Tuesday, October 26, 2010

Compilation of various source - basmain



extrn $ $ main: far
cseg segment para public''code''

; This program is used to set the PSP address for a compiled BASIC program.
; The PSP segment is saved at 0:4 F2H.

; It can also be used to limit the maximum memory available to a compiled
; BASIC program. The option''/ M: nnn''is used on the command line, where
; Nnn is the number of K-bytes the program is limited to. If no, / M option
; Is specified, no memory limitation takes place. For example,''/ M: 64''would
; Limit the program to 64 * 1024 bytes. The range for nnn is 64 to 1024.

; This routine gets control before BASIC, does its handiwork, and then
; Passes control to the BASIC program. It must be linked as follows:
; LINK BASMAIN + yourprog, yourprog, NUL.MAP, BASCOM

; If BASMAIN is unable to limit memory as requested, a message is displayed
; And the execution of the program is continued.

public basmain
basmain proc far
assume cs: cseg, ds: cseg, ss: nothing, es: nothing

push ds; save ds
xor ax, ax
mov ds, ax; ds = 0
mov si, 4f2h; dos communications area
mov ax, es; get psp seg
mov [si], ax; save psp in dos comm area
pop ds; restore ds
mov si, 80h; point to command line
mov ch, 0
mov cl, [si]; get length of command line
jcxz p025; it''s zero

p010: inc si
mov al, [si]; get char from command line
cmp al ,''/''; is it a slash?
jnz p020; no
mov ax, [si +1]; get next 2 chars
cmp ax,'': M''; is it M:?
jz p030; yes
cmp ax,'': m''; is it m:?
jz p030; yes

p020: loop p010; check next char
p025: jmp p080; no / m: or / M: found

p030:; found / m: or / M:
add si, 3; point to first number
mov ax, 0
mov bx, 0
mov cx, 10
p040: mov bl, [si]; get character
cmp bl,''0''; out of range?
jb p050; yes
cmp bl,''9''; out of range?
ja p050; yes
sub bl,''0''; convert to binary
mul cx; multiply ax by 10
add ax, bx; add new digit
inc si; point to next char
jmp p040; continue

p050:; got value in ax
cmp ax, 64; less than 64K?
jb p060; yes - print msg
cmp ax, 1024; greater than 1024K?
ja p060; yes - print msg
mov cl, 6
sal ax, cl; convert from KB to paragraphs (* 64)
mov bx, es; get psp
add bx, ax; new top of memory
mov si, 2; point to top of memory in psp
mov ax, [si]; get current top of memory
cmp ax, bx; is new setting larger?
jae p055; no
mov dx, offset msg2; yes - print msg
jmp p065

p055: mov [si], bx; save new top of memory
jmp p080

p060: mov dx, offset msg1; print the message
p065: add dx, 100h; fudge for the psp
mov ah, 9
int 21h

p080: jmp $ $ main; jump to BASIC''s start point

msg1 db''Memory specification must be from 64 to 1024'', 7,10,13 ,''$''
msg2 db''Unable to limit memory'', 7,10,13 ,''$''

basmain endp
cseg ends
end basmain; must be a main program!







Recommended links:



7 Completely remove the USB device hardware approach



Emergency RESPONSE to where



Waves resurgence - Purple VS Sogou contest



MP4 to WMP



3G2 To AVI



Infomation Cursors And Fonts



"3G" STAGED battle



China mobile phone wholesalers why chinese



Chen Zhou reflect years of business success: The greatest scar has not come yet



How To Turn Your Career Profile?



Work life: Makes the most incredible 28 career Quotations



Brief Nature - Screen Savers



Photoshop plug-in FILTERS



WMV to QT



Before making any decisions



Tuesday, October 5, 2010

ADSL FAQ wonderful Q & A?



Do not use ADSL to dial-up? What dial number?

INTERNET ADSL with a virtual dial-up access and leased line access in two ways. Virtual dial-up users with similar MODEM and ISDN dial-up procedure, the use habits are no different than the original way. A high-speed access users can access as long as the boot INTERNET.

What is a virtual dial-up? What dial number?

A: The so-called virtual dial-up is the same when using ADSL INTERNET access need to enter user name and password (and the original MODEM and ISDN access to the same), but the ADSL connection is not a specific access number such as 16900, but the so-called Virtual Private Network VPN, ADSL access, IP address.

Browse the Internet using ADSL, you should not receive phone bills?

ADSL Internet access with telephone charges do not charge. Browse the Internet using ADSL, not through the telephone network, so no need pay the telephone charges.

Installation of ADSL, the user is required to apply for a dedicated telephone line? What are the requirements on the users computer?

Installation of ADSL, the user can either existing telephone lines in the transformation can also apply specifically to the second Internet phone line. There is no difference in the installation. If you use an existing telephone line, before the telephone number of the same. 586 computers in general can, and no special requirements. Users can use a simple method to judge the suitability of your computer: Can ordinary MODEM Internet, the computer results can still use the ADSL line can be (but does not require general MODEM).

Computer with ADSL Internet access if you want to buy new parts?

As the high speed ADSL, but the interface is also provided MODEM Ethernet interface. Therefore the user needs to plug an Ethernet PC card (normal 10 Gigabit Ethernet card, price is about 200 yuan or so.)

ADSL installation is not too much trouble, how long can not call?

No changes to the user to install ADSL phone line, installation takes only minutes, without any impact on the user, nothing to worry about destroying the telephone line.

