Tuesday, October 19, 2010

Sun executives hefty pay increase for 2006, six times the most high


Beijing on September 21 news, Sun announced this week three, the company CEO Qiaonasenshu Watts (Jonathan Schwartz) and Chairman of the Board Mike Scott Neely (Scott McNealy) 2006 salary increase for the year. While Sun has not profitable this year, but spending has been cut through layoffs and regain some market share.

Schwartz total compensation in 2006 will reach 22.8 million U.S. dollars, far more than 3 million U.S. dollars in 2005, or six times over; McNealy total compensation in 2006 will reach 16.5 million U.S. dollars, as far more than 4.2 million in 2005 dollars. The two Sun executives total compensation increase from the company granted restricted stock, of which Schwartz was worth 12.97 million U.S. dollars will be restrictions on equity, while McNealy will be worth 6.7 million U.S. dollars equity restrictions.

According to Sun to the United States Securities and Exchange Commission filings, Schwartz fiscal year 2006 will be 290 million shares, received only 80 million shares in 2005; McNealy will receive 300 million shares in 2005 was only 125 million shares. The right of the line prior to the date, if the Sun shares rose 5% annually, Schwartz received options in fiscal year 2006, the value will reach 8.4 million U.S. dollars, McNealy was the value of equity will reach 8.7 million U.S. dollars.

Sun said it obtained 290 million in equity McNealy, 90 million shares exercisable at a price of 3.85 U.S. dollars, and exercise date July 28, 2015. McNealy remaining 200 million shares, and Schwartz 210 million stake in the exercise price of 4.95 U.S. dollars, and exercise date April 27, 2016. Week 3, Sun shares in the Nasdaq rose 0.04 cents, or 5.16 U.S. dollars, or 0.78%.







Recommended links:



Tear down the horse-tert-break "AION" Legend of the strongest NPC



Server APPLICATIONS Infomation



After the way you do business you're considering?



The sony ericsson xperia x10 mini the smallest



Under the iceberg



OPTIONAL U disk watch "shell" scam



Simple Music COMPOSERS



Photoshop Round with your dream car (directory)



Fang Hao made a small amount of 3G next month or early next year provisional license issued



MPEG to 3GP



Ad BLOCKERS Storage



DVR-MS to MP4



Lucent China's revenue fell 9 Longa marriage to be laid off thousands



New Ad Blockers



MKV to MOV



Friday, October 8, 2010

Intrusion Detection (ID) FAQ (on)



On intrusion detection, what open standards exist?

Intrusion detection so far had not come to open standards. But we are in this direction.

Internet Engineering Task Force (IETF) is developing Internet standards entities. They have a working group dedicated to the development of a common format for IDS alarm. The group has completed the investigation phase of the demand, the specific design has been basically completed, but the specific details may change slightly. Implementation of the initial work will probably be conducted to finalize the standard small changes. Now the design is similar to HTTP connection through the format of XML-based IDS to send a warning. In order to meet the needs of IDS analysis, and so the agreement can be in a natural way through the firewall, people have done a lot of work.

We welcome more staff involved. IEFT Working Group would like to participate in any and skillful people who are open. This is because the individual is always able to put forward the best way to solve the problem, rather than the boss's agenda to give the answer.

The purpose of the working group can refer to http://www.ietf.org/html.charters/idwg-charter.html, mailing list: http://www.semper.org/idwg-public/ working group documents can view http : / / www.silicondefense.com / idwgISO of T4 Committee also paid a lot of efforts, intrusion detection framework proposed. The progress of the project is still unknown, FAQ authors have also not have access to known data.

Common intrusion detection framework (CIDF) is the U.S. Defense Advanced Research Projects Agency (DARPA) for the IDS data exchange made an attempt. CIDF not want to get a commercial product can affect the standard, it is just a research project. Now CIDF development seems to have stopped. CIDF similar to Lisp's format used to exchange information on the invasion-related events, and to use these messages define a large number of system prototypes. Http://www.gidos.org you can get more information.

