涜鎷掔粷鏈嶅姟鏀诲嚮銆傞粯璁etscreen涓嶅惎鐢⊿SH锛孨etscreen涔熶笉榧撳姳瀹㈡埛浣跨敤SSH鏈嶅姟锛屼絾鏄湪GUI涓彲浠ヨ缃娇鐢⊿SH鏈嶅姟锛屼笉杩囪繖涓湇鍔″彧寮?惎鍦ㄥ彲淇℃帴鍙d腑锛岄櫎闈炲鍔犺鍒欒浆鍙戜俊鎭埌鍏朵粬鎺ュ彛/绔彛涓?濡傛灉Netscreen寮?惎浜嗚繖涓猄SH鏈嶅姟锛屽氨瀛樺湪鎷掔粷鏈嶅姟鏀诲嚮鏉′欢銆傝緝鏂扮増鏈殑ssh1瀹堟姢绋嬪簭涓墍甯︾殑涓?浠g爜涓瓨鍦ㄤ竴涓暣鏁版孩鍑洪棶棰樸?闂鍑哄湪deattack.c锛岀敱浜庡湪detect_attack()鍑芥暟涓敊璇湴灏嗕竴涓?6浣嶇殑鏃犵鍙峰彉閲忓綋鎴愪簡32浣嶅彉閲忔潵浣跨敤锛屽鑷磋〃绱㈠紩婧㈠嚭闂銆傝繖灏嗗厑璁镐竴涓敾鍑昏?瑕嗙洊鍐呭瓨涓殑浠绘剰浣嶇疆鐨勫唴瀹癸紝鏀诲嚮鑰呭彲鑳借繙绋嬭幏鍙杛oot鏉冮檺銆傚埄鐢ㄤ换浣曠浉鍏矯RC32婕忔礊鐨勬敾鍑讳唬鐮侊紝閮藉彲浠ュ鑷磋澶囧穿婧冿紝闇?閲嶆柊鍚姩鎵嶈兘鎭㈠姝e父鍔熻兘銆備絾鏄疦etscreen鍝嶅簲璁や负杩欎釜鎷掔粷鏈嶅姟涓嶆槸鐢变簬CRC32婕忔礊闂寮曡捣鐨勶紝涓嶈繃CRC32婕忔礊鐨勬敾鍑讳唬鐮佸彲浠ュ鑷存嫆缁濇湇鍔°?

Proposal

涓存椂瑙e喅鏂规硶锛氬缓璁殏鏃朵笉浣跨敤SSH鏈嶅姟浠ラ檷浣庡▉鑳併?

姘镐箙瑙e喅鍔炴硶锛氶殢鏃跺叧娉ㄨ蒋浠跺晢涓婚〉浠ヨ幏鍙栨渶鏂扮増鏈?

6. Microsoft Windows NtSystemDebugControl()鍐呮牳API鍑芥暟鏉冮檺鎻愬崌婕忔礊

Microsoft Windows XP SP1鍜學indows 2003浼氬彈姝ゆ紡娲炲奖鍝嶃?Microsoft Windows鎿嶄綔绯荤粺鍐呮牳API鍑芥暟瀛樺湪瀹夊叏闂锛屾湰鍦版敾鍑昏?鍙互鍒╃敤杩欎釜婕忔礊鎻愬崌鏉冮檺銆俍wSystemDebugControl()浠巒tdll.dll瀵煎嚭锛岃皟鐢╓indows鎿嶄綔绯荤粺鍑芥暟NtSystemDebugControl()锛岃繖涓嚱鏁板湪ring 0妯″紡涓嬫墽琛岋紝鎷ユ湁SeDebugPrivilege鏉冮檺鐨勮皟璇曡?鍙互鍒╃敤杩欎釜鍑芥暟鑾峰緱鏉冮檺鎻愬崌銆?br />
Proposal

涓存椂瑙e喅鏂规硶锛氬缓璁湪鎵?湁鐢ㄦ埛/缁勪腑鍘绘帀璋冭瘯鏉冮檺浠ラ檷浣庡▉鑳併?

姘镐箙瑙e喅鍔炴硶锛氶殢鏃跺叧娉ㄥ巶鍟嗙殑涓婚〉浠ヨ幏鍙栨渶鏂扮増鏈?

