跳至主要内容

Audio and video from the storm caused by network congestion to see Internet governance

Illustrates the fact that the brutality of the development of information technology because of the fast, technical and application related to fast replacement of the management of the Internet should not be a simple blocking, clearance, and other means to stop, but standing on a higher level through technical management tools on the Internet for illegal and criminal acts to be tackled, the management of commercial software in place. Although the development of the Internet in China to a certain stage, however, the information security environment of the Internet has not been effectively reversed, is not closed several small sites, is not strictly implemented the policy record (the other hand, because the record mechanism inefficient, but a lot of delay in the normal operation). Information security, can not be imperfect, the industrial chain of the parties should safeguard the stability of Internet-based environment, not just think of the commercial interests of light.
 
 
 
 From the evening on the 19th, Beijing, Tianjin, Shanghai, Hebei, Shanxi, Inner Mongolia, Liaoning, Jilin, Jiangsu, Heilongjiang, Zhejiang, Anhui, Hubei, Guangxi, Guangdong and other regions have experienced Internet users reflect the fault. (China May 20, Nanjing Xinhua)
 
 The telecommunications sector to the media revealed that the failure was due to storm video client software flaws but, Storm video, said the real reason for failure to provide services because the domain name service provider "dnspod" by a large number of the server from an unknown source, "Broiler "attacks caused. >> Comment network information, Luoyang life: http://luoyanglife.com/  >> Luoyang discount forum I love life: http://bbs.luoyanglife.com/  >> Henan entrance examination Network: http://www.edu-ha.com/index.php  >> just one sentence: http://log-by-me.blogspot.com/
 
 
 
 Things here, I have the following questions:
 
 
 
 1: Network mafia's power in the end whether the government regulation?
 
 
 
 Letters over the past few years the Department of Public Works has been a strong push main site record, I believe that this policy is a good starting point is to effectively control the Internet, but before a point I mentioned: the filing system site, solely on the basis of stand gentleman, by not mean the development of the Internet to the present, gangs run the network, the entire Internet attacks, Trojans, viruses, abound. We can speculate from the common sense, the real place of these viruses and Trojans gang network, they will not go to the record, few people would go in the record to the competent authority. I think the real solution to this problem is to increase the authority of law enforcement gang network.
 
 
 
 DNSPOD this thing to be attacked, in fact, is reflected in the Internet governance gaps, China's information industry has been lagging far behind the legislation of China's Internet industry rapid development, and related legislation remains a long time before. This is a network of criminal gangs run rampant in our country's deepest-seated reasons, and relevant authorities on the management of the Internet remain at the site is only a temporary solution, such as the record of the means.
 
 
 
 The second point is: the Internet business management software, is there a good response.
 
 
 
 Having said that, in recent years, China's Internet companies in order to seize the market, have used a variety of technology to seize the user's lower left-hand corner, the bottom right corner of the desktop, browser and other end-users of resources. Still remember a lot of media exposure over the network audio and video of the storm to stay stormlive the process of long-term memory. The major area of failure is an important reason for failure dnspod occupied by a large number of Internet users StormCodec client continually repeated due to failure to submit dns domain name resolution process of the network congestion.
 
 
 
 Before a lot of IT media, have reported on the video, there are many loopholes in the storm, it is easy to be used. This also shows that this is a gap: a large number of customers of commercial software, how to order in a stable Internet efforts. We imagine, adding the storm is just a local audio and video player, then I think this incident will not happen again.
 
 
 
 The Internet to seize a number of strategic customers of business software, including Tencent QQ, security guards, Storm video, foxmail, msn and other software. In the increasingly crowded Internet, the information superhighway, the Internet software as well as the control terminal is like a big one on this team how to effectively regulate and manage, it should be put on the agenda of the relevant departments, the software vendor through the Internet indirectly or direct control of the computer users in the control of the process, who have to monitor? Who is responsible for this, how to ensure that the software is in the use of the data transmission channel to meet the user application, or to achieve their business objectives? Simply can not control, I even thought of Microsoft's black screen, though; under pressure, and finally to nothing. However, the so-called lesson, a guide for the future, the lessons are worth considering. However, the Storm is also one of the victims of audio and video.
 
Illustrates the fact that the brutality of the development of information technology because of the fast, technical and application related to fast replacement of the management of the Internet should not be a simple blocking, clearance, and other means to stop, but standing on a higher level through technical management tools on the Internet for illegal and criminal acts to be tackled, the management of commercial software in place. Although the development of the Internet in China to a certain stage, however, the information security environment of the Internet has not been effectively reversed, is not closed several small sites, is not strictly implemented the policy record (the other hand, because the record mechanism inefficient, but a lot of delay in the normal operation).
 
