Sunday, October 24, 2010

80386 interrupt and exception



In addition to maintaining 8086/80386 80386 related functions, but also enhanced interrupt handling capability, and the concept of "exception" concept. This article will introduce the 80386 interrupt and exception mechanism. Download the article all the source code.

8086/8088 to break into the internal interrupt and external interrupt two categories. In order to support multi-tasking and virtual memory and other functions, 80,386 external interrupt known as the "break", the internal interrupt as "abnormal." As with the 8086/8088, 80386 usually between the two commands to respond to interrupt or exception. 80386 handle up to 256 interrupt or exception.

1. Interrupted

On the 80386, the interrupt is caused by asynchronous external events. External events and interrupt response and is not related to the implementation of the directive. Typically, the interrupt to indicate I / O device has completed an operation. As with the 8086/8088, 80386 INTR and NMI are two pins accept external interrupt request signal. INTR accepted maskable interrupt request. NMI received interrupt request can not be shielded. In 80386, the flag register IF flag in EFLAGS to decide whether screening can shield interrupt request.

External hardware through an interrupt request signal INTR the same time, but also to give an 8-bit processor interrupt vector. Processor in response to maskable interrupt request, read the paper by the external hardware interrupt vector number. Processor interrupt vector of this number and does not provide. But in the specific computer system, the system must meet the set of software and hardware, so given the interrupt vector number corresponds not only with the external interrupt sources and interrupt vector number used to avoid the appearance of conflict. 8259A programmable interrupt controller chip can work with the 80386, can be set to the processor according to the interrupt vector number, can handle the priority interrupt request. Each 8259A chip can support 8 interrupt request signal, if you use 9 8259A chip (a master piece, eight from the film), would enable a single pin INTR 80386 accepted up to 64 interrupt sources, interrupt request signal .

Processor does not mask the interrupt request from the NMI. Processor in response to NMI interrupt is not received from the external hardware interrupt vector number. And 8086/8088, as in 80386, the non-maskable interrupt the corresponding interrupt vector number is fixed at 2. For non-maskable interrupt nesting, when receiving an NMI interrupt, the processor again in response to the internal shielding of the NMI, the implementation of the screening process until after the end of the interrupt return instruction IRET. Therefore, NMI handler should be the end of IRET instruction.

2. Exception

80386 instruction exception is detected during the implementation of irregular or illegal conditions are present. Abnormality in the execution of the instructions have a direct link. For example, the implementation of the divide instruction, the divisor is equal to 0. Again, the implementation of instruction privilege level is not correct when found. When these situations occur, the directive can not be completed successfully. Software interrupt instruction "INT n" and "INTO" also classified as abnormal and not interrupt, because the implementation of these instructions produced anomalies.

80386 identify a variety of different types of anomalies, and to give each category a different interrupt vector number. After the exception occurs, the processor so as to respond to interrupt handling exceptions. That under the interrupt vector number, switch to the corresponding interrupt handler. This interrupt handler is called the exception handler may be more appropriate.

Abnormal according to whether the procedure caused the restoration and recovery point can be different, to be further classified as abnormal fault (Fault), trap (Trap) and suspension (Abort). We were the corresponding exception handler is called fault handler, trap handlers and termination handlers.

Failure is caused by abnormalities in the instruction before it is notified to the system anomaly an exception. That the fault is 80386 can be excluded. When control is transferred to the fault handler, the saved CS and EIP values break point to lead to failure of the command. Thus, the fault handler to troubleshooting, the implementation of the IRET to return to the program caused by failure to execute, just lead to failure of command can be re-implemented. This re-run, no additional operating system software to participate. Failure of the findings may begin before the command may also be in the instruction execution period. If failures are detected during instruction execution, then the suspension of fault instruction, and instruction operands to restore the value before the instruction started. This will ensure the re-implementation of fault instruction to get the right results. For example, during the execution of an instruction, if we find there is no section, then stop the implementation of the directive, and notify the system to produce Fault, the corresponding segment fault handler can load the troubleshooting section of way, after which the original instruction can be successfully implemented, at least not non-existent fault segment occurred.

Trap is caused by abnormalities in the following instructions to inform the anomalies An exception to the system. When control is transferred to the exception handler, the saved CS and EIP break point to lead to trap the value of the next instruction to execute instructions. The next instruction to be executed, not necessarily the next instruction. Therefore, the trap handler does not always save the breakpoints according to the anti-push identify an exception instruction. When the trap handler in turn, lead to the completion of trap instruction to be normal, it is possible to change a register or memory cell. Software interrupt instruction, single-step exception is the example of the trap.

Suspension is a serious situation in the system, an exception notification system. Caused by the suspension order can not be determined. Produce termination, is the implementation of the program can not be reinstated. System receives the suspension, the processing procedure to re-establish the system forms, and may restart the operating system. Hardware failures and system tables in the illegal value or inconsistent value is suspended example.

3. Priority

In an instruction execution period into more than one interrupt is detected, or abnormal, then press the priorities listed in the table notification system. The highest priority interrupt or exception notification system, other lower-priority exception being abandoned, while the higher-priority interrupt will remain hanging.

