Saturday, October 23, 2010

Yanzhao tentacles stretch pupils how to actually make the child away from unhealthy content



"Pornographic" event continues for more than a month, over time, the wide dissemination of indecent according to an increasingly large number of minors involved in sharing the "Pornographic" ranks in years, even a small number of primary and secondary students even imitate these photos, but also the on-line privacy of their own photographs. This situation, so that teachers and parents are worried about: how to get kids away from the "Pornographic" and other undesirable content, has become the focus of the community. The Trend Micro Internet Security Expert (TIS) 2008 leading "parental control" feature, which can effectively purify the home network environment.

Hong Kong, "Wen Wei Po" in the questionnaire survey: up to 4 percent had contact with primary and secondary students in Hong Kong is the second involving indecent photographs, of which nearly half are in circulation among friends and classmates, even a few people in possession of relevant images, the situation worrying! and in the Mainland, to buy CDs Yanzhao team had much uniform-clad figure. In addition, students also appeared more than imitate the "Pornographic" in the case of online dissemination of their photos. This has led to many parents and teachers concerns. Mr. Liu said, according to Guangzhou parents, although his son has just started this, but from a lot of students that peep photos, also the parents of their students find it particularly worried them.

CPPCC National Committee members, Beijing Haidian District People's Court Second Criminal Court of Vice-President Shang Xiuyun that network to provide convenient, but also mixed with some harmful information. Such as: network, violence, obscene content, gambling. Minors are in development stage, to identify not strong, but curious, good at imitating, vulnerable to adverse cultural influences, and then change their value judgments. But like "Pornographic" This network of information focused on bad outbreak, but parents and teachers feel helpless. Lee said a middle school teacher in Guangzhou, class a few students in private stole mass Yanzhao, I do not know how to explain this to students, can only hope that this early in the past.

Faced with this situation, Trend Micro Internet security experts say, want to clean up a home network environment, need to introduce a ratings system management. Experts such as Trend Micro Internet Security (TIS) 2008, as an individual user's network security software, which would have "parental control" feature. This feature goes beyond the traditional extensive classification model, relying on the billions of websites on the global real-time monitoring and analysis, will be divided into adult bad website, violence, alcohol and tobacco more than ten categories, parents can be home local area network, according to the child In the computer age disaggregated to "prevent access to unwanted Web sites"; If you find such a setting close enough, you can also set "allow the Web site," the learning needs of the child day to day, your website will be set can ensure that young people are not bad from a search engine or other website any adverse information obtained.



Press through the use of this feature interviews with the parents that although children are first starting some resistance, but the "parental controls" to prevent the effect of this security is very satisfactory, children can adapt quickly, after all, does not affect it has used the access information, log on forums and other operations, but actively take the initiative to prevent access to information on the possible bad. A student also told reporters: "We often do not want to know how things Pornographic, the key is a random search for relevant information can be too easy to see, so are the engine room of our school to implement this access restrictions of security, although some awkward beginning, but a habit still think that better. "

At present, the network information varies greatly, especially pornography is particularly prominent. Young people lack self-control and the resolution is easy to be misled, even committed crimes. To this end, we should mobilize all social forces, from the moral, educational, social responsibility and the correct guidance, and regulation of minors to further strengthen the education and guidance. The Trend Micro Internet Security Expert (TIS) 2008 unique "parental control" feature, for the purification of a minor home network environment provides new ideas and means.







Recommended links:



Matroska to MPEG



Wizard Adventure And Roleplay



YouTube to WMV



Retail: International and domestic giants play the attacking football



United States: Symantec President Gary Bloom resigned



Fraud warning: Fishing the latest plot and potential threats



Review Network Monitoring



Alipay's Disregard The Changing Circumstances



Business Databases And Tools Directory



the Excitement of playing games on the sony psp



See THIS bigger than the SONY



How VB.NET does not. NET Framework to run the machine



TOD to WMV



Operators around loose charges tariff war is inevitable that the first



Wednesday, October 20, 2010

"Crocodile Group" under the chip, "national character"


A few days ago, I saw an interesting street in Qingdao, a picture, the local front page of several major newspapers are published in the first group of substantially loaded Hisense R & D of digital video processing chip, "the letter core" of Hisense TV off the assembly line news, seemed to shoot straight, and lined up like soldiers.

Successive chips are Chinese companies that do, to pray with us all day stuck in the world of Chinese enterprise IT people a kick out of the throat. Some people come up with a book called "chip a little better discipline."

It is noteworthy that Chinese companies "to do chip" is the ability to zoom into corporate strategy, and some media that Changhong would like to become the chip giant, together with Shanghai Symphony, it is a "crocodile group."

However, Shougang NEC's warning not far away.

There are two chips, one for national security, a development of the industry total. However, domestic enterprises to describe their own chip, like it is a "nation." Then, the chip has "national character" it?

From a commercial sense, the chip is there as an upstream product. Its value is the ability of the downstream products of an important impact on the whole industry chain. So, this is the chip value.