I want to install ADSL, but worried about the quality of telephone service will decline. In addition, the call rate will lead to decline in the Internet?

ADSL equipment has been designed with this in mind, use special technology to separate the phone audio and data streams without disturbing each other. In the actual line test, install ADSL phone and ordinary telephone voice There is no difference: the time when the transmission data, bring the phone, hang up the phone and free calls, ADSL data transmission will not be affected.

If you want to install ADSL, what equipment to buy?

Because the ADSL terminal equipment and access equipment supporting the use of, as now you can buy the same general MODEM, purchase your favorite ADSL MODEM. However, we recommend that you purchase related equipment provided by telecommunications companies.

The possibility of extension devices are connected to ADSL?

No, only direct connection to ADSL terminal equipment.

ADSL equipment can not be the same as ordinary MODEM use?

No, but the users and the general MODEM similar manner, but with a telecommunications company providing client software to connect Internet.

Q: According to the speed of ADSL, local download should be more than 1M, why actually it only between 100-300K?

A: This is the rate of housing units. 56K modem to download the largest known of only 5-6K. 56K units is a bit, and the download rate display is byte. 1byte = 8bit. So download the show is 200kB in fact already reached 1.6Mbit, already quite fast. As the server and client hard disk access speed, and many other reasons, can not play local download speed ADSL2-8Mbit / s maximum capacity. We also expect a faster server appears.

I am a ADSL user, may sometimes not work online, this is why?

"Internet Express" - ADSL is a transmission signal in the original phone line technology, copper telephone lines to a certain law of two entangled with each other, so that can effectively resist the external electromagnetic interference. However, most telephone lines are parallel market line, the connection from the outside box to the user telephone number of this line are parallel with the line, which is very unfavorable ADSL signal transmission, long parallel lines ADSL phone line will cause instability ADSL light flashes and other phenomena, thus affecting the Internet. In addition, users connect the phone before the separator, or a device such as phone theft fighting will influence the data transfer.

How to view the network configuration?

A: If WIN95/98, had to be in the "Network Neighborhood / Properties" to view the IP address, DNS, WINS, Gateway, etc. whether the ADSL service providers to match

Why sometimes no ADSL access speeds much faster than regular dial-up MODEM?

A: ADSL access to result in slow conditions are as follows: 1) If access to foreign sites, access will be subject to export bandwidth and other factors such as site configuration; 2) Since the ADSL technology requires high quality of telephone lines, and in Shenzhen ADSL is used RADSL (ie rate adaptive ADSL), telephone exchange to the user if the phone line between certain period of time affected by external factors in the interference, RADSL the pros and cons based on line quality and transmission distance of the dynamically adjust the user's access speed.

ISDN is able to modify ADSL?

Although the media are carrying copper wire, but the ISDN telephone line voltage, signal coding different, for the time being can not change the ADSL. Must first be converted into ordinary ISDN telephone lines to conduct ADSL access.

10M/100M card to use in the ADSL speed difference?

In general, there will be no difference in speed, because speed ADSL Internet access from the network card limit and less than 10M, 10M, but the card is a large part of the ISA interface, use the I / O addressing mode, the CPU utilization high efficiency is very low, the impact of small on speed, so Ben Wang recommended two-speed PCI interface to 10M/100M adaptive network card.

Why not install a virtual dial WINDOW XP program?

Because WINDOW XP comes with dialing process the agreement itself, so just in Network Neighborhood create a new connection, you can get online.

ADSL network is 1M, so can use the bandwidth to 1M?

Certainly different, first of all because, ADSL central office to the bandwidth is 1M, but the other features more PPPoE protocol, it will have 5-10% of the bandwidth of the signal transmission for PPPoE protocol.

Existing ordinary dial-up or ISDN access to the Internet account, Can it be used on ADSL?

Can not, ADSL virtual dial-up account to re-apply. Ordinary dial-up or ISDN and ADSL technology structure, entirely different because they Telecom is verified by a different web server account.

Install ADSL for a fixed IP and virtual dial mode any different?

When installing ADSL users should choose according to your needs means. If you apply for ADSL is to be able to do their own home, let others come to browse, then you can apply for a fixed IP broadband services. But if you are online just to browse the Web, play games, watch movies ...... so, then you can apply for a virtual dial mode. In terms of speed, the difference was not different, you apply for 1M bandwidth, then the telecommunications company to you is 1M bandwidth, no matter what way. Virtual dial the Internet when the computers do not know how to protect themselves are more suitable, because the Internet when the IP is not fixed, it also prevents some people find you through a fixed IP to attack you







Recommended links:



Screen Savers Report



Fireworks produced hidden color photo



What the future of "beneficial" booming



MacTel Impact WinTel



evaluation Accounting And Finance



MPEG4 to MPEG



3GPP to WMV



Picked Online Gaming



MPG To DivX



China's economy remains to be seen whether there are signs of rebound



electronic paper technology tomorrow s paper



Fun For Your Dealer



e-cology in the micro-series 9 pan



Big Rabbit - Yuan Colombia



In the view state to save custom objects



Thursday, September 16, 2010

Why such a dramatic programming in Chinese?



