Wednesday, October 6, 2010

Maxthon filter floating Flash ads all captures


Maxthon (Maxthon) built a web content filter can filter out the advertising page image. But this filter in Flash for web page advertising can do nothing. Of course, install the appropriate plug-ins can easily remove the pages of Flash ads. But too many plug-ins installed Maxthon will run its own slow, and will procedures take up more system resources.

In fact, the use Maxthon own web content filter can filter out pages of Flash ads. Shown in Figure 1 is our target site has not filtered before the Tabs Flash ads.



Figure 1 Flash Ads Filter screenshot before the Web

To filter out Web pages Flash advertising, first of all necessary links to find out Flash ads, because ads directly Flash can not see it right click the link, so we have to view the source of documents to find the link Flash ads address. Figure 2 shows that in Maxthon View Source menu item. Similarly, clicking the right mouse button on the page you can find the View Source menu item.



Figure 2 View Source menu item

In the pop-up page source text file, we use ". Swf" as a keyword to find links to Flash files. Shown in Figure 3.



Figure 3 to find. Swf file

銆??鍦ㄧ綉椤电殑婧愭枃浠朵腑鎵惧埌濡傚浘4鎵?ず鐨勪竴涓狥lash骞垮憡鐨勯摼鎺ュ湴鍧??



鍥? 鎵惧埌Flash骞垮憡鐨勯摼鎺ュ湴鍧?br />



[Next]



銆??鎶婂浘4涓?涓殑Flash骞垮憡鐨勯摼鎺ュ湴鍧?繚瀛樹笅鏉ャ?鐒跺悗鎵撳紑Maxthon 鑿滃崟鏍忎腑鐨勨?閫夐」|骞垮憡鐚庢墜|缂栬緫杩囨护鍒楄〃鈥濓紙濡傚浘5鎵?ず锛夈?



鍥? 骞垮憡鐚庢墜鑿滃崟

銆??鈥滅紪杈戣繃婊ゅ垪琛ㄢ?鐨勭獥鍙e鍥?鎵?ず锛岀偣鍑烩?缃戦〉鍐呭杩囨护鈥濋?椤瑰崱锛岀劧鍚庡湪榛戝悕鍗曚腑鐐瑰嚮鈥滐紜鈥濆彿鎸夐挳锛屽湪鍚嶅崟涓氨浼氬嚭鐜颁竴涓柊鏉$洰锛岀劧鍚庢妸鍓嶉潰淇濆瓨鐨凢lash骞垮憡鐨勯摼鎺ュ湴鍧?緭鍏ュ埌鏂版潯鐩腑銆備负浜嗘壒閲忕殑杩囨护缃戠珯鐨凢lash骞垮憡锛屾垜浠彲浠ユ妸鈥渉ttp://www.pcpop.com/banner/040705shenzhou140.swf鈥濊繖涓湴鍧?敼涓衡?http://www.pcpop.com/banner/*.swf鈥濈劧鍚庡湪杈撳叆鏂版潯鐩腑锛堝鍥?鎵?ず锛夈?



鍥? 鏂板缓缃戦〉杩囨护鍐呭

銆??鍒锋柊涓?笅娴嬭瘯椤甸潰锛屽彂鐜癋lash骞垮憡閮戒笉瑙佷簡锛屾崲鎴愪簡涓?潡鐧借壊鐨勫尯鍩燂紙濡傚浘7鎵?ず锛夈?



鍥? 杩囨护Flash骞垮憡鍚庣殑椤甸潰鎴浘

銆??閲囩敤杩欑鏂规硶鍙互鏈夋晥鐨勮繃婊ら〉闈腑鐨凢lash骞垮憡锛屾牴鎹娇鐢ㄩ?閰嶇鈥?鈥濓紝鈥?鈥濈殑浣嶇疆涓嶅悓锛屽彲浠ユ妸杩囨护Flash骞垮憡鐨勮寖鍥翠粠鍗曚釜Flash骞垮憡鎵╁ぇ鍒版墍鏈夌綉绔欑殑鎵?湁Flash骞垮憡銆傛垜浠彲浠ユ牴鎹嚜宸辩殑鍠滃ソ鑷敱鐨勮瀹氳繃婊lash骞垮憡鐨勮寖鍥淬?