80386 responses

Interrupt / exception priority interrupt / exception types the highest priority fault other fault 鈫?debug trap instruction INT n and INTO 鈫?鈫?NMI debug trap minimum disruption 鈫?INTR interrupt







相关链接:



Clever songs do not account for the cache line set up three strategies to cool my music box



Distribution of 6.0 billion Taiwan Clevo OEM Buynow out difficulties



AVI To FLV



Murdoch: Gone are the days before



Easy to use Tools And Editors



National Domain Name Defeat ". COM"



42 lcd inch tv best tips for Buying a 42 lcd inch



RM To AVI



MKV To PSP



12 large companies in 2007-2008 COMPARED the welfare state



My Favorite E-Commerce



From gray to COLOR: The Breakthrough identification documents



Beautiful Call, XP Mac OS Perfect Clone



jsp, servlet talk ABOUT Chinese issues



I used so cool music box, easy to download favorite songs



Monday, October 18, 2010

Mocha further prosecution of the North Tower "Nine Questions" cocoon



Recently, the North Tower Software has released an article entitled "North Tower Software Mocha on the infringement question nine companies" article, the article in the North Tower with a very straightforward language Mocha protect their rights on a comprehensive question, while continuing to Mocha is accused of Rights of speculation. For the North Tower of the many doubts, Mocha software, today held a special press briefings, also invited a number of industry-leading media in the conference, and activists to conduct a detailed explanation.

As we all know, early in October this year, Mocha experience of their products because of suspected plagiarism, and will work with vendors and the North Tower to court. Initially, the Mocha software to non-named published an official statement means. Why non-named for the way, Mocha software Zhong Ping, Deputy General Manager, said: "Out of respect for and protection of those involved, our company adopted a non-official statement released in the form named, is intended to alert the industry, promote fair competition. However, we can not accept that statement 1, North Tower, directly to the Division I characterized as acts of legitimate speculation Rights, for such a ridiculous allegation, we can no longer bear patiently, only to issue a statement once again clear that the Division I the object of litigation for the North Tower. "

It is because of the North Tower of this practice outright, Mocha directly to the court "case acceptance notice" in the form of a statement issued screenshots. So far, the official North Tower suddenly silent, but constantly through the media insinuating accusations Mocha Rights in the hype. Until early December, the North Tower was through the media that the prosecution against their corporate reputation Mocha and has been placed on file in the court, while with the case did not make any disclosure of other information. Immediately following the announcement, it is no longer below the North Tower, has been so far.

At the same time, in view of the North Tower of speech and expression here, Mocha has already begun to make an additional claim of the plan, but taking into account the increase in new claims court and submit new evidence of limitation has expired, and Mocha decided to drop the be prosecuted. Just at this time, the North Tower on December 25 and then to "9 Q Mocha" form, issued an official voice. And accused the Mocha "four noes and one not" (no call, no explanation, no clarification, no apology, all right).

For the North Tower of the "Nine Questions", GAO Zhong-ping said: "This statement is totally unreasonable, even ridiculous. First of all, Mocha software may be against their own interests, to take the legal means to protect their rights that practice is normal and legitimate, is understandable, we do not need any person other than the court, any agency of any description, but do not make any clarification on any company with an apology; Second, Mocha is not the withdrawal of foreign informed , the primary consideration has been speculation the ground before the other side to attack us, in view of this, we used to avoid each other again, and has adopted a low profile and Tolerance attitude, but the other side we have the patience to shift as a symbol of their powerful This is ridiculous, and also is the disdain. "

Zhong-Ping, Mocha withdrawal is not to give up rights protection, on the contrary, not only will not give up Rights mocha, it will increase the claims and efforts to increase rights protection. In particular, progress in the course of this case, the North Tower of the number of irresponsible statements and actions already on the goodwill of Mocha causing serious injury, which further strengthened the confidence of Mocha continue to defend their rights. Based on this, taking into account the increase in new claims and new evidence submitted by the deadline, in full communication with the legal profession, the Mocha software decided to drop the prosecution will be present, Mocha has collected sufficient evidence, then Mocha will interface on the North Tower concerning alleged plagiarism and inappropriate comments after the North Tower adverse impact on the Mocha be investigated.

For the North Tower in the "9 Q Mocha", the accused Mocha's to create a "court of public opinion," "above the law," "distorted" and other statements, GAO Zhong-ping said: "This is not based on, can not stand live foot. mocha reiterated Mocha All Rights acts are based on a high degree of similarity between the two interfaces based on the expanded, Mocha did not have any business with any personal attacks, but do not involve above the law. As the industry standardization of legitimate businesses, Mocha know what to do, not what to do, but any attempt to infringe rights Mocha, fish in troubled waters, the purpose for doing nothing and are all futile, it is intolerable to Mocha . mocha defenders not only will not give up, it will increase the intensity of Rights, is now, the future will be like this! "

In addition, North Tati to the Mocha against the issue of its corporate reputation, high-Zhong Ping, said: "Prior to North Tower in the media, the date of this news release, our company has to prepare for active responding, and look forward to the Court of justice decision. But until today, I do not know why, our company has not received the Division I North Tower prosecution 'against its corporate reputation' legal documents related to the case, but considering the company will not easily take any legal problems as child's play Therefore, we have been not that we do not receive the relevant overseas law but is still awaiting the court's notice. but the North Tower on the matter already danced to this, we feel angry. "

