Monday, October 25, 2010

CN domain name registration in China break 1.8 million


Yesterday, the China Internet Network Information Center (CNNIC) announced that, as at the end of December 2006, China's CN domain name registration has reached 1.8 million total, countries in the world rankings of top-level domain registrations up the fourth place.

According to CNNIC side introduced a year ago, the number of CN domain name registration has only 109 million in late 2006, this figure has risen 65.1%, especially in December submarine cable fault accident occurred, making CN domain name registrations to the rapid growth .

Furthermore, CNNIC also denied yesterday that the "CN domain names to price hikes" rumors. CNNIC Director Mao Wei said, CN domain name will not end the overall trend of rising prices, to maintain long-term rates than COM domain name.







Recommended links:



Photoshop color change animation effects



ASP.NET 2.0 at the same time to prevent the same user login



Shinco GPS navigation map of Hong Kong and Macao version available



How to pay by the end of The opening?



VOB to Zune



Shop Flash Tools



Using Photoshop Build A Passion Miyi Chocolate Effect



TOD to WMV



XviD to MP4



Store goods without MANUALLY



Two Loud Sigh As The HC



choose the best satellite tv for pc Software



Evaluate Games Simulation



Tuesday, October 19, 2010

Operating principle of gray pigeons


Remote Monitoring Software gray pigeons in two parts: client and server. Hackers (let so called it) manipulating the client, using client-side configuration generates a server program. Server file name defaults to G_Server.exe, then hacking through various channels to spread this server (commonly known as a Trojan). There are many types of Trojan horse means, for example, hackers can bind it with a picture, and then into a shy MM fake QQ the Trojan pass through you, trick you run; can also create a personal web page, luring you click, Using IE vulnerability to Trojan downloaded to your machine and run; can also upload files to a software download site, posing as an interesting software to trick users into downloading ... ..., which is contrary to the purpose we have developed gray pigeons, So this applies to those people to illegally install gray pigeons server users, help users remove the gray pigeons Vip 2005 service-side program. Most of the content of this article is taken from the Internet.

顥?顥?G_Server.exe run will copy itself to the Windows directory (98/xp under the windows directory for the system tray, 2k/NT disk for the system under the Winnt directory) and then released from the body and G_Server_Hook.dll G_Server.dll to the windows directory. G_Server.exe, G_Server.dll and G_Server_Hook.dll three documents form the gray pigeons with each other server, and some more gray pigeons, released a document called G_ServerKey.dll used to record keyboard. Note, G_Server.exe this name is not fixed, it can be customized, such as custom server-side file name A.exe, the generated file is A.exe, A.dll and A_Hook.dll.

顥?顥?Windows directory G_Server.exe file will register themselves as service (9X system started to write registry entries), each boot can be run automatically start G_Server.dll and G_Server_Hook.dll run and automatically exit. G_Server.dll file functions to achieve the back door, and control the client side to communicate; G_Server_Hook.dll through the intercept API calls to hide the virus. Therefore, the poisoning, we do not see the virus files, can not see the virus registered service entries. With the gray pigeons of different server settings file, G_Server_Hook.dll sometimes attached to Explorer.exe process space, sometimes it is attached to all processes.

Manual detection of gray pigeons

顥?顥?As the gray dove to intercept the API call, in normal mode, the server program files and its registered service items were hidden, meaning that even if you set the "show all hidden files" can not see them. In addition, the gray pigeons file name server also can customize it gave manual testing brings some difficulties.

顥?顥?However, through careful observation we found that, for the detection of gray pigeons still have rules to follow. From the above analysis of operating principle can be seen, regardless of custom server-side file name what is usually the operating system installation directory generates a "_hook.dll" at the end of the file. Through this, we can more accurately detect hand-gray pigeon server.