相关链接:



Dreamweaver MX 2004 from scratch (6)



Built-in Objects Of The JSP In A Brief Overview



Unstoppable P2P



music players questions amp answers



Puzzle And Word Games brief



My favorite Timers And Time SYNCH



College JOB: Workplace rules are familiar with the key



MPG To Flash



AVI to MPEG4



Symantec said the new storm worm detected



Suspected of extortion Donews producer Liu Ren denies allegations



Why do we need SAS?



VOB to Flash



Saturday, September 25, 2010

Types of Trojan horse



Types of Trojan horse

Since the Trojans since birth, has appeared in many types, would like to give them to a complete the list and annotations for the impossible, not to mention the majority of Trojan horse is not a single function, they are often very many functions integrated product ---- and even many of the functions from the public in a number of Trojan also widely exist. Nevertheless, to the Trojans to a preliminary classification. For computer users is also very necessary and timely.

1. Remote Control Trojans

Remote control Trojan is the largest number of most harmful, while the maximum is also a well-known Trojan that can allow an attacker to completely control an infected computer, an attacker can even use it to complete some computer owners themselves can not be successfully carried out operations its great harm should not be underestimated. As the remote control to achieve the purpose, therefore, the types of Trojan horse is often integrates the functions of other types. So that the infected machines do whatever they want, you can now access files, get the owner's private information and even credit card, bank account number and other vital information.

The famous glacier is a remote access Trojan Trojan horse type. Using this type of Trojan horse up is very simple. Just someone to run the server and get the victim's IP. Will have access to his / her computer. They can dry your machine anything. Remote Access Trojans general characteristics of type: keylogger, upload and download, registry operations, restrict system functions ... ... and so on. Remote Access Trojans will type on your computer to open a port to stay connected, as shown in Figure 1-1 1 1.






Figure 1-1-1

2. Password sent Trojans

Increasingly important in information security today. Password is undoubtedly important information leading to an extremely useful key, as long as the master password each other, from a large extent. You can get each other a lot of unscrupulous information. The password is sent special type of Trojan horse infected computer to steal passwords and write, and Trojan, once implemented, will automatically search for the memory, Cache, temporary folder, and all kinds of sensitive password file, once the search for useful password, Trojan will use free e-mail service will send the password to the specified mailbox. To achieve the purpose of obtaining a password, so most of these Trojans use port 25 to send E-mail. Most of these Trojan horse does not restart every time Windows restarts. The purpose of this Trojan horse is to find all the hidden password and the victims do not know where to send them to the specified mailbox, if the physical hidden password, these Trojan horses are dangerous.

Because we need the password diverse, different forms of storage, so often we need to write your own procedures to meet their requirements by Trojan.

3. Keylogging Trojan

This Trojan horse is very simple. They only do one thing, that is, record the victim's keystrokes and find the password in the LOG file. According to my experience, this Trojan horse with the boot and start Windows. They have online and offline recording options such as the name suggests, they were recorded online and offline, you tap the keyboard keys when the situation. That is what button you press, the next horse people know, from these keys, he can easily get your password and other useful information, even your credit card account Oh!, Of course, for this type of Trojan, mail function is also indispensable.

4. Destructive nature of the Trojan

This Trojan only function is to destroy the infected computer's file system, it suffered a system crash or loss of a great loss of important data. From this point, it and the virus is very similar. However, in general, the activation of this Trojan is controlled by the attacker, and the spread of the virus less than a lot of ability.

5.DoS Trojan horse attack

As more and more widely used in DoS attacks, DoS attacks, Trojan horse being used as more and more popular. When you invade a machine, give him kind of DoS attack on the Trojans, then will this computer be your DoS attacks on the most right-hand man was. You control the number of chickens, the more you launch a DoS attack, the greater chance of success. Therefore, the danger of this Trojan is not reflected in the infected computer, but also at the attacker can use it to attack one another computer, cause great harm to the network and cause losses.