Recently, the topic of countless Chinese language programming. Internet search engine, enter "Chinese programming," the words, comes into view on the numerous web site. It all sites in the domestic press, almost can find information on the topic of Chinese programming. Activities in the frequent users Sina blog, Sohu blog 锕?End of the World Forum, Jagged community, CDC Interactive Forum Forum and other large sites, it is to see, and Chinese programming became a topic of controversy many users.

According to Baidu statistics show that the Chinese program's website has up to 30 million. Meanwhile, the Chinese program's official website - click on the Chinese language programming network rates soared, from two months ago, the world's No. 3390000, straight up to the first 1.25 million now. It is no exaggeration to say that: Chinese programming in the industry it has never been a set off the shaking waves.

Chinese Programming Why so hot? Why has this attention? We forget about the Chinese language itself, programming technology aside, I think, mainly in the following several reasons.

First, the new things is always cause for concern, Chinese programming is no exception

Although the Chinese program was born as early as 1994, but has not been walking the road of popularization, but in government, military, aerospace technology and other areas of application, so little known. In the industry, our programmers are accustomed to using c language, java and other programming. English language computer programming language can be said has already gone deep. Now, Chinese programming from their girl out of a sudden, turned out to be popular in the country, almost all of the people is an accident. For the first time I heard there are Chinese programming, of course, is curious. So when the "Chinese programming dark horse dark horse blaze of national industry," the article in the well-known websites such as Sina Sohu 锕?was published, no doubt it caused an atomic world. Enthusiastic users have only to keep abreast of Sina as many 1155. The news for a long time, it has played Sina Technology News charts the most important position. "To more than 1,000 news comment on the news is not much." sina a press frankly. Chinese programming so that we really had an accident.

Second, Chinese programming curious, cause all kinds of speculation and questions

What is the Chinese language programming in the end? Whether Chinese programming? Japanese Ye Hao, Germany worth mentioning, South Korea Ye Hao, Russia worth mentioning, science and technology is not backward than China can not own a computer language, in China alone, a group of unknown people able to develop a Chinese language computer programming language? not been finished by other computer language? Chinese Programming software compatibility can you? is not plagiarized someone else's technology? Chinese language programming is not another Han Chinese core? ... ... It can be said of Chinese users unlimited programming led to reverie.

It may be prejudiced, it is often also difficult to accept the Chinese programming. Many people look at it with suspicion, speculation about it, question naturally very much. Some users even assume, to the Chinese language programming call-in a variety of hats. How Chinese programming, different opinions, the voice has not settled in all directions, they naturally did not make the curious satisfaction and admiration. Uproar of controversy, has never had a definitive result.

The Chinese language programming questions and more arguments, the higher the degree of our attention.

Third, the Internet played a role in fueling the

Some say development of the Internet today, the same as infectious diseases, rampant spread of a variety of information. These words not at all fake. Or the case, when the "sudden emergence of Chinese programming, national industry out of the dark horse" of the long communication, in "Chinese undertaking of a network" Sina is reproduced, the country reprinted the major networks have followed, according to incomplete statistics, there are 836 overnight many. This is a positive report about Chinese language programming. The opposite is true, a netizen in his blog, throw, following the Han Chinese core programming is a big scam after another, all of the sites have also reproduced, users are even more curious, "Does the Chinese variety of programming guess, with the conclusion? "Oh, not to mention the natural result. The Chinese programming on Fengyanfengyu, irrelevant comments, not only failed to bring the number of negative effects of Chinese programming, but the tendency to use the Internet, but also a handful of fire, visibility has improved significantly. Statistics show that there is Nosey: a 8340 national competition of Chinese programming stir together many websites.

Thus, the role of the Internet fueled, can not be underestimated ah.

Fourth, do not rule out espionage in the activities organized

Of course, this is only the author's speculation. It is said that the reports of Chinese programming, just released in the blood and iron community, there is a large group of Replies interactive users. Most users of Chinese programming questions put forward all kinds of high-level questions, attempts to explore the secrets of Chinese programming. If you do not answer some questions, those well-meaning friends to claim that Chinese programming is a lie, if answered, also leaked the. This website also in Chinese industry information station. Tree attracts the wind, so keep abreast of fast response, rack their brains to explore the Chinese language programming secret, I humble opinion, most likely organized in tracking Chinese spies programming. This is the Chinese language programming, a very important factor in heat.

Fifth, the lack of good faith, also contributed to the Chinese language programming "hot" an important reason

Nowadays, our lack credibility problem is serious, pervasive counterfeiting, Honesty everyday occurrence. Han core of the fraud, Kirin's event, Godson's embarrassment, all the Chinese people have endless pain. Handan, Hebei Agricultural Bank of China 50 million this year, the loss of large sums of money, it is still a lingering fear us. People ask, banks are so that we can believe? So time goes by, we have a watch of the psychological, not easily believe in things. The Chinese Language program, although it has independent intellectual property rights, and achieved national and international patents, or even top computer expert Professor Wu Kezhong domestic interview Sudy of Programming in a feasible and can be there who believe in the authenticity of Sudy of Programming? Despite Beijing country classic Chinese programming technology company, announced more than 50 kinds of time series with the Chinese puzzle game, and the development of practical software source code, can be voices of doubt are constantly, all the conjecture, the popularity of Chinese language programming, whether it is driven by what benefits it ... ... So, with a dike of the heart, we questioned, we guess, everyone's attention.

Various reasons, resulting in the heat of Chinese programmers not only not diminished, but a heat wave after wave. All voices but I can not convince most people, so I think in the next period of time, the heat wave of Chinese programming will still persist.







