Monday, October 18, 2010

Beautiful hand experience with lighting effects with the old photo magic



Some old old photos scanned into the computer after the general feeling some regret, how to get them back up bright? Let us restore memories? Fortunately, this work in today's highly developed digital technology, we can use of light and shadow Magic hand, to play its functional effects. Draw a beautiful picture was born from our mouse!

銆怐ownload銆?shadow magic hands (nEO iMAGING) 3.1.1.58 full version

First, understand the magic of light and shadow magic hand function

Shadow magic hand is a right-hand man with digital photos, popular among photography fans. Use of light and shadow magic hands can easily post a photo processing, such as a photo color, exposure, brightness, curves, hue adjustment and so on. In addition, light and shadow magic hand has also provided us with some common photo effects, such as reversal film effect, treatment effect studio portraits, old photo effects. And other digital photo processing software, like light and shadow magic hands can also add some special photo border effects. After learning how to use light and shadow magic hands, we do not have to learn such complex large Photoshop image processing software can easily handle on the photo.

Second, scanning old photos into the computer

Scanner is a high-precision optical integrated image capture device, the device will be detected by optical light signal is converted to electrical signals, then signals through the analog / digital converter converts the computer can display, edit, store and output in digital format. DC purchased a digital camera users also need the scanner, because if only with a digital camera to shoot pictures, the effect is not good scanner. And now the price is very cheap scanner, worth a purchase. Have a scanner (Figure 1), we derive greater life would be much fun!






Figure 1 buy scanners a good idea

When correctly installed the scanner driver, in the hands of shadow magic select "File" 鈫?"Get Picture" 鈫?"from Twain devices," will then open the window shown in Figure 2, we select the scanner device. For scanning and then set up a folder, you can see the scan window shown in Figure 3. Operation along the wizard can scan old photos into the computer, waiting to be processed.






Figure 2, select the scanner device






Figure 3 is scanning photos

3, modified so bright up old photos

1. General features

Lighting magic hands and other commonly used image processing software, can be cut on the photos, adjust levels and curves and other conventional features.

(1) size of the adjustment

Photo size and direction of the adjustment is frequently used functions can be in the hands of shadow magic, "Image" menu to achieve these effects, such as on the photo zoom, rotate, mirror, cutting edge and so on and expand.

(2) of the conventional picture adjustment

The photos that we may need to adjust the color aspects of conventional, such as Levels, curves, color balance, white balance, hue, brightness and exposure, etc., these features can be through "adjustment" under the corresponding menu command to achieve.

Because these features and operation of the common image processing software has, I believe we are easy to use, and light and shadow magic hand to provide a visual effect of the adjustment, it will not go into.

2. Lighting effects magic hands

In addition to these common features, we are more concerned about the lighting magic hand in dealing with aspects of the old photo effects, such as digital fill light by light, reversal film, negative red, black and white, blur, sharpen, noise reduction, and the portrait style of dealing with so, these features are available through the "effect" under the corresponding menu command to achieve.

(1) fill light and reduce optical digital

If the old photos dark, feeling light enough, you can use digital light dimmer function to fill easily correct these deficiencies. Open a photo it dark, and then select the "effect" 鈫?"Digital fill light" command. In the pop-up "fill light" dialog box can fill a photo light processing, in the "range of options" option to set up a photo light range, a value larger photo of the fill light on the scope of the greater; "fill brightness "option is set to complement the intensity of light, we can photograph the actual brightness level adjustment of these parameters (Figure 4).






Figure 4 for the old digital photos fill light

(2) punching effect

On the handling of the photographs also include the simulation of a number of slides, negatives, black and white photographs and other effects. "Slides" is a film in a highly artistic effect of the film, also called positive. General digital camera photos only have negative effects, if you want to your own photos into the effect of slides, use light and shadow magic hand of the "slides" command can be easily implemented.

Open a need to address the photo, then select the "effect" 鈫?"reversal film effect" command. In the dialog you can set the slides in contrast, shadow, specular color, if you select the "portrait" option is also available on the character of the head to optimize the processing (Figure 5). In addition, you can create slides in addition to other effects, we can easily create a negative impulse, black and white and red positive negative effects, these effects of the production method is simple, simply execute the corresponding menu command can be realized.






