Friday, March 11, 2011

Digital certificates can also be letters?


Not long ago, Shanghai 33-year-old Mr Choy in the Construction Bank of Internet banking card suddenly disappeared 16 million yuan, while the last case the bank's efforts in detection, but still so many people feel palpitations. It is said that the
This situation is not unusual, mainly because the banks issuing digital certificates through MSN and other real-time software tools being stolen, theft, fraudulent use of Mr Choy on behalf of such person into no man's land, swaggered to 160,000 yuan in multiple money taken away. This allows many users fear has always been known as the most secure digital certificate actually have such a big loophole, digital certificates can believe it? Investors heard a few years ago the capital account have been maliciously manipulated, the sale of some of the decrease in stock, so that assets are huge losses of events, these events have occurred in recent years, since the whole of this year, the stock market madness, the Internet stocks security issues become the focus of attention.

How safe is digital certificate

Digital certificates are used to sign and certify the identity of both the network communication of digital information file. Digital certificate has been considered the most secure online banking pass, than the traditional "account number + password" more protection. , "Electronic Signature Law of the PRC," The introduction of digital certificates to form legally recognized security technology into people's daily use in, CA electronic authentication services, PKI technology is people gradually so familiar.

Because of this, the end of 2006, China more than 40 million online banking users, the existing individual users using digital certificates 46%, 46.3% of business users in the digital certificate being used.

Digital certificate is like a gateway to online banking security locks, but if we are key to the lock placed anywhere, or do not lock when inserted in a long time, and paste the password lock next to the fancy takes the reader in the insurance, regardless of security locks What a strong and reliable, is useless.

Lack of financial Digital Certificate

Why use a digital certificate will also appear after the funds stolen events? This use of digital certificates and bank methods. Some commercial banks in consideration of the use of cost, online banking use cheap, non-secure storage of "soft digital certificate" that banks provide their own replication, can be saved in a computer or mobile device without security on the digital certificate Some certificates are free, some of the certificate fee only costs 20 to 30 dollars. As the soft digital certificates can be saved as files, Trojans still have the opportunity to copy the certificate, record the password, causing the user account is stolen, so that the certificate is unsafe, Shanghai, Mr. Cai is the case encountered.

Some banks realized the lack of soft certificate, and that he introduced a hardware certification, price from 60 yuan to 80 per month. But the risk still exists. Financial industry established itself as a digital certificate, in technically not professional, some without going through the relevant state department certification, equivalent of two further an athlete has the referee, to thoroughly ensure the native security certificate.

Digital certificates require third-party certification

The most secure digital certificate should be certified by a third party digital certificate, digital certificate stored in the technology by the State Board approved the certificate password storage medium, the user certificate used to insert the storage medium and enter the medium security
Protection code, for two-factor authentication; in the use of the process need to verify the existence of the certificate and valid, the signature / verification, encryption / decryption and other operations are carried out in the media operation, key file will not be transferred out medium; used up Unplug the certificate storage medium, the medium of the documents will not be saved on your computer, so users do not have to worry about hackers control or theft. Because secure digital certificate storage media can not be observed, not to copy features make the Trojans can not copy, effective protection of digital certificates.

"The People's Republic of China Electronic Signature Law" stipulates that "third-party certification of electronic signature required, from the electronic certification service provider to provide certification services," the letter can be given legal effect of the digital certificate shall be established by law, the electronic certification service provider presented. In the "Electronic Certification Services" in the provisions required under the law of electronic certification services in the electronic certification services with professional and technical personnel, operations management, security management and customer service staff; have a fixed place of business and to meet the requirements of electronic certification services physical environment; comply with national safety standards with the technology and equipment, mandatory targets, to ensure that a digital certificate issued by the rigorous review of data, real credible, and legitimate position of CA is also a neutral third-party technology and the law to protect users interests. Currently available, "Electronic Authentication Service License" in the online security of electronic transactions with the authority and impartiality of the trusted third party CA National legitimate only 21.

Such certificate may be the price at 100 yuan, but received the official professional certification, from the security get a great guarantee. Financial sector need to be further co-operation with third-party CA center can completely guarantee the safety of users of funds.










