Wednesday, March 30, 2011

This is probably my

 In many cases, the problem will be to know the so-called persistent. It took just two hours today searching


fear most is loneliness, because there is always that not enough people understand themselves and often become lonely hero. for the sensitive feelings of the other side of a small action or eyes, they will keep in mind, then down is the other's mind endless conjecture.
fear most is instability, because of the changing environment so filled with a sense of crisis,
fear most is emotional, because emotional enrich themselves so worried about irrational emotional problems, burns itself into ash
Firelight Some people even said: Scorpio is not afraid of anything because love becomes the dominant emotion.
;
betrayal

misunderstanding

lost

lonely ... ...

stereotyped stuff jumping for no reason, the initial surprise gradually cooled into a final tired. inherently contradictory and the hysterically Scorpio struggling in the abyss, as is now generally, no sense of shame to his own weakness in the hot sun exposure, but also I do not know mercy to others, or to facilitate other people's attacks. Fanjian only when it is born.

do not understand how their most recent thread is always somehow broken, empty mind floating only a few familiar figure.

Today we stand on the starting point be the separation, but will someone have the courage to promise: left back will be reunited a tacit agreement?

I just want to say, who can understand the loneliness of Scorpio?







Scorpio

love, hate, love your distinct personality intense
, he no turning back, enthusiasm and dedication to one hundred percent loyalty, contribution, their own money, the expense of self-enjoyment, to make rose to madness and dripping love closely. but makes them reluctant to be his lover exposure. do not why, he is not. faithfully and completely love and care about most is the scorpion. talent and a beautiful body, the scorpion would not bear, but it will temporarily be confused badly. He can not stand betrayal, betrayal of himself very few stories of others. Once betrayed him, is equal to deny all his loyalty, love, dedication and sacrifice, this would anger him, forced him to onto the road of revenge. but not the character of each Scorpion's Revenge Scorpion are very obviously the most O-, A second type, AB type in that order, B-the weakest.

strong self-esteem silence offensive
scorpion self-esteem is very strong, could not bear the contempt of his people. appearance, Scorpio people always look good, and always keep polite smile, also take the initiative to warm tone with others greetings. He is not attempting to mix with others, just want to eliminate people wary of him and hostility. However, he does not always successful. because the scorpion born with strange temperament, silence is a kind of defensive tactics trying to hide something, he inevitably make people feel intimidated.

Deliberate, thoughtful is the greatest advantage of Scorpio, but rarely show it. Scorpio's defensive emphasis, few people can rest assured, but was able to strictly other people's secrets, not leak out, this and Sagittarius are different. Scorpio is suitable for a reliable friend or lover, but, when you want to live with him, things may not be so simple. because Scorpio sincere and straightforward person, regardless of the criticism of themselves or others, are stark and brutal. They often sincere attitude to the pursuit of truth, so that some friend or lover, unable to endure the situation because of the away from him away.

Scorpios do not actively provoke others like he does not want anyone to mess with his general.

He has a special charm, especially his deep will the soul piercing Office of the eyes. He is a natural Avenger, any hurt him, and things are usually no good end.

he is a friend indeed, but only You are limited to his friend, if you betray him, then you would be his enemies.

his thoughts and behavior sometimes quite extreme, he can make a good man it may be bad!!!

Tuesday, March 29, 2011

Only three quarters of the year

 Professor Zeng Shiqiang Taiwan scholars in China Central Television ,
One day, a student of Confucius sweeping out to a guest. His customers ask : There are several quarters in the end the year ? , is the Four Seasons . Students thought that in this I was Wynn 's . This time , Confucius happened from the house out. Very happy on the ground before the students asked:
guests left , the students asked the teacher : , He is what he is grasshoppers, grasshopper spring of life, fall on the dead, he had never seen winter, did not you talk to him four seasons with the dead , you say he is very satisfied with the third quarter , we will tell you the four seasons Wake tonight . three quarters , you Chi Diankui , knock three head does not matter .
Zhuangzi said: See people who do not say so, to become the Ghost Talk . Hell do not say nonsense , you can not communicate with ghosts .

Monday, March 28, 2011

Girl with mature man only , and is happy

 Man will call you immature pig, my dear, stupid sort of nickname.
mature man will call you baby. And is distressed.

2.
immature men will be very hard and you're kissing, whether you like it or not, is not allowed.
mature man in love to the concentration at the time you close your eyes and gently kiss, so you can feel his love for detail.

3.
immature man or night you call in and talk to Q, it will not be too concerned about whether you want to sleep, but by their own decision is not hung up.
mature man will continue with the care you hardship, other arrangements will detain you and then decide the next step. Even their own as long as you want to sleep tired will accompany you.

4.
immature men always ask you to ask you East West, what is done today, and how so and so, the problem and more numerous, but never his mind to think about a lot of action obvious problems.
mature men rarely ask you too many problems, unless it is something that they confuse, can not find any clues of things. Otherwise, what could rarely escape from their analytical and thinking skills.

5.
immature man who always tell you so and so well, someone what happened, and so all kinds of gossip.
mature man who rarely talk in front of you well, and teach you some truth.

6.
immature man will knock you back to his cooking and washing, and occasionally do a few road for you taste food in general, but will accuse you of faults.
mature man will be very quiet as long as you do have time to give a very delicious meal, and gave you fruit, laundry pick up the housework, even if you do unpalatable meal will eat the surface of all the happiness.

7.
immature men will laugh out loud in public, regardless of others and your trouble.
mature man will do their own thing, calm smile, handle various situations. Great respect to take care of you.

8.
immature man is always in the fight to protect you, or let you go.
mature man beside you will not fight, but calm with sapiential.

9.
immature man will be fine one way or another to play a bunch of friends go to bars nightclubs, and then the play is very HIGH, and the beauty flirting.
mature men always are forced to the being called to go, a quiet chat with friends drinking and smoking.

10.
immature men did not always have to play without a problem, you want to learn more about you.
mature man will try to understand you.