How heavy traffic in a network environment to achieve the exchange of intrusion detection system (web-based)?

In exchange environment to achieve the main difficulty of intrusion detection system is different from the hubs and switches caused. The concept of the hub is not connected, so each packet received from one port will be copied to other ports. However, the switch is based on the connection, when a data packet from the switch port to enter a temporary connection, the packet will be forwarded to the destination port. Therefore, the hub environment, we can probe into any of our locations, but for the switch, you must use some means of making the detector can monitor the traffic needs.

The current choices are TAPS (in Chinese meaning for the faucet), hubs and cross-port (spanning port, in some places, also known as Mirror Port mirroring ports), cross-port switch can be configured in pairs as a port as hub work. For example, in Figure 1, we want to monitor the switch and resource machine (Resource Machine) the connection between the conditions. So we can switch the resource base of data transmitted through the port where the IDS port. We can send resources to machine data packets sent or received data packets, or both. Some of the existing switches can not guarantee 100% will be sent to the span port to monitor traffic, so even if the intrusion detection system is set to monitor all the attacks, some attacks may also be undetected. Sometimes the switch port only allows transmission of a packet, so monitor multiple hosts at the same time very difficult, even impossible.



TAP is to use a hub or similar solutions. Hub or tap is placed in the middle of the monitored link, usually located between the two switches or between switches and routers, or between servers and switches, and so on. In Figure 2, the hub is placed between the resource hosts and switches. In this way, resources between the host and switch networks are still running, but due to the characteristics of the hub, the network data is copied to the IDS on. Some of this and similar across the port, but across the port can only monitor a single host. Hub to connect multiple machines to cause network problems offset the benefits of the switch the other, using a fault-tolerant hub will greatly increase costs. Tap is used to design pairs of primary connection (that is host to a switch from the resource connection) fault tolerance, and use the hardware to ensure that no error occurred.



Figure 3, a tap is used to monitor a host of resources. Tap is one-dimensional, allowing only the host from the switch and resources to the IDS between the traffic through. This prevents the IDS host to a switch or a resource flow, the flow rate will not go back to IDS. Since the tap is one-dimensional, we can tap the network traffic from several leading to the hub, and ultimately by the IDS to monitor, so it will not cause network problems, see Figure 4





What is a honeypot? How to use the honeypot?

Honeypots are programs that can simulate the specified port on your computer to run one or more network services. Attacker will think you run some of the loopholes in the service, to break through those systems. Honeypots can be used to record all the activities connected to those ports, even including the attacker's keystrokes record. This will provide you with early warning of some joint attacks.

A honeypot program called cheat Kit (Deception Tool Kit), can be downloaded from the http://www.all.net/dtk/index.html. You can configure a port to connect to each reaction.

Honeypot server running on the well-known, such as Web, e-mail or domain name server, and it is appropriate, because these systems are often the object of attack. Honeypots can also be used to replace the system being attacked.






Recommended links:



runtime error 1721 it can be fixed Now



Operation of Supermarkets to dealers Suggestions



PS texture Text SERIES: Python pattern word



Picked Audio RECORDERS



GIS work?



Infomation Timers And Time Synch



The reliability of SAS



MP4 To 3G2



DivX to MPEG



Training into the domestic game Breakthrough



Open-source can not be anti-monopoly



FLV to VOB



Element UNION and day encounter in the rubber of the Kingdom of thinking



Thursday, September 23, 2010

ASP test two simple functions external to submit


This article cites two simple test ASP-function external to submit examples of the first function is ChkPost (), it can detect whether the server name where the user is currently present in the source page, the second function is PostCheck (), it can Through a simple test to see whether the POST form submission.