Wizard Personal INTEREST



College STUDENT hidden hard to guarantee the right to life and health worries



The birth of kissing fish



the ps3 ylod fix the yellow light of death



Prerelease download ATi Catalyst 5.5



Zen MOZAIC Converter



Describe The C # Call An External Process



RM TO AVI



IFO file Converter



Storage Inventory And Barcoding



Using De exterminate rabbits annoying ads RMVB movies



Saturday, October 23, 2010

Shanghai Public Transport Demand, "IQ" high


Shanghai bus drivers in a line chef Lee usually like to drive fast, most recently his "horse" has just been replaced by a new application O bus, can easily over 100 kilometers per hour. If in the past, this new car to one lot or viaduct Shu, Li Biao, the master should not be allowed while security. But now he dare not, and sticking to only run 80 km per hour, peak 60 km, a small section of the control at 50 km.

Master Li is not daring smaller, but because the car more time intelligent system sets the "monitoring" him. Master Lee for speeding if within 5 seconds, the system will live in peace with him, excluding his non-compliance; to continuous speeding more than 5 seconds, the system will alert them to abnormal data back to the background; soon speeding over the 10 km distance , the system master by the car radio to make informed Lee. Master Lee does not listen to "sincere advice" bent on whom, then reach the destination before the end of the lunch, he served "eat" on a ticket.

Close close customer service "concern" drivers

Lee's master instill obedience in this system is the public transportation industry, specifically operational management developed by the current leading the "3G" (GPS, GPRS, GIS) technology, technology development side bus Group subsidiary - Shanghai Bus Information System Engineering Co., Ltd. Chun of Friends. Senior engineer Yu Guiming these days too proud, because their system has just passed another test run in major cities, will expand the applications.

According to Yu Guiming introduction, the Shanghai total of 18,000 buses, mainly belong to four groups, the Bus (9000), Xiali public (3000), Johnson (2000), Guanzhong (1000). Remove the vehicle in 3000 is not good, really on the road there are about 15,000. 15,000 vehicles in this, the bus Toshitomo intelligent system has real equipment 3100, for a total of more than 80 lines.

"Vehicle turn, pull a good handrail Note." Every day that prompt voice buses in Shanghai is in the ring. However, in the 123 line, a similar voice-prompted GPS positioning system has been hung with hooks. "In the past, rely on voice prompts drivers to hand press button operation, every turning point of the geographic information has been recorded, the vehicle near the turning point, GPS positioning system can automatically recognize it automatically sounds an alert. The driver no longer distraction a. "Yugui Ming said.

Voice prompts and automatic intelligent system bus-stop is just a small feature in these buses, the installation of equipment, including automatic traffic recorders, GPS systems, GSM communication system, so that bus traffic safety with a reliable guarantee .

Driving recorder can accurately record the data each time point and door vehicles off state, the real-time data is sent to the background. Drivers in the pit stop, the speed of 2 kilometers per hour less than in the parking count, speed, zero to open a door, or back door will be cf time speed record for the "sliding car door state" like such a violation. From the station must be closed when the speed is zero. In the traffic on the way, the recorder automatically according to speed with the voice prompts to the language of the drivers speeding, passengers can clearly know the current operating conditions, real-time monitoring of the drivers.

In addition, some lines have been able to do so passengers waiting on the bus arrival time had an idea for bus groups with the Shanghai Media Group, building a new electronic stop sign. Station Name integrated grid, GPS positioning technology, traffic forecasts and technology, through wireless data exchange, which greatly improved the forecasting accuracy. Waiting on the platform in the new, passengers can view the recent arrival of a road when the bus in order to decide whether to continue to wait or take the bus on duty.

Intelligent system to facilitate the number of passengers, bus drivers also benefit from the lot. In addition to automatic reporting stations feature allows drivers to worry prompts effort, the driving recorder back to the background of the vehicle's data traffic for the driver in the face of such great state, to provide a reliable and valid evidence to help solve the related drivers legal disputes.

Moreover, because buses generally have been installed car TVs, audio equipment, power consumption than the original design, in the event current overload, lead to disastrous consequences, constitute a serious hazard for vehicle safety. But with traffic recorder, vehicle and other aspects of the current data also returns the background, easy to monitor traffic to the emergence of anomalies, so that early discovery, early settlement.