Meanwhile, the high-Zhong Ping Ban jokingly, asked: "If there really hype Mocha meaning, it seems more should choose HP, IBM vendors such as objects, it is easier to become famous overnight, but there is no need to choose a small domestic manufacturers. North Tower from the beginning of the unlatched facts regarding the word about whether the alleged infringement, to continue to attack first, now Mocha is speculation, then Mocha 'against its corporate reputation' grounds of anti-reported Mocha, and to end Division I drop the question, we really do not understand the company's North Tower, what is the real purpose of this? "

"No matter what happens, as a standard IT solution provider, Mocha software in line with 'international technology, localization services, customer first' philosophy, will always continue to provide sustained, stable, safe, high quality services, with their unremitting efforts to develop China's software industry to do its part. "Zhong-Ping last made such a stress.

Description of the meeting in Mocha, Mocha Hou Jun, director of software products also involved Mocha BSM interface, the interface with the North Tower BTIM did a full explanation and comparison. According to him, Mocha business service management dashboard interface and an automated early warning mechanism for handling the incident as the core, truly to CMDB as the core of the operation and maintenance system for the establishment, operation and maintenance will help IT staff faster, more accurate treatment of accident to help IT managers set up a department from accident to accident settlement and the formation of experience and knowledge of the operation and maintenance mechanism, this mechanism can be tracked, can be found, can be controlled. The Mocha BSM host real-time dynamic operation interface is largely enhanced human-computer interaction. Which products to increase the deployment wizard-style configuration, drag-style mode of operation, visualization management system, to create personalized work space applications and other key features are due to human-computer interaction considerations.

Not difficult to see, this involved a visual management interface Mocha BSM host real-time dynamic operation interface is Mocha software breakthroughs in many aspects of human-computer interaction point. The deceptively simple UI interface, but from the unique design concept and product design system, the interface shows a different way will also have a very different user experience.

From this, the industry has been hit more than two months, "Mocha North Tower of the dispute", it seems only just begun. Not only because of the further prosecution of mocha, but because the North Tower of the "guerrilla" tactics. Appears in the press, as with the vendors and everyone seems to focus on products should be technology innovation, product marketing, corporate brand sublimation on. After all, the market is an objective reality, regardless of "reference" or "speculation" worth mentioning are unable to achieve a qualitative breakthrough.







Recommended links:



Expert Teaching AND Training Tools



C + + / CLI Object Of Speculation Recorded The Object Layout



Improvement of THE current financial report



Review Games Simulation



ASF to AVI



Directory File Sharing Or Peer To Peer



Db2 Universal Database Concurrency



C language library FUNCTION (K class letters)



Audio files, search the earthquake it was thousand clues



3G2 to MPEG



Matroska To MP4



Alternative workplace quit: to a rival company to do an undercover intelligence probe



Accounting is the common language of the financial sector



Compilation of various source - inthand



Identify the black and white ash field, rapid correction of color cast photos



CAD world, SHANGRI-LA



Sunday, October 10, 2010

Cleverly hide an important part of the worksheet so that no leakage



In practice, it often needs to be some important work sheet to hide, but many of my friends in the hidden worksheet are based on the menu "Format / Sheet / Hide" to complete, do you not know that hidden worksheet, for Little Excel's people, is basically useless, because we can also use the "Format / Sheet / Unhide" to be displayed, then how can it be truly hidden?

In fact, very simple, follow these steps:

1, select the menu "Tools / Macro / Visual Basic Editor" command, open the Microsoft Visual Basic window, on the left you can see the "project" and "Properties" panel.

2, in the "Project" panel, select the worksheet to be hidden, and in the "Properties" panel, set the "Visible" property value "2-xlSheetVeryHidden".

If set to 0-xlSheetHidden compared with the general hidden through the "Format / Sheet / Unhide" can still be canceled.

3, Select "Tools / VBAProject Properties" command, open the "VBAProject Project Properties" dialog box, select "Protection" tab, check "Lock project for viewing", and set the view properties of the project password, click "OK" button.

4, press Ctrl + S to save the file, return to Excel interface, you can see the worksheet has been hidden. At this point the menu "Format / Sheet / Unhide" is also in the gray state. Even if people know this way, no password is also not show the hidden sheets and immediately try it!







Recommended links:



Students this Year, real salary levels Jiemi fresh



"Cockroaches door", HP will lose?



XviD to WMV



Built-in objects of the JSP in a BRIEF overview



Flash5 ActionScript Advanced Programming GUIDE (8)



MKV To Zune



Audio Presentation Tools Storage



Sober.P worm rampant total 5.4 percent of total e-mail



How to convert youtube video and burn youtube



CDP: Super Snapshots - The Ultimate Ownership



FreeBSD Serial (35): serial port and modem



AVI To DivX



Articles about Clocks And Alarms



Business Databases And Tools evaluation



Wednesday, September 29, 2010

On the memory leak (1)


On the memory leak (1)

For a c / c + + programmers, the memory leak is a common cause for headache. There are already many techniques have been proposed to address this problem, such as Smart Pointer, Garbage Collection, etc.. Smart Pointer relatively mature technology, STL has already included support for Smart Pointer of the class, but it seems not widely used, but it can not solve all problems; Garbage Collection in Java, are already quite mature, but in c / c + + area The development is not smooth, although some early thinking in C + +, also joined the GC support. The real world is like this, as a c / c + + programmer, the memory leak is the pain in your heart forever. Luckily, there are many tools to help us verify the existence of a memory leak, identify the problem code.