顥?顥?As the normal mode will hide their gray pigeons, so dove gray test operation must be carried out in safe mode. To enter safe mode is: start your computer, enter the Windows startup screen in the system before, press the F8 key (or start your computer hold down the Ctrl keys), in the event of the boot options menu, select "Safe Mode" or "Safe Mode."

1, because the file itself is gray pigeons hidden attribute, so to set Windows to show all files. Open "My Computer", select the menu "Tools" - "" Folder Options ", click" View "cancel" Hide protected operating system files "before the check mark, and the" Hidden files and folders " item select "Show hidden files and folders", then click "OK."

2, open the Windows "search files", the file name input "_hook.dll", Search location Select Windows installation directory (default 98/xp to C: windows, 2k/NT to C: Winnt). 顥?br />
3, after a search, we have Windows directory (without subdirectories), the found a file called Game_Hook.dll

4, according to principles of gray pigeons we know that if Game_Hook.DLL is gray pigeons file, the operating system installation directory there will be Game.exe and Game.dll file. Open the Windows directory, and sure enough there are these two documents, along with a keyboard used to record the GameKey.dll file.

顥?顥?After these few steps we can determine these basic file server is a gray dove, and the following can be manually removed.

顥?gray pigeon manual removal

顥?顥?After the above analysis, it is easy to remove the gray pigeons. Clear gray pigeons still operate in safe mode, two major steps: 1, clear gray pigeons services; 2 program files to delete gray pigeons.

Note: To prevent misuse, we must do a backup before removal.

First, clear the gray of the pigeon service

2000/XP system:

1, open the Registry Editor (click on "Start" - "" Run ", enter" Regedit.exe ", OK.), Open HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServices registry entries.

2, click the menu "Edit" - "" Look "," Find "input" game.exe ", click OK, we can find the gray of the pigeon service items (in this case is Game_Server).

3, delete the entire Game_Server item.

98/me system:

顥?顥?in 9X, the gray pigeons start only one item, so removal easier. Run the Registry Editor, open HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun item, we immediately see a named Game.exe will Game.exe items can be deleted.

Second, remove the gray pigeons program files

顥?顥?delete the program file is very simple gray pigeons, only in safe mode to delete the Windows directory Game.exe, Game.dll, Game_Hook.dll and Gamekey.dll file, and then restart the computer. Thus, the gray pigeons VIP 2005 server has been cleaned.






相关链接:



New Search Or Lookup Tools



Zhang Lijun: Hundred Days Made Hundreds Of Millions Of Wealth



Religion Storage



CSS Syntax Guide (1) Font Properties



Aspect-oriented (AOP) and object-oriented (OOP) [1]



Reviews Themes And Wallpaper



AVI To MOV



Storage Religion



Zhou Kaixuan: No sex woman in Hong Kong



"Steal" food reform "Abstract" dishes: Without Thieves lonely farm still in the



"Era of exploration of the beginning of 1404," talk about my own experience



best forex TRADING robot what automated forex



DVR-MS To MPG



Pole through the "Swiss Friends of the lawsuit AGAINST Tao case" statement to the public



MKV To PSP



Special MO CD 230MB, 540MB, 640MB, 1.3GB



Sunday, October 10, 2010

Fraud warning: Fishing the latest plot and potential threats



As consumers and businesses can create a potential threat of cyber crimes, fishing in the past few years to the spread, the deceptive tricks are endless. The current downturn in the economic form, but also provides a breeding ground for fish, there has been the use of new social engineering to fraud without the knowledge of the phenomenon of consumers and business users.

First, fishing without boundaries

Fishing - to lure computer users to provide sensitive information, identity theft and business data - on both businesses and consumers a very real threat. In the past 10 the next year, the infiltration fishing, fishing in the daily attacks around the world, about 8 million times.




Anti-Phishing Working Group (APWG) reported that, in the second quarter of 2008, light phishing attacks rose by 13%, more than 28,000 times. It also reported that, in the same period, the infected computers to steal the password code, can be used to spread malicious software has been broken on the website 9500 - compared with the same period in 2007, an increase of 258%. Figure 1 shows the fishing - spear phishing in the 16 months of growth.