Demand economic flew visible

Intelligent system has improved the bus, "IQ", Nature will be easy to see economic benefits. Speaking of cost, passengers may experience less than the cost of public transportation system operating pressure. Yugui Ming said: "The rising oil prices, scrap vehicles more, updating speed, bus even Kongshi must make sure that out of the bus, the bus groups themselves are also listed companies, profit pressures extraordinary. Intelligent System-side in the reduction of vehicle mileage on Kongshi save a significant amount of the Group expenditure. "

Car Smart bus terminal increase the "IQ"

In the past, the operation of bus routes to the originating station from the parking lot, then start day operations. With the intelligent system, bus lines, either from the middle of the site into operation, no need to wait for scheduling the departure station; with a group of vehicles can also be flexible to adjust the lines, small capacity vehicles can support peak lines, could both increase the transport capacity and profitability, but also improve social service quality. The driver-for-line, the only credit card can be adjusted, the vehicle will automatically head, waist and tail signs replaced with a new line content, voice prompts every step of the way of change, truly a "demand."

Demand for the bus line vehicles to adjust the Group has a standby vehicle to save costs. Bus Group, the total road running more than 7,000 buses, in the intelligence system before the key lines to ensure capacity for peak periods, each branch must ensure that 10% of the stock of vehicles, the bus group will have to prepare 700 spare car.

After 90 years of the 20th century, continuous improvement and upgrading bus, cheap points, such as Guilin, one should also 500000 Daewoo brand and better Ruishi Shen O is 70 ~ 800 000. If you continue to maintain the original number of spare cars, the bus group, amount of funds used is very serious. But on the intelligence system, the retention of the stock of vehicles of each branch significantly reduced, and more spare cars out of the busy line can support each of the procurement savings, maintenance costs over a hundred million.

Intelligent system to produce economic benefits of such an impressive, Who would have thought the time had launched, drivers, dispatchers, office manager, was unanimously against it? Yu Guiming for journalists has opened the secret. Previously, some drivers like the smart did little tricks, deliberately given a statement of some stations directly to the car back to the end, it is not only not punished, but also fraud Saving Award; some good relationship with the dispatcher to the driver, the driver ran four laps to record his 5 laps, and now can not cheat, because a single automated reporting system road and manual reports a comparison, the error value is out of range means that transmission of the disease.

In addition, some branch managers were previously set up illegal accounts, such as borrowing the car outing, and rents have put in their coffers. Positioning System can now be found online on the road vehicle is running, as long as no vehicles running on the specified routes, will be regarded as abnormal, subsequent to the survey. In the oil sector, given the fuel card and the information systems integration, How much fuel each vehicle, whether it is abnormal, the system can be found in the background.

In short, the intelligent system launched, meaning drivers, dispatchers, office manager no longer had their own self-serving.

Scheduling the end of the traditional management model diversification

Intelligent system to bring more than just hard cash benefits, but also triggered a bus group itself changes. Yu Guiming said, to intelligent systems up and running, companies need to diversify the traditional management paradigm shift scheduling. "France has 1,400 buses, a company that only 3,000 people inside and outside the ground crew, bus groups there are 60,000 people 7,000 vehicles. There is considerable management benefits can be tapped." Yugui Ming said.

Bus Group is currently planning for a diversified operation. In the past, Shanghai's bus routes mainly depend on manual scheduling staff scheduling, scheduling of each line are bilateral, that is set up in the bus lines of both ends of the dispatcher. Defects in this system, although to ensure that the time interval out of two terminals to meet the requirements, but can not guarantee that all sites Junan required to reach half-way, and the lack of overall dispatch ends. Actual operation, the same bus lines concentrated in the up line or down line, and finally piled up in a terminal, the driver to wait a long time, the time spent driving is not much.

To this end, the bus groups make great efforts to collect and dispatch-related information, such as driving speed of each bus, to a certain point of time, different periods of congestion situation, a section of the climate change. Together these information, the scheduler be able to "absorb" the experience of the dispatcher, to automate scheduling.

"System can quickly design a scheduling table the next day. Compared with the experience of the dispatcher, the system is more accurate and more realistic. The benefits of the system scheduling is to reduce the drivers and dispatch personnel fill in the form of time, particularly certain lines per minute peak time grid, this time saved is considerable. "Yugui Ming said. According to statistics, in the past each bus in the terminal waiting time of 25 minutes, now down to 10 to 15 minutes. Without increasing costs, raising vehicle efficiency.