Function ChkPost ()
Detect the user currently exists in the server name where the source of the page

Code is as follows: Function ChkPost ()

dim server_v1, server_v2
chkpost = False
server_v1 = Cstr (Request.ServerVariables ("HTTP_REFERER"))
server_v2 = Cstr (Request.ServerVariables ("SERVER_NAME"))
If Mid (server_v1, 8, Len (server_v2)) <> server_v2 Then
chkpost = False
Else
chkpost = True
End If
End function

Function PostCheck ()
Very simple test is to test whether the POST method to submit

Code is as follows: Function PostCheck ()

PostCheck = False
If Lcase (Request.ServerVariables ("Request_Method "))=" post" Then PostCheck = True
End Function






Recommended links:



Easy Audio CD Players



QT to WMV



SWF to MOV



ICBC Amendment



Lists E-Commerce



Rising harm the user did not apologize for doing odd tiger, said to be practical



Alternative To Microsoft Office Word 39 S Tools



Photoshop font effects - waffle words



Used to create AUTOMATIC play music listening Pros CD



What is the trend of digital cameras



FreeBSD Serial (35): serial port and modem



FLV to iPhone



CEO Online: Yan Huang Star CEO Chang On August 15 Guest Sina



Directory Cartoons - Screen Savers



Visual Studio 2010 Will Be Formally Included F #



Tuesday, September 14, 2010

U.S. scientists trained computer "understand" the human brain



銆??鍖椾含鏃堕棿5鏈?0鏃ユ秷鎭紝鎹浗澶栧獟浣撴姤閬擄紝缇庡浗鐮旂┒浜哄憳鏄ㄦ棩琛ㄧず锛岀數鑴戠粡杩囧弽澶嶈缁冨悗锛屽彧瑕佷竴鐪嬪埌浜轰滑鍦ㄦ?鑰冩煇浜涜瘝鏃剁殑澶ц剳鎵弿鍥惧儚锛屽氨鑳解?璇绘噦鈥濅粬浠殑鎯虫硶銆?br />
銆??鐮旂┒浜哄憳甯屾湜杩欓」鐮旂┒鍙戠幇鑳戒娇浜轰滑鏇存繁鍏ヤ簡瑙eぇ鑴戝浣曞偍瀛樹俊鎭?棰嗗璇ョ爺绌堕」鐩殑缇庡浗鍗¤?鍩?姊呴殕澶у鏈哄櫒璁ょ煡绯荤殑姹ゅ路绫冲垏灏?Tom Mitchell)琛ㄧず锛岀爺绌跺彲鑳戒細浣胯瑷?殰纰嶅拰璁ょ煡闅滅寰楀埌鏇存湁鏁堢殑娌荤枟銆備粬浠殑鐮旂┒缁撴灉鍒婄櫥鍦ㄦ渶鏂颁竴鏈熺殑銆婄瀛︺?鏉傚織涓娿?

銆??绫冲垏灏旇〃绀猴細鈥滄垜浠瘯鍥捐В绛斾汉浠暟鐧惧勾鏉ラ兘鍦ㄦ?鑰冪殑涓?釜闂锛屽嵆澶ц剳濡備綍缁勭粐鐭ヨ瘑锛熷彧鏄湪杩囧幓10骞存垨15骞撮噷锛屾垜浠墠鑳戒互鎴戜滑甯屾湜鐨勬柟寮忕爺绌惰繖涓棶棰樸?鈥濈背鍒囧皵鐨勭爺绌跺皬缁勯噰鐢ㄤ簡鍔熻兘鎬ф牳纾佸叡鎸垚鍍?fMRI)鎶?湳锛岃繖绉嶅ぇ鑴戞壂鎻忔妧鏈兘瀹炴椂瑙傛祴鍒板ぇ鑴戞椿鍔ㄣ?