In this sense, if only beneficial to a company or several companies, such as Hisense developed the core chip video processing, as a long period of time, may Zhi Shi Zi Ji Kongzhichengben the Shouduan Hisense. Believe it or not?

In the commercial, the Hisense launched chips, domestic manufacturers still no cheers, taking into account the color TV in the world factory in China, so it limited prospects. Technically, Hisense chip is not unique to China, is not a pioneer, a few years ago, Chengdu and Xi'an have been developed by the company once, but did not realize industrialization and mortality.

Chinese enterprises in promoting their own time, like the ethnic label affixed. Some industry so, but the chip industry may not be. Need chip color TV, PC, camera, mobile phone industry and other industries are the three high - a high degree of globalization, highly standardized, highly coordinated, but it must be trade names, or chips, "nationalism" should be properly defined.

As standard, to sweep the world, will hit the user. At first, Esperanto has been defined as an international language, but in the end, pass the world is English.

Samsung and SMIC is the world's chip industry, the two model, they, as newcomers to quickly become the world leader. If you look at family history SMIC hair, you will find have a global "mind" how important it is.

SMIC growth in the key stage, with the cooperation of the world's chip leader is always the main theme. In the 0.18-micron chip, it is the world's third-largest chip foundry Chartered Semiconductor; in 0.13-micron chip, but also cooperation with Texas Instruments. Since then, it has with the European IC Design Factory Accent Srl, Elpida, Toshiba, Infineon, Infineon Technologies of Germany to reach the transfer of technology and OEM agreement.

Changhong, Hisense, or both, are the terminal equipment manufacturers, in this area, they are the world leader. However, if really like the outside world may say so, to become the chip giant, I am afraid we must first note, the chip can not be a nation.






Recommended links:



RM to AVI



3G2 to AVI



Enjoy it: lots to talk about topics for undying domain



Eight Motivate the staff more dynamic model [1]



Job on the road a few lessons to remember



8 questions with 6 way



09 'happy To Steal Food' In 2010 What We Steal?



Comment Games Arcade



FLV TO 3GP



INTERVIEW with Linspire CEO maverick sorts?



Premier Browsers



backup software Acronis true image server for use



ASP test two simple functions external to submit



Sunday, October 10, 2010

Norton Ghost clone parameter four examples demonstrate


I believe Windows to crash, system crashes we've seen a lot. The brilliant idea quickly restore the system is to use Ghost program, but each time must be selected using Ghost, too much trouble. In fact, Ghsot many parameters, clever use of these parameters, and write them in MS-DOS batch software.

I believe Windows to crash, system crashes we've seen a lot. The brilliant idea quickly restore the system is to use Ghost program, but each time must be selected using Ghost, too much trouble.

In fact, Ghsot many parameters, clever use of these parameters, and write them in MS-DOS batch software that can backup and restore system to bring us great convenience.

1. Automatic Backup

ghost-sure-clone, mode = pdump, src = 1:1, dst = system.gho

Put the first hard disk first partition information back up to the current folder's system.gho in the future can use it to restore

2. Sub-volume backup

ghost-sure-clone, mode = pdump, src = 1:1, dst = system.gho-span-split = 630

Its role is to first partition the first hard disk information back to the current folder's system.gho, if generated system.gho more than 630 trillion will be generated in the GHO file segmentation, the parameters of a large area in the back and to burn them to a 650 MB CD-R is useful when.

3. Automatic Recovery

ghost-sure-rb-clone, mode = pload, src = system.gho: 1, dst = 1:1

Its role is to system.gho under the current folder to a file to restore the first partition on the hard drive, and without confirmation, after the completion of the operation automatically restarts the computer

4. With a password backup

ghost-sure-pwd, 666888-clone, mode = pdump, src = 1:1, dst = system.gho

The statement is the first hard disk first partition information back up to the current folder's system.gho in, and to 666,888 after the GHO file as a password generated for encryption.

After using Ghost to restore system.gho file, or to use Ghost Explorer to release the documents which are to enter a password, or can not recover or release documents, which played a secret role.

If you enter a ghost-sure-pwd-clone, mode = pdump, src = 1:1, dst = system.gho, ie-pwd back without a password, GHO Ghost in the production of documents before the user will be asked GHO encrypted password, you must remember the simplicity. GHO file to encrypt, the other can not be free to view or restore our files






Recommended links:



"Fallout 3" The third sense after playing DLC broken steel



Photoshop make a super simple light and shadow WALLPAPER



News about Converters And Optimizers



First Financial Weekly: direct supply IN the Shadow of Digital China



Training Into The Domestic Game Breakthrough



Media, How to deal with the phenomenon of public relations in society



3GP to AVI



Three Kingdoms OL "I am 40 (anti-war) to talk about the EXPERIENCE



steam dll problem EASILY repair it



Close to the KM role



Specialist Install And Setup



DAT to WMV



Expert: the Open source community is its own worst enemy



UML, RUP and Zachman framework: the perfect combination of [3]



Comment Launchers And TASK Managers



ASF to AVI