To change the traditional bilateral scheduling model, the bus operation of the Group developed a set of unilateral program, or called one-way air-release program, that is the terminus of the passenger away from one terminal to another terminal stop. For example, line 123, there is the phenomenon of tides in the morning from the direction of People's Square to Yueyang Hospital, very few people. Implementation of the one-way air discharge, the 123 line going directly overhead, the passengers taken from the People's Square, Yueyang Hospital, do not rely on intermediate stop, then return from the Yueyang Hospital, followed by station capacity. The peak of the original can only be made six trips, now made 22 trips, effective solution to the peak of the up and down in both directions on the issue of uniform traffic demand.

While the implementation of one-way air discharge, the bus company also were used for different line interval (for example, is the end of 55 road cars to three channels, but to those who Wujiaochang up, so do not separate the part of the car the three channels, only to Wujiaochang ), double interval (less than 2, which scheduling), and the intermediate added (to a site with a customer directly into) modes.

Diverse group scheduling to help save the human cost of the bus, opened the line in both directions, to shorten the waiting time the driver of the grid, thus significantly saving time and cost of capital. Bus Group, in accordance with the plan, the end of 2006, less than 110 lines within the Link 50% will use diverse scheduling model.






Recommended links:



Used to create automatic play music listening Pros CD



Reference Tools Shop



You before the BOSS look like a duck in a variety of Lotus



Introduction Nature - Screen Savers



PCCW's Assets, Hedge Funds Covet Emergency Shot Sing Tao Charles Ho



Photoshop rendering realistic beautiful necklace



VOB to FLV



YouTube To WMV



Foreign general manager of Intel low-key arrival in shaping China's power structure



New XML Or CSS Tools



GPS POSITIONING world



Baby Ringtone Justin Bieber Baby Ringtone



MP4 to 3GP



vb6 how to dynamically add controls



CGI Tutorial: Chapter cgilib cases



Thursday, October 14, 2010

Dynamic VLAN moving from person to person


As the company continues to expand the network, switches, technology advances, the company's network administrators are more willing to choose the layout can network switches, network switches and can be applied in the VLAN (virtual local area network), VLAN by devices connected from different regions, making the device between different regions separated from each other, VLAN can isolate broadcast and broadcast storm suppression within the scope of this VLAN, VLAN other users will not be affected very save network bandwidth. VLAN technology in the implementation, the dynamic VLAN is obviously loved by the users.

Dynamic VLAN better than the static VLAN

The properties of the switch port connected to divide, VLAN is divided into the static VLAN and dynamic VLAN. Static VLAN refers to the switch which VLAN a port is relatively fixed, while dynamic VLAN is the switch under the access to this computer to determine which VLAN the port is in work.

On the current application, the static VLAN is extensively used, settings are also very simple. However, the only static VLAN is also the largest drawback is that the properties of the switch port must be manually set by the network administrator. If the number of computers in the network over a certain number (eg 200), or need to change, switch port VLAN attributes, the network must be re-configured on the switch, which greatly enhanced the possibility of misuse. And change the connection for each client port, must also change the port belongs VALN, obviously not suitable for those who need frequent changes of network topology.

The dynamic VLAN is not the same, because he is based on the user, rather than switch to set the port, so when the user moves the physical location (ie, change from one switch to another when the switch), VLAN without reconfiguration. Not only reduces the probability of network errors, but also reduces maintenance costs.

Therefore, in the long run, dynamic VLAN network management technology will be more popular.

Username technology into highlights

The realization of the dynamic VLAN technology, according to the realization of the level in the OSI is divided into three kinds of different.

One of the most popular is the second level in the OSI set way to access the link - the definition based on MAC address. It is based on end-user device MAC address to define the membership (and MAC address is the extraction of user equipment to obtain a general network card address), that is when the device is connected into a switch port, the switch to query a database to its establishing VLAN membership.