There is also a similar DoS Trojan horse known as e-mail bombs, once the machine is infected, trojans will be randomly generated a variety of letters, kept on a specific mailbox to send messages to each other has been paralyzed, unable to accept the message up.

6. Agent Trojan

While the invasion of hackers cover their tracks, to guard against others find their own identity is very important, therefore, to be controlled on the agency Trojan chicken species, allowed the attacker to become a springboard for attacks is the most important task proxy Trojan . Through a proxy Trojan, an attacker can use in case of anonymous Telnet, ICQ, IRC and other procedures so as to cover their tracks.

7.FTP Trojan

This Trojan may be the most simple and ancient Trojan, and its only function is to open the 21 ports, waiting for the user to connect. Now the new FTP Trojans also added password function, so that only the attacker knows the correct password the talent to enter the other computer.

8. Program Trojan killer

Although the above features all kinds of Trojans, but to the other machine to play a role, but also had anti-spyware software that off Caixing. Popular anti-spyware software are ZoneAlarm, Norton Anti-Virus and so on. Trojan program killer feature is the closure of the other machine running on such procedures, so that the other horse to work better. In http:/www.snake-basket.de/e/AV.txt this address, you can find most of the now popular use of anti-virus and anti-Trojan software, the name, description, and the end of their methods.

9. Bounce port-based Trojans

Trojan is a Trojan developer features in the analysis found that the firewall: the firewall for incoming links tend to be very strict filtering, but the link is for even a guard. Thus, contrary to the general's horse, bounce port type Trojan server (the controlled side) with active port, client-side (control side) to use passive ports. Trojan regular monitoring of the client, there is, find that the control side on the line immediately pop-port active link control side to open the active port; for covert purposes, the control side of the passive port normally open at 80, so that if users use port scanning software to check their own ports, also found a similar TCP UserIP: 1026 ControllerIP: 80ESTABLISHED situation, a little bit negligent, you thought that his website (firewall would think so, I think probably no connection outside the firewall will not allow users to port 80 it ).

See here, one may ask: So how can the server know the client, IP address? Are control client can only use a fixed IP address? Inspections to find the. In fact, this rebound port Trojans often use a fixed IP of third-party storage device to carry out IP address of the transfer. Give a simple example: a good prior agreement a personal home page space in which to place a text file, Trojans once every minute to GET the file, if the contents of the file is empty, it does not do anything, if there is content, in accordance with the text file data to calculate the client, IP and port, a TCP link bounce back, so that each controller on-line FTP only one INI file, you can tell the horse where they are. In order to be safe. The IP address even after a certain encryption, in addition to service and control side. Others have not even got any sense. For those able to analyze packet filtering TCP / UDP firewall, port-based Trojans rebound the same method to deal with. To put it simply. Control client uses port 80 trojan can really use the HTTP protocol will transmit the data contained in the HTTP packet, the Do firewalls really smart enough to tell whether through the HTTP protocol is transmitted page or control commands and data? Such as Figure 1 1 1 1 2 below.






Figure 1-1-2







Recommended links:



Fu Chong: The General Trend Of Those Who Know Great Things



Borrow money to MAKE money doing business



RECOMMEND Firewall And Proxy Servers



"Deceiving" Or "enlightened Approach"



MKV to iPod



Domain Name Registration Norms Into Their Public Phase Of Consolidation



VOB to MP4



FreeBSD Serial (35): serial port and modem



reviews Newsgroup Clients



Compare Active X



Photoshop Plug-in Filters



ASF CONVERTER



"Dance Like" Chinese Edition



Zhou Chengyu Court hematemesis: die in The end to fight a lawsuit



power nas campus NETWORK solution education



Green Manufacturing MES Successes



Tuesday, September 21, 2010

Overcome stage fright interview the 10 candidates recruited nirvana


1. A sense of balance necessary to correctly treat the interview, to do well prepared to withstand setbacks. Even temporary loss interview, nor to a failure Hero.