相关链接:



Chinese CN domain names registered by the end of lift height



M4v



The budget system is inadequately PREPARED elder Wu



Chat And Instant Messaging Guide



avi TO ps3



Special MO CD 230MB, 540MB, 640MB, 1.3GB



online WAV to mp3 converter



Do for others to do the wedding dress carriers should be out of the "influence" the edge



iphone RMVB



Unlimited access to the latest trick for Gmail account



Premier XML Or CSS Tools



Orient Securities Executive Assistant Shu Wang: grab the share of off-site transactions



Infomation Dictionaries Education



Screenshot Screenshot Effects Of Extraction



Secret benefits to customers Shi Xiaoen



Terminal And Telnet Clients Storage



Mold industry began to Show radiation effects



Monday, August 2, 2010

Unicom transition strayed into "their" way?


A runway can only be one leader, as the followers would like to lead, then it is best to re-select the track,

Thus, whether to follow or lead, are a smart choice.

Unicom's current situation is swinging back and forth on the two runways.

Unicom exchange standard, and the people uproar. In fact, last year, China Unicom has conspired to use only a one-year replacement LOGO slogan became "Let's all free connectivity." From the slogan change to the replacement of LOGO, Unicom is to embody the same theme. Before that, China Unicom has always advocated that "lead communications future."

Comply with "Application for the King" trend, this has been determined to be "technology pioneer" in the role of operators began repositioning itself.

3G Eve, it came later than, but some familiar. Not long ago, moving the slogan of "mobile communication expert" into the "Mobile Information Expert", the emphasis is shifted from the technical service information services, with Unicom's new thinking exactly the same.

涓?潯璺戦亾鍙彲鑳芥湁涓?綅棰嗚窇鑰咃紝浣滀负璺熼殢鑰呬篃鎯抽鍏堢殑璇濓紝鏈?ソ鏄噸鏂伴?鎷╄窇閬擄紝杩欐牱锛屼笉璁烘槸璺熼殢杩樻槸棰嗗厛锛岄兘涓嶅け涓烘槑鏅轰箣涓俱?鑱旈?鐩墠鐨勭姸鍐垫槸鍦ㄤ袱鏉¤窇閬撲笂鏉ュ洖鎽囨憜銆?br />
鍦ㄦ渶鍒濋偅鐗団?绾㈡捣鈥濓紙宸茬煡甯傚満绌洪棿锛夆?鈥旇瘽闊充笟鍔℃柟闈紝绉诲姩鏄?杩愯惀鍟嗭紝缃戠粶鎴愮啛锛屽崰鏈夊厛澶╀紭鍔匡紱鑱旈?C缃戝叏鏂伴摵璁撅紝涓囦簨寮?ご闅撅紝閿佸畾楂樼鐢ㄦ埛姝f槸浠ュ繁涔嬬煭姣旂Щ鍔ㄤ箣闀裤?姝f槸濡傛锛岃浆鍨嬪悗鐨勮仈閫氭棩鍓嶈〃绀猴紝C缃戜负鐩堝埄寮?鍚戜綆绔笚閫忋?

铏借鏄煫姝d簡濮挎?锛屼絾鏈夋剰鏃犳剰闂达紝鑱旈?姝e湪璧板悜鍙︿竴鐗団?绾㈡捣鈥濃?鈥斿湪鏁版嵁涓氬姟甯傚満涓庣Щ鍔ㄧ洿鎺ュ拰姝i潰绔炰簤銆侰DMA鍦ㄤ腑鍥介伃鍒板喎閬囪緝涓虹洿鎺ョ殑鍘熷洜鍦ㄤ簬绌烘湁缃戠粶鑰屽簲鐢ㄤ笉瓒筹紱鍚屾牱鐨勫按灏惤鍦ㄧЩ鍔ㄧ殑韬笂鍗存槸搴旂敤瓒呭墠锛屼絾缃戠粶涓嶅叿澶囦紭鍔裤?鍥犳鍙互璇达紝鍦ㄦ暟鎹笟鍔$殑寮?睍涓婏紝鑱旈?鏈夌潃寰堝ぇ鐨勫唴鍦ㄤ紭鍔垮拰鍙戝睍娼滃姏銆?br />
鍊熸崲鏍囦箣鏈猴紝鑱旈?鍦ㄨ繘琛屾柊涓?疆鐨勫搧鐗屾墦閫犮?鍏跺疄鍦ㄥ嚑骞存潵锛岃仈閫氬湪鍝佺墝鎵撻?涓庡缓璁句笂鍙皳涓嶉仐浣欏姏锛屼絾鍦ㄤ腑鍥界Щ鍔ㄨ繖涓己澶у鎵嬬殑寮哄姏鍐插嚮涓嬶紝灏辨樉寰楀急涓嶇椋庛?

浠庨拡瀵逛腑浣庣鐢ㄦ埛鐨勮仈閫?30銆?31鈥滃鎰忛?鈥濓紝鍒伴拡瀵归珮绔敤鎴风殑C缃戔?鑱旈?鏂版椂绌衡?锛岃仈閫氱殑鍝佺墝涔熸兜鐩栦簡鍏ㄧ嚎鐢ㄦ埛锛屼絾鍏跺湪缁忚惀涓嵈鍑虹幇浜嗗畾浣嶆憞鎽嗙殑闂銆傗?鑱旈?鏂版椂绌衡?鍦ㄩ伒寰害鑲敗鎻愬嚭鐨勯珮绔搧鐗岀瓥鐣ヤ笉涔咃紝鐢变簬甯傚満鍙戝睍閫熷害杈冪紦锛屼笉寰椾笉鍥炲埌浠锋牸璺嚎涓婏紝閫氳繃璧勮垂闄嶄綆銆侀?鎵嬫満绛夋垨鏄庢垨鏆楃殑浠锋牸鎵嬫鏉ュ惛寮曞鎴枫?