Therefore, the network administrator must first user's MAC address assigned to the VLAN Membership Policy Server (VMPS, VLAN Membership Policy Server) database of a VLAN. This network manager must first collect all the cards to access VLAN the MAC address and log in, and if the computer for the network card, you have to reset. This undoubtedly increased the workload of network administrators, network card on the regular replacement of notebook users is very inconvenient.

The second approach is the realization of the dynamic VLAN is connected through the computer's IP address to determine the respective port VLAN, this means the third layer in the OSI set the access link to achieve. Unlike the MAC address-based VLAN, even if the computer because of the change network card MAC address, or other reasons to change, as long as it's IP address change, you still can join the pre-set VLAN. Based on this approach compared to MAC address, the change can be more simple network structure.

The third option is the fourth layer in the OSI over achieve, it is based on the user VLAN solutions. This means each port by the switch connected users currently logged on the computer (where the user identification information, usually the computer operating system, the logged on user, for example can use the Windows domain user name) to determine which VLAN the port belongs .

In other words, just use your user name login, the user no matter what computer, what IP the computer is free to access their own VLAN networks. Whether the user or network administrator who is very convenient, are three ways to achieve a relatively good solution.

Due to people moving dynamic VLAN configuration

ASUS launched the second floor above managed switches, their dynamic VLAN according to the user, the user needs a dynamic set of different VLAN, the VLAN attribute changes in the complexity of the work simple, safe and automatic.

This method, we can imagine that there is a switch database, this database information can be stored in a server switch outside (RADIUS Server) or the presence of the switch itself. The database of information including user names, passwords, and the user belongs to VLAN. Users to access switches, the need to enter user information, and then switch the user in the database to find information, read the user's VLAN, and the VLAN settings on the user access port. The user's identity is its own user name and password, regardless of where the user moved to, as long as the certificate is correct, the switch can be added to his dynamic in the corresponding VLAN.






Recommended links:



Who Is Knocking The Door Of Opportunity?



SanDisk to promote large-capacity iPod MP3 strong words



"Tomato Garden" case of first instance Pronounced loss of Chengdu, a total of over 10 million soft



DivX To MPEG



TS To MPG



New Hobby



Hot Office Suites And Tools



Jinshan said the domestic A-share listed denied rumors false



Find out the psychological make promotions



're Renting buy a house in the ascendant with



Jiang Qiping Family Laboratory of Beijing University speech sounded "New Life Movement" horn



XviD to WMV



svchost.exe has encountered a problem repair



Tuesday, October 12, 2010

C + + / CLI object of speculation recorded the Object Layout


C + + / CLI is a relatively pure C + +, support the creation of managed reference object, managed object to allocate memory from the virtual machine and management, the programmer can no longer worry about the memory leak problem. In fact, that white is the equivalent of their own to create a memory pool, and the virtual machine actually do so.

In the CLI, all classes derived from Object, including the value of this int. So the internal structure of how the Object like? Vm code through the research, you can see in general is structured as follows:




Users Save handle to a managed object, in fact, can be seen as a pointer to a Object pointer, which contains a MethodTable in Object pointer, this type of information preserved MethodTable and some function, which is like the same virtual function pointer. Many of the operations are accomplished through the pointer, such as Allocate (), such as Box (), UnBox () and so on. Followed behind in MethodTable is the real data.

This MethodTable is very core vm inside a class, it can be done by a lot of action.






Recommended links:



New Computer Education



A Fully CG Production Process - The First Draft (the Original Painting)



Dealers should not be fishing in 10



change divx to sony nwz-s738f Extension



Top Music Composers



To work without selection, the problem You thought about it?



RENJIAO She Coke Man: step by step



YouTube to WMV



Skyworth the secret of surviving



WMV to Zune



Ministry of Information Industry, Dalian today on the AVS will determine the acceptance of IPTV comm



Storage Inventory And BARCODING



Alliance With The Merger As



Liu Ren case throughout the second session Documentary



Ad Blockers Infomation



QuickTime to MPG



Monday, October 11, 2010

SARFT responded: "shield acronym" Department of misunderstanding



Earlier this month, CCTV confirmed SARFT issued a circular calling for the host port broadcast, press interviews and subtitles, and can not re-use such as the NBA, GDP, WTO, CPI and other foreign language acronym. Yesterday, SARFT responded by saying, "acronym shield" is being misread, it was intended to regulate the use of foreign words.