Two. On the recruitment of units and must have a correct assessment of its own, believed that he is fully capable of doing the job. "Confidence is not necessarily to win, not necessarily lose confidence. "

3. Appropriate to improve apparel grade, dressed neat appearance, to change their image and self confidence.

4. To do a few deep breaths before the interview, the mood will certainly be much more calm, courage will be doubled.

5. When he met with the examiner, must take the initiative to conduct intimate with each other in God's eye contact, to eliminate tension. Established in the heart as an equal relationship with the recruiters. If you are afraid, there was the feeling of overwhelm each other when the courage to eye contact with each other until the tension removed, and then expressed his own job ideas.

6. When tension may wish to about yourself, talk about their feelings, can you become lighter.

7. Feel under pressure, might help to find gaps recruiters such as clothing, speech, posture, weaknesses, in order to improve their mental strength, so that it will enhance the inter-consciously or unconsciously, self-confident, more comfortable answering questions also the.

8. When there talking with each other intervals, do not impatient, so instead of thinking to give myself the space, pay close attention to honoring the other side feel you are a calm person.

9. To answer the question once the tension, to say may stutter or becomes clearer and faster, tension will increase, at this time, the best way is to intentionally slow down their speech rate, so a word from the mouth of a clear spit it out, slowed down, the mood is not nervous. Tail may also add language pronunciation, speak loud and slow, to ease the tension.

10. Into the examination room to see the examiner, we might wish to say a few polite aloud if a meek, nervous feeling will disappear.






Recommended links:



Five 8-word mantra! Speculative memory are major CONTRIBUTORS spit voice



PHS Delisting who is in charge



convert XVID to divx



Avi To Iphone Converter



Convert aac to mp3



"Nobunaga's Ambition 12 Innovation" 82 HOKKAIDO start a battlefield report



Northern Rock's instant messaging



Top Ad Blockers



Easy Gallery And Cataloging Tools



Star Speed: gentleman or "rogue"



ICBC Amendment



Comments Reference Tools



best Video format



Sonic Foundry Vegas 4.0 Collection 25 NOVICE fly into effect



Jusched.exe What process? How to disable?



Thursday, July 29, 2010

A fully CG production process - the line of Laws (3)


銆忋? Step2

Now introduce the method to remove the white background. (That part is for beginners, if you know you can skip this part if the next step to see the content)



鈽?recommendations to the beginners:

Now remove the white background part. The following I will introduce several methods commonly used in one:

1. First press Ctrl + A 銆忋? will be part of all the selected lines. And then press Ctrl + C 銆忋? will select some copy. (Not the layer.)

2. The establishment of a new transparent layer! Use this layer to remove the white background.

3. Q 銆廱y銆?key, launch the shortcut keys

4. Then in the transparent layers in press Ctrl + V 銆忋?. Layer now shows a red line
Article.

5. 銆庛? Button and then press Q to remove shortcut.

6. Because the space for the selected part, press Ctrl + Shift + I 銆庛? reverse options, so put
Some selected lines.

7. As part of the line has been selected, then press Alt + Back_spase key to remove selected parts. (Slightly
Sorry about! Make sure to select the color at this time should be changed to black. If the words do not turn black
Click 銆忋? D key. )
(Want to become tan lines can appropriate at this time the choice of line color.)

8. And then map out the effect of question.






相关链接:



Catalogs Security And Privacy:



Business market, "cloud" style singing



Converting mov to wmv



Avi To Mp4 Converter



Find 20%



Review Games And Entertainment



Visual Studio08 Now Open To MSDN Users



ps3 Video format



CorelDRAW to create colorful light BULBS



MS Proxy Usage (2)



"Tomato Garden" case of first instance pronounced loss of Chengdu, a total of over 10 million soft



Mp3 To Aac



Job on the ROAD a few lessons to remember



Production Of Fine Wood Decorative Painting



Audio Players Expert



Wednesday, July 14, 2010

U buy four unique skill set


New Year, many friends and for choosing a U disk as work, study, calculations of the essential tools. As the current portable data storage and exchange of necessary equipment, flash drives have also become routine, one of the products is essential in life. The current flash drive market, an unprecedented hot, the face of many brands, different functions of flash disk products, ordinary users how to choose a superior quality to meet their own needs, while special benefits of the flash drive it?