鑰屽弽瑙備腑鍥界Щ鍔紝閫氳繃鈥滃叏鐞冮?鈥濄?鈥滅宸炶鈥濄?鈥滃姩鎰熷湴甯︹?楂樹腑浣庝笁涓笉鍚屽眰娆$殑鍝佺墝锛屼笉绱т笉鎱㈢殑杩涜鑷繁鐨勫競鍦烘帹杩涳紝鍝佺墝瀹氫綅娓呮櫚銆佺粨鏋勫畬鏁达紝缁欒仈閫氱殑甯傚満杩涙敾鍑犱箮娌℃湁鐣欎笅绌洪棿锛屽競鍦洪瀵艰?鍜岄槻寰¤?鐨勯鑼冩樉闇叉棤閬椼?

鑷閫氶?鏈鏃╄蛋锛屽浠婄Щ鍔ㄧ殑搴旂敤鏈嶅姟鏃╁凡鍏堜竴姝ュ崰濂借溅浣嶏紝鑱旈?鐨勪笟鍔′箣杞﹁浠庢柊涓婅矾锛岄渶瑕佹瑙嗚嚜韬殑浼樼己鐐瑰姹傚垱鏂板彂灞曘?

褰撹仈閫氭彁鍑衡?寮曢閫氫俊鏈潵鈥濓紝绉诲姩绔嬮┈浜堜互鍙嶅嚮锛屾彁鍑衡?鏈潵鍦ㄦ垜鎵嬩腑鈥濄?鑱旈?銆佺Щ鍔ㄤ袱瀹剁Щ鍔ㄨ繍钀ュ晢鍚戞潵澶勪簬婵?儓鐨勭珵浜夊綋涓?涓??鑷亙鎶?湳浼樺娍锛屼竴鑰呮爣姒滃競鍦烘帉鎺э紝涓ゅ杩愯惀鍟嗘敞瀹氳鍦?G鏃朵唬灏嗙珵浜夎繘琛屽埌搴曪紝骞舵帴韪佃繘鍏ヤ竴鐗囧張涓?墖鈥滅孩娴封?銆傛湁浜鸿锛屽湪3G鍒版潵涔嬪墠锛岀粺涓?彂灞曟ā寮忔槸甯傚満鍩硅偛鎵?渶锛屼絾鏄紝鍗曞崟瀵逛簬鍦ㄦ妧鏈笂鏇村叿娼滃姏鐨勮仈閫氭潵璇达紝澶氬皯鏈変簺濮旀洸姹傚叏鐨勬剰鍛炽?

鍊煎緱鐜╁懗鐨勬槸锛屾洿鎹㈠徃鏍囨槸鑱旈?鏂板畼浠笂浠荤殑涓夋妸鐏箣涓?紝杩欎簺鏂板畼鍖呮嫭浠庝腑鍥界數淇¤皟鍏ョ殑涓浗鑱旈?鍏徃钁d簨闀垮父灏忓叺锛屾湁鐫?槑鏄剧殑鍥虹綉鑳屾櫙锛涘師浠诲寳浜Щ鍔ㄦ?缁忕悊鐨勪腑鍥借仈閫氬壇鎬昏鏉庡垰锛屽湪骞夸笢鏈塃DGE寤虹綉缁忛獙锛涘叾瀹冭繕鏈夊師浠诲畨寰界數淇℃?缁忕悊鐨勪腑鍥借仈閫氬壇鎬昏寮犲潎瀹夈?鐣欏績浠栦滑鐨勫嚭澶勶紝鍥炲懗鈥滆涓?垏鑷仈閫氣?鐨勭悊蹇佃瘔姹傦紝璇佷箣浠?.75浠?X缃戠粶鐨勯亶鍦板紑鑺辫?鍚屼唬EDGE鍥夸簬鐝犱笁瑙掍竴闅呯殑鐜板疄宸紓锛屼笉鐭ヨ兘鍚﹀彲浠ユ竻鏅扮湅鍒颁腑鍥借仈閫氱殑鏈潵銆?br />
濡傛灉蹇楀悜涓嶆斁鍦ㄢ?寮曢閫氫俊鏈潵鈥濓紝鑱旈?杩樻槸涓嶆槸鑱旈?锛熷鏋滄槸鍏ㄦ柊鐨勮仈閫氾紝鍙堝皢濡備綍瀹炵幇鈥滆涓?垏鑷敱鑱旈?鈥濓紵鏈変簺缁曞彛鐨勯棶棰橈紝鏈夊緟鑱旈?鐢ㄥ疄闄呰鍔ㄤ綔绛斻?