The definition of a memory leak

We often say that generally refers to the memory leak heap memory leaks. Program heap memory is allocated from the heap, the size of any (memory block size can be run on the decision), released after use to display memory. Applications generally use malloc, realloc, new and other functions assigned to the block of memory from the heap after use, the program must be responsible for the corresponding call to free or delete the release of the block of memory, otherwise, this memory can not be used again, we that this memory is leaked. The following program demonstrates this small heap memory leak case:

void MyFunction (int nSize)

(

char * p = new char [nSize];

if (! GetStringFrom (p, nSize)) (

MessageBox ("Error");

return;

)

... / / Using the string pointed by p;

delete p;

)

Example One

When the function GetStringFrom () returns zero when the pointer p point to the memory will not be released. This is a common case of memory leak. Procedures at the entrance to allocate memory, the memory in the release of the exit, but the c function can quit at any place, so if there is an exit should be released without the release of memory, a memory leak occurs.

Broadly speaking, memory leaks, not only contains the heap memory leak, also includes the leakage of system resources (resource leak), such as the core state HANDLE, GDI Object, SOCKET, Interface, etc. Basically these objects are allocated by the operating system consumption of memory, and if these objects will eventually lead to leakage of memory leak. Moreover, consumption of certain objects is the core state memory, these objects will cause severe leakage throughout the operating system unstable. So contrast, system resources leak heap memory leaks than more serious.

GDI Object leak is a common resource leak:

void CMyView:: OnPaint (CDC * pDC)

(

CBitmap bmp;

CBitmap * pOldBmp;

bmp.LoadBitmap (IDB_MYBMP);

pOldBmp = pDC-> SelectObject (& bmp);

...

if (Something ()) (

return;

)

pDC-> SelectObject (pOldBmp);

return;

)




[Next]



Example Two

When the function Something () returns non-zero, the program does not quit before the election back to pOldBmp pDC, this will lead to pOldBmp point to the HBITMAP object leak. If the long run this procedure may cause the entire system Huaping. This problem is easily exposed under Win9x, because the GDI heap than Win9x or NT, Win2k much smaller.

Memory leak occurs by:

Way to place the classification of a memory leak can be divided into four categories:

1. Often made of a memory leak. Memory leak in the code will be repeatedly executed, when each is executed will lead to a memory leak. Such cases two, if Something () function always returns True, then the pOldBmp HBITMAP object always points to a leak.

2. Episodic memory leak. The code memory leak occurs only in certain environments or under the operation will occur. Such cases two, if Something () function only in specific circumstances only to return True, then the pOldBmp HBITMAP object does not always point to the leak. Regular and occasional hair is relative. For a particular environment, and perhaps occasional became often made of. So the test environment and test methods for detecting memory leaks is essential.

Three. A one-time memory leak. Memory leak in the code will be executed once, or because of algorithm flaws, there is always a just cause and a memory leak. For example, in the class constructor to allocate memory in the destructor does not release the memory, but because this class is a Singleton, so the memory leak only happens once. Another example:

char * g_lpszFileName = NULL;

void SetFileName (const char * lpcszFileName)

(

if (g_lpszFileName) (

free (g_lpszFileName);

)

g_lpszFileName = strdup (lpcszFileName);

)

Example Three

If the program at the end of the string does not release g_lpszFileName point, then, even if multiple calls SetFileName (), there will always be a memory, and only one memory leaks.

4. Implicit memory leak. Program kept running during the distribution of memory, but only until the end of the free memory. Strictly speaking, there is no memory leak here, because the final procedures for the release of all the memory. But for a server program, need to run a few days, weeks or even months, without timely release of the final run out of memory can also cause all the memory system. Therefore, we call this type of memory leak as the implicit memory leak. Give an example:

class Connection

(

public:

Connection (SOCKET s);

~ Connection ();

...

private:

SOCKET _socket;

...

);

class ConnectionManager

(

public:

ConnectionManager () (

)

~ ConnectionManager () (

list:: iterator it;

for (it = _connlist.begin (); it! = _connlist.end (); + + it) (

delete (* it);




[Next]



)

_connlist.clear ();

)

void OnClientConnected (SOCKET s) (

Connection * p = new Connection (s);

_connlist.push_back (p);

)

void OnClientDisconnected (Connection * pconn) (

_connlist.remove (pconn);

delete pconn;

)

private:

list _connlist;

);

Example Four

Assuming Client disconnected from the Server side, Server does not call OnClientDisconnected () function, then the connection on behalf of the Connection object that will not be timely removed (in the Server program exits when all the Connection object of analysis in ConnectionManager structure function is deleted). When there is continuous connection is established, disconnected implicit memory leak happened.

