Wednesday, September 29, 2010

When the doctor came to their computers for health


What kind of virus attack hackers? Hard to say, because they attack the diversity of situations. But if your computer has the following performance, it is likely that the virus had infected hackers.

Sometimes the computer freezes, sometimes restarts; what action in the absence of the time, but in hard disk read and write; system inexplicably search on the floppy drive; not running a big program, but the speed of the system slower and slower, Right to open My Computer銆? see 銆怭roperties銆?鈫?銆怭roperties銆?in 銆恠ystem resources銆?normal generally above 90%; with CTRL + ALT + DEL bring up task list and found that more than name the same program running and may increase over time increased. Especially in the network or local area network connected to the Internet, if your machine has these phenomena, we should be careful, of course, there may be some other viruses are at play.

When the removal of these viruses is best to use the latest "pesticide" in case of failure in a long time. If you do not have a antivirus software, but they do have something wrong place, whether the virus, also need to determine your experience! Here are some experiences:

1 view c: autoexec.bat and c: config.sys, these two files needed for some system drivers. What is strange to see whether or not to join the driver, if the object of suspicion in his adding "REM", restored to "REM" to remove on it.

2 look at the Windows directory under the WIN.INI file, first few lines:

[WINDOWS]

load =
ren =

Here is the start up automatically after Windows programs, such as Chinese Star here. Hacker virus note.exe could be here, if in doubt the object in front of it with ";" recovery will be ";" remove on it.

3 See the SYSTEM.INI file under Windows directory in the these lines:

[386Enh]

device =

Here is generally placed on the system itself and external drivers. Plus the driver usually use the full path,

Such as:

device = c: abcd1234.386

Similarly, if the object of suspicion in adding ";" recovery will be ";" removed.

4 View Start menu program銆?銆愨啋銆?銆恠tart.

Here let's also start automatically after Windows program, if the object of suspicion in
C: WindowsStart MenuPrograms start will be deleted, the recovery from the "Recycle Bin" to resume.


5 in Windows, see the registry. Start the 銆愩? 鈫?銆怬peration銆?in the implementation of the "regedit".

Be sure to start revising before the backup. Look in the registry.

HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRunServices and Run in the implementation of what the famous "back orifice" virus here.

6 Windows of the implementation of the file. Exe,. Com,. Dll, .386 ... ... they are likely to be carriers of viruses or hackers. In the system to normal, the best to do a backup of the above documents, be prepared for it!


7 in the Windows directory to see whether a file named Winstart.bat. The Autoexec.bat file is also similar to an automatic and batch files, but it can only work for the Windows and not for DOS use. Look at what you do not know whether one driver. General This automatic batch file will not be used. If you suspect that it can back up a copy
And then delete it, then restart your computer.






相关链接:



Photoshop CS play magic, making the mysterious eye of the



Wang Haibo: Society world partners, with 10 000 win



3GP to AVI



c language Programming style



CEO Online: Yan Huang star CEO Chang on August 15 guest Sina



Specialist BENCHMARKING



Unicom officially started selling 30 iPhone "contract user" pay 1 month prognosis,



ASF To AVI



Project Management reviews



Compare Printer



Easy Graphic



"Personal Efficiency" And "organizational Efficiency"



View from the MIS MIS success or Failure of their own



files sharing 3



Alternative workplace quit: to a rival company to do an undercover INTELLIGENCE probe



Meiling: Select Game Gu Gu and back



DAT To WMV



Sunday, September 19, 2010

FreeBSD Serial (64): NetBIOS name resolution


In the development of personal computers and local area network early, in order to achieve network capacity personal computer, Microsoft and IBM co-developed a protocol NetBIOS, which is a call interface for network communications, IBM developers as they consider this agreement BIOS designed as a basic computer network access interface, the use of the NetBIOS name. The NetBIOS interface development on the use of Microsoft Web servers and corresponding client software.