Second, beware of the latest phishing scheme

* Spear phishing (spear phishing)

Spear phishing attacks only against specific targets, usually the object lock is not a general person, but to a specific company, organization members, such as well-known banks, financial companies and their executives and so on.

Consumers are not the only spear phishing attack target. More and more employees are cunning criminals eyeing. Their goal is to obtain bank information, customer data and other information to support criminal acts of their network.

According to VeriSign iDefense, spear phishing attacks in April 2008 to May during the company launched the attack, reached unprecedented levels. The aim of these attacks is the company's senior management and other important figures. In 15 months, the number of victims of corporate users as much as a staggering 15,000. These victims include Fortune 500 companies, government agencies, financial institutions and law firms.

* Business Services phishing

In addition to spear phishing, the fishing new plot also targeted phishing attacks on commercial services. For example, the use of Yahoo! Introduced relations and Google's AdWords for fishing. According to PhishTank report, AdWords customers will be an e-mail to remind them of accounts need to be updated. , The user will be asked to visit the AdWords interface and a fake credit card information. As many SMEs rely on online advertising to provide site traffic, marketing managers who are vulnerable to anglers eye on.

* The use of economic intimidation launch phishing attacks

Gloomy economic situation, as the criminals phishing attacks launched to provide the facilities. For example, e-mail posing as financial institutions need to obtain from a victim of bank cards, deposits and loans and other financial information, to help deal with bankruptcy or mergers, acquisitions and other matters. A large number of mergers and acquisitions information, so that consumers are confused. To make matters worse, the lack of unified communications, even for those who have nothing to fear of fraud.

* Hybrid Fishing / malware threats

In order to increase the success rate, number of phishing attacks with malicious software, combined manner. For example, a potential victim received phishing e-cards sent by mail, by clicking on the card, the user will not know the conditions in a fake Web site to enter, and the infection site to automatically download over the Trojans . In addition, victims may see a message before viewing the cards need to download the updated software (eg Flash). When the user of the software, when in fact it is a keylogger.

Fishing-based keylogger will track each user access record, and monitor them useful information, such as online shopping, bank card accounts and passwords and other sensitive information.

Another allow phishers to capture sensitive information, Trojans, it is redirected. Redirect the user to enter not make its intended site. At present, based on fishing, keyloggers and redirection are pandemic.

* Middleman SSL penetration attacks

In 2008, the emergence of a new encrypted session enables criminals to deceive the malicious software. This variant of the standard middle attack that allows criminals access to the network transmission unprotected passwords and other sensitive information.

* SMS and phone phishing scams

Phishers may use SMS instead of email to impersonate a financial institution and obtain confidential account information. Known as smishing (short message through phishing attacks), is a typical cellular phone fraud, it will notify the user bank account has been compromised or bank card is disabled, and requested a telephone call to restore banking services. Once cell phone users visit the Web site or through automatic telephone system, will be disclosed fraudulent financial information and bank PIN number.

Third, the impact of fishing on the business

While the financial industry has always been a major target for phishing attacks, but it is not the sole objective of being phishing attacks. Online payment, donation sites, retail and social networking sites often become prey to anglers. Anti-Phishing Working Group (APWG) reported that cell phone providers and manufacturers against phishing attacks also showed a significant growth trend. In other words, no industry or field to escape danger from attack.

Posing as a company's official website phishing attacks, would seriously damage the company's brand image and hurt the confidence of users, allows users to not dare to visit the official website. In addition, the company will be subject to the following effect:

* The impact of customer trust, online revenue and click-through rate will decline

* Once the customer data was leaked, the company should pay compensation

Phishing attacks also cause the user can not easily conduct online transactions, especially for those who do not trust them.