Figure 5 shows the effect of old photographs generated slides

(3) Portrait Treatment

If you find old photographs of the portrait is not satisfactory, but also be able to handle landscaping portrait photos, such as portrait white, buff, yellow back to red-eye, etc.. This old photo of the characters become more young, beautiful, and old photographs of the environment match, complement each other more!

Open a photo portraits need to be addressed, and then select the "effect" 鈫?"Portrait Beauty" command, open the "Portrait Beauty" dialog box (Figure 6). In this dialog, we can carry out resurfacing of the characters deal with, but also can increase the level of people face a bright, white can also use the "scope" option to control the size of the face to deal with the portrait, if I select "soften" Options can also deal with people face to soft. Compared with the complexity of Photoshop, use light and shadow magic hands relatively easy to operate.






Figure 6 for portrait beauty operation

(4) Other features

In addition, we can also operate on the figures for black and white, which for old photographs, especially old black and white photos quite useful. Studio portrait style can also use the simulation, while for the yellow race of people back the yellow function is very effective when dealing with a photo assistant (select "effect" 鈫?"More Portrait deal" 鈫?"Portrait faded yellow"). Some of the features on the other, due to space reasons, it is impossible to introduce. We can try on their own, will be able to find in the software used for their practical functions.







相关链接:



WGA newest setting: It may be pirated



CSS Syntax Guide (4) text fill, borders, boundaries and location of the property (2)



How To Maximize The Value Of BPM



Getting Started With Corel Draw 10 (4) Hands To Create Vector Graphics (1)



Photo 6 of A tough, for the first magic



FLV to 3GP



Confessions of an Advertising teachers: "Most people I did not tell him"



Guide Launchers And Task Managers



ikea planner atioglxx.dll error fix it yourself



Eight motivate the staff more dynamic model [1]



How to turn your career profile?



Picked Newsgroup Clients



YUV to AVI



3G2 to WMV



Tuesday, October 5, 2010

Full-width half-angle switching (five-stroke input)



We use the Chinese character input method of the time, often to conduct full-width half-angle conversion, but many people do not know the full-width half-angle how to switch, in fact, full-width and half-width of the switch is simple, use the key combination "Shift + space bar" to can conduct full-width, half-width of the set conversion.

Of course, we can also use the mouse directly on the input icon on the switch.






Half-moon icon in the image above click the mouse to complete the switch.

Wubi and switching between English and the number

To facilitate alphanumeric input, the system set up a hotkey to input Chinese characters and English digital input states and the transitions between states, the hot key to the right SHIFT key (default), hot keys can also be set to the left CHIFT key.







Recommended links:



MPEG to 3GP



Arp Deception Theory And The Innate Immune Router



XviD TO MP4



AVI To MPEG4



Wednesday, September 29, 2010

"Cockroaches door", HP will lose?



've Been looking for this year's 3? 15 show exactly what will be exposed. There is no novelty, no expectations, just wanted to see our lives and what appeared worthy of our attention and to avoid damage.

This year's 3.15 nights, first LCD TV's main component count let me know the fact that the word paper games, not just our company's good, because we see many Japanese Korean system manufacturers know how to justify themselves. Daoshi good news is, we made the TV manufacturers to a handful of people proud.

Of course, more concerned about the quality or HP. The earlier the Internet has provoked much discussion, also see a lot of related presentations. But see Hewlett-Packard at the party's interpretation of the relevant staff, I could not help smiling.

"Cockroaches door", and John who is powerful. Dignified HP ah, can not find a better reason is it?

HP Customer Experience Management Commissioner Yuan Ming in an interview, the reasons for the failure of the HP notebook and made its own interpretation of: Chinese student dormitories terrorist cockroaches too. Really horrible, and John were the ages of famous again.