And IBM Token Ring and Ethernet on the direct implementation of the NetBIOS driver realized the NetBIOS and the physical network layer in between the specific interface, these programs follow the standards known as NetBEUI. NetBEUI direct control of the Token Ring and Ethernet drivers, so it can only run in the local area network. However, the lower NetBIOS itself did not limit the use of the protocol, so it only can run under the NetBEUI support, but also can run in the other protocol support. Other web developers in some other basis of the agreement also achieved NetBIOS interface, such as TCP / IP, IPX and Decnet so. Including the use of NetBIOS over IP TCP / IP protocol, thus the lower the compatibility with the Unix computer, a Unix and PC systems based on communication.

Windows family of computers does not necessarily use IP as its network transport protocol, it can also make use of IPX or NetBEUI protocol, but FreeBSD does not support IPX or NetBEUI on NetBIOS, must configure IP protocol for the Windows clients can share with each other FreeBSD resources.

NetBIOS name resolution

As a matter of fact is a NetBIOS and TCP / IP standards developed independently, although it can use TCP / IP as the transport protocol, but due to the different concept, it does not use TCP / IP to provide the full capacity, but to use their own way to accomplish similar work. The biggest difference is the way name resolution, NetBIOS name resolution with its own independent concepts and capabilities, so it uses the name resolution mode on and the TCP / IP in the standard analytical methods 鈹?鈹?DNS different. In the NetBIOS name resolution must be received one named after the corresponding IP address, NetBIOS sessions can be established on the basis of normal TCP connection was. Therefore, NetBIOS, the NetBIOS name resolution is a conversation with ordinary TCP connection biggest difference.

NetBIOS name resolution and DNS name resolution of NetBIOS is the biggest difference is that dynamic, the computer must first register their names before they can resolve to the name. Although dynamic analysis brought great convenience, but more complex and inefficient, so only for small-scale local area network.

Each NetBIOS name can be up to 16 characters, 16 characters Enter the name used to identify the type of procedure used. When the NetBIOS computer to communicate, it must be based on NetBIOS names, not based on IP address.涓?釜NetBIOS鏈嶅姟绋嬪簭蹇呴』棣栧厛娉ㄥ唽鑷繁鐨凬etBIOS鍚嶅瓧锛岃?涓?釜搴旂敤绋嬪簭鍒欓渶瑕佹煡璇㈡墍闇?鐨凬etBIOS鍚嶅瓧銆備緥濡傛瘡鍙癢indows璁$畻鏈哄湪鍚姩涔嬪悗鍒濆鍖栫綉缁滄椂灏变娇鐢ㄦ墍閰嶇疆鐨勮绠楁満鍚嶅瓧鏉ュ垵濮嬪寲鍏朵娇鐢ㄧ殑NetBIOS鍚嶅瓧銆?br />
NetBIOS鍚嶅瓧瑙f瀽鏂瑰紡

銆??浠嶯etBIOS鍚嶅瓧鏌ユ壘鐩稿簲鐨勮妭鐐瑰湴鍧?紙TCP/IP鍗忚涓负IP鍦板潃锛夋湁鍑犵涓嶅悓鐨勬煡鎵炬柟寮忋?

鏈湴骞挎挱锛?鍦ㄦ湰鍦扮綉缁滀笂鍙戦?骞挎挱锛岄?杩囧箍鎾煇璁惧鐨凬etBIOS鍚嶅瓧锛屾煡鎵惧叾瀵瑰簲鐨処P鍦板潃銆傚箍鎾柟寮忎篃鑳界敤浜庢敞鍐岃嚜宸辩殑NetBIOS鍚嶅瓧锛屼緥濡備竴鍙拌绠楁満鍙互閫氳繃骞挎挱鏈満鐨勫悕瀛楋紝鍚戝叾浠栬绠楁満瀹e憡鑷繁浣跨敤浜嗚繖涓狽etBIOS鍚嶅瓧銆?br />
缂撳啿锛?姣忎釜鏀寔NetBIOS鐨勮绠楁満涓紝缁存姢涓?釜NetBIOS鍚嶅瓧鍜岀浉搴擨P鍦板潃鐨勫垪琛紝杩欎簺瀵瑰簲鐨勫悕瀛楅兘鏈変竴瀹氱殑鐢熷瓨鏈燂紝浠ヤ究鑳藉強鏃舵洿鏂般?

