Thursday, September 23, 2010

Review: Liu's "marathon" Life



August 7, 2007 afternoon, the Chang'an Club, high-end Finance Forum - "Thought feast" of the "Maestro", I had the honor to see a great admirer of Mr. Liu. At the meeting, Mr. Liu that modest, friendly, modest demeanor impressed me.

A few days ago, Lenovo Group (0992.HK) released fiscal year 2007 to 2008 one-quarter results show, the company achieved operating income of 3.9 billion U.S. dollars, up 13%, and implemented since the acquisition of IBM PC-round profitability around the world, Company pre-tax profit reached 78 million U.S. dollars, net profit of 67 million U.S. dollars. This marks Lenovo in the global exchange standard, hand the Olympic Games, after the successful acquisition of IBM PC, has ushered in a new strategic turning point, successfully achieved leapfrog development - international, and is expected to help the 2008 Olympic Games, Samsung style to achieve The new leap.

A master at that day, Liu voiced his success with the Lenovo Famen - "long-distance running." Indeed, in the past 20 years, too many companies develop faster than the association, there are too many entrepreneurs prospered than Liu. However, many entrepreneurs and enterprises in the sprint, then it stalled for various reasons, even collapsed.

So, what kind of a leader Liu has 20 years of distance runners Lenovo? If more than physical, more than technology, more than courage, more than qualifications, specific energy than the management ideology, Liu higher than in Chinese business person is not specified minority. However, Liu to become the business world, "leading authority" that he had so explained, he said, a pearl and some portraits, some people are not pearls, not as shiny as pearls, but he is a line, can those pearls strung. Business leaders must know their value - you are the line.

In my opinion, Liu was able to be strung piece of Li Qin, Ni Guangnan, Sun Hongbin, Guo Wei, Yang, Zhu Linan, Ms Mary Ma, Chen Guodong, etc. These "pearls" and "line" because of its depth, he established can support his philosophy of life long-term success.

Liu had contacts with the people, not people do not praise his humble, friendly man demeanor. Mr. Qin Shuo writes in his article: "with him, you definitely do not feel that his reputation and prestige from the pressure, Liu 'low' of this step, you brighter future. This is the Chinese culture, called modesty, self-suppression. "

In the August 7 meeting at the Masters, and his dialogue with Taiwan's entrepreneurs are COFCO chairman of Ning, Pan Gang, chairman of Yili Group, General Manager Mao Zhong Fang too kitchenware group, but he is very modest way from time to time young entrepreneurs to start than his speech. In particular, the details worth mentioning is that when Mr. Ning offensive to look at state-owned enterprises in the past, when Mr. Liu Any reference in state-owned enterprises is insufficient, we must first seek a friendly manner Ning understanding.







Recommended links:



DivX to iPod



3 Accounting in a drama, colorful festival Foshan accounting



Comments Icons



ASF to MPG



The face of the new law, HR policies IN place to deal with the



View from the MIS MIS success or failure of their OWN



Taiwan's UMC case: killing monkey to scare?



Wei Zhe: Interpretation of the four key words Alibaba 2008



novice school Linux shell to delete the directory



Young professionals entering the workplace to learn the three key issues



OGM to AVI



"Reverse flow" into "bad money drives out good money" dilemma



Articles About Art - Screen Savers



Longhorn CAN be run on some old computer



Domain name Registration norms into their public phase of consolidation



Thursday, September 16, 2010

Hide IP address detection and Experience


Formal various "hack" before, hackers will take all means to detect (you can also say "reconnaissance") each other's host information in order to determine what the most effective way to use their own purposes. To see how hackers learn the most basic network information - each other's IP address; and users how to prevent leakage of your own IP

First, access to IP

"IP" Net users as an important marker, a hacker first need to know. Method of obtaining more, hackers will be the situation for different networks to different methods, such as: use the Ping command in the LAN, Ping each other in the name of the network acquired IP; the Internet using IP version of the QQ displayed directly. The most "cow", is the most effective way is to intercept and analyze each other's network data packets. Using Windows 2003's Network Monitor to capture network data packets, may be more difficult for ordinary users to understand the hex code of 16, while the knowledge for understanding the network hackers, they can find and directly through the software analysis intercepted IP packet header information, then that information about a specific IP.

Second, hide IP

Although the method of multiple IP surveillance, but users can hide IP's method is also diverse. Take the deal with the most efficient "packet analysis" is concerned, it can be installed to automatically remove the sending IP packet header information of the "Norton Internet Security 2003". But using the "Norton Internet Security" some shortcomings, such as: it serious drain on resources and reduce computer performance; in some forums, or visit the Web site will be affected; not suitable for Internet cafe users and so on.

Now individual users hide IP using the most popular method is to use the proxy should be, because using a proxy server, "redirect service" will send out packets been changed, resulting in "packet analysis" methods fail. Some easy to leak user IP network software (QQ, MSN, IE, etc.) support the use of proxy connect Internet, in particular, QQ use "ezProxy" connection such as proxy software, IP version of QQ can not show the IP address. Here the author describes a relatively simple proxy for individual software users - newbies IP hidden devices, as long as the "proxy server" and "proxy server" enter the correct proxy server address and port, you can use on the http proxy, QQ more suitable as IE and IP-leak case.

But to use a proxy server, also has some disadvantages, such as: will affect the speed of network communication; need to network a computer can provide proxy capabilities, if the user can not find such a proxy server can not use proxy (Find proxy server, You can use "proxy hunter" and other tools scan a network proxy server).

Although the agent can effectively hide the users IP, but advanced hacker can bypass the proxy, find each other's real IP address of the circumstances under which the user which method to use hide IP, also because in the circumstances.






Recommended links:



The accounting date of establishment of a free report - 1.1. Understanding the function of several r



Articles about Teaching And Training Tools



e-cology In the Pan Micro Series 27



Mito Xiu Funeral Flowers To Create Poignant Picture Of Non-mainstream



Premier Web Servers



m2ts YOUTUBE



blackberry divx



Best Inventory And Barcoding



Bonus Of Sight [2]



ts format



Policy of Spring



Clipboard Tools reviews



Fireworks produced blue and white porcelain button



Master is not highly educated does not mean that high-income elite



"Deceiving" Or "enlightened Approach"



Competitive Intelligence, the fourth competition



Vob to youtube