April 7, CCTV Sports Channel Director Jiang Heping confirmed a week prior to the SARFT issued a notice of CCTV and other media, I asked the host broadcast, press interviews and subtitles, and can not re-use such as the NBA, GDP, WTO, CPI, etc. language and acronyms, replaced by "American Professional Basketball League," "World Trade Organization," Chinese full name.

Yesterday, SARFT deputy director, publicity chief force in the participating high "standard foreign language translation, language and create a harmonious environment", said the forum, some media said SARFT "shield" the expression language acronym is not appropriate, "is not shielded, that is standard to use, we do not reject foreign culture, but after the required foreign language into the Chinese language used should be standardized."

High-long power that the current situation of the community to use foreign languages more seriously, without translation, a phenomenon directly embedded in Chinese more and more, this trend and habits will naturally have an impact on radio and television, resulting in a number of Chinese using the non-standard. Gao Chang-Li said: "This is normal, the English abbreviations are more young people to use, and these people is the main body of users."

High-power long statement, SARFT will stick to maintain the purity of Chinese, and called on other stations in line to the CCTV also hope that the relevant state departments take the lead in setting norms, foreign language should be used explicitly what kind of translation, given the short Chinese expression, "These should be phased to work at different levels, across the board will inevitably lead to social reaction. "







Recommended links:



TOD to WMV



WMV to MPEG



are megapixels all that matter in camera phones



AVI to MOV



Thursday, September 23, 2010

80386 interrupt and exception


In addition to maintaining 8086/80386 80386 related functions, but also enhanced interrupt handling capability, and the concept of "exception" concept. This article will introduce the 80386 interrupt and exception mechanism. Download the article all the source code.

8086/8088 to break into the internal interrupt and external interrupt two categories. In order to support multi-tasking and virtual memory and other functions, 80,386 external interrupt known as the "break", the internal interrupt as "abnormal." As with the 8086/8088, 80386 usually between the two commands to respond to interrupt or exception. 80386 handle up to 256 interrupt or exception.

1. Interrupted

On the 80386, the interrupt is caused by asynchronous external events. External events and interrupt response and is not related to the implementation of the directive. Typically, the interrupt to indicate I / O device has completed an operation. As with the 8086/8088, 80386 INTR and NMI are two pins accept external interrupt request signal. INTR accepted maskable interrupt request. NMI received interrupt request can not be shielded. In 80386, the flag register IF flag in EFLAGS to decide whether screening can shield interrupt request.

External hardware through an interrupt request signal INTR the same time, but also to give an 8-bit processor interrupt vector. Processor in response to maskable interrupt request, read the paper by the external hardware interrupt vector number. Processor interrupt vector of this number and does not provide. But in the specific computer system, the system must meet the set of software and hardware, so given the interrupt vector number corresponds not only with the external interrupt sources and interrupt vector number used to avoid the appearance of conflict. 8259A programmable interrupt controller chip can work with the 80386, can be set to the processor according to the interrupt vector number, can handle the priority interrupt request. Each 8259A chip can support 8 interrupt request signal, if you use 9 8259A chip (a master piece, eight from the film), would enable a single pin INTR 80386 accepted up to 64 interrupt sources, interrupt request signal .

Processor does not mask the interrupt request from the NMI. Processor in response to NMI interrupt is not received from the external hardware interrupt vector number. And 8086/8088, as in 80386, the non-maskable interrupt the corresponding interrupt vector number is fixed at 2. For non-maskable interrupt nesting, when receiving an NMI interrupt, the processor again in response to the internal shielding of the NMI, the implementation of the screening process until after the end of the interrupt return instruction IRET. Therefore, NMI handler should be the end of IRET instruction.

2. Exception

80386 instruction exception is detected during the implementation of irregular or illegal conditions are present. Abnormality in the execution of the instructions have a direct link. For example, the implementation of the divide instruction, the divisor is equal to 0. Again, the implementation of instruction privilege level is not correct when found. When these situations occur, the directive can not be completed successfully. Software interrupt instruction "INT n" and "INTO" also classified as abnormal and not interrupt, because the implementation of these instructions produced anomalies.