Time and time again, journalists in HP's customer support center so that we can see that the relevant personnel forward vigorously. "HP laptop does not have any quality problems." Yuan Ming commissioner even said HP's consumer notebook notebook failure and the use of the environment of the College Students Donate Sperm. "None of us can not be resolved, is the student hostels cockroaches, it is very terrible." Terrorist, really horrible, which is HP's attitude?

As we all know, China has grown into the world of many of the first consumer. HP is the world's largest PC manufacturers and brands. But in the face of customer complaints when the HP brand reputation do not know gone? HP pledge gone?

Just this exposure, do not know what HP will lose? At least the brand reputation in the Chinese market will be greatly reduced. This is how many ads are difficult to recover losses. When a company loses the people's time, then the company's growth will continue? Will be recognized and sought after consumer do? Consumers would be willing to trust this brand? HP do not know that people who may be the world it?

Product problems are not terrible, terrible is shirking and shirking its responsibilities, the responsibilities they should be forgotten. Well, ignoring the user, but also inevitably been cast aside and abandoned customers. Water the boat can also overturn it.

Prior to that, notebooks for some problems, Hewlett-Packard in November 2007 issued a "limited warranty service enhancement program" in February 2008 the scheme has been extended. The plan promises to provide users with product standards from the beginning effective date of warranty of 24 months warranty. This is HP's attitude.

Many users in the main components of the maintenance period to three packs of two or more, HP Care Pack Services only to repair, refused to replace the new machine. March 15, the face of the Chinese consumer complaints to its notebook computers, HP has finally taken action once again, declared the affected customers extended warranty services, and to consider the board has paid for the mailing and maintenance costs of the user pay subsidies.

For this approach, CCTV reported that the number is still repairing faults, is in accordance with the provisions for the user to replace three bags of new machines, HP does not do any indication, the other main components of the model HP notebook after maintenance and replacement within the warranty period after, or in accordance with the provisions of the Hewlett-Packard, the warranty period is only three months.

As the world's largest PC maker, a long-term cultivation in the Chinese market, multinational corporations, a good PC company in the world's fourth-largest PC market, so the face of consumer complaints and questions, HP does make the crisis public relations people can not compliment. The neglect of this market, and ultimately will make Hewlett-Packard from the bag.

If the HP people lose trust in the brand, then HP will be a huge loss of potential infinite market, HP's consolidation of the world's first PC also increased sharply the pressure on the throne. When Lenovo, Dell, Acer, HP, mistakes are eyeing the time, HP just to the competitors a chance. HP, this will be how to survive?







Recommended links:



MAKE SOUNDS (voice)



Job: Get high-paying positions in six coup



Psp To Sony Nwz-s739f Converter Guide



TOD to WMV



MOV To IPod



Launchers And Task Managers reviews



MP4 To FLV



Recommend Games Board



Century "chain" War To Build The New Century Brewery



Are Days, As The (ZONTIS) Infrared Camera Prices Down Across The Board



ChinaByte Jian Yang: Dell you in the end Yuan Buyuan



Lightning fast shortcut keys used to grasp Thunder 5.9



Kaspersky v. Rising 7.45 million claims of unfair competition



FreeBSD SERIAL (64): NetBIOS name resolution



Flash Highlights Examples Of Forms Produced (6)



Monday, September 27, 2010

MSN also has "never gone" fixed base



Before the msn group also provides a similar function, but it is not QQ can be permanently established as a fixed group. There is finally the establishment of a fixed group of robots, and is the official!

First, the establishment of a fixed group of their own when the group master

In the MSN Messenger or Live Messenger, click "Contacts 鈫?Add Contacts", then the provision of services to the small group I Robot (groupadmin@xiaoi.com) Add to MSN friends, add to the links after the successful the list of people find this nickname for the "group of customer service," a small robot and double-click the I, in the open and "customer base" of the dialog box will see digital information.

Follow the prompts to information, enter "1" and as the message sent to the "group of customer service," created after the cluster wizard will start. Will see later, an invitation prompt, just click "accept" key at this time "customer group" new group will start the registration wizard, follow the wizard prompts in the window to enter the correct registration information, in this group from time to time registered two methods, one is automatically assigned to group accounts, the other is hand-registered group accounts. If you want to apply for an individual's group accounts, group accounts need to manually register, is to open in the browser page to register http://get.live.com/getlive/overview a Live Messenger account, then use the Live Messenger account to register the group. In order to avoid complicated to simple, suggest that you still use the system to automatically assign account of the method to apply.