Fourth, to prevent phishing attacks

Although there is no way to deal once and for all phishing attacks, but can still use some techniques to protect your users and your interests.褰撳墠鐨勯挀楸兼妧鏈紝涓昏杩樻槸渚濊禆浜庤浣跨敤鎴风櫥闄嗕吉閫犵綉绔欒幏鍙栫敤鎴蜂俊鎭?璇稿SSL銆丒VSSL绛夋妧鏈湪闃茶寖閽撻奔鍜屽叾浠栧舰寮忕殑缃戠粶鐘姜鏂归潰锛岃繕鏄捣鐫?嚦鍏抽噸瑕佺殑浣滅敤銆?br />
銆??瀹炵幇瀹夊叏鐨勬渶浣冲仛娉曞氨鏄紝寮?惎鏈?珮绾у埆鐨勫姞瀵嗗拰璁よ瘉鎺柦銆係SL锛學eb瀹夊叏鐨勪笘鐣岀骇鏍囧噯锛屽畠鍙互瀵瑰埄鐢℉TTS鍗忚浼犺緭淇℃伅杩涜鍔犲瘑淇濇姢銆傚綋鍓嶇殑缁濆ぇ閮ㄥ垎鎿嶄綔绯荤粺銆乄eb娴忚鍣ㄣ?Internet搴旂敤绋嬪簭鍜屾湇鍔″櫒纭欢閮藉唴缃湁瀵筍SL鐨勬敮鎸併?

銆??涓轰簡甯姪鏈夋晥闃叉閽撻奔鏀诲嚮锛屽苟澧炲己鐢ㄦ埛淇′换锛屽叕鍙镐篃闇?涓?鍙互鍚戠敤鎴疯瘉鏄庡叾涓哄悎娉曠綉绔欑殑鏂规硶銆侲V SSL璇佷功鍙互甯姪浼佷笟瀹炵幇杩欎竴鐩殑銆傚畠鏄叏鐞冮鍏堢殑鏁板瓧璇佷功棰佸彂鏈烘瀯鍜屼富娴佺殑娴忚鍣ㄥ紑鍙戝晢鍏卞悓鍒跺畾鐨勪竴涓柊鐨凷SL璇佷功涓ユ牸韬唤楠岃瘉鏍囧噯锛岃鏂颁竴浠e畨鍏ㄦ祻瑙堝櫒(濡傦細IE7)鑳借瘑鍒嚭 EV SSL 鑰屽湪鍦板潃鏍忔樉绀轰负缁胯壊锛岃鏅?娑堣垂鑰呰兘纭俊姝e湪璁块棶鐨勭綉绔欏氨鏄?杩囨潈濞佺涓夋柟涓ユ牸韬唤楠岃瘉鐨勭幇瀹炰笘鐣岀殑鐪熷疄瀹炰綋锛屼粠鑰屽寮烘秷璐硅?淇″績锛屼績鎴愭洿澶氬湪绾夸氦鏄撱?




銆??铏界劧缃戠粶鐘姜鍒嗗瓙姝e彉寰楄秺鏉ヨ秺浼氭ā浠垮悎娉曠綉绔欙紝浣嗙敱浜庝粬浠病鏈塃V SSL璇佷功锛屽洜姝ゅ湪鍦板潃鏍忎笂 骞朵笉鑳芥樉绀哄嚭浠栦滑鐨勫悎娉曚俊鎭?