銆??鐮旂┒灏忕粍璁?鍚嶅鐢熷織鎰胯?蹇冮噷榛樻兂58涓瘝锛屽悓鏃剁敤鍔熻兘鎬ф牳纾佸叡鎸垚鍍忎华鍣ㄦ媿鎽勪粬浠鍒荤殑澶ц剳娲诲姩鍥惧儚锛屼互姝ゆ潵涓嶆柇鏍″噯鐢佃剳銆傜背鍒囧皵璇达細鈥滄垜浠粰蹇楁効鑰呬笅杈炬寚浠わ紝鍛婅瘔浠栦滑锛屸?鎴戜滑浼氳浣犱滑鐪嬩竴浜涜瘝锛屽笇鏈涗綘浠湪鐪嬪埌杩欎釜璇嶆椂锛屾兂璞′竴涓嬪畠鐨勭壒寰併?鈥欌?

銆??鐮旂┒浜哄憳灞曠ず浜?8涓笉鍚岀殑璇嶏紝骞跺皢9鍚嶅織鎰胯?鐪嬪埌杩欎簺璇嶆椂鐨勫ぇ鑴戞椿鍔ㄦ媿鎽勪笅鏉ワ紝鍒涢?鍑轰竴绉嶅璇嶇殑鈥滃钩鍧団?鍥惧儚銆傜背鍒囧皵璇达細鈥滃鏋滄垜鍚屾椂鍚戜綘灞曠ず涓や釜璇嶇殑澶ц剳鎴愬儚锛屼綘娉ㄦ剰鍒帮紝涓や釜璇嶇湅涓婂幓闈炲父鐩镐技銆傚鏋滀綘鐪嬪畬涓?釜璇嶅悗闅斾竴浼氬効鍐嶇湅鍙︿竴涓瘝锛屼綘鍙兘瑙夊緱瀹冧滑鏈夊皯璁稿樊鍒?鈥?br />
銆??绫冲垏灏旇ˉ鍏呰锛氣?鎴戜滑寮?彂鐨勭▼搴忓彲浠ヨ绠楀嚭鏌愪釜浜哄湪鐪嬪埌鎵?湁杩欎簺璇嶆椂鐨勫ぇ鑴戝钩鍧囨椿鍔ㄣ?閫氳繃杩欑鏂规硶锛屾垜浠彲浠ヨ幏寰楁煇涓汉鍦ㄦ?鑰冧竴涓瘝鏃剁殑骞冲潎鍊硷紝鎺ョ潃锛屾垜浠粠鎵?湁閭d簺鍥惧儚涓噺鍘昏繖涓钩鍧囧?銆傗?

銆??闅忓悗锛屾祴璇曞紑濮嬩簡銆傜背鍒囧皵璇达細鈥滃湪鎴戜滑鐢ㄥ彟澶?8涓瘝杩涜璁粌鍚庯紝鎴戜滑浼氳鈥樿繖閲岄潰鏈変袱涓瘝鏄綘浠ュ墠娌℃湁瑙佽繃鐨勨?鈥旇姽鑿滃拰椋炴満鈥欍?鈥濈爺绌朵汉鍛樿姹傜數鑴戦?鍑轰笌姣忎釜璇嶇浉鍖归厤鐨勫ぇ鑴戝浘鍍忋?缁撴灉锛岀數鑴戦『鍒╅?杩囦簡杩欎竴娴嬭瘯锛屾垚鍔熼娴嬪嚭涓?釜浜哄湪鎯斥?鑺硅彍鈥濇椂鐨勫ぇ鑴戝浘鍍忥紝浠ュ強杩欎釜浜哄湪鎯斥?椋炴満鈥濇椂鐨勫ぇ鑴戝浘鍍忋?