80386 identify different types of anomalies, and to give each category a different interrupt vector number. After the exception occurs, the processor so as to respond to interrupt handling exceptions. That under the interrupt vector number, switch to the corresponding interrupt handler. This interrupt handler is called the exception handler may be more appropriate.

Abnormal according to whether the procedure caused the restoration and recovery point can be different, to be further classified as abnormal fault (Fault), trap (Trap) and suspension (Abort). We were the corresponding exception handler is called fault handler, trap handlers and termination handlers.

Failure is caused by abnormalities in the instruction before it is notified to the system anomaly an exception. That the fault is 80386 can be excluded. When control is transferred to the fault handler, the saved CS and EIP values break point to lead to failure of the command. Thus, the fault handler to troubleshooting, the implementation of the IRET to return to the program caused by failure to execute, just lead to failure of command can be re-implemented. This re-run, no additional operating system software to participate. Failure of the findings may begin before the command may also be in the instruction execution period. If failures are detected during instruction execution, then the suspension of fault instruction, and instruction operands to restore the value before the instruction started. This will ensure the re-implementation of fault instruction to get the right results. For example, during the execution of an instruction, if we find there is no section, then stop the implementation of the directive, and notify the system to produce Fault, the corresponding segment fault handler can load the troubleshooting section of way, after which the original instruction can be successfully implemented, at least not non-existent fault segment occurred.

Trap is caused by abnormalities in the following instructions to inform the anomalies An exception to the system. When control is transferred to the exception handler, the saved CS and EIP break point to lead to trap the value of the next instruction to execute instructions. The next instruction to be executed, not necessarily the next instruction. Therefore, the trap handler does not always save the breakpoints according to the anti-push identify an exception instruction. When the trap handler in turn, lead to the completion of trap instruction to be normal, it is possible to change a register or memory cell. Software interrupt instruction, single-step exception is the example of the trap.

Suspension is a serious situation in the system, an exception notification system. Caused by the suspension order can not be determined. Produce termination, is the implementation of the program can not be reinstated. System receives the suspension, the processing procedure to re-establish the system forms, and may restart the operating system. Hardware failures and system tables in the illegal value or inconsistent value is suspended example.

3. Priority

In an instruction execution period into more than one interrupt is detected, or abnormal, then press the priorities listed in the table notification system. The highest priority interrupt or exception notification system, other lower-priority exception being abandoned, while the higher-priority interrupt will remain hanging.

80386 responses

Interrupt / exception priority interrupt / exception types the highest priority fault other fault 鈫?debug trap instruction INT n and INTO 鈫?鈫?NMI debug trap minimum disruption 鈫?INTR interrupt






相关链接:



ASF To MOV



How TO C + + language for formatting on the float



M2TS converter



Across Threads In C # Winform Control Access



Visuanl C # 2005 Quick Start Of The While Statement (1)



java open source testing tools summary 1



News about Hobby



With SCSI driver for the Win98 Qiao



The official version of Opera 10 September 1 showing the speed will increase 40%



Virtuozzo Chinese name of the Solicitation list of winners



MPG To 3GP



J2ME learning Reviewing the Old Posts



VIP guests have the Start menu



Directory Office Suites And Tools



Friday, September 17, 2010

Jobs: find a good quality of the work of eight major


Employment Guidance Centre Beijing not long ago, college graduates more than 150 state-owned enterprises, private and high-tech enterprises, foreign-invested enterprises in human resources and some colleges and universities conducted a survey of the characteristics of the following eight Students welcomed by most employers. In fact, not just the graduates, any person who would like to find a good job, need to have the following qualities.

Identity Corporate Culture in the shortest time

"Corporate culture is the spiritual pillar of the survival and development. Staff only recognized corporate culture can grow with the company." Shell's head of human resources, said, "We are in recruitment will focus on job attitude and examine students professional orientation is consistent with company needs, individual self-understanding and development of space is the company's corporate culture is consistent with the trend. "

Beijing College Graduates Career Guidance Center experts suggest: "college students jobs before, to focus on selected businesses have some understanding of corporate culture, and to see whether they agree with the enterprise culture. If you want to join this enterprise, we should make their own values and enterprises consistent with the values advocated in order to enter the enterprise, the initiative to put myself into the team, the enterprise culture to constrain their behavior, as the company due diligence. "

Sense of belonging and loyalty to a team of enterprise

Survey showed that state-owned enterprises, foreign-invested enterprises, private enterprises are the human resources agreed that the company would prefer to be an adequate loyalty, even if capacity was close, and also in but do not want to be an extraordinary ability to play fast and loose people.