NetBIOS鍚嶅瓧鏈嶅姟鍣細浣跨敤涓?釜鍚嶅瓧鏈嶅姟鍣ㄦ潵鎻愪緵鍚嶅瓧涓嶪P涔嬮棿鐨勮В鏋愪换鍔★紝杩欎釜NetBIOS 鍚嶅瓧鏈嶅姟鍣ㄨ绉颁负NBNS锛圢etBIOS Name Server锛夛紝Miscrosoft瀹炵幇鐨凬BNS鍚嶅瓧鏈嶅姟鍣ㄤ负WINS锛圵indows Internet Name Service锛夈?NetBIOS璁$畻鏈洪鍏堣鍚慛BN S鐧昏鑷繁鐨凬etBIOS鍚嶅瓧锛屽畬鎴愬悕瀛楃殑娉ㄥ唽杩囩▼銆?br />
棰勫畾涔夋枃浠秎mhosts锛歁icrosoft Windows鑳介?杩囨煡鎵惧瓨鏀惧湪鏈湴鏂囦欢lmhos ts涓殑鏁版嵁锛屾潵璇嗗埆缃戠粶涓奛etBIOS鍚嶅瓧鍜孖P鐨勫叧绯伙紝杩欎釜鏂瑰紡涓嶆槸NetBIOS鍚嶅瓧璇嗗埆鐨勬爣鍑嗭紝浣嗗畠鏄疢icrosoft 鐨勫疄鐜版柟寮忥紝鍥犳鏄竴绉嶄簨瀹炴爣鍑嗐?

閫氳繃DNS鍜宧osts鏂囦欢瑙f瀽锛欴NS鏈嶅姟鍣ㄥ拰鏈湴hosts鏂囦欢涓瓨鏀剧殑鏁版嵁鏄敤浜庢爣鍑員CP/IP 鍗忚涓悕瀛楀拰IP涔嬮棿杞崲浣跨敤鐨勬柟寮忥紝浣嗕娇鐢ㄥ叾浠栨柟寮忔煡鎵句笉鍑哄搴旂殑鑺傜偣鍦板潃鏃讹紝Microsft Window s涓?甯镐篃鑳介?杩囨爣鍑嗙殑TCP/IP鍚嶅瓧瑙f瀽鏂瑰紡锛岃繘琛屽悕瀛楀拰IP鐨勮浆鎹?鍚屾牱杩欎篃涓嶆槸NetBIOS鐨勬爣鍑嗭紝鑰屾槸Micorsoft 鐨勬墿灞曘?

銆??浠庤繖浜旂NetBIOS璇嗗埆鏂瑰紡锛屼互鍙婂叾涓殑涓嶅悓鐨勫悕瀛楁敞鍐屾柟寮忓嚭鍙戯紝杩涜涓嶅悓鐨勭粍鍚堟柟寮忥紝灏辨瀯鎴愪笉鍚岀殑鍚嶅瓧璇嗗埆绛栫暐銆傚湪NetBIOS鏍囧噯涓紝灏嗕娇鐢ㄤ笉鍚屽悕瀛楄瘑鍒瓥鐣ョ殑妯″紡绉颁负涓嶅悓鐨凬etBIOS鑺傜偣绫诲瀷銆?br />
銆??B-node锛氶?杩囧箍鎾柟寮忔潵杩涜娉ㄥ唽鍜岃繘琛岃瘑鍒玁etBIOS鍚嶅瓧銆傚浜嶪P鍗忚涓婄殑Net BIOS锛屽氨闇?鍩轰簬UDP杩涜骞挎挱锛屽湪灏忕綉缁滀笂杩欑鏂瑰紡宸ヤ綔寰楀緢濂斤紝浣嗗綋缃戠粶澧炲ぇ鏃讹紝灏变細琚娇鐢ㄨ矾鐢卞櫒灏嗗ぇ缃戠粶鍒嗗壊涓哄嚑涓皬缃戙?鍦ㄤ竴鑸儏鍐典笅璺敱鍣ㄤ笉杞彂骞挎挱鏁版嵁锛屽箍鎾寘浠呭彂閫佸埌鏈湴缃戠粶銆傝櫧鐒跺彲浠ラ厤缃矾鐢卞櫒杩涜b-node骞挎挱杞彂锛屼絾鏄繖灏嗕娇UDP骞挎挱浜х敓澶ч噺鐨勬棤鐢ㄧ綉缁滄暟鎹紝涓斿悕瀛楁敞鍐屽拰瑙f瀽鐨勯毦搴︿篃澧炲姞浜嗐?鍥犳瀵逛簬杈冨ぇ鐨勭綉缁滐紝杩欑鏂瑰紡涓嶅彲鍙栥?