11.
immature men like to drink, where nothing to eat love to open a bottle of wine.
mature men hate to drink, the time will need to drink alcohol.

12.
most immature men to spend time or smoking habits fun.
mostly mature men smoking themselves to think and calm.

13.
immature men in times of difficulties will ask you how to do.
mature man in times of difficulties will not tell you, but their own to bear.

14.
immature men like expensive flashy things, the pursuit of the surface.
mature men do not like something quieter, like to have the quality and taste things.

15.
immature men like the luxury of life, sometimes wasted.
mature man no matter how rich, will be on their very thrifty, but ignored the others and loved very generous of you.

16.
immature men rarely come home with their parents, few parents care about love. Regardless of their parents often feel things to do.
mature man will not even work no matter how busy time to go home with the family, to his family the best things to buy. Parents long illness, every day to accompany the bed. Everything that stood in the perspective of parents.

17.
immature men, and you grab the TV remote control.
mature man will accompany you to watch your favorite TV shows.

18.
immature men their favorite songs, but also forced endless love with you.
mature man listening to their favorite songs, but also know your favorite songs. Occasionally match up, in short, he was happy to see you smile.

19.
immature men will drive you trouble, pull your hand do not see you when.
mature man will be very careful driving, will tell you a lot of funny jokes are things that keep you and him trouble. Because he cherished life, especially your life.

20.
immature men would hold you, that you sink, you are the pig, so you lose weight.
mature man like carrying you forward, how do you then say so light, so you do not need to lose weight, go with the flow like.

21.
immature men would take forever just to buy the things you like. After what will nag you bought.
mature man is as long as you like, you will not hesitate to buy. Or secretly buy what you like, give you a surprise. He loves you, so will try to make you happy.

22.
immature man will give you a holiday or birthday celebration open PARTY.
mature man will take you to a warm place for you to celebrate, just the two of you belong to our small world.

23.
immature man is always around to show off his women and romance. Whether you're mind.
mature man, when you're around he would be proud of Yang Zhetou. Needless to say, his friends will understand your relationship. You love him, he loves you, sometimes love is so simple.

24.
immature man always dressed to the nines like you, fear of walking down the street people do not see you, friends, relatives and girlfriends do not boast a beautiful fashion.
mature men do not like your make-up and dress up the publicity. They prefer a natural and intuitive you. Even if you do not make ugly also feel the most beautiful.

25.
the love of a man unable to withstand the test of immature and lack the deep and persistent.
mature man's love is profound, love, calm and collected, yet firm attachment. Like father. He sees if you treasure.

26.
immature man is always a waste of time.
mature men always feel the time is not enough to fight, just want you happy fortunate blessing.

27.
immature men always make a lot of irresponsible things, and then trying to avoid responsibility.
mature man is always brave to take responsibility and will not make any harm to you.

28.
contradictions immature men have problems, it will ask you how to do.
mature man would calmly to the solution.

29.
immature man will make you cry make you angry.
mature man makes you laugh make you happy make you comfortable.



men, after reading it, you think you have the ability to marry her? On the very talented, so can people see through! Turn it! You are interested to share your views under the Oh!

Sunday, March 27, 2011

I'm serious

  I  asked why the girl texting me
and you do not explain why the head down, silent

I believe you love me do not want to turn me

Or understand what
you have not saved

ask why I'm not happy
But why do you have a smile that I know everything
a
self-esteem often people have to go dragging
twists and turns of love
pretend to know the truth too afraid of

embarrassed naked painful than losing
I miss is no , then do not say that I miss is the
dreaming together is the fight I miss

still want to love you after the impulse
birthday that year I remember that song

also remember remember the patch of sky right
most tight chest

warmest who forgot who remember
< / p>
I miss the silence moved
I miss is absolutely hot
I miss you very excited
hugged me and begged me to forgive all the pain

I remember you also remember me in the back shaking
remember feeling the most beautiful fireworks
turbulent
longest hug
who who love too much freedom too far too
Who go far
my heart
who forgot that promise
who just keep walking
who looked at me
Who forgot to change the heavy
who love to give you forgot to tender


I let go off my seat
free and easy to understand how much I
who are not willing to
too love

did not cry so I did not say

Thursday, March 3, 2011

Be careful, your project may be leaking confidential!