Use the program from the user point of view, the memory leak itself does not produce any harm, as a general user, simply do not feel the existence of a memory leak. Real damage is the accumulation of memory leaks, which will eventually consume all system memory to do. From this perspective, a one-time memory leak no hazard, because it does not accumulate, while the implicit danger of memory leak is very large, as compared to regular fat, and occasional memory leak it more difficult to be detected.






Recommended links:



ThinkPad First National USER Conference held in Beijing



Comparison Registry Tools



A MOVE into a digital video camera to camera



car gps



TD COMMERCIAL trial on April 1 the minimum consumption of 118 yuan a complete experience



Catalogs Newsgroup Clients



MP4 to WMP



IM: Decisive Force's crowded



Describes the Properties of the problem MIDP



Simple Trace And Ping Tools



Unicom's First Response To IPhone Parallel: Black-earned Money Through Tax Evasion



ASF TO MPG



Passion in June, feast Of Mach 5 Group buy



MKV To WMV



Infomation Accounting And Finance



Tuesday, September 14, 2010

How far from the focus to the expertise?



"Our success is built on a professional team, keep improving the quality awareness and quality of service and service attitude basis, we must first find a suitable market segments and solutions, and then focused to do so, consistently, so deep to do through. "This is a Microsoft Gold Certified Partner - Shanghai Grape City Information Technology Co., Ltd. (hereinafter referred to as grape City) Vice President Lee said in an interview are the words, which is the grape has always been adhering to the corporate philosophy of the city.

Technology first, focus on the professional achievements

Grape City into China since 1988, has always focused on technology development, focused on production and sales enterprise, specializing in IT technology play a greater value in the customer service role. It is this focus, the professional achievements of the grape City, Shideputao City as a software company, Microsoft's China region through the first CMMI 4 绾?(software Yanfa Capability Maturity Model) Certified Partner.

As a foreign-funded enterprises to enter China since the beginning of grape City, location is very clear focus on the Microsoft platform-based software development, implementation and training services. In the years of technical development and implementation based on the technical strength not only continue to strengthen, the customer is also deepening the understanding of business, customer service experience is enriched. Years of dedicated, accumulated enough resources and strength. Grape City in transition to provide customers with integrated solutions to their technology, services, advantages more fully into play. Grape City in many cases, we can see the advantages of its technology brings unique value to customers.

For example in 2007, in the implementation of a Fortune 500 client MOSS (Enterprise Information Portal) solution of the project, the city successfully grape existing customers in more than 20 different types of systems to the MOSS platform set under the goal of the system integration and to help clients achieve IT efficiency. In this project, more than 20 system integration, both technically and from the coordination of the existing system provider, has a great challenge.

In order to give full play to the role of MOSS platform, organized the city's grape technical consultant also carried out a number of technical breakthroughs, while the power company's technology organization to coordinate efforts to solve MOSS Microsoft technical support for multi-system integration issues, on the other hand the technology Consultants are divided into several groups, coordination of client resources, respectively, a provider of a way to communicate with the existing system to address the issue of integration of various systems. In many system providers to communicate with, the grape is not only the city's technical consultant demonstrated superb communication skills, but also to the customer's understanding, mastery of each system to win customer trust and praise.

Grape City in focus, while also continue to sum up the common customer needs, with targeted product development. It is understood that being a city built entirely on grape MOSS platform workflow product research and development, this product can significantly reduce the user based on the MOSS platform workflow system implementation and development costs. For business users and IT departments can conduct its own business process design, greatly reduce the learning cost and the learning curve.棰勬湡灏嗗湪浠婂勾7銆?鏈堜唤鍦ㄤ腑鍥藉競鍦烘帹鍑恒?

銆??閽荤爺涓嶆噲锛屼笓涓氶摳灏变笓闀?br />
銆??鍖哄埆浜庢湰鍦熺殑缁忛攢鍟嗭紝钁¤悇鍩庨潪甯告敞閲嶅洟闃熴?鎰忚瘑鐨勫缓璁撅紝涓嶄粎鏈変笓涓氱殑鍥㈤槦锛屾洿寮鸿皟鍝佽川鎰忚瘑銆佹湇鍔℃剰璇嗗拰鏈嶅姟鎬佸害锛屼互涓撲笟鐨勫洟闃熷拰涓撲笟鐨勬湇鍔″叏鏂逛綅鍦版弧瓒冲鎴风殑闇?眰銆傚湪澶氬勾鐨勮В鍐虫柟妗堥」鐩疄鏂戒腑锛岃憽钀勫煄鍦ㄥ叾涓撴敞鐨勫悇涓涓氫腑绉疮浜嗗ぇ閲忕殑鎴愬姛妗堜緥锛屽苟褰㈡垚浜嗙ǔ瀹氱殑闀挎湡瀹㈡埛缇や綋锛屽鍏堢伒钁嗛泤銆佺綏姘忚瘖鏂澶囥?娴﹀彂閾惰锛屽鏅數瀛愶紝鑻辫繄鍥介檯锛孶L缇庡崕璁よ瘉绛夌瓑銆?br />
銆??杩欎簺鎴愬姛妗堜緥瀵逛簬钁¤悇鍩庢潵璇村叿鏈夐潪甯告繁杩滅殑鎰忎箟锛屼竴鏂归潰褰㈡垚浜嗚壇濂界殑瀹㈡埛鍙g锛屾湁鍒╀簬钁¤悇鍩庢墿澶т笟鍔★紝鍙︿竴鏂归潰钁¤悇鍩庤繕灏嗚繖浜涙渚嬩腑鐨勭粡楠岀Н绱笅鏉ワ紝鍦ㄦ洿澶氱殑琛屼笟鍜屽鎴蜂腑杩涜鍒嗕韩銆傝繖褰㈡垚浜嗚憽钀勫煄鐨勪紭鍔匡紝鑳藉鏇村揩閫熷噯纭湴瀹氫綅瀹㈡埛闇?眰骞堕?杩囨妧鏈弧瓒冲鎴烽渶姹傘?