Second, a key to start

Open the MSN, in the contact list to find the group just created and double-click to open, and then click MSN splash screen vibration button and click on the following "acceptable" after the group start function. In the right window can be achieved through the corresponding button to add contacts (need to be added to add a contact to accept invitation), set group of data and information, set the administrator so.

3. The same as the QQ chat group

New group and add a contact, you can group the contacts and chat. If the group of contacts in the group issued a public message in your msn will receive a message from the group, if the other party directly to you through a message function to send the message, it achieved the equivalent of using group one to one chat. If you want to participate in group chat and post group messages, first found in the contact list and double-click the group, and then click the "splash screen vibration" button to start a group chat, then send messages directly, the message will be sent to the group All the contacts within, if you want to contact a specific message, as long as the group's contacts within the contact list by clicking the appropriate nickname in the small window that pops up enter the messages in. (See Figure 1)





If you are a group of owners, do not want to use the group, just kicked out all of the friends group, then you can then exit the group. If you participate in the establishment of a group of people in the group want to quit, as long as the group chat window, click on the "members" button, then click on "Exit group" button. If you are adding to the other group after the group do not want to withdraw from the case, you can block MSN chat window button to temporarily shield base to send the message, so you can temporarily shield after operation in the contact group is sent to you message.

I use this little robot group is simple, just apply for a group, then you can add contacts come in, but do not QQ group can double-click the group from the contact list to start the chat, it needs to " Nudges "button to start the group function before they can take the initiative to send group messages. If you wish to talk like QQ and MSN contacts as chat groups, might also add a fixed their MSN group now!








相关链接:



DDSN analysis, PLM value for the DDSN



Photoshop Production - wire and spark



Report Timers And Time Synch



Selected to create the first step taken on the PLM



Catalogs Audio And Multimedia



VBScript Pattern Properties



The world's smallest digital music player coming soon



QuickTime To MPG



MPG to AVI



OGM to AVI



Gallery And CATALOGING Tools brief



New AD Blockers



2009 chip market reached 321 billion u.s. dollars



Computer fraud, although he is alleged to have bought



How to create Firefox EXTENSIONS of Jetpack



Tuesday, September 14, 2010

EMC Q3 earnings results announced revenue fell 5.3% over the same period



EMC announced yesterday its latest quarterly financial report, the results exceeded Wall Street expectations. EMC is expected, IT spending will rebound slightly in 2010.

EMC's third-quarter revenue fell 5.3% last year to 3.52 billion U.S. dollars, higher than the Thomson Reuters expected a 70 million U.S. dollars. Non-GAAP calculation, EMC for the quarter was 480.3 million U.S. dollars income (or 23 cents per share), as higher than expected.

EMC said revenue growth resumed in 2010 until the fourth quarter revenues will be 4 billion U.S. dollars last year was flat.

EMC CEO Joe Tucci and Chief Financial Officer David Goulden said that users will spend their IT spending to "feel more relaxed."

Tucci said in a telephone conference: "In the third quarter, we expect good business stability. Orders for the quarter and the previous level are very close."

He expects IT spending will increase slightly in 2010, EMC's data storage, virtualization, security, regulatory compliance, backup, recovery and archiving core IT market will exceed the overall market.

Tucci said: "We expect IT spending in 2010 will begin to grow, but also lower than the 2004 to 2007, the historical level of growth."

Tucci special emphasis on the EMC of the (internal and external corporate firewall) the views of cloud computing.

He said: "We will work with telecommunications and service provider partners with business users to create to complete the internal cloud structures compatible with the external cloud."