 Be careful, your project may be leaking confidential!
Of: Tian Guangfu BRANCH CAMPUS Fang Yanxiang
project the possibility of leaks everywhere, the slightest slip in the management, can give companies a huge loss. This paper selects a few representative projects leaked scene, and a detailed analysis of these scenarios the anti-phishing strategies.
project leak Scene One: a shared computer
W ERP project the company started, and from all business units to deploy officers set up a project team, including Zhang from the Finance Department. ERP projects were closed out the discussion group as a whole, the project team members together for food and shelter, Zhang laptop during this period has often been borrowed. start Zhang taking into account their own notebook computers have important information such as payroll, has not taken any measures for data privacy, do not want to share the computer, but then I thought, to borrow a computer is a project team of the brothers, could not refuse.
did not take long, leading to talk to find Zhang, said that many people discussing the recent unfair wages, he asked if it was leaked the salary information. Zhang regret.
Solution: Set in the security zone
increasingly open office environment, a shared computer, to borrow the computer, etc. occur. How to prevent confidential documents stored in the computer by other people to see, things are very anxious people.
the past, business, business leaders office often save a lot of confidential documents. They receive guests in the office, but do not worry about confidential documents seen by the guests. The reason is that confidential documents stored in a safe or locked in a drawer, into the office can not see these confidential information.
similar to this principle, the user can use computer encryption products in the construction of a security zone to their important information and data into the security area, to master the security zone on or off the password password. Thus, in addition to users themselves, others can not read these important documents, user information can be foolproof.
security zone set aside this way is to use the console management procedures (management encryption software to create the partition, such as add, delete partitions, password management, image file management), disk formatting module (of the virtual disk formatting features), the virtual disk module (virtual disk function), the disk image file to protect and hide (protection and hidden safe the data files to prevent illegal tampering or deletion), and other programs and modules to achieve encryption.
computer can store multiple types of files, some files take up much room types, such as photos, videos and so on. Users should want to encrypt files on this major to require users to create computer security zone must be large enough. current space encryption products in the security zone is usually only the upper limit of 4GB, users can no longer meet demand, encryption products is bound to create more toward security space development.
present, some encryption products with encryption capabilities than the hardware itself, but also allows users to set their own course in the use of a password. This is equivalent to a double protection of information. If people want to peek at your computer files to be proficient computer passwords, password encryption hardware products. And in order to get these same password for non-legitimate users, is basically impossible.
in real life, very few Some people in the presence of outsiders to open the safe. users to read documents in the security zone, which is equivalent to open the safe, most likely be stealing data and information through the network, or hacker attacks, resulting in files infected with viruses. Therefore, , the user important information in reading computer data, should run protection program. users set their own security space changes, additions or storage of data and other operations, should be temporarily shut down the system's network connection to prevent other computers to access this machine any resources, thus increasing the security of protected areas.
the Internet there are many free encryption software, users can easily download and install. However, such weak encryption software is very easy to break mm because almost all These software are vulnerable. If you really want to protect their confidential information on your computer, you must choose a safe and reliable encryption products.
project leak Scene Two: U disk free to use
2007 年 8 months China Central Television broadcast a legal program pointed out that enterprises and secret unit shall adopt both technology and management methods to prevent leaks.
with U disk, one can easily copy files from your computer. This has caused problems along the path of secrecy. If the information once Therefore disclosure will enable enterprises thrown into passivity.
responses: peripheral constraints
U disk U disk management easier and carry copies of electronic documents, but people do not worry. peripherals, security management is more limited prone areas of negligence, unauthorized users are often in the peripheral interfaces using small digital cameras, MP3 players, Flash memory sticks, and free to upload or download files. Of course, equipment restrictions are not only USB interface constraints. The current terminal I / O interfaces are floppy, CD-ROM, recorder, Bluetooth, 1394, serial and parallel, infrared port, etc..
variety of computer I / O interfaces to the user a great convenience, but also largely increased difficulty of management of managers: if the interface from the terminal block, will affect the employee's normal job requirements; if not blocked, these interfaces is an important means of information disclosure. I / O interface, easy to intensify the management of administrators and managers the contradiction between, so that managers in a dilemma.
In fact, although the computer can provide a wealth of I / O interface, but only a small amount of interface work needed. timely closure of work-related interfaces can reduce the risk of leakage. export access control system through the device, administrators can focus on setting policy, remote open or close the interface, and detailed records of relevant information.
U disk management is the I / O interface to manage the most important part of the core of which is to be effective U disk to use to control the manner and scope of use can be divided into illegal U U disk U disk drive and two to the legitimate administration. legitimate disk is divided into non-controlled U U U disk drive and controlled both. Both U disk permissions need to be set, based on the user's authority to set different permissions for U disk. by authorizing, U disk to access the appropriate level of classified terminal. Non-controlled U disk not only in the classified area Use can also be used in non-classified area. controlled U disk can only be used in top-secret machine. Of course, non-controlled or controlled U disk U disk and can not be any use at all terminals, but also need to use be allocated. Finally, we need to bind the U disk and the target terminal, the user can under normal use the appropriate permissions.
order to facilitate the needs of different levels of confidentiality, you can create a personal secret U disk, U disk group privacy the unit disk U confidentiality: personal privacy can only make U disk U disk to open all their own; group confidentiality U disk is opened for all the group, but other groups of people can not open; confidentiality of the unit disk U is a unit of all who can open, but people can not open other units.
so U disk management system deployed to prevent the company did not authorize the person or persons outside the company to bring the U disk free access to the secret network of companies any terminal, thus ensuring internal company documents will not leak through the U disk.
project leak Scene Three: e-mail exchange
2005 年 6 10 May, Panyu District, Guangzhou City, a certain Internet cafe, Liu Qing quietly into the Sichuan Exhibition Biodroga Electronic Co., Ltd Shenzhen office clerk Xiamou e-mail.
In the process, Liu Qing and Yemen show that Xiamou is a customer to do business by e-mail and agreed method of payment, so the breeding ground for evil . He sent Xiamou interception of Yemen e-mail client, and a self-built customer of the same name with the Yemeni-mail to Xiamou send mail to steal the Xiamou back to the customers mail in Yemen and then to collection Liu Qing bank account changed to show my bank account opened by the result of Yemen customers will be $ 40,000 for the goods imported by Liu Qing exhibition held accounts.
responses: a digital certificate signed