First of all concerned about the brand

Brand is a guarantee of product quality and service. Since 2003, after two years of intense competition, whether technical or price, flash disk market after several clean-up, a number of competitive brands has gradually withdrawn from the market, the brand has withstood the test of the market for the mobile storage industry has grown the leader.

Remember data security

U disk data in the birth of the movement to bring the convenience store and exchange application, but precisely because of its excellent portability, the user of the product made unusual seismic requirements. If poor seismic performance products bring not only the loss of products, one of the important data stored in the same inevitably suffer from a "disaster"!

Currently, U disk seismic safety much attention throughout the mobile storage industry, Patriot U disk can withstand the impact of free fall 3 meters to ensure that vibration is strong environment, the data stored in the U disk will not be lost, especially is the data security industry has special requirements for users, good shock resistance is undoubtedly improve the quality of information necessary to target office.

U disk, first of all seismic requirements of product itself has a strong physical security, the product within the required packaging technology using thermal molecular curing; combine seamlessly embedded structure, so that nanocrystalline core components and PCB bonding one, can completely eliminate the mechanical data loss caused by the phenomenon of shock, moisture and also has excellent resistance to electromagnetic interference, and our data storage greatly enhanced safety performance.

Large-capacity & high-speed

U-disk from the development of this view, 128M, U disk capacity has become the mainstream this year, users choose, and with the USB2.0 technology matures, many users have begun to experience the convenience brought by high-speed storage. From the development trend, U disk market in 2005, mainstream products will no doubt 256M, 512M-based, high-speed U disk will quickly pop up and a friend can be a conditional selection in the first year.

Service, an integral part of

It is understood that because of improper use of U disk is damaged or lost to the user a more common phenomenon, so choose the brand with excellent service is the best way to remove the worry.

Should be provided in addition to the "three guarantees" service, a powerful mobile storage companies have achieved superior service standards.

A functional and practical, U disk to use without worry of a complex of purchase, purchase to the above four major decisions, to the store where you can live to experience, feel relaxed U-favorite dish, in the new one years to improve efficiency, all packed in good order moment will no longer fear many of the documents and fast-paced work.






Recommand Link:



Premier Source Editors



Youtube FLV to ASX Software



Explosion XviD Converter



Picked Recreation



Flv Audio Extractor



3GP to avi



Matroska file



Good WEB Or Video Cams



XML Or CSS Tools Guide



How-to Youtube Converter



Wondershare Video to DVD Burner



Youtube Movie To MPEG Store



flv To 3gp converter



Free Mkv Converter



Youtube FLV To H264 Now



Tuesday, March 30, 2010

Vacations PS3 Converter


Vacations PS3 Converter converts AVI, DivX/Xvid, WMV, MPEG videos to PS3 WMV or MP4 video format in one simple click. It is a powerful PS3 MPEG4 video converter/PS3 burner with fast working speed in burning movie to PS3 and downloading movie to PS3. Now you can get this PS3 MPEG4 video converter at a very competitive price! Its key features include: The software features superb video audio quality and fast conversion speed. And it is very easy to use.

Vacations PS3 Video Converter is a best video and movie converter to PS3! This product offers convert movie to Sony PS3, Easy Convert AVI, MPEG, WMV, MOV, MP4, RM, RMVB, DivX, ASF, VOB, 3GP and etc. Vacations PS3 Converter helps you watch your music videos and movies on your PS3.

Thursday, February 25, 2010

Vacations PS2 Converter


Vacations PS2 Converter converts AVI, DivX/Xvid, WMV, MPEG videos to PS2 WMV or MP4 video format in one simple click. It is a powerful PS2 MPEG4 video converter/PS2 burner with fast working speed in burning movie to PS2 and downloading movie to PS2. Now you can get this PS2 MPEG4 video converter at a very competitive price! Its key features include: The software features superb video audio quality and fast conversion speed. And it is very easy to use.

Vacations PS2 Video Converter is a best video and movie converter to PS2! This product offers convert movie to Sony PS2, Easy Convert AVI, MPEG, WMV, MOV, MP4, RM, RMVB, DivX, ASF, VOB, 3GP and etc. Vacations PS2 Converter helps you watch your music videos and movies on your PS2.