銆??姣斿鍦ㄦ煇涓叏鐞冩?璁よ瘉鍏徃鐨勫ぇ涓崕鍖哄疄鏂組OSS绯荤粺鐨勬渚嬩腑锛岃憽钀勫煄涓嶄粎鎴愬姛鍦板疄鐜颁簡瀹㈡埛瀵规枃妗g鐞嗙殑涓ユ牸瑕佹眰锛屾洿灏嗚繖绉嶆枃妗e綊绫荤鐞嗗彉鎴愪簡鑷繁鐨勪紭鍔匡紝鍦ㄥ悗鏉ユ湇鍔″叾浠栧鎴锋椂鍙戞尌浜嗛噸瑕佷綔鐢ㄣ?

銆??璇ュ鎴锋槸涓?鍏ㄧ悆鎬х殑闈炶惀鍒╂満鏋勶紝涓撲笟浠庝簨瀹夊叏璁よ瘉鍜屽挩璇笟鍔★紝鍏徃鐨勫ぇ涓崕鍖哄湪棣欐腐銆佸彴婀俱?澶ч檰(鍖椾含銆佷笂娴枫?鑻忓窞銆佸箍宸炪?閲嶅簡绛?鍧囪鏈夊姙鍏銆傝椤圭洰瑕佹眰鍩轰簬MOSS瀹炵幇鏂囨帶绠$悊锛屽疄鐜版枃妗e彉鏇存祦绋嬮泦涓鎺э紝寮傚湴鏂囨。鍚屾绛夊姛鑳姐?杩欎簺瑕佹眰铏界劧澶嶆潅锛屼絾鏄粠鎶?湳涓婃潵璁插浜庤憽钀勫煄鏉ヨ骞朵笉闅撅紝鐪熸鐨勬寫鎴樺湪浜庡鎴疯姹傚湪绯荤粺涓疄鐜板鏂囨。鐨勪笓涓氬垎绫荤鐞嗗拰鍙樻洿娴佺▼鎺у埗銆傝?瀹㈡埛鏂囨。鐨勫垎绫婚潪甯镐笓涓氬拰缁嗚嚧锛屼笉鍚屼簬涓?埇鏂囨。鐨勯?杈戙?鐔熸倝瀹㈡埛鐨勫垎绫绘ā寮忥紝骞跺湪绯荤粺涓疄鐜拌繖涔堢粏鑷村拰搴炴潅鐨勫垎绫昏姳璐逛簡澶ч噺鐨勬椂闂村拰绮惧姏銆傝憽钀勫煄鐨勬妧鏈【闂滑娣卞叆鍒板鎴蜂腑锛屼笉鏂湴杩涜娌熼?锛屼簡瑙e鎴风殑鏂囨。閫昏緫锛屼笉鏂湴璋冩暣瑙e喅鏂规涓殑鍔熻兘锛屾渶缁堝疄鐜颁簡瀹㈡埛甯屾湜鐨勬枃妗f爣绛惧垎绫绘柟寮忋?

銆??鍚庢潵锛岃憽钀勫煄鍙﹀鐨勪竴涓鎴蜂篃鏈夌被浼肩殑鏂囨。绠$悊闇?眰銆傝憽钀勫煄灏嗗叾鑳藉瀹炵幇鐨勫姛鑳藉睍绀虹粰瀹㈡埛鏃讹紝浠ゅ鎴峰ぇ涓鸿禐璧忓苟褰撳嵆涓庤憽钀勫煄绛剧害銆?br />
銆??姝f槸杩欑涓撴敞锛屼笓涓氾紝浣垮緱钁¤悇鍩庝笉鏂湴浠ョ旱娣卞彂灞曠殑鏂瑰紡璧颁笂浜嗚繖浜涢鍩熺殑楂樼锛屾渶缁堟垚涓鸿涓氱殑浣间郊鑰咃紝涓烘洿澶х殑鎴愬姛濂犲畾浜嗗熀纭??







相关链接:



Mkv File?



COMPARISON of Insert and Rs.Addnew



video format for blackberry



About Groovy AND Grails



Kaspersky: vigilance good at disguising the "beauty" release device Trojan



Cool Dog K's 2008 song King Achievement



Premier Screen Capture



BEST E-Commerce



Interview with B & Q (China) Vice President, Human Resources Director Miss Hu Weiyan



"Blue screen" hardware reasons and solutions



Process



File AND Disk Management Wizard



Free download mp4 to 3gp



The BACKBONE of retail business personal



Articles about Audio PLAYERS



Flac to aac



Wednesday, August 4, 2010

Two Errors in the exchange of links



On Google ranking, many people know that link is a very important factor, many people are principles that link the factory.