A company's human resources manager that the staff of the company loyalty, reflected in the staff and the success and prosperity of the company's interest, no matter the boss is not present, must earnestly work, encouraged to go to work. Employees a sense of belonging, his loyalty and ultimately let him achieve the desired goals, thus becoming a trusted person, a boss to hire the person, a right-hand man who could become the boss.

Beijing College Graduates Career Guidance Center Han Chunguang teacher, said: "Enterprises in the recruitment of staff, in addition to test their ability level, the individual behavior is the most important assessment. Did not conduct the people can not use Yebuzhide culture. Conduct of The most important aspect is the company loyalty. that is both able and loyal business people, every business needs is the best talent. "

Not demanding alumni of prestigious universities as long as the comprehensive quality

Ji-Tong Network Communication Co., Ltd. of human resources who said, "Our company is not demanding elite and professional counterparts, even more rare in the profession, as long as the overall quality of a good student, learning ability and adaptability, a problem in time to see crux of the matter, and in time to mobilize their own capacities and have learned to quickly release their potential, develop a workable plan, it will also be welcomed. "

Survey analysts pointed out that "As enterprises increased competition, companies pay more attention to the quality of talent. Because the talent is to create products for enterprises to win a major factor in the profit. Some companies, especially technology companies with low levels, and not just value students academic performance, and more attention to the overall quality of students, this is the employment characteristics of modern enterprises. their overall quality is more important than academic qualifications. "

With dedication and professionalism

"Now, some rather low-quality young career, there was a young man, the reasons for being late for work the morning last night watching TV actually is seen too late. New to the students work problems or difficulties encountered, not timely communication with colleagues, until the leadership in the only reported delays in the progress of work, these are not the dedication and professionalism of poor performance. "Zhongguancun Electronic Co., Ltd. Human Resources Department who said," Businesses are looking to strengthen the community school students survival outlook, values education, strengthen the professional quality of students, emotional intelligence, adaptability and psychological quality. With the dedication, the other is relatively easy to cultivate quality. "

Professional technical capacity

Beijing Science and Technology AG, a human resources manager, said, "Professional skills of our employees the most basic quality requirements, IT industry to hire and pays more attention when the technical capacity of applicants. When the applicants in the recruitment of the same capacity if, perhaps will give priority to recruit graduate students. However, after the academic level into the company is not the main measure, and will pay more attention to practical techniques, who can do it and who is to have a skill, who Take the high wages. "

Strong communication skills, have affinity

BOE Technology Group, the head of the Ministry of Personnel, said: "Our company Ren Wei, college students need improvement Nengli is communication capabilities. Qiye need is to Yunyongziji good for communication skills and Qi Ye Neiwaiyouguan personnel contacts, to co-operating with concentric Tong Germany, completed the organization's mission and purpose of man. "

Teamwork and collaboration are

Shanghai Automotive Industry (Group) Corporation, the human resources person said: "From the perspective of the growth of talent, a person belongs to the team, there must be spirit of teamwork and collaboration, and only in an atmosphere of good social relations, personal growth will be more successful. "

With a passion to work

"Passion is a powerful emotion, a kind of people, work and faith strong emotion." Guiding College Graduates Beijing Ren Zhanzhong, director of "The enthusiasm of the employees without a job can not complete their high quality work, let alone to create results. Only those who have a genuine desire on their enthusiasm, are likely to put their wishes into a beautiful reality. "







Recommended links:



Business Is Business Had To Kind



Exception Handling in C # (1)



BI, in the M & A growth?



IP and MAC binding of crack



H264 format



real player IPHONE 3g



Specialist Games Card



Experience the wind Took the new brilliant new housekeeper brilliant new listing 2008



SNS, A Dominant Red Sea? Chen Zhou In The Idiotic Nonsense



Create Visual Impact



SIMPLE FTP Clients



avi To mpeg



When The "vision" Into A "trap"



convert rmvb to mp4



The "Page Setup" Come Right menu