this case did not occur in the project, But the exchanges during the project is particularly noteworthy. e-mail more traditional means of information transmission can significantly reduce the cost of the project has become a widely used means of communication exchange. enterprises more and more sensitive information transmitted by e-mail. How in the mail transmission process to protect these information security, to prevent the process of mail delivery was intercepted or tampered with, are companies should be of concern.
signature technology using PKI private key to ensure the authenticity and integrity of e-mail: e-mail certificate as the carrier of the private key, the message sender's private key to use their own digital certificate to digitally sign e-mail; e-mail message recipient is authenticated digital signature and the signer's certificate to verify that the message has been tampered with, thereby determine the sender's true identity.
digital signatures can help confirm the sender to the recipient's identity, but it can not ensure that information is not hackers peek. use PKI public key encryption technology, by e-mail as a public key certificate vector, to avoid this from happening. Sender e-mail recipient's digital certificate using the public key of the e-mail content and attachments are encrypted. encrypted message can only be held by the recipient's private key can decrypt , so only the recipient can read the message, intercepted the mail of other people only see garbled encrypted information. In this way, you can ensure that the e-mail in transit is not read by others, preventing the disclosure of confidential information.
With a digital certificate assistant, e-mail users can easily manage the life cycle of the certificate. assistant with the certificate of import and export certificates, the certificate password has been changed, other people certificate management, CA certificate management, file encryption and decryption and other functions, support for USB Key Certificate Assistant means the certificate, to help users complete the e-mail encryption certificate in the operation of virtually all management functions, to maximize the user experience on the use of certificates, the certificate has been greatly improved ease of use. In this way, the user centers do not deal directly with CA, only can be achieved with the certificate assistant all operations of the certificate.
between businesses and their customers often pass some important confidential information, and customers might be used free e-mail. to ensure that these secure communication between the mailbox to ensure secure transmission of the core secrets, and transferred to the mailbox information security is very important. The good news is that some manufacturers to provide solutions to this situation have been able to protect the security of e-mail communications. < br> it is necessary to prevent leakage mail, but also prevent important documents are sent by email. This need to support the monitoring of email content security solution. There are many such solutions, the company security policy can be established to achieve sensitive information transfer control to ensure that confidential company information will not be sent out by mail.
flow chart of e-mail encryption program leaks
Scene Four:
people collaborate on documents found in a large R & D center, the competition opponents one step ahead of launch of new products, and this new product and the company will launch the A product is almost identical. The center led senseless: the enterprise had to rely on A products to complete the product line conversion, and put a lot of money , many researchers have paid hard work. The company has taken on the design drawings strict security measures, not only purchasing encryption software to encrypt, but also drawing on personnel access to strict limits.
company executives The first reaction is that this is a result of leaked internal staff, and ordered to stop investigating the development of the product. The survey found that the company does not compromise the final drawings, but close to the end result of leakage of the drawings. As semi-finished products drawing persons involved too much, to find out who leaked too difficult, and ultimately the company had to let the matter rest.
responses: the role of encryption to encrypt the design drawings
to prevent leaks, better approach is to design team in isolation, to close all possible export. but not necessarily the right approach is most useful. such isolation would be subjected to the designer's objections, they will not check the internet to borrow, not convenient to communicate with other departments, need to print the design issued by the effect such a reason to oppose.
lot of encryption software can be encrypted for the final document, but can not guarantee that someone is copying the document during editing the document to go. the process of encryption and encryption is the role of the design team should be a way to try . the process of encryption refers to the entire design process, the document is encrypted. This encryption is the moment you save the document to.
to CAD documents, for example, the process of encryption is not only reflected in the CAD document the production process, but also in production from the CAD to the tender process. In many cases, designers need to participate in the production of tenders or product specifications, CAD software needs to be some of the graphics data copied to Word, Excel, or PPT, etc. the document. This not only can avoid the distortion of graphics and very easy to modify. Some encryption software is usually to copy and paste function blocked, but the shielding will cause great inconvenience to the designer. Some of this encryption software is open function, but because the encryption software may not be encrypted to the Office family of software, leading to the drawings by way of disclosure of the hidden danger.
In this case, the user can also choose to encrypt Office family of encryption products to ensure the CAD software and the Office family of software for information security. In this way, designers can to ease from the CAD software to Word, Excel, PPT and other documents copied graphic data, without having to worry about the existence of security risks.
identity-based encryption is another situation. in the same project team, each member is responsible for the content of their work, is responsible for a part of the members of the B part of the contents can not understand. but if you split each part into a separate document, the document is neither convenient production and modification, and overall responsibility for convenient reading. At this time, we can document that requires encryption settings in different parts of different identities, for example, you can set the title of the document as one important sentence in the body (for example, the amount of bids in the tender) as the second set, the general body of the set to identity three and so on. Protection of identity-based encryption to further refine the access rights that can better meet the project team co-production of tenders and other circumstances. < br> administrator can set permissions for individual user can also set permissions based on user groups. If the user group to set permissions, set group permissions will apply to all users. through the user groups to set access permissions strategy, individual users do not need to set one by one. permissions can be divided into local authority, external authority, print rights, etc. can also set the permission is valid. At the same time, you can also set up a temporary operating permit, the project team to deal with a variety of temporary needs. This identity-based encryption method has the advantage, can the same document with different security classification of information to set a different approach, the project team to meet the complex requirements of large document production.
electronic documents can not be taken away , print the document can not be taken away. many collaborative projects but also bring a printed document to prevent leakage. file a printed copy management system is designed for this demand. file a copy management system can print all content of the documents printed preserved for later review and evidence. Audit information can be detailed log file of the print time, the terminal machine name, IP address, user name, file extension, file content, pages and other information, the administrator can always play back the file contents.
document management system can also print a copy of the contents of the file audit. The system will back up the terminal to print the file, and then put the designated server console through the system to remotely view the contents of the terminal to print the file. In this way, regardless of whether the end user to modify the document name, you can determine whether the file contents secret.