However, Google or other search engine ranking, your link to more, and here's the link that is more effective links, or links are higher quality, not the kind of cheating ah what the address, then Such examples are common, that is, just do a website on the search engines caught, and this is why? very simple way is to do the links, in fact there is nothing mysterious, as opposed to a number of unpopular Key words, you need only some key words in its title Riga, keyword optimization, the written description, alt attributes increase, the do under the Links, then your website within the meaning of words in the search engine rankings surely up, but still very front rank.閭d箞閾炬帴鏄枃瀛楃殑濂借繕鏄浘鐗囩殑濂藉憿?杩欒繕鏈夎鍚?鑲畾鏄枃瀛楅摼鎺ョ殑濂藉挴锛岃繕鏈夐摼鎺ョ殑鏃跺?鎴戜滑涓?畾瑕佹兂娓呮锛屽鏂圭殑缃戠珯鏄笉鏄綘鐨勫悓琛岀殑锛屽鏋滄槸鍚岃鐨勫氨OK锛屾湁寰堝浜洪兘涓嶆兂鍜屽悓琛岀殑鍋氶摼鎺ヨ繖鏍峰Google涓婄殑鎺掑悕娌℃湁浠?箞甯姪鐨勶紝浣犱笉鍋氬悓琛岀殑閾炬帴涓昏鏄洜涓轰綘鎬曚粬鎶㈣蛋浜嗕綘鐨勫崟瀛愶紝鍏跺疄涓嶆槸杩欐牱鐨勶紝鍋氱敓鎰忚繕鏈夊緢澶氱殑鍥犵礌鍦ㄩ噷闈紝鍏夐潬杩欑偣鏄笉琛岀殑锛岀浉淇℃瘡涓汉閮介潪甯告竻妤氳繖鐐圭殑銆?br />
銆??浜ゆ崲閾炬帴鐨勮鍖猴細

銆??1銆佷笉瑕佷互涓篜R瓒婇珮瓒婂ソ銆?br />
銆??寰堝绔欎富鍦ㄨ姹備氦鎹㈤摼鎺ワ紝绗竴涓彁鍑虹殑瑕佹眰灏辨槸pr瑕佽秴杩囧灏戝灏戙?

銆??瀵逛簬鍚岀被缃戠珯鏉ヨ锛岀綉绔橮R鏄秺楂樿秺濂姐?杩欐牱涓嶄絾浼氳浆鎹负浣犵殑鍙嶅悜閾炬帴锛岃?涓斾篃鍙互鏈夋晥鍦版彁楂樹綘缃戠珯鐨凱R鍊笺?涓轰綘鐨勭綉绔欐帓鍚嶄篃浼氫綔鍑哄緢澶х殑璐$尞(鏍规嵁hilltop绠楁硶锛屾帓鍚嶇殑鏈?悗鍐冲畾浜庨摼鎺ョ綉绔欑殑鏁伴噺涓庤川閲?

銆??浣嗘槸濡傛灉浜ゆ崲閾炬帴鐨勭綉绔欎笌浣犵殑绔欑偣姣棤鍏崇郴鐨勮瘽锛屽氨绠桺R鍐嶉珮瀵逛綘鐨勭綉绔欑殑浣滅敤涔熶笉澶с?杩欓噷涓嶄絾鏄寚瀵规彁楂樹綘缃戠珯鐨凱R锛岃?涓旇繕娑夊強鍒颁綘缃戠珯鐨勬帓鍚嶃?涓庝綘缃戠珯鏃犲叧鐨勭珯涓伙紝google鏄笉浼氭妸浠栫殑閾炬帴杞崲涓烘湁鏁堢殑鎺掑悕鍒嗘暟鐨勩?

銆??灏界閾惧叆鐨勭綉绔橮R寰堥珮锛屼篃鏄悓绫荤殑缃戠珯锛屼絾濡傛灉璇ョ珯鐨勯摼鎺ラ〉涓婃湁N涓鍑洪摼鎺ワ紝杩欐牱瀵逛簬浣犵殑缃戠珯PR浣滅敤涔熶笉澶с?(涓嶈繃杩欒捣鐮佽姣斾笂闈㈢殑閭f牱鎯呭喌瑕佷箰瑙傦紝鑰屼笖鍦ㄧ綉绔欐帓鍚嶇殑鏃跺?锛岃繖绉嶇綉绔欏悓鏍蜂篃鍗犳嵁鐫?竴涓笉鍙拷鐣ョ殑浣滅敤銆?

銆??2銆佷笉瑕佷互涓洪摼鎺ユ暟閲忚秺澶氳秺濂姐?