銆??P-node锛坧eer-to-peer锛夛細瀵圭瓑鏂瑰紡鑳戒负璇嗗埆鍚嶅瓧鎻愪緵闈炲父鏈夋晥鐨勬柟娉曪紝瀹冧娇鐢?NetBIOS鍚嶅瓧鏈嶅姟鍣ㄨ繘琛屽悕瀛楃殑娉ㄥ唽鐧昏鍜屽悕瀛楄瘑鍒?鍥犳瀵逛簬姣忎釜NetBIOS璁$畻鏈猴紝蹇呴』鎸囧畾鍚屾牱鐨凬BNS 鏈嶅姟鍣ㄧ殑IP鍦板潃銆傝繖鏍峰湪NBNS鏈嶅姟鍣ㄥ仠鏈烘垨鏇存敼浜嗚缃紙濡侷P鍦板潃绛夋儏鍐碉級鐨勬儏鍐典笅锛屽悕瀛楄В鏋愪笉鑳藉畬鎴愶紝灏变笉鑳借繘琛孨etBIOS閫氫俊銆傚綋鐒禢etBIOS璁$畻鏈哄彲浠ラ厤缃负浣跨敤澶氫釜NBNS鏈嶅姟鍣紝浠ヤ究鍦ㄥ叾涓竴涓嚭鐜伴棶棰樻椂浣跨敤澶囦唤鐨勬湇鍔″櫒銆?br />
銆??M-node锛圡ixed锛夛細涓轰簡姝g‘瑙f瀽NetBIOS鍚嶅瓧锛屾渶濂界患鍚堜娇鐢ㄥ箍鎾拰鍚嶅瓧鏈嶅姟鍣ㄧ殑鏂瑰紡锛岃繖鏍风殑鍚嶅瓧璇嗗埆鏄竴涓鍚堢殑杩囩▼銆侻-node棣栧厛閫氳繃B-node骞挎挱鏂瑰紡杩涜鍚嶅瓧璇嗗埆杩囩▼锛屽綋骞挎挱鏂瑰紡澶辫触涔嬪悗锛屽啀浣跨敤P-node鏂瑰紡杩涜鏌ヨ銆?br />
銆??H-Node锛圚ybrid锛夛細H-node妯″紡涔熸槸涓?澶嶅悎妯″紡锛屽畠涓嶮-node涓嶅悓鐨勫湴鏂规槸鏌ユ壘鐨勯『搴忎笉鍚屻?H-node鍏堟煡鎵綨BNS鍚嶅瓧鏈嶅姟鍣紝鐒跺悗鍐嶄娇鐢ㄥ箍鎾柟寮忚繘琛屾煡璇?