Wednesday, March 2, 2011

Shushan experience online quizzes (c) equipment, refining

 Shushan equipment into four categories, from low to high, respectively, the ordinary equipment, can be upgraded equipment, suits, artifact
an ordinary equipment
in different places, you can buy the equipment at the NPC, but buy equipment is white, can not be upgraded.
II can be upgraded equipment
Daguai equipment is upgradeable equipment, and can rise to heavy day or add a property to property and equipment better, specifically in the refining part of the introduction. Daguai be equipped, light and not the opening of two separately, not the opening of the equipment, can not immediately use, it is necessary to any sale of the NPC at the opening of props to use.
three single set
piece set of equipment attributes than can be upgraded somewhat less, but if you collect a set of additional properties are very powerful, of course, will start as long as 2 plus, a bonus for each of the different attributes.
can not be set Daguai must use the honorary degree to the NPC at the exchange, or mantra stone and other materials to refining, the mantra is not directly buy the stone, the box can only be obtained through the opening. per person per day can designated NPC place to spend a certain fee to open 10 boxes, you can at the mall to buy the box. In NPC at the cost of money is called Sengoku bag or Sengoku, Daguai sell things get a fairy stone bags, RMB recharge by Sin crystal, Xian Jing is not the deal, but can be scaled conversion immortal stone, can be traded only Sengoku, Sengoku if your bags is not enough, and you will spend Sengoku.
honors degree is obtained through the different camps to kill people to get, you are kill off Honorary degrees will kill the people will be honorary degrees. different levels of packages, require different degrees in exchange for the honor.
four artifact
there is now a list of artifacts, but no refinery method, open the box from the secret stone is used to refining artifact, so you open to the MM, do not throw away, because the beta does not delete files, definitely need it later.
V. refining
into After the game, there is a row of vertically on the right button, the same one as the refining furnace, like a button, point to open, the window will pop up a refinery, according to the different purpose of refining can be divided into materials, weapons, armor , suits, artifacts, etc., point to open one of the different options, you will see different requirements.
refining some of the primary materials needed can be obtained by Daguai, but very little income Daguai, absolutely can not meet the needs of normal, so the NPC will need to purchase and sell materials NPC NPC in the warehouse next to a map of the purpose of 180 caps, only the fire Zixia House Wild habitat management and the full moon in the city's rich material there Mui the sale.
different levels of equipment require different materials, low-level materials into advanced materials for refining, so the materials are useful, do not waste to throw away. In addition to Mantra stone, other materials do not need to spend money refining . In the training of different levels of gear, you need a different amount of money to spend. In addition to materials, weapons, armor, suits have professional differences, especially the suit, be sure to pay attention to choosing the right career needs further refining.
can Equipment can be upgraded by other persons on behalf of the refining and packages to their own refining, after refining because the package is bound, can not trade.
can upgrade equipment in the opening, you can clearly see the potential for heavy days, and set re sure to zero-day refinery, and random potential.
in Shushan, the heavy lifting against the sky is, physical defense, or attack, the information displayed in the top equipment, such as weapons, plus the basic property is attacked , then the day is to add heavy attack, and some of the armor is the addition of anti-anti-matter, then the upgrade is lifting heavy day of special anti-anti-values. refining the package must be re-zero days, while the equipment is re-opening of days is random, 1-9 is possible, but most days you can re-re-refining to 9 days. 1-3 heavy days in which the primary, the success rate of 100% heavy days, 4-6 ,7-9 Drawer Intermediate for advanced, more advanced equipment, the lower success rate, but may be back to zero after the failure of re-days.
want to increase the success rate, you can team up front refining step, a team of five people, but you outside the main array The four members of the time when riding in the refining front, the maximum increase of 8% success rate (2% each). Refinery Drawer Note that zero weight to a heavy day of days, will add six-level requirements, such as piece of equipment, zero heavy days to go, Dress is 30, then a heavy weight days, the same day that 36,2-3, only enhance the property, 4 Drawer Drawer is 42,5-9 only enhance the property.
addition to the basic property, equipment, and another three properties, one is the five elements, one is the additional properties, one is the system properties.
Here are five elements of basic properties, five elements Allelopathy, if you fill all the Who does not affect, or will have an impact.
gold unboiled water, wood, strong and mighty its nature, can increase the role of the attack.
wood fire, grams of soil, on behalf of perennial nature life, increase the maximum life roles.
aquatic wood, fire, can be just soft water, treacherous enemy, its shape is also happening, can increase the role of magic defense.
adobe fire , grams of gold, of the fierce and strong, powerful explosive, can call God, the role of duration.
native gold, grams of water, thick tight soil, the foundation of all things, enhance the role of physical defense. < br> In addition to five elements, you can also add additional attributes, weapons, weapons of additional properties, different anti-armor defense has not added properties vary, they are listed in refining the list, do not place them in the description .
property is called stochastic system may be assigned to the property, which is refinery can not own property, there are two, one is to increase the rate of +9% out of treasure, one is to increase the experience of +9% Daguai . just a piece of equipment may not see results, but eight samples Shushan equipment, weapons, helmets, clothes, wear the waist, hands, shoes, a soul, Yuan air, eight samples was 72%, when Daguai , stroll pet game, a dozen treasure loaded, luck to have ~ ~ ~
representatives of the following focused on the potential significance of the next.
whether to upgrade equipment, or a suit, have the potential, the opening, the equipment will be displayed a fraction, the denominator of which may be increased to a maximum number of properties on behalf of the molecular properties on behalf of how many there are. whether it is five elements or additional properties, the combined figure is certain, such as weapons, played all the properties to need 11 potential, and The maximum potential of 12 weapons, the other is 9, the denominator of the potential is random, the minimum is 1. not so good luck, out each time you need professional equipment, nor is it out of your professional equipment, is the largest after the opening property, so sometimes you need to choose the kind of property to increase personal opinion is that unless the most senior, or burning RMB, and equipment are not necessary to maximize each property. game, and replaced the extra equipment needed to leave MM is the best way.
equipment to build the property according to how many different colors will show the equipment name, the prefix will have to cents, the cents, the angel, fairy, and gold cents, etc., This can get you in the future the title of the corresponding comprehension. Kim Sin-class weapons can be issued orange-red light emitting addition was present, only set, different sets of potential will be issued a different light. So, you will see suit a person who may show different colors in different parts of the light. like the beautiful MM person may not accept a red upper body, lower body green, blue hands like the alternative style.
known The equipment is divided into six levels, each level has a set A and B are two sets, A set of requirements for wearing a lower level, the corresponding attribute value will be lower than the B sets to play with my little test run Luna , whether A or B set of sets, are very beautiful, in addition to attribute some of the gap, A set of light and elegant, B sets of beautiful sexy, which set can wear, can meet the needs of the task to do. I usually only for a collection , this is more harmonious, and more pre-task, basically as long as you can get by task Daguai appropriate professional equipment, one hundred after the task less Daguai are less equipped to make up a set of the more difficult. and do not For unknown reasons, the equipment out on very little, most are Sword, and sometimes even inside a package to a set.
A and B cover the difference between sets, you can see the official website of published information, from the name on the can be judged. Of course, the official website of images in the game there is not a small difference, the more beautiful game.