銆??褰撶劧锛屾瘡鏍蜂簨鎯呴兘浼氭湁涓ら潰鎬с?閾炬帴鏁拌秺澶氳秺濂芥槸鎸囷紝閾惧叆鐨勭綉绔欎笉浣嗘槸鍚岀被鐨勭綉绔欙紝鑰屼笖杩樻槸璐ㄩ噺寰堥珮鐨勭綉绔?楂樿川閲忕殑鍒嗙被鐩綍涔熸槸涓?)銆傚湪杩欑瑙傚康(閾炬帴鏁伴噺瓒婂瓒婂ソ)鐨勯┍浣夸笅锛屽緢澶氫汉閮芥嫾鍛界殑鎵鹃摼鎺ワ紝鐗瑰埆鏄厤璐圭殑鑷姪閾炬帴銆傚叾瀹炶繖鏍峰仛鏄櫨瀹宠?鏃犱竴鍒╃殑锛屽緢澶氭悳绱㈠紩鎿庢浘琛ㄧず瀵硅繖涓瀮鍦鹃摼鎺ヨ繘琛屾儵缃氱殑(濡傛灉浣犺繕杩涜鐨勮瘽锛屽姖鍛婁綘涓?彞锛氳刀蹇敹鎵嬩簡!)銆?br />
銆??浜ゆ崲閾炬帴鐨勪竴鐐逛釜浜虹湅娉曪細

1, to see whether the linked site has been included in major search engines update their search engines how often (in the search results you can see the last update time dividend, more than three days if not updated, it will not display) ; if the chain into the major search engines your site is also updated frequently, then your site will account for a lot of light. Because search engines will also link to update the site accordingly, so you do not need to go to the search engine company Jiaoqian to help you updated (such as "Baidu")

銆??2銆佹槸鍚﹁澶х殑鍒嗙被鐩綍鏀跺綍(濡傦細dmoz锛寉ahoo绛?;杩欐牱鐨勭綉绔橮R浣庡彧鏄殏鏃剁殑浜嬫儏锛岃繃浜嗕竴涓湀浼氭洿闀跨殑涓?偣鏃堕棿锛屼汉瀹剁殑PR灏变細椋炶捣鏉ワ紝鍒版椂浣犲啀璺熶汉瀹朵氦鎹紝浜哄鏈繀绛斿簲浜嗭紝鎵?湁瑕佹湁闀胯繙鐨勭溂鍏夋潵瀵瑰緟褰撳墠鐨勪簨鐗?

3, it was included most of the pages within the site; if a site of good quality, reasonable structure, then that is such a Web site popular search engine favor. The number of pages your PR value is directly proportional.褰撶劧锛屾湁鐨勭綉绔欒闄ゆ暟鏀跺綍浜?000澶氫釜椤甸潰锛岃?鏈夌殑鍙敹褰曚簡80澶氫釜銆?The latter will certainly be very bad. We see how much your ratio, not only the number. If the former has only a collection of some 100,000 more than 2000 pages, this is not considered a very good web site, which contains only 100 to more than 80. Obviously the latter is much higher quality than the earlier ones had to be. This site would be a good exchange of objects.







相关链接:



WEB Servers comparison



Spreadtrum And Lower Fourth Quarter Revenue Is Expected To Lay Off 15%



Fireworks in the fade in animation production



swf format



CONVERTING .mov to .wmv



swf TO flv



Premier File Sharing Or Peer to Peer



Paladin 4, 1000 pagoda body



SONG Jun-de: fixed integration WILL create new value space



Kingsoft CEO Lei Jun: calm face of the new issue of



mp4 to Avi



Dell GO from here



How to reduce the lead time ---- to the world-class manufacturing of the third practice



Wednesday, July 7, 2010

Youtube Video to VCD Plus

It's most popular and very easy to use YouTube tools. helps you Fast download, convert, play, manage your favorite YouTube videos. If you're a YouTube fan, you'll love YouTube tool! is the most powerful YouTube assistant on the planet. YouTube tool easily: 1. Fast downloads YouTube videos, 2. Supports unlimited simultaneous downloads (a real time saver!), 3. Automatically names the downloaded video the same as the YouTube title, 4. Converts YouTube videos to various video formats, including Video, DVD, VCD, AVI, MPG, MPEG, Divx, Xvid, WMV, RM, RMVB, MOV, MP4, 3GP, SWF, DAT, H264, VOB, Flash, PDA, M4V, 3G2, AMV, CDA, DV,QuickTime, ASX, TV, VHS, FLV, H264, BDMV, MAC, Apple TV, Zune, iPod, PDA, PSP, PS2, PS3, Xbox, Xbox 360, Mobile Phone, Cell Phone, Blackberry, Wii, Laptops, Printers, Palm OS, Pocket PC, PPC, Treo, Psion, EPOC, iphone.
Supports customize or create user's own profile for any new (portable) device. The video conversion supports preview. About Playing Features. Embedded YouTube Video (Offline) Player is available, it supports offline play YouTube video, .flv video and .swf video. Supports "Drag and Drop" video files direct to the main window. Easy to select the source files. Cool UI skin available. - is the most powerful YouTube assistant on the planet.



Recommand Link:



Free mp4 to 3gp converter



ChrisTV Professional



for You Games Arcade



AoreSoft Video to Apple TV Converter



Converter Flv To Mp3



OJOsoft DVD to iPhone Converter



Rm to avi



iPod VideoConstructor PRO



Silver DVD to AppleTV



Articles about Timers And TIME Synch



Flv to mp3 converter free download



CHRISTMAS-IDEA RM RMVB to DVD



Wizard Launchers And Task Managers



Youtube Movie To Blackberry Pro