銆??Windows涓疄闄呬娇鐢ㄧ殑鍚嶅瓧璇嗗埆鏂瑰紡鏄鏍囧噯H-node鏂瑰紡鐨勬墿灞曪紝Windows绯诲垪鐨勮绠楁満灏嗛鍏堟鏌ョ紦瀛樹腑鐨勫唴瀹癸紝鐒跺悗鍐嶆煡鐪媁INS鏈嶅姟鍣紝涔嬪悗杩涜骞挎挱锛岀劧鍚庡皢鏌ユ壘lmhosts鏂囦欢锛屼互鍙婇?杩噃osts鍜孌NS 杩涜鏌ユ壘銆傚疄闄呰繘琛孨etBIOS璇嗗埆鏄竴涓鏉傜殑杩囩▼锛屼富瑕佸氨鏄敱浜嶯etBIOS鏄竴涓姩鎬佺殑鍚嶅瓧瑙f瀽鏂瑰紡锛屾瘡涓?彴璁$畻鏈洪兘蹇呴』娉ㄥ唽鑷韩銆?br />
NetBIOS鍚嶅瓧璇嗗埆鐨勮繃绋?br />
銆??涓嶥NS涓嶅悓锛孨etBIOS鍚嶅瓧浣跨敤鍔ㄦ?鏂瑰紡杩涜绠$悊銆侱NS鏁版嵁鏄潤鎬佺殑锛屽鍔犲拰鍒犻櫎DNS鍚嶅瓧闇?绠$悊鍛樻墜宸ユ洿鏀归厤缃枃浠躲?浣哊etBIOS瑕佹眰璁$畻鏈哄湪缃戠粶涓婅嚜鍔ㄦ敞鍐屽叾鍚嶅瓧锛岃绠楁満鍋滄満涔嬪悗鍗犵敤鐨勫悕瀛椾細琚噴鏀撅紝杩欎釜杩囩▼涓嶉渶瑕佺鐞嗗憳骞查銆傚洜涓哄畠闇?棰濆鐨勭綉缁滄暟鎹互瀹屾垚鍚嶅瓧鐧昏绛夎繃绋嬶紝浣垮緱瀹冧笉閫傚悎璞nternet杩欐牱鐨勫ぇ鍨嬬綉缁溿?NetBIOS鍚嶅瓧璇嗗埆闇?涓変釜姝ラ锛?br />
銆??鍚嶅瓧娉ㄥ唽锛氬湪NetBIOS鍚姩鏃讹紝璁$畻鏈哄悜鏁翠釜缃戠粶澹版槑鍗犵敤浜嗕竴涓狽etBIOS鍚嶅瓧锛屽鏋滃凡缁忔湁鍏朵粬璁$畻鏈哄崰鐢ㄤ簡杩欎釜鍚嶅瓧锛岃繖涓绠楁満灏变細鏀跺埌閿欒淇℃伅銆傛敞鍐屾槸閫氳繃鍚戠綉缁滃箍鎾0鏄庝俊鎭垨鍚慛etBIOS鍚嶅瓧鏈嶅姟鍣ㄧ櫥璁扮殑鏂瑰紡鏉ュ疄鐜扮殑銆?br />
銆??鍚嶅瓧瑙f瀽锛氶?杩囧箍鎾垨鏌ヨNetBIOS鍚嶅瓧鏈嶅姟鍣ㄦ潵瑙f瀽涓?釜NetBIOS鍚嶅瓧銆傛澶栬繕鍙互閫氳繃lmhosts 鏂囦欢鍜孌NS杈呭姪瑙f瀽鍚嶅瓧銆?br />
銆??鍚嶅瓧鍒犻櫎锛氬湪绯荤粺鍏虫満鎴栨彁渚涚殑宸ヤ綔绔欐湇鍔$粨鏉熸椂锛屼細鍒犻櫎鍏跺崰鐢ㄧ殑NetBIOS鍚嶃?

銆??閫氳繃NetBIOS鍚嶅瓧鍜屽叡浜殑鐩綍鍚嶏紝灏辫兘澶熷畾浣峎indows璁$畻鏈轰笂鐨勮祫婧愩?Microsoft浣跨敤U NC鐨勫舰寮忔潵纭畾涓?釜缃戠粶璧勬簮鐨勪綅缃紝涓?釜UNC浠ュ弻鍙嶆枩绾垮紑濮嬶紝鎺ヤ笅鏉ユ槸鎻愪緵璧勬簮璁$畻鏈虹殑NetBIOS鍚嶅瓧锛岀劧鍚庢槸璇ュ彴璁$畻鏈轰笂鎻愪緵璧勬簮鐨勫叡浜悕锛屾帴涓嬫潵灏辨槸涓嬮潰鐨勭洰褰曞拰鏂囦欢鍚嶃?濡傦細\ntserversharefiles 锛屽洜姝や娇鐢ㄤ竴涓祫婧愮殑鍛戒护涓猴細