相关链接:



UML, RUP and Zachman framework: the perfect combination of [1]



video Converter



Storage Games Arcade



WHAT is rmvb



Refused To Applaud For The Rotten Tomatoes



.vob file



Compare Games And Entertainment



COSCO Kawasaki's shipbuilding mode



Find 20%



Dell's earnings Report late three times or face Nasdaq delisting



Mp4 to wmv converter free



Report Food And Drink



Unicom announced IPhone bare metal prices



FreeBSD Serial (14): shell set



Thursday, July 15, 2010

About PGP



銆怰EVIEW銆?In this paper, the realization principle about PGP and background knowledge.

In this paper, the realization principle about PGP and background knowledge. The other on the PGP installation, use, etc. Please refer to this article and other documents are provided. PGP Pretty Good Privacy, is an RSA public key encryption system based on e-mail encryption software. Can use it to your e-mail confidential to prevent unauthorized persons to read, it can also add your e-mail signature so that the recipient can be sure that the message is sent by you. It allows you to safely and you have never seen people communicate, do not need any prior confidentiality channel used to pass key. It uses: careful key management, an RSA encryption of the hybrid and traditional algorithms, message digest for digital signature algorithms, encryption, compression, etc. before, there are a good ergonomic design. It has fast speed and powerful. And its source code is free of charge. PGP's features in fact more than the above said: PGP can be used to encrypt files, you can also use PGP instead of UUencode generate RADIX 64 format (MIME is the BASE 64 format) encoded files. PGP is the founder of the United States Phil Zimmermann. His creativity lies in his RSA public key system to the convenience and speed of traditional encryption systems combined, and authentication in digital signatures and key management mechanisms have a clever design. So PGP become almost the most popular public key encryption package. PGP is an encryption software for public use. Encryption is for security, privacy is a basic human right. In modern society, e-mail and network file transfer has become a part of life. E-mail security problems have become increasingly prominent, and we all know the Internet to transmit data is not encrypted. If you do not protect their own information, third parties will have easy access to your secret. Another problem is the message authentication, how to make the recipient believe the message has not been tampered with third parties, we need digital signatures. RSA public key system features make it ideally suited to meet these two requirements: Confidentiality (Privacy) and authentication (Authentication).

RSA (Rivest-Shamir-Adleman) algorithm is a prime factor decomposition based on large numbers can not assume that the public key system. Simply is to find two large prime numbers, one open to the world, a world not tell anyone. Called "public key" and another called "private key" (Public key & Secretkey or Private key). The two keys are complementary, that is encrypted with a public key cipher can be decrypted using the private key, and vice versa. Suppose A to B to send a letter, they know each other's public key. A with B's public key to encrypt messages sent, B received after his own private key can decrypt the A's original. Since no other people to know B's private key so I can not even decrypt a letter, which addresses the issue of confidentiality letter. On the other hand because everyone knows B's public key, they can write to B, then B can not be sure it was not a letter. Certified question arises, this time, there digital signature used.

Before the first digital signature in the notes to explain what "message digest" (message digest), is one speaking on a message method with a calculated one can embody this message "essence" of a few years, once the message has any change this number will change, then the number with the author's name (actually the key in the author) also dates and so on, you can sign up as a. Rather PGP is a 128-bit binary number as a "message digest", and used to generate its algorithm called MD5 (message digest 5), MD5 The author is Ron Rivest, PGP is the code used in Colin Plumb prepared, MD5 itself is the common software. So PGP legal provisions are not mentioned. MD5 is a one-way hash algorithm, which unlike the CRC check code, hard to find a replacement with the original message with the same "essence."

Back up digital signature, a private with its own 128-bit key would be the "cream" of encryption, attached to the mail, then B's public key to encrypt the entire message. The ciphertext that was received after B and B with their own private key to decrypt the message, get the original text and signature A, B of PGP calculated from a 128-bit original "cream" to re-use A's public key Comparing the number of signatures obtained to decrypt, if found to explain this is indeed a message sent. This two requirements are met.

PGP encryption can also be not only the signature, which applies to public statements, the statements of people in order to prove his identity (so the network can), you can use your private key signature. This allows the recipient to confirm the identity of the sender, the sender can deny his own statement to prevent. This is great in the commercial application of the future of the field, it can prevent the sender's denial and the letter was en route tampering.

So why use PGP encryption is RSA and the traditional hybrid algorithm? Because a great amount of RSA algorithm for encryption speed is not a lot of data, so PGP encryption is not actually used for RSA itself, but uses a traditional encryption algorithm called IDEA. Let me first explain what is meant by traditional encryption, simply is to use a plaintext encryption key, and then use the same key to decrypt. This approach is represented by the DES (US Federal DataEncryption Standard), is multiplication encryption, its main drawback is that the transmission channel can not solve key security issues, e-mail encryption is not suitable for the network environment needs. IDEA is a patented algorithm, the patent holder is the ETH and a Swiss companies: Ascom-Tech AG. IDEA to achieve non-commercial use without paying fees to them. IDEA, plus (solutions) close much faster rate than RSA, it actually is a randomly generated PGP key (different for each encrypted) encrypted with the IDEA algorithm explicitly, then the key with RSA encryption algorithm. This is also the recipient of this RSA to decrypt the random key, and then IDEA decrypt the message itself. This chain RSA encryption to make the existing system of confidentiality, but also a fast algorithm of IDEA. PGP creative half on this point, why RSA system proposed 70 years ago, has not promote the use of it? Too slow! Then the other half of PGP creative here? I talk about under the surface PGP's key management.