He also said that, through cooperation with partners they would "help our customers create their own cloud of the Lianhe. These clouds will enable our customers to IT Gongzuo Fuzaifenbu to their own Tongyineibu cloud Shujuzhongxin and Suoxuan services external cloud provider data centers for our customers another level of flexibility and efficiency. "

EMC also plans to develop from these clouds can operate on the basis of architecture, SaaS-based solutions, and from the Mozy online backup service to start. Tucci also said, EMC plans to introduce unity to the desktop and mobile device services.

Tucci also promised to provide all partners VMware subsidiary of "open and fair way."

EMC outstanding for the quarter plate, including the latest Symmetrix V-Max, Celerra unified storage systems, Data Domain and Avamar data de-duplication products, solid-state disk, Mozy and Iomega small business and consumer products.

Goulden said that the launch this coming quarter automatic storage layer (Fully Automated Storage Tiering, FAST) will further promote solid-state drive revenue growth.

Goulden said that as Dell and EMC will be the long-term partnership with each other focus more on the OEM sales, rather than sell on, so Dell's midrange Clariion sales decreased 15% contribution, the Clariion revenue accounted for 1 / 4 share. Dell EqualLogic product line through its own data storage area began to push into. The overall Clariion sales ring up more than 1%, EMC hopes to make up Dell's direct channel sales decline in the resale business.

Third quarter U.S. market is the best EMC performance of regional markets, from the market, revenues increased 13%, while other areas of revenue growth was only 3%. Goulden also made special mention of the stability of the financial services IT spending.







Recommended links:



format TS



free mkv Converter



m2ts to VOB



Free Mkv To Avi Converter



Wednesday, August 4, 2010

Chinese Microsoft Access Help BUG



The color of the original given name is wrong, using the wrong color name, not the desired result, and the display will appear, "[Color names]" characters.

Original:

Can use the Format property to customize the number, date, time, and the text is displayed. String type, read / write.

expression.Format

expression required. Return "used" list of an object expression.

Explain
You can use predefined formats, or you can use formatting symbols to create a custom format.

Format of the different data types use different settings. Information about specific data types, see the following topics:

"Time / Date" data type

"Digital" and "currency" data type

"Text" and "Notes" data type

"Yes / No" data type

For controls, you can set the control's property sheet in the attribute. For the field in table "design" view ("Field Properties" section) or "query" window "design" view ("Field Properties" property sheet> in) to set the the property. You can also use macros or Visual Basic.

Note In Visual Basic, you can enter the corresponding pre-defined format of the sub-character string expression or input a custom format.

Format property affects only the data is displayed, does not affect the data is stored.

Microsoft Access as the "time / date", "digital" and "currency", "text" and "Notes" and "Yes / No" data type provides a predefined format. Predefined format and country / region settings (by double-clicking Windows "Control Panel" in the "Regional Settings" set) of. Microsoft Access display corresponds to the selected country / region format. For example, if the "General" tab, select "English (United States)", then 1234.56 a "currency" format is $ 1,234.56, if the "General" tab, select "English (United Kingdom)", the figures will show to 拢 1,234.56.

If the table "design" word view field Format property is set, Microsoft Access data table using the format to display the data. Forms and reports on the new controls are also applied field Format property.

In any type of custom data format can use the following symbols: Symbol Meaning

Spaces will appear as the original meaning of space character.
"ABC" character within double quotes will appear as literal characters.
! The implementation of left-aligned instead of right-aligned.
backup bin conf config data eshow_sitemap.html generate.sh log maint sitemap.html svn tmp character filled with the next available space.
The next character will appear as the original meaning of character. Can also be placed in double quotation marks around way to display the original meaning of character.
[Color] in between the brackets with the specified color display formatted data. Available colors: black, blue, green, blue, red, purple, yellow, white.

Can not be "digital" and "money" type of data types and custom formatting symbols, "Date / Time", "yes / no" or "text" and "Notes" format symbols mix.

If the data input mask also defines the Format property is set in the display data, Format property will be the priority, and ignore input mask. For example, if the table "design" view, create a "password" input mask, the same time they set the Format field property, either in form or in the form of control, data attributes according to Format display, and "password" input mask are ignored.