C:> net use f: \ntservershare
C:> f:
F:>

銆??涓婇潰鐨刵et use鍛戒护灏唍tserver涓婄殑share璧勬簮鏄犲皠涓篎:鐩樸?

鍚嶅瓧鏈嶅姟鍣ㄧ殑宸ヤ綔鍘熺悊

銆??鐢变簬b-node骞挎挱浼氬湪缃戠粶涓婁骇鐢熷ぇ閲忕殑淇℃伅娴侊紝灏ゅ叾鏄湪缃戠粶鏄敱澶氫釜瀛愮綉鏋勬垚鐨勬椂鍊欙紝鑰屼娇鐢ㄨ矾鐢卞櫒鏈潵灏辨槸瑕侀殧绂诲箍鎾俊鎭紝鍙槸涓轰簡杩涜鍚嶅瓧瑙f瀽锛屽氨涓嶅緱涓嶈浆鍙慴-node骞挎挱淇℃伅鍖咃紝杩欏氨杈句笉鍒扮缉鍑忔棤鐢ㄧ綉缁滄祦閲忕殑鐩殑銆?br />
銆??浣跨敤鍚嶅瓧鏈嶅姟鍣ㄨ繘琛岃В鏋愬氨鑳介伩鍏嶈繖涓棶棰橈紝瀹㈡埛閫氳繃瀵瑰悕瀛楁湇鍔″櫒杩涜鏌ヨ鑰岄潪骞挎挱锛屼俊鎭祦灏变笉蹇呬紶鎾埌鍚勪釜瀛愮綉涓婏紝灏辫兘鍑忓皯骞挎挱鏁版嵁锛屽噺杞荤綉缁滅殑璐熸媴鑺傜渷甯﹀锛屽苟涓旇兘鏈夋晥鐨勬彁楂樺悕瀛楄В鏋愮殑閫熷害鍙婂噯纭?銆?br />
銆??瀹為檯瀛樺湪鐨刉indows缃戠粶鐢氳嚦寰堝皯鍒╃敤鍚嶅瓧鏈嶅姟鍣ㄨ繘琛屽悕瀛楄В鏋愶紝杩欏氨浣垮緱杩欎簺缃戠粶鍚嶅瓧瑙f瀽瀛樺湪寰堝ぇ闂锛屽父甯镐細鍑虹幇涓嶅悓璁$畻鏈虹殑缃戠粶閭诲眳鍒楄〃涓嶅悓锛屾牴鏈師鍥犲氨鏄箍鎾柟寮忔槸娌℃湁淇濊瘉鐨勶紝蹇呴』杞悜鍚嶅瓧鏈嶅姟鍣ㄦ柟寮忔墠鑳借В鍐冲悕瀛楄В鏋愰棶棰樸?