A sophisticated encryption system must have a sophisticated key management mechanisms supporting. Public key system proposed is to solve the traditional encryption key distribution system difficult to confidential shortcomings. Such as Internet hacker who is one of the means used to "listen", if the key is transmitted through the network would be too dangerous. For example: NovellNetware old version, the user's password in cleartext in the transmission line, so that listeners will easily get the password of others. Of course, Netware 4.1 in the header of the user password is now encrypted in the. On the PGP public key is supposed to be for the public, there is no anti-monitoring problem. However, the release of public key security issues still exist, such as public key's been tampered with (Public Key Tampering), which is public key cryptography may be the biggest loophole, as most beginners can not quickly find it. You must be sure you get the public key belongs to its looks is the one. In order to clarify this issue, I give an example, and then say how to properly use the PGP plug this loophole.

Alice's communication to you and example, suppose you want to mail a letter to Alice, then you have to have Alice's public key, you download from the BBS on Alice's public key, and used it to encrypt a message sent with the function of BBS's Email the Alice. Unfortunately, you and Alice do not know, another user named Charlie sneaked into the user BBS, the name of his own with Alice's key pair generated public key replaces Alice's public key. You used to write the public key is not Alice, but Charlie, everything seems to be Ok, because you get the public key of the user name is "Alice". So Charlie can use his private key to decrypt the hands of your letter to Alice, and even he can use Alice's public key to a real forward your letter to Alice, so no one will not be suspicious, he would like to change if you give Alice did not issue the letter. What is more, he can forge Alice's signature letter to you or anyone else, because you in the hands of the public key is fake, you would think that Alice is really a letter.

Avoid such a situation the best way to prevent any other person the opportunity to tamper with public key, such as get her hands directly from Alice's public key, but when she was thousands of miles away or can not see, this is very difficult . PGP public key describes the development of a mechanism to solve this problem. For example: If you and Alice have a mutual friend David, but David knew he was in the hands of Alice's public key is correct (on how certified public key, PGP there is a way to talk back, assuming David has already Alice had her certified public key). So David can use his own private key in Alice's public key to sign (that is, speak with the signature of the above methods), said he secured the public key belongs to Alice. Of course you need to use David's public key to verify Alice he gave you the public key, the same David to Alice can be certified for your public key, so that David will be between you and Alice "introducer." Alice or David so they can be safely put David signature to Alice's public key uploaded to BBS and let you go and get, not to tamper with it might not be you find, even BBS administrator. This is the public key from a public safety channel transmission means.

Some people may ask: how do you safely get David's public key then, this is not a first, the chicken or the egg question? Indeed, David could you get the public key is fake, but this requires the participation mischief this whole process, he must be three of you are familiar with, but also planning for a long time, which is generally not possible. Of course, PGP may have to prevent such a proposal, that is widely trusted by a person or institution to play this role. He was known as the "key waiter" or "certification authority", each signed by his public key is considered to be true, so you only have a copy of his public key on the line, this person's public key certificate is to facilitate because he was widely available this service, fake his public key is extremely difficult because of his wide spread public key. This "authority" for non-personal control as organizations or government agencies, now have the institutional level certification system exists.

For people who are dispersed, PGP is more in favor of the use of private means of key referral form, because it better reflects the non-organic nature of social interaction, and that people can trust the people the freedom to choose to introduce. Short and to meet the same people do not know. Each public key has at least a "user name" (User ID), please try to use their full name, preferably together with my Email address, to avoid confusion.

Attention! You must follow a rule is: you use any public key, be sure to first certified it! ! ! No matter what you are tempted, of course, there will be this temptation, you do not, absolutely not, a direct trust from the public channels (by those who seem confidential) have come to the public key, remember to use the public key acquaintance introduced or their own personal authentication with each other. Do not the same as the others you sign their public key authentication, you and your real life, home, house keys to the trust you are only human.

Now, I talk about how the authentication key by telephone. Each key has their own identity (keyID), keyID is a hexadecimal number eight, the two keys have the same keyID possibility is one of billions, and PGP also provides a more reliable method of identification keys: "Key fingerprint" (key''s fingerprint). Each key corresponds to a string of numbers (16 8 hexadecimal numbers), this figure may be repeated more minimal. And no one can specify to generate a key with a fingerprint, key is randomly generated from the fingerprint can not be key to anti-launched. So you get someone's public key after him on the phone can check the fingerprint, which certified his public key. If you can not, and Alice the phone, you can phone David David's public key certificate, which certified by David Alice's public key, which is directly and indirectly introduced the combination of authentication.

This gives rise to a method, is to sign with different people gather together their own public key, sent to public occasions, so most people can expect at least know one of them, and thus indirectly, your public key certification. Similarly, you signed a friend's public key should be returned to his post, so let him be you through your other friends authentication. A bit like it, and social reality as people contacts. PGP will automatically find you get your public key in what your friends come, who is friend of a friend you came, which is a friend of a friend's friend's ... ... it will help you to divide them into different trust level, so that you refer to determine their level of trust. You can designate someone to have several layers of public key referred to the ability, this ability is delivered with certification and decreasing.

Referred to the authentication mechanism which can be transferred, this is an interesting question. PGP author Phil Zimmermann. A statement: "do not have transitive trust; I have a friend I think not lie. But he is determined president would not lie fool, obviously I do not think the president will not lie."