銆??闄や簡鍒╃敤EV SSL璇佷功鎶?湳澶栵紝浼佷笟杩樺簲璇ュ鍛樺伐鍜岀敤鎴峰氨缃戠粶琛屼负鍜屽浣曢伩鍏嶆璇堣繘琛屽浼犲拰鏁欒偛銆傛暀瀵间粬浠浣曡瘑鍒豢鍐掔綉绔欙紝濡傦細鎷煎啓閿欒銆佸己鐑堣姹傜敤鎴锋彁渚涗釜浜轰俊鎭?浼?鍩熷悕鎴栬?鏈煡閾炬帴銆?br />
銆??杩樿鏁欒偛浣犵殑瀹㈡埛鍜屽憳宸ワ紝鍦ㄦ彁渚涗换浣曚釜浜轰俊鎭垨鑰呭叾浠栨晱鎰熶俊鎭箣鍓嶅浣曡瘑鍒竴涓湁鏁堢殑銆佸畨鍏ㄧ綉绔欙細

銆??*鏌ョ湅缁胯壊鍦板潃鏍?br />
銆??*纭繚URL涓篐TTPS

銆??*鏌ョ湅瀹夊叏鏁板瓧璇佷功

銆??涓轰簡娑堥櫎閽撻奔鏀诲嚮甯︽潵鐨勬亹鎯э紝鏁欏鍛樺伐鍜屽鎴锋槸鏍戠珛蹇呰鐨勪俊浠荤殑鍏抽敭缁勬垚閮ㄥ垎銆傞?杩囧府鍔╁鎴风悊瑙e浣曠‘璁や粬浠槸鍚︾櫥闄嗗悎娉曠綉绔欙紝浼佷笟鍙互鑾峰緱鏇村鐨勫湪绾夸氦鏄撳拰鐢ㄦ埛璁块棶锛屽苟鎵╁ぇ鐭ュ悕搴﹀拰鏁翠綋閿?噺銆?br />
Summary

銆??缃戠粶閽撻奔浼氱户缁紨鍙樻垚鏂扮殑鑺辨牱锛屽畠浠瘯鍥惧埄鐢ㄤ汉浠浐鏈夌殑鍚屾儏蹇冦?淇′换鎴栬?濂藉蹇冿紝鏉ュ紑灞曚竴杞張涓?疆鐨勯挀楸兼椿鍔ㄣ?鍥犳锛屼繚鎶や紒涓氬搧鐗屽拰瀹㈡埛闇?浼佷笟浠樺嚭涓嶆噲鐨勫姫鍔涖?鍒╃敤鏈?珮绾у埆鐨勫畨鍏ㄩ槻鑼冩帾鏂藉拰EV SSL璇佷功鏁欏鍜屼繚鎶や綘鐨勫鎴凤紝鍙互璁╁鎴峰浼佷笟鐨勫湪绾挎湇鍔″厖婊′俊蹇冦?







相关链接:



John XINHUA introduction of Guangxi sugar set EAM2008



OGM to MP4



Using De exterminate rabbits annoying ads RMVB MOVIES



Refused to applaud for the rotten tomatoes



Wang Quanguo: To "King Kong" Solid As A Rock



Yuan established the value of win-win connection



Utilize All Practical Use Of Small Floating Window All Captures Thunder 5.9



Flying Milky Way God seven AIR



eBiz.scm Introduction



OGM To MKV



Shop Registry Tools



FLV TO PSP



email marketing Corregistration and product



Good Registry Tools



Tuesday, October 5, 2010

VBScript Month function



Month function

Between 1 to 12 return a integer (including 1 and 12), representing a month of the year.

Month (date)

date argument is any expression that can represent a date. If the date parameter contains Null, it returns Null.

Explain
The following examples use Month function returns the current month:

Dim MyVarMyVar = Month (Now)''MyVar contains the number corresponding to the current month.








Recommended links:



Me Introduce The Judges To Do Creative Practice Contest Hugo



Who told Panda burning incense on a job?



Review Telnet SERVERS



C2C staged "Three Kingdoms"



Chen Wende: Narrow City rushed machine must



TOD to WMV



Easy to USE Communications Tools



MTS to MOV



Flash game production - memory game



Languages Education Expert



All Roads Lead To Full High-definition Video Equipment HD Thunder



MPG To 3GP



Evaluate Access CONTROL



changing tod into archos 404



FREEBSD beginner you must know something