Correct:

[Color] in between the brackets with the specified color display formatted data. Available colors: "black, blue, green, blue and green, red, magenta, yellow, white"







相关链接:



Reviews Reference Tools



flv to mp4 converter FREE download



Analysis of the Japanese shipbuilding Industry



Business is business had to kind



mts format



Rising still fall asleep right now?



Dealer, where your opportunities



Symbian Association David Wood: open source, unity and progress



freebsd5.0kde Chinese interface settings



Operators To Remind: Strange Sounds For Calls Do Not Hang Back On



Simple Flash Tools



what is mov



How To Quick Cash Flow Statement The Two Main Forms



Articles about GRAPHIC



Streaming Media common sense: the basic principles of stream



mov to avi converter free



Monday, July 26, 2010

Comparison of six agent approach



Traditional proxy, transparent proxy, plug-gw, Apache reverse proxy, IP masquerading, port forwarding comparison of six methods

The first part features a variety of proxy and packet rewriting the way the process

Squid proxy and transparent proxy tradition:

In Linux, the most widely used traditional proxy and transparent proxy is Squid. Default Squid configuration into the traditional agency approach. In this way, windows in the browser client to set the proxy server address and port number, the client actually very little work to be done. Only need to specify the proxy server IP address and port number can be, the other left to do all that to the proxy server. In this way a striking feature is the windows client browsing the Web, when entering a URL, DNS is also done by the proxy server. DNS resolution process is based on Linux server set up / etc / host.conf file parsing order of.
General of the order is to first find the / etc / hosts, then looking for DNS database bind. In this case, the interesting example is that if you set up a site for your internal network domain in a server, you first go to access the internal network server. If you set 192.168.11.3 www.yahoo.com then your browser can not access the internet to a yahoo site.
However, if you set the transparent proxy, then the resolution of the DNS and then the order will become windowshosts Linux, DNS database. No longer possible to check the Linux server / etc / hosts file.
Introduction of transparent proxy, see the article meets in another article "How to set the transparent proxy in Linux"

Traditional proxy and transparent proxy package rewriting process: see below

[PC] A [Linux squid server] B
__192.168.11.12_ |_____ 192.168.11.5__ | ___1.2.3.4_________Internet

A machine in the user's browser to set the proxy to 192.168.11.5, port number is 3128, through the B line.
If the access www.linuxforum.net, in fact if you set a proxy if the client browser only and Linux Squid server and the Internet to communicate and never talk on the www.linuxforum.net server, first of all by the squid proxy server
www.linuxforum.net parse (find / etc / host.conf in the resolution order, first / etc / hosts then DNS lookup)
For the IP address 202.106.124.185, the last by the proxy server instead of client IP address of the HTTP access, restore the information back to the squid cache in the first cache, and a copy to the client. Next time if the user or other users to access the same page, you can call from the squid cache to save time.
Transparent proxy process and the traditional agency similar to the difference between
1. DNS resolution process is different, as already mentioned
2. Transparent proxy gateway must be set to squid proxy server IP address, but the traditional agents do not need.
3. Transparent proxy need to set fire chain of input rules, and the rest of squid the same way as traditional agents.

plug-gw:
plug-gw is brought FWTK in general agent. Available to agents such as POP3, HTTP and other application layer services.

[PC] A [Linux POP3] C [Linux plug-gw] B
__192.168.11.12_ |______| 192.168.11.1____192.168.11.5__ | ___1.2.3.4__Internet

If there is a segment within the Linux POP3 server C (192.168.11.1), want external users to receive e-mail can be set in the machine B, the POP3 proxy plug-gw as follows:

Put the following line to / etc / rc.d / rc.local
/ Usr / local / etc / plug-gw-daemon 1.2.3.4:110-name plug-gw-pop3 & file / usr / local / etc / netperm-table has the following line
plug-gw-pop3: port 110 backup bin conf config data eshow_sitemap.html generate.sh log maint sitemap.html svn tmp-plug-to 192.168.11.1-port 110

The user to set the POP3 server outlook express address of 1.2.3.4. When the received message, the external interface of the B machine, the port 110 in 1.2.3.4 to accept user requests, subsequently plug-gw treatment, in-house segment, from 192.168.11.5 192.168.11.1 110 port on request. To the data collected by the 1.2.3.4 interface, copy to external users.