7. Microsoft IIS HTTP澶撮儴澶勭悊缂撳啿鍖烘孩鍑烘紡娲?br />
Windows 2000銆乄indows XP銆乄indows NT4.0銆両IS4.0/5.0浼氬彈姝ゆ紡娲炲奖鍝嶃?IIS锛圛nternet Information Server锛夋槸Microsoft Windows绯荤粺榛樿鑷甫鐨刉eb鏈嶅姟鍣ㄨ蒋浠躲? IIS 4.0/5.0/5.1鍦ㄥ鐞咹TTP澶撮儴淇℃伅鐨勪唬鐮佷腑瀛樺湪杩滅▼缂撳啿鍖烘孩鍑烘紡娲烇紝杩滅▼鏀诲嚮鑰呭彲浠ュ埄鐢ㄦ婕忔礊杩滅▼鎵ц鍛戒护鎴栭?鎴愭嫆缁濇湇鍔°?IIS鍦ㄦ敹鍒颁竴涓狧TTP璇锋眰鏃讹紝浼氬厛瀵瑰叾杩涜鍒嗘瀽锛屽畠鏍规嵁鍒嗛殧绗︽潵鍖哄垎涓嶅悓鐨勫尯鍩燂紝骞跺皢涓嶅悓鍩熺殑鍐呭淇濆瓨鍒伴?褰撳ぇ灏忕殑缂撳啿鍖轰腑銆備负纭繚搴旀湁鐨勫垎闅斿煙瀛樺湪涓斿浜庡悎鐞嗙殑浣嶇疆锛孖IS浼氬湪瑙f瀽HTTP鎶ュご鐨勫煙涔嬮棿杩涜涓?釜瀹夊叏妫?煡銆備絾鏄埄鐢ㄨ繖涓?紡娲烇紝鏀诲嚮鑰呮湁鍙兘娆洪獥杩欎竴妫?煡锛屼娇IIS璇互涓哄垎闅斿煙纭疄瀛樺湪锛孖IS鍙兘浼氬皢涓?釜瓒呰繃IIS棰勬湡闀垮害鐨凥TTP澶撮儴鍩熸暟鎹繚瀛樺埌涓?釜缂撳啿鍖轰腑锛屼粠鑰岄?鎴愮紦鍐插尯婧㈠嚭銆傝鍒╃敤杩欎釜婕忔礊锛岀洰鏍嘔IS鏈嶅姟鍣ㄥ繀椤诲厑璁镐娇鐢ˋSP ISAPI銆傚鏋滄敾鍑昏?浣跨敤闅忔満鏁版嵁锛屽彲鑳戒娇IIS鏈嶅姟宕╂簝锛圛IS 5.0/5.1浼氳嚜鍔ㄩ噸鍚級銆傚鏋滅簿蹇冩瀯閫犲彂閫佺殑鏁版嵁锛屼篃鍙兘鍏佽鏀诲嚮鑰呮墽琛屼换鎰忎唬鐮併?鎴愬姛鍦板埄鐢ㄨ繖涓紡娲烇紝瀵逛簬IIS 4.0锛岃繙绋嬫敾鍑昏?鍙互鑾峰彇SYSTEM鏉冮檺锛屽浜嶪IS 5.0/5.1鏀诲嚮鑰呭彲浠ヨ幏鍙朓WAM_computername鐢ㄦ埛鐨勬潈闄愩?

Proposal

涓存椂瑙e喅鏂规硶锛?br />
鈼?濡傛灉涓嶉渶瑕佷娇鐢ˋSP鑴氭湰锛屽簲璇ョ珛鍒诲垹闄も?.asp鈥濈殑鑴氭湰鏄犲皠锛氭墦寮?nternet 鏈嶅姟绠$悊鍣紝鍙冲嚮鏈嶅姟鍣紝鍦ㄨ彍鍗曚腑閫夋嫨鈥滃睘鎬р?鏍忥紝閫夋嫨鈥滀富灞炴?鈥濓紝閫夋嫨 WWW 鏈嶅姟鈫掔紪杈戔啋涓荤洰褰曗啋閰嶇疆锛屽湪鎵╁睍鍚嶅垪琛ㄤ腑鍒犻櫎鈥?asp鈥濋」锛屼繚瀛樿缃?鐒跺悗閲嶅惎IIS鏈嶅姟銆?br />
鈼?鍙互浣跨敤寰蒋鎻愪緵鐨勪竴涓畨鍏ㄥ伐鍏稶RLScan鏉ラ檺鍒舵敾鍑昏?鍒╃敤杩欎釜婕忔礊杩滅▼鎵ц鍛戒护銆俇RLScan缂虹渷涓嶅厑璁窾RL涓寘鍚潪ASCII瀛楃锛屽洜姝ゅ彲浠ユ湁鏁堝湴澧炲ぇ鏀诲嚮鑰呮敾鍑荤殑闅惧害銆備絾杩欎笉鑳介槻姝㈡敾鍑昏?杩涜鎷掔粷鏈嶅姟鏀诲嚮銆?br />
姘镐箙瑙e喅鍔炴硶锛氬畨瑁呭井杞畨鍏ㄥ叕鍛奙S02-018鐩稿簲鐨勮ˉ涓併?