Tuesday, March 1, 2011

Graphic tutorials + plug-in Adobe Audition Detailed

 Graphic tutorials Adobe Audition
I. Introduction:
Adobe introduced Adobe Audition software, which is a complete application running on a Windows system, PC, multi-track recording studio. The product previously known as Cool Edit Pro 2.1, in May 2003 the company successfully purchased from Syntrillium Software.
Adobe Audition offers advanced mixing, editing, control, and effects processing capabilities, is a professional audio tool that allows users to edit individual audio files create a loop, the introduction of more than 45 DSP effects and up to 128 tracks.
Adobe Audition with an integrated multi-track and edit views, real-time effects, surround support, analysis tools, restoration features and video support and other functions, for music, video, audio and sound design professionals with fully integrated audio editing and mixing solution. The user can allow them to hear real-time changes and track EQ in real-time audio effects benefit. It includes a flexible cycle tools, and thousands of high-quality, royalty-free (royalty-free) music loop, music track and music help.
Adobe digital video products as a new member, Adobe Audition can either be purchased separately can also be in the new Adobe Video Collection to get.
Adobe Audition provides an intuitive, customizable interface, allowing users to cut and adjust the window size, audio to create an efficient operating range. a window manager able to open files using jump track, special effects and a variety of hobbies, batch tools can efficiently handle multiple files, such as the sound to match all, to transform them into standard file formats like the daily work.
Adobe Audition video projects for the high quality audio, allowing users to watch video playback of AVI for editing the sound track, mix and add special effects. broad support for industry standard audio file formats, including WAV,, AIFF, MP3, MP3PRO and WMA also able to use 32-bit bit depth to handle the file, the sampling rate of more than 192 kHz, enabling the highest quality sound output to tape, CD, DVD or DVD audio.
II, Audition 1.5 English version of FLASH installed and finished Animation (Ouyang Xuan Yuan production)
on the localization, indicate that. make changes to the directory to install the friends that are still open after the installation is in English, because the finished path is wrong. can re-enter the installation directory.
Adobe Audition Simplified Chinese V1.5 program files under the en_us folder to the root directory covering en_us folder. re-open the software is the Chinese version of the.
three
Adobe Audition v1.5 Overview of the Chinese version of
multitrack interface of four, entry
1, recorded a song using Adobe Audition 1.5 operating procedures
first step: Mike debug
is to your headphones as the only listener, the significance of this step is use headphones to listen to the music, if you are driving a speaker when the song record song recorded, then the entry is the mix of music and vocal sounds, so the effect will be poor.
check the recording options, select the microphone ( MIC) column, the other is closed, because we only want to record your own voice.
Step: Noise Sampling
Open Adobe Audition 1.5, light up a track in front of any then click on Record button, then do not say anything, and the first noise record a blank document, not very long (10-30 seconds or so can be), click the Record button again to close the recording, and then double-click the audio tracks into single tracks mode, choose - Turn off multi-track and single track switch button etc.), select - Open the R button, click the red record button below to get started with the singing. recording is completed, click on the button to hear your recorded voice, the voice is not feeling very dry or very difficult to hear the noise? in the absence of any effect of noise reduction and processing all this before.
fifth step: to reduce noise
click ; effects - noise reduction - noise reduction - OK until satisfied. excessive noise will have some loss of sound.
Step Six: effect of treatment effects
first refresh (after the effects do not need to set a time) click on the - refresh the effects list, ;.
2. pressure limit is your voice through treatment become more balanced, to maintain the same consistency, the sound will not suddenly big suddenly small. Click plug-in pressure can also play a limited role, there will not talk about it. and above in the pre-polish as there are many options already available for your choice, you can make your own, personally think that the most appropriate treatment of the human voice is default in the pop vocal. After the election can listen to what satisfaction and click device-DirectX-Utlrafunkfx - ReverbR3 , and put it into the white point. Love what effect can also choose if you feel dissatisfied too many words will make people leave the sounds too fuzzy, plus the less they will seem very dry sound very astringent, and we slowly explored, there is more experience in the recording a few times.
Step Seven: accompaniment people sound prior to the merger merger
listen to an effect, if the perception of the human voice and the accompaniment volume does not match in the second track (vocal track) at the the volume of the regulator up and down where you can debug, until you feel the match so far.
Right-click the third track (the other tracks are OK, as long as blank audio tracks), select the waveform, tracks (accompaniment and vocal tracks synthesis) into the mono track to save the file, save type can also be WAV, MP3, see you need a.
skills: Audition (CEP) of the timer recording
The dialog box can be set to automatically record the length of the unit is After, AA automatically start recording.
2, made with adobe audition 1.5 OK karaoke accompaniment with
you ever come across your very favorite songs, but could not find a karaoke accompaniment OK with it? Now, with dobe audition 1.5 to help you, you will not find an accompanist for the band to worry about! we can bring home-made accompaniment.
in dobe audition 1.5 multitrack window right click select the first track, the pop-up menu select into the Sound eliminate extract from the original song only this part of the.
files will have to re-insert the second track, double-click into the items in the is the human voice frequency range. We will cover the frequency attenuation of the human voice to a minimum, edge conditioning, while listening, until almost no human voice can be, and handle the window after the return to multi-track editing, mixing the two shrunk to a rail track . Finally, save the mix down the audio.
players listen, is not it also? However, this method can not completely eliminate the human voice, if completely eliminate the human voice, the music is paid for distortion of the price. But when you sing, your voice can not eliminate the clean acoustic cover, no problem!
If you're using Cool edit pro, then it does not matter, because little difference between the two operations, good , and as soon as possible to try it myself!
Tip 1: remix of 20 Tips for