銆??绫冲垏灏旂爺绌跺皬缁勭殑涓嬩竴姝ュ伐浣滃垯鏄爺绌跺ぇ鑴戞椿鍔ㄥ鐭鐨勪笉鍚屽弽搴斻?绫冲垏灏旇锛氣?姣斿鈥樺厰瀛愨?锛屸?璺戝緱蹇殑鍏斿瓙鈥欙紝鈥樿浜哄枩鐖辩殑鍏斿瓙鈥欙紝瀹冧滑閮芥槸杩ョ劧涓嶅悓鐨勬蹇点?鎴戜滑甯屾湜灏嗘浣滀负鐮旂┒璇█濡備綍鍦ㄥぇ鑴戜腑澶勭悊鐨勪竴绉嶆ā寮忋?鈥?br />
銆??绫冲垏灏斿9鍚嶅織鎰胯?澶ц剳娲诲姩瀛樺湪鐨勭浉浼间箣澶勫?鎰熸儕璁讹紝灏界鐮旂┒宸ヤ綔璁╄繖浜涘鐢熻嫤涓嶅牚瑷??涓轰簡鑳借鏍哥鍏辨尟鎴愬儚浠櫒鍙戞尌鏈?ぇ鍔熸晥锛屽織鎰胯?蹇呴』涓?姩涓嶅姩鍧愮潃鎴栬汉鐫?繛缁嚑鍒嗛挓銆傜背鍒囧皵璇达細鈥滀竴涓汉姝ゆ椂寰堥毦闆嗕腑绮惧姏銆傛湁鏃讹紝瀹為獙涓?浠栦滑鐨勮倸瀛愬紑濮嬪挄鍣滃挄鍣滃搷銆備粬浠笉绾﹁?鍚屽湴鎯筹紝鈥樻垜楗夸簡鍟娾?銆傝繖纭疄涓嶆槸涓?鍙帶瀹為獙銆傗?







相关链接:



Converting dvd to wmv



wmv PS3



free mkv converter



Ps3 Rmvb



Tuesday, August 3, 2010

Analysis of the "financial center"


Many articles are talking about a similar "business management in order to finance the center, so management information should be first on the financial system" argument. Such arguments have a lot of individuals and companies, many of whom are from the transition to computerized accounting ERP system, companies and even some foreign companies, the statement shows is that people talk.

This understanding, the development of management information for enterprises to implement these steps, there was indeed no small impact. Some software companies on the implementation of the methodology recommended first on the implementation of ERP financial, and many case reports as well.

Core business is the integration of the relationship between

Financial management includes many things, such as capital, management accounting, financial accounting, cost-benefit analysis of various financial, etc.; but often the so-called "center" of the "financial" deal with the scope of limited accounts, but only the financial accounting part, that is, the scope of traditional computerized accounting.

The ERP is a computerized accounting with the great tradition of the differences, mainly in two aspects: from a management point of view mainly the application of management accounting, mainly from a technical point of view of financial information and business information integration and synchronization. Figure 1. Each system will automatically generate a transaction certificate, leaving "footprints", the business process is a "visual" help trace and audit, but also conducive to business process improvement and restructuring.



Figure 1 Computerized Accounting and ERP differences between the financial system processes

Enterprise management involves a lot of business, some of which are core business; no business operations of these businesses out of the question. Take manufacturing, its core business and their relationship can be expressed in Figure 2.




Figure 2, the core business of manufacturing

We know, MRP, MRP II and ERP is a manufacturing information management system of the three most important milestone. Three Character Classic, in which several English, has a "P" word is "plan." MRP / ERP principles of the company as one body, planning and control is seen as a "nervous system", coordinated control of all operating production activities, including planning and control and logistics costs and capital planning and control. Therefore, in order to plan and control the three are the main line. On internal integration of information management terms includes all the core business.

As can be seen from Figure 2, with the other business, like finance, belong to the core business. Any type of business, the content of the core business may change, but they are ultimately finance; Perhaps, this is it easy to finance as the "center" for a reason.