Apache reverse proxy.
Packet rewriting process and similar plug-gw

Note: The above stated three cases, the request process is in two separate in the middle usually squid proxy server or plug-gw, Apache server, data server, two network cards in the middle of the action to do copies, but the process of the two requests The source address is randomly assigned to high-end addresses are different. In 1024 and 65535. But in general, TCP / IP address assigned most of the random-end 1024 - 5000 allocation. For example: For the plug-gw is:
If an external dial-up user's IP address is 5.6.7.8. If the address and port as follows:
Source address and port number and destination address and port are:
5.6.7.8 1038 1.2.3.4 110
Request to be plug-gw rewritten as:
192.168.11.5 1045 192.168.11.1 110

Reply by 192.168.11.1 data is copied to the external customers.

But not all cases, the address of the source are randomly assigned to high-end 1024 - 5000. IP masquerading is the exception:

IP masquerading:

[PC] A [Linux MASQ server] B
__192.168.11.12_ |_____ 192.168.11.5__ | ___1.2.3.4_________Internet

Shown above, PC A through B camouflage Internet. To access www.linuxforum.net, when the package is disguised rewrite process is as follows:

Source address / port number and destination address / port number:
192.168.11.12 1047 202.106.124.185 80
Disguised the source after the address and port number and destination address / port number:
1.2.3.4 62334 202.106.124.185 80

Anti-back package for the
202.106.124.185 80 - 1.2.3.4 62334
Longer be re-written to PC A as:
202.106.124.185 80 - 192.168.11.12 1047

In general, IP source address is usually disguised> 60000, and in the 61000 - 64999 between.
The firewall maintains an IP masquerading comparison table. With the command / sbin / ipchains-M-L-n can be seen as:
[Root @ proxy etc] # / sbin / ipchains-M-L-n
IP masquerading entries
prot expire source destination ports
UDP 02:18.86 192.168.11.12 205.188.179.41 1215 (62615) -> 4000
TCP 17:03.20 192.168.11.12 205.188.248.57 1049 (62584) -> 80

Column from the ports you can control the source address of the match twice.

Port forwarding (port forwarding):
See the article meets in another article, "Using port forwarding to internal network to provide network services of external"

The second part of the way the various agents and the advantages and disadvantages of the application

The role of the various proxy methods:
1. IP masquerading, Squid proxy and transparent proxy for the traditional make no real IP address of LAN users to access Internet.
2. Apache reverse proxy, plug-gw general proxy, port forwarding for external users to access the LAN without real IP address of the server.

Advantages and disadvantages of various proxy methods:
1. Squid has the advantage of client requirements Henshao, as long as Liantong squid server. But the need for each machine are set to the proxy server IP address and port number
2. Squid transparent proxy does not need the advantages of each client are set proxy address and port and simplify client configuration. But the need for each client's default gateway are set to squid proxy server, and require the client to do DNS resolution
3. IP masquerading may be suitable for most application-layer services, unlike the squid only supports http and ftp. But customers also need to set the default gateway address of the firewall. And do not like squid with cache functionality
4. Plug-gw proxy the servers can be as HTTP, POP3, etc.. But the Apache reverse proxy can only reverse proxy http requests
5. Port forwarding for most services. Nothing to do with the specific application. And fast implementation in the kernel IP layer, application layer without requiring special services running. But may need to recompile the kernel.






Recommended links:



What Is The ARP Protocol? How To Guard Against ARP Cheating Trojan?



Long new use of knowledge transfer, strengthening Bosch power up



mpeg



ts File



"Six Degrees Theory" mold SNS



Free mp4 to 3gp converter



Premier Security And Privacy:



Articles about Teaching And Training Tools



Easy HTML Tools



Mp4 To 3gp Converter Free Download



How to reduce the lead time ---- to the world-class manufacturing of the third practice



I have fish and bear's paw: MSNPlus make better use of MSN



BI's Salvation



Teach you to manually Remove Angola variants