1, by deleting the unused track, the parameter is set straight, turn off the effects send for each track.
2 , gain control, but contained, without deleting the air intake.
3, grouping the control, the effect Editor's note must be returned into the grouping.
4, a clear change in the volume of the various parts of music, make records in a single orbit, for Automation and not listening to music while watching the level.
5, in the same listening environment, listen to some successful commercial music.
6, do not be too much of the effect of treatment, especially reverb. more dry sound more forward, if you have to put the lead singer's voice added to the large mixing the air, and can be adjusted with the Pre-Delay ratio of wet and dry, making songs more natural.
7, not to the bass instruments like Bass, the sound of drums location of partial discharge phase, because the high-energy sound evenly to the two speakers to achieve the best results
. and bass sound that contains only the point to little or no information.
8, EQ, and some effects multitrack playback should be added whole, as a single player put together a different instrument sounds. EQ will not increase too excessive, so as to make it sound more natural, without losing its original charm.
9, do not put too much instruments in a band, the particular frequency. the sound source is better. At this time then the whole instrument EQ to adjust the control on the distribution of the spectrum, for each instrument can be assigned to the spectrum space. such as the acoustic guitar rock If you pull down the low-frequency, sound localization will become more clear, but the reduction is too clean. noise filter on the door is a good tool, it is not as clear as the boundary.
10, EQ will not increase or decrease was over, when you do change the tone significantly, external equalizer than a good mixer.
11, using the EQ, try to attenuation rather than enhance, the human auditory system has less attenuation sensitive.
12, of the human voice is compressed so that the volume in the final mix in a unified, very few singers do not have a compressor to maintain a stable volume. However, if the compression is considered a warm and encouraging results, you can use the br> 13, from time to time in the control of outdoor music to listen to the whole feeling, which can detect the voice of balance and too close may not be allowed to listen to.
14, the total volume of not too much, it would be music sounds good, and reduce your hearing. from time to time to open big, but in general down-mix, the audience should listen to the music volume to be down-mix. (not including the Disco)
15, to ensure the headphones and speakers to hear the same Analysis of the headset better because a big speaker can not hear a slight distortion and sonic boom. but we can not just listen to headphones, stereo speakers as it is not the same expression.
16, if not necessary, the volume of the bass not to soy and Bass come and go, they are the backbone of the entire song in the rhythm.
17, more music in the voice, the frequency instruments such as distorted guitars, Pad must give voice to the spectrum space, singing out, with which band of similar musical instrument to be down-3dB, so have the clarity and level of the whole sense of music. using threshold and compressor in particular the value of fast Attack and Release, Release values may result if the gain is too small suction effect. But In rock music ??????< br> 18, if you shrink MIDI, do not always see the display of the sequencer, it will disturb your sense of hearing, the hardware sequencer
19, picked up if you use close sound, the sound is no vitality. they do not want to add reverb, you can use some of the environmental simulation or early reflections to make the acoustic space simulation equipment, the shorter the reverberation time, the more likely the sound into the front.
20, shrink After completion, the next day, ears a rest the night, listen again, and what changes the feeling of yesterday, into the monitoring system is not different, WalkMan, DiscMan and listen to on the car stereo.
Skills 2: EQ ( equalizer)
easy to remember the golden rule Golden Rule EQ (translation)
1. If the sound is muddy, please attenuation band near 250hz.
2. If the voice sounds like a trumpet tone, attenuation near 500hz The band
3. When you're trying to make voice sound better, please consider the use of decay
4. When you're trying to get different sounds, please consider upgrading
5.you can't boost something that's not there in the first place. (This one I can not turn, who will turn?)
Here is a table, it reflects some point in the hearing frequency range causing the association.
31hz rumbling sound, muffled thunder rumbled in the distance. feeling chest tightness.
65hz depth, the so-called
250hz full or turbid
500hz car horn
1khz whack (against the sound?! this translation is wrong with it!)
2khz crushing sound of things, step on the Ga la creaked. < br> 4khz trim, Fengrui sense
8khz high frequency whistle or dental, clean cut, > 1. audio plug mUltraFunk compressor About
Ultrafunk:
Ultrafunk let us look at the compressor interface.
still looked quite pleasing to the eye.
points left fx: and compressor two buttons will pop up a sign above the Ultrafunk. Just click on the logo can be canceled once.
interface, the blue LED in the square there is a white line, adjust the left and right Input Output the value, and middle Gain (gain) slider to see the white line in real-time changes.
some numerical adjustments described in the previous section with content related to a similar compression, such as threshold, ratio , inflection point, from the sound, release, gain and so on. generally adjust the compression threshold, compression ratio to achieve the function, and then adjust the gain value can be appropriate to enhance the volume of the waveform.
Limiter trigger for peak limit state there on and off, when the Limiter is open, but the lights of a limit function to play a role, guaranteed not to overflow. then the following TCR what is it? originally Transient Controlled Release (instantaneous controlled release) trigger, the state has on and off, for real-time and automatically adjust the release time, it is a special algorithm.
If you are not very specific values of the adjustment, then the line can also be used directly in the factory Presets some of the parameters already set up solutions Tap the Presets pop up the Preferences menu.
(the first is to do all this pressure limit THRESHOLD decibels from which the beginning is to choose the compression, the figure of -20 means -20 dB or more voice processing
RATIO; This is the compression ratio means the column is generally sound with 2_4: 1 on the line
KNEE: English to explain the meaning of the knee to ease the smaller this parameter the greater the more the more sharp the 10 election if it is fast songs slow songs Select 30
GAIN: gain, which means that if the compression is only a very small sense of the human voice, you can use this to enhance the volume of the waveform compression only ``
ATTCK: I used the reaction time is normally 6
release : is the recovery time following some of the more commonly used parameter values.