But we must note that each of the core business is a kind of process, but there is a different process occurs after the first, is that project management is often stressed that the "pilot" and "follow-up" relationship. The financial cost is the sales, production and procurement of the results of the three core business operations, compared to sales, production and procurement in terms of a "follow-up" process. Through financial analysis, then, in turn, guide or amended business. Here the information flow is closed loop, and thus is "interaction". Can be seen between various business systems is an interdependent relationship between the interaction of the integration, rather than as the center of that relationship.

A lot of work is financial management accounting process, and finally generate the Ministry of Finance and Company Law requirements of the three statements - income statement, balance sheet and cash flow statement. These statements reflect the situation of a period of business results, accounting in some external to the business end of the publicly available information. The key word here, one is the "results", one is "final" in that it does not reflect the "process" can not be "real."

In no other business before the implementation of the system, all the raw data into the financial system, are manually entered, and even "artificial", and can not reflect the information integration, real-time and accuracy are not guaranteed. Report on all data should come from various business systems, if not in real time to reflect business processes, business processes can not be visualized, it can not effectively control and optimize business processes, and promptly correct possible deviations. Often find problems, has caused irreparable consequences. This is not the implementation of information management systems to pursue goals and objectives.

To achieve financial and operational synchronization, you can not only on the financial system. Materials of each type of flow or changes can be viewed as a transaction, the transaction should be synchronized with the accounting treatment in order to achieve the information "real-time." Figure 3.




Figure 3 logistics information and funds flow information integration

Not to say that the implementation of enterprise information management systems in the process, not the first on the financial system, not absolute. However, if the first on the financial system, it must be the reality of the situation mentioned above have a clear understanding.

Imagine if a company produced products do not meet the market needs a serious slow-moving, plant suspend production for rectification, basic living expenses of workers take home standby, is very depressed, precarious situation. At this time the Finance business to do? The "financial center" you can save this situation? Did not operate production business, where will the Finance?

Given material value - the cost of entry points

Many reported that the successful implementation of the MRP II or ERP system, business, cost systems often delay implementation, strictly speaking, is not enough on the standard MRP II, ERP more out of the question. There are many reasons, some are not implemented "production operation control subsystem", the product cost can not be calculated. Product of the standard cost or cost of the project can be formulated in advance, but the actual cost of purchasing and production from the two executives to get feedback. If there is no standard cost is not to mention the cost of the plan; not the actual cost, not tell the deviations in the implementation process, there would be no cost control.

Not on the cost of the system, product cost information is not accurate. No accurate cost, will bring a series of management problems, including: blind pricing, profits are not allowed, profit and loss is unclear, there is no basis for product development decision-making. In the financial statements, is the cost of the project a lot of profit and loss account in the Xiaoshou costs and profits, the balance sheet of the current assets and inventory with the cost of Youguan Jine; Bushang cost system, the financial statements of Xuduoshuju Duhui Shiqukekao basis , credibility is hard to say. The implementation of the cost of the system it must be some of the core management information systems business.
So: material information with key financial information integration of a key entry point is the cost, the customs, if Chuang, however, before the financial system, the significance of management decision-making will be much worse; This is the management accounting with financial accounting interrelated important part.

In the long-term management of extensive manual mode, can not accurately handle large amounts of data; in the ERP system, costing some of the parameters needed in the case of manual management is never used; therefore, is bound to encounter the implementation of ERP an "information development" issue. ERP system cost results, sometimes in conjunction with extensive experience in manual management of the data obtained is very different, so people skeptical, not used. Such problems should be in the ERP project implementation, through training to deepen understanding, obtained through simulation testing possible solutions, not "quit."

Rare inscription around the former Premier Zhu Rongji had made an exception for the National Accounting Institute two questions, including "do not do accounting" in the following words of inscription (honesty integrity do not do follow the guidelines for the re-cook the books), indicating that national leadership people attach great importance to the authenticity of the accounts. But if there is no ERP system support, even if subjectively not the slightest idea of false accounts, or the authenticity of the accounts will be discounted.