 
 
 Information security, can not be imperfect, the industrial chain of the parties should safeguard the stability of Internet-based environment, not just think of the commercial interests of light.
 

评论

此博客中的热门博文

Google和雅虎签约加入英国定向广告规则

北京时间3月4日消息,据国外媒体报道,Google、雅虎已经签约加入英国的定向广告规则,以便向消费者提供更好的隐私保护。   定向广告去年成为了英国的热门话题,当时广告技术公司Phorm宣布与英国电信、维京传媒(Virgin Media)等互联网服务供应商合作,一些人士警告说消费者的隐私将受到威胁,互联网广告局英国部门在与Google、AOL、雅虎、微软等公司商讨后制订了若干原则。   互联网广告局监管官员尼克-斯特林格(Nick Stringer)表示:"定向广告占到了网上显示广告的20%,如果这一领域要发展,就必须赢得消费者的信任。"   按照这些原则,所有定向广告平台在获得数据之前都必须明确通知消费者,必须提供一种方式让消费者可以拒绝定向广告,最好能征求消费者的同意。(编译:搜狐IT Unifytruth) ------------------ 洛阳生活信息点评网:http://luoyanglife.com/ 洛阳生活信息,我爱打折论坛:http://bbs.luoyanglife.com/ 河南招生考试网:http://www.edu-ha.com/

前员工称社区网络是Google最大弱点

北京时间3月7日消息,Google员工近日掀起了离职创业之风,并且主要的创业领域为社区网络。有前Google员工指出,社区网络正是Google最大的弱点。以下是今天美国科技博客的主要内容。   Bits:分析师称移动运营商之间将出现价格战   Sanford Bernstein分析师Craig Moffett日前在一份报告中称,由于手机普及率已经很高,因此移动运营商将很难继续实现增长,而运营商之间将出现价格战。来自美国各主要运营商的最新数据显示,用户增长的速度正在大幅放缓。08年美国手机用户数仅同比增长5.9%,而09年可能进一步下降至3%。而一旦出现价格战,运营商的营收增长也将趋于停滞。Moffett甚至表示,整个移动通信产业即将崩溃。移动运营商目前将希望寄托在智能手机上,智能手机用户通常会更多的使用数据业务。   WebProNews:员工称Google最大弱点在社区网络   前Google员工Bindu Reddy和Arvind Sundararajan近日创立了一家社会化网站Likaholix,这是前Google员工近期创立的数家网站之一。分析认为,导致Google员工离职创业的原因有二。首先,Google目前的规模太庞大,因此很难将一些好的创意引入核心业务中。其次,在网页搜索领域对Google发起挑战是愚蠢的,Google最大的弱点在于社区网络和实时搜索。Reddy认为,Google未来最大的威胁来自Facebook和Twitter,而不是微软和雅虎。   Search Engine Land:AdSense发行商起诉Google获胜   AdSense广告平台的一名用户近日对Google提起诉讼并获得胜利。Google此前关闭了该用户的AdSense帐号,理由是该帐号"对广告主造成威胁",但Google并未具体指出这一威胁是什么。该用户随后起诉Google,并要求Google赔偿721美元。尽管Google的法律代表声称Google有权终止用户帐号,并且已经向该用户支付了721美元,但法庭最终判决结果仍然要求Google支付这笔钱,以及40美元的庭审费用。这一诉讼或许将成为其他AdSense发行商未来起诉Google的依据。   VentureBeat:全部iPhone应用程序总售价超7万美元   尽管RIM、微软和Palm等公司均推...

银行叫市民还钱,市民一封回信:ATM机取400元吐出4000元

云南昆明ATM机取400元吐出4000元,银行叫市民还钱。之后银行收到这位市民一封回信,内容如下: 1:请在我规定的时间到我家来取,时间是早上7点到8点,晚上7点到9点,其他时间我要上班和休息。  2:到我家后请在过道口取号,然后在楼梯间蹲着等待叫号,请在我家门口黄线外等待。  3:请提供你的有效证件,在我奶奶那里领取申请表,填好后签名,盖公章,我会对比你们的公章,要是模糊了,我会叫你回去重新盖。  4:你要是要问我取了多少钱,对不起,请支付查询费,一笔2元。  5:提供你的单位证明,委托书等资料。(注意这个"等"字,到时候突然想起还需要什么,你自己回去拿。)  6:手续全部完成后,请交纳取款手续费,每笔4元,然后留下TEL号码,我会把资料提交到我老婆那里审批,20个工作日,到我家领取。当然,来领取时请重复1,2,3步骤