8. Windows濯掍綋鎾斁鍣ㄥ澹充笅杞戒唬鐮佹墽琛屾紡娲?br />
Microsoft Windows Media Player 7.1銆乄indows Media Player XP銆乄indows XP銆乄indows NT銆乄indows 98銆乄indows ME绛夌郴缁熼兘浼氬彈姝ゆ紡娲炲奖鍝嶃?

Windows濯掍綋鎾斁鍣ㄥ湪澶勭悊涓嬭浇澶栧3鏂囦欢鏃跺瓨鍦ㄩ棶棰橈紝杩滅▼鏀诲嚮鑰呭彲浠ュ埄鐢ㄨ繖涓紡娲炲埄鐢ㄦ伓鎰忛〉闈笂浼犱换鎰忔枃浠跺埌鐩爣绯荤粺涓换鎰忎綅缃?褰揑nternet Explorer閬囧埌MIME绫诲瀷涓衡?application/x-ms-wmz鈥濈殑鏂囨。鏃讹紝灏变細浠モ?/layout鈥濆懡浠よ閫夐」鍚姩wmplayer.exe鏉ユ寚绀哄獟浣撴挱鏀惧櫒浠庢寚瀹氱殑URL涓嬭浇澶栧3鏂囦欢鍒癕edia Player鐨勫澹虫枃浠剁洰褰曚腑銆備负闃叉閮ㄥ垎鍩轰簬Internet鐨勬敾鍑伙紝绋嬪簭鍦ㄤ笅杞借矾寰勪腑浣跨敤闅忔満鍏冪礌锛岃繖鏍峰彲浣夸笅杞界殑澶栧3鏂囦欢鍚嶄笉浼氳鏀诲嚮鑰呯寽娴嬪嚭鏉ャ?Media Player瀛樺湪涓?釜缂洪櫡锛屼笂闈㈡弿杩扮殑鍔熻兘鍙湪URL涓娇鐢℉EX缂栫爜鐨勫弽鏂滅嚎绗﹀彿鏉ョ粫杩囷紝濡傛灉鍙寚瀹氭伓鎰廢RL骞惰浣跨敤鎴疯闂紝涓嬭浇鐨勬枃浠跺す灏卞彲浠ヨ閫夋嫨銆傚鏋滄枃浠跺悕涓嶆槸浠モ?.WMZ鈥濈粨灏撅紝Media Player涓?埇浼氬湪鏂囦欢鍚庡鍔犺繖涓墿灞曞悕锛屼絾鏄鏋滀互鐗规畩鏂规硶浣跨敤Content-disposition HTTP澶村瓧娈碉紝杩欎釜闄愬埗灏卞彲浠ョ粫杩囧苟涓斿彲浠ラ殢鎰忛?鎷╂墿灞曞悕锛屽洜姝ゆ敾鍑昏?缁撳熬杩欎袱涓棶棰樺氨鍙互鎶婁换鎰忔枃浠跺瓨鏀惧湪鐩爣鐢ㄦ埛浠绘剰鍦版柟銆傛敾鍑昏?鍙互鍒╃敤鎭舵剰椤甸潰鎴栨伓鎰廐TML褰㈠紡EMAIL鏉ヨ浣跨敤鎴疯闂紝涓嬭浇澶栧3鏂囦欢锛岃Е鍙戞紡娲炪?

Proposal

涓存椂瑙e喅鏂规硶锛歄utlook Express 6.0鍜孫utlook 2002榛樿璁剧疆鏄湪闄愬埗鍖哄煙涓墦寮?TML閭欢锛屼娇鐢∣utlook 98鍜?000鐨勭敤鎴烽渶瑕侀?杩嘜utlook E-mail瀹夊叏鍗囩骇鏉ヤ慨姝f婕忔礊銆?br />
姘镐箙瑙e喅鍔炴硶锛氬畨瑁呭井杞畨鍏ㄥ叕鍛奙S03-017鐩稿簲鐨勮ˉ涓併?






相关链接:



MASH



Silver DVD Editor



Evaluate Education



LasVegas DVD To SWF



Simple Network And Internet



Inventory And BARCODING Storage



psp 6000



how to CONVERT flv to 3gp



mkv to avi CONVERTER free download



CoreSoft DVD to iPod Video Converter



Bluesea M4V Deconde



Nwz-e443



Recommend Hobby



CABLE TV On PC



Professional WMV to DVD FLV



Youtube Video to AVI Top Rated