If you hold the "financial center" of the argument, first on the financial system, all data entry entirely by hand, can not reflect the real-time information integration and sharing, is still an island of financial information. Even made a few nice statements, the authenticity of how, on what management decisions they can play a useful role, worthy of deep reflection and discussion.






Recommended links:



Management And DISTRIBUTION Specialist



Converting avi to wmv



Premier Server Applications



Shop Investment Tools



Zhang Lijun: Hundred Days made hundreds of MILLIONS of wealth



Awards before the flowers RED 2000 Hu Yong 9 years hard work recognized



Recommend Personal Interest



Free Download Convert Mp4 To 3gp



Pocket Baidu claims 10 million downloads have been pushed Android version has expired



Popped into the home appliance industry with high black horse



Realplayer h.264



Mito Xiu a plus for the perfect



WinXP 23 strokes to build Speed



The difference between Samba and NFS



Graphics come FROM paint in



Using Photoshop Build A Passion Miyi Chocolate Effect



nwz-e443



Thursday, July 15, 2010

Unicom announced iPhone bare metal prices



Today, China Unicom officially announced the iPhone bare metal prices, which does not participate in package plans iPhone, the contract price, iPhone 3G 8GB price of 4999 yuan, iPhone 3GS 16GB price is 5880 yuan, iPhone 3GS 32GB price is 6999 yuan. Users do not have stored the bill, they can buy the bare metal.
From the price point of view, China Unicom bare metal version of the iPhone price of at least 1,000 yuan higher than, the 32GB iPhone 3GS the largest difference, about 1462 yuan. In addition, Unicom version of iPhone is not Wi-Fi capabilities.
According to industry sources, the present situation, Unicom iPhone bare metal prices high, beyond the ordinary user of the psychological level, this is bound to affect Unicom version of iPhone sales. However, China Unicom to data released yesterday, the National Day holiday on the 8th, Unicom iPhone booking number has more than 10,000.
Official said China Unicom, China Unicom will adopt its own operating room, co-agents and stores to sell Apple's iPhone bare metal. Users will have the time of purchase the sales staff to be trained guide to show users related functions.







Recommand Link:



Liu: a play from the acting to the private equity fund Non-plague



Vob To Mkv



Convert Mp4 To 3gp Free



Specialist Remote COMPUTING



Days Sihe Island Tour package: passion, warmth, unity Island Tour



Mpg to wmv converter



Christmasgift DVD to Youtube



Youtube FLV to EPOC Platinum



BLACKBERRY video formats



Lenogo DVD Movie to 3GP Converter



321 DVD to iPod PSP Ripper



Trace And Ping Tools reviews



Games Action Introduction



Hope DVD GOOGLE Video MPEG Editor



Wednesday, July 7, 2010

X-Cloner VOB Converter

X-Cloner VOB Converter is easy and fast DVD VOB software with powerful and integrative functions. Easy convert VOB files to all popular video and audio formats with easy. It includes features of both VOB Ripper and VOB to Audio Ripper. With it, you can easily rip your VOB Files to all popular video formats such as AVI, MPEG, WMV, DivX, RM, MOV, MP4, 3GP, 3G2, Xvid, ASF, etc., and convert VOB to audio formats including MP3, WAV, WMA, AAC, AC3, M4A, MP2, OGG, etc. It can support many personal multimedia devices such as PSP, iPod, Zune, iPhone, PDA and MP4 player, with the fastest speed.



Recommand Link:



Lists Log Analysers



Articles about Reference Tools



wma Converter



Hope DVD Google Video MPEG Editor



ID3 Audio



Daniusoft DVD to PS3 Converter



Youtube Video To Apple TV Plus



Open DVD to Apple TV



Archos



Youtube Movie to Psion Plus



Youtube FLV to Xvid Live



WondSoft Ultimate DVD CONVERTER



Mkv to avi converter free download



For you Flash Tools



converter mp4 to avi



Youtube FLV to QuickTime Professional