On the security of public key security issue is the core of PGP, I will not elaborate here. Like the traditional single-key system, private key confidentiality is crucial. In terms of relative public key and private key does not exist to be tampered with, but there is disclosure of the issue. RSA private key is a long one number, the user can not remember it, PGP's approach is to allow users to randomly generated RSA private key to specify a password (pass phase). Only by giving the password to release the private key using the private key with password encryption method of confidentiality and PGP itself is the same. Therefore the private key of the security issue is in fact the first user password confidential. Compromised private key file itself of course is also very dangerous, because those who just need breaking with the exhaustive method test out your password, and although very difficult, but after all is lost level of security. Here only briefly to remember that like any privacy to be preserved as your private key, do not let anyone have access to it.

PGP Security issues in the careful consideration reflected in all aspects of PGP. Such as the actual encryption key for each is a random number, we all know that computers can not generate real random numbers. PGP program to generate random numbers is very prudent, random number key RSA key is generated as the user see the keyboard from the time interval to achieve a random number seeds. For the disk randseed.bin file is used and mail the same encryption strength. This effectively prevents other people from your randseed.bin paper analyze your key to the Law of the actual encryption.

Here I refer to the PGP encryption before the pre-compression, PGP core algorithms using PKZIP to compress plaintext before encryption. On the one hand on the e-mail, the compressed encrypted encoded ciphertext for another 7bits have less than clear, which saves time for network transmission. On the other hand, clearly compressed, in fact, after the equivalent of a transformation, information more disorganized and the resilience of the plaintext attack more. PGP algorithm used in PKZIP was agreed after the original author. PKZIP algorithm is a recognized compression ratio and compression speed are very good compression algorithm. PGP is used in PKZIP 2.0 compatible version of the algorithm.

Well, on the PGP security issues I will "PGP Security," a paper devoted. I have just mentioned, so much just to let everyone know that PGP is very safe, as long as you follow the correct use. Installation and use of PGP, please refer to "PGP 2.6.3i installation and use of" article. If you look at the English document, some do not understand the words, try to not be from the "PGP Glossary" article for clues. PGP 2.6.3i is I recommend you use the PGP version of detailed questions about this version, see "PGPi Questions" article.

In today's Internet use PGP signatures can be seen on the article, PGP quickly updated version is also said to PGP 3.0 and then a few months to release the. The world, more and more people use PGP, we Chinese people should pay attention to protect their legitimate privacy rights. I translate articles is to organize the promotion in the domestic use of PGP. Although it is still a new thing, but we want to see in cyberspace (CyberSpace) in that it can certainly grow up fast, although China started late, but not too different than the U.S., we should catch up.







相关链接:



mkv



MP3 M3U to ID3



5Star DVD to Video RIPPER



Youtube to AVI Pack



Flac To Wav



Infomation Components And Libraries



Mov to avi converter



Infomation E-Mail List Management



Experts Return Weapon entertainment, travel to save MONEY



Clocks And Alarms introduction



WORLDCUP Flash to Mobile



Vob File



Youtube Movie TO Windows Mobile Pack



Video Player



Thursday, July 8, 2010

MP3 M3U to ID3

MP3 M3U to ID3 is a DVD copy and ripping tool easy to use at high speed. MP3 M3U to ID3 can copy and backup DVD movie to all popular video formats such as VCD, SVCD, DivX, MPEG1, MPEG 2, MPEG 4, AVI etc. Being suited for both veterans and beginners.
You can save your favorite CD as audio files on your hard disk also include the CD album, artist, track titles and much more CD information. Convert MP3 to WAV, WAV/MP3 to WMA, OGG to WAV/MP3, WMA to WAV/MP3, WAV to MP3, WAV/MP3 to OGG.Burn your favorite songs to CDs so you can listen them in your home or car stereo CD player.Record sound include line-in, CD, tape, microphone and any input source to WAV, MP3, WMA and OGG files directly.



Recommand Link:



Popular iPhone Suite Free Download



mpeg to mp4 converter



flv to mp3 converter



Digital M4A MP3 to AC3 Converter



News Servers Specialist



X-CLONER DVD to 3GP



Wondershare DVD to AVI Converter



Mkv



Explosion DVD Converter



Premier Download Managers



real player to h.264/avc



ValeSoft DVD to Apple TV Video Converter



Picked Online Gaming



Friday, July 2, 2010

AAC CDA to RA

AAC CDA to RA is an extremely easy to use yet powerful converter and decoder. Very stable Performance. Very fast install. Very stable Performance. Take up the very few system resources. Very stable Performance. Very fast install. Take up the very few system resources. AAC CDA to RA is an extremely easy to use yet powerful CD.
Convert MIDI files to MP3, CD, CDA, CD-R, DVD-Audio, AAC, AC3, ID3, M3U, M4A, M4P, MP3 ID3 Tag, OGG, RA, WAV, WMA, MP2, APE, VQF, MPC, AMR, Midi, WAVE, and RM file audio formats.



Recommand Link:



Plato Video To FLV Converter



CD Brochure Builder



Open AVI Converter



Vacations DivX Converter



Flv To Swf



Bliss DVD-Audio APE AC3 to WMA Burner



Ever CDA MPC Sound to WAV Conversion



Cartoons - Screen Savers Expert



Download video to Archos 7 soft



Extra DVD Ripper Professional



Comparison Reference Tools



Video to iPod Nano conversion tool



X-CLONER DVD to DivX



GUIDE Audio Speech



Extra DVD To Sony PSP PS3 Ripper