銆??鏅?NetBIOS璁$畻鏈哄拰NBNS鏈嶅姟鍣ㄨ繘琛岄?淇℃湁鍥涗釜涓嶅悓鐨勯?淇¤繃绋嬶細

銆??鍚嶅瓧娉ㄥ唽锛氭瘡鍙癗etBIOS璁$畻鏈哄惎鍔ㄦ椂锛岄兘鍦ㄥ悕瀛楁湇鍔″櫒涓婃敞鍐屻?杩欐牱灏变繚鎸佷簡鏁版嵁搴撶殑鑷姩鏇存柊锛屽苟鍏峰鍔ㄦ?鏇存柊鐨勭壒鎬с?鍚嶅瓧鏈嶅姟鍣ㄥ皢杩斿洖纭淇℃伅锛屼互鍙婅繖涓悕瀛楃殑鐢熷瓨鏈烼TL銆傚鏋滃鎴疯姹傜殑鍚嶅瓧宸茬粡琚崰鐢ㄤ簡锛屾湇鍔″櫒灏辨煡璇㈠崰鐢ㄨ繖涓悕瀛楃殑瀹㈡埛鏄惁杩樺湪缃戠粶涓婏紝浠ュ垽鏂繖涓悕瀛楁槸鍚﹀彲浠ュ啀娆¤浣跨敤銆傝繖绉嶆儏鍐典富瑕佸彂鐢熷湪Windows璁$畻鏈烘鏈哄悗閲嶆柊鐧昏鐨勮繃绋嬩腑锛屽洜涓烘鏃跺湪璁$畻鏈烘鏈轰箣鍓嶏紝瀹冨湪鍚嶅瓧鏈嶅姟鍣ㄤ腑鐧昏鐨勫悕瀛楄繕瀛樺湪锛屽鏋滃悕瀛楁湇鍔″櫒绠?崟鐨勬嫆缁濇彁渚涘悕瀛楋紝閭d箞杩欎釜璁$畻鏈哄氨鏃犳硶鍐嶆鑾峰緱鑷繁鐨勫悕瀛椼?鍙湁鍦ㄧ湡姝e彂鐢熷啿绐佺殑鎯呭喌涓嬶紝瀹㈡埛鐨勫悕瀛楁敞鍐屾墠浼氬け璐ャ?

銆??鍚嶅瓧鏇存柊锛氱敱浜庢瘡涓悕瀛楅兘瀛樺湪涓?釜鐢熷瓨鏈烼TL锛岄偅涔堝綋缁忓巻浜嗚繖涓猅TL涓?崐鐨勬椂闂达紝瀹㈡埛浼氬悜鏈嶅姟鍣ㄨ繘琛屾洿鏂拌姹傦紝鍒锋柊鏈嶅姟鍣ㄤ笂鐨凾TL璁剧疆銆?br />
銆??鍚嶅瓧閲婃斁锛氬鎴峰仠鏈烘椂浼氫笌鏈嶅姟鍣ㄩ?淇¢噴鏀惧叾鍗犵敤鐨凬etBIOS鍚嶅瓧锛屽叾鍚嶅瓧TTL瓒呮椂涔熶細浣垮緱鏈嶅姟鍣ㄩ噴鏀捐繖涓悕瀛椼?

銆??鍚嶅瓧璇嗗埆锛氬鎴峰彲浠ュ悜NBNS鏈嶅姟鍣ㄥ彂閫佹煡璇㈠悕瀛楃殑璇锋眰锛岃繘琛屽悕瀛楄В鏋愩?

銆??鏈変簺鎯呭喌涓嬶紝瀹㈡埛娌℃湁璁剧疆鏀寔鍚嶅瓧鏈嶅姟鍣紝鎴栬?浣跨敤鐨勫鎴疯蒋浠惰繕涓嶆敮鎸佸悕瀛楁湇鍔″櫒杩涜瑙f瀽锛屽彲浠ラ?杩囪缃竴涓?WINS浠g悊锛岀敱瀹冩潵鍦ㄥ箍鎾暟鎹拰鏌ヨ鍚嶅瓧鏈嶅姟鍣ㄤ箣闂磋繘琛岃浆鎹紝瀹冨彲浠ュ府鍔╁鎴锋敞鍐屽苟鍥炲簲瀹㈡埛鐨勫箍鎾煡璇?






相关链接:



Using Filter effects create fantastic images



J2ME In The Divide And Rule



51 killed a backstroke start with Tencent IM battle



windows media PLAYER vob



psp mp4 converter



mts to MPG



Best Science - Screen Savers



R accounting economics foundation (3)



Debugging REPORT



Review GRAPHIC CAD



introduction News Servers



Customer is not his wife is a Lover of God is



E-cology in the Pan Micro Series 54



Dvd To Mp4 Converter



Ballmer: ten years of full digitization of traditional media



PB8 How to get in the character string containing the length of the Problem - Davis Summary