Notice I did not give a threshold, it is because the threshold should be set according to specific circumstances.
Special Note: The following figures by no means conclusive!
(Note: release time: 120 - 200 hard knee
guitar ratio: 8 attack time: 5 - 12 release time: 100 soft knee
electric guitar (without distortion) ratio: 4 attack time: 20 release time: 20 hard knee
distorted rhythm guitar (heavy metal, punk, etc.) ratio: 8 attack time: 2 - 6 release time: 70 hard knee
electric bass ratio: 4 attack time: 50 release time: 50 hard knee
human voice (singing) ratio: 2.5 - 4 attack time: 5 - 8 release time: 50 - 80 soft knee
(Note: the human voice can not be conclusive set the parameters, because the plasticity of the human voice is very large, there are male, Girls, Boys, Chinese, English, Enya sound, Cui Jian, sound, etc.)
the human voice (speech) ratio: 2.5 attack time: 15 release time: 50 soft knee 9,)
balanced look at EQ device.
Ultrafunk the EQ band equalizer with 6-speed option, and you can also click on the yellow button to cancel one or several bands. after you cancel, the blue LED in the corresponding yellow Digital markers and loss of function will become gray.
in the Filter can select a different curve options, the general election can be preset. In Freq can set the frequency point.
Q value is used to set the curve shape and width, a low value given to a high frequency filter band width. adjustment formula is: Q point to box after move up and down to increase or decrease its value.
adjust the gain of the way:
1 . directly in the white box, enter the specific value.
2. Drag the slider right.
will see the curve of each real-time adjustment of change.
have done if you are not satisfied with EQ can also be the result of the deal has been overturned, Flat button and tap on it.
Modulator (Modulator)
content can be modulated:
ratio, phase, depth, delay, feedback, cross-mix, mix, output.
in the Rate of the right is LFO - Low Frenquency Oscillator (LFO), a total of six waveforms to choose from.
in Depth (used to control the depth --- delay time change area) is the right of Tape (tape), used in the manufacture of a similar analog tape Flanger effect.
Feedback Invert right side can be used to create a little have offset the effect of bass content.
phase effects:
in Mode (mode) in:
LR phase (phase left and right channels), MS phase (middle and sides / single-channel and stereo phase), CS encode (encoded into the left channel for the central information for the surround right channel information), SC encode (with left and right before an effect opposite phase) of five.
loop filter in the Filter button There are two options: IIR (infinite impulse response) and FIR (finite impulse response). IIR speed, phase effect, but will introduce a constant phase shift. FIR slow, can provide an accurate high frequency phase poor, but somewhat less in the low frequency, this will not introduce a constant phase shift, only in two channels have a slight delay.
Meter (meter) with Pre (preview) and Post (post- view) of two.
Reverb (reverb)
Below is Reverb (reverb) interface.
you can adjust the Input (input) level, or close it;
can enter values or directly in the right of the LED to adjust the drag handle low cut and high cut frequency, or double-click the handle to restore its default value;
adjustment Predelay can directly input signal and the first reverberation control the delay between the time of reflection;
can set the virtual room size;
adjustment Diffusion (spread) the value was little reflected sound can have more different, big time will have a similar white noise, sound, can not distinguish between the echo;
the following four values are input values and can either drag the handle to adjust, they are:
double bass (used to adjust the crossover frequency below the Crossover signal decay time),
Crossover (overlap, overlap for double bass signal frequency),
Decay Time (Reverberation decay time),
High Damping (high-frequency damping, allowing You adjust the reverberation time when the signal exceeds the damping of high frequency signals).
Dry, set the sound output level of dry,
ER, set the output level of early reflections,
Reverb, Reverb settings (wet) effect of signal level,
Typically, Dry-level level of large and small Reverb, sounds clearer, less echo effect; the contrary case, the voice of the more obscure, the effect echo big;
in Width (width) in Normal (normal), Wide (wide), Ultra-Wide (too wide), Mono (single), Narrow (narrow) the five options;
Output has two output options: stereo and mono;
If you pick the Tail (tail), can give a short sample with a long decay time, to extend their length. <br `` `round dry fast songs, then if it is less slow songs on the reverb a little more inside me first explain what the meaning of low-frequency cutoff point is:
next to low-frequency cutoff point of 300 which is a small box filled 300HZ Following the voice of all the bolt out
HZ if you want to ask what is meant is the sound frequency units. is the sound of 300 vibrations per second, this is a high-frequency cutoff bass
the meaning and the same as above
If people inside the high-frequency sound will sound too much vocal thorn ears feel dirty so that you can cut through the high point of the early reflection time to resolve
: This is given to the human voice and then bounce back after hitting the wall to reach your ears
spatial span of time: the need to explain it to the left of the transfer
very wide as if to feel like a big concert which transferred the right to feel very free from anxiety is not so open (slow song lyric song I will adjust The larger the contrary)
level of diffusion: This study did not how it used 50% of the low mixing ratio
hey: this I usually use 1.0
Crossover; 500
reverberation time: 1.0 or the 1.1
high failure point: 5.0
the original dry sound: the greater the human voice before that I used to * 0
early reflections: big tune this I feel there is meaning in the wet sounds very dry if Then it
this transfer large volume reverberation: the need to explain it. less vocal is very dry. more voices will be fuzzy
I-8_-1010,)
Surround (Surround) Effects device:
Below is Surround (surround) the interface effects.
you can manually adjust the range around the pan (Zoom 1,3,5);
input (stereo, mono) ;
Focal point (the focus, when opened, there will be a yellow cross, attenuation and Doppler effect to handle);
adjustment Attenuation (attenuation), the focus around a yellow circle will appear, click Zoom Observation can be switched 1,3,5;
Doppler (Doppler) effect, which is also known Doppler phenomenon in physics terms, it was first proposed by Austrian physicist Christian Doppler discovered in 1842, this applies to all wave phenomena, not just sound waves. A common example is: when you stand on the highway, a car Youyuanerjin, you will hear the tone will increase, decrease away, you can use this cases to set the value of Doppler movement;
the path to achieve the above chart settings, you need to Path (path) to play in the a new handle, while the route between the two handles will appear in the blue LED on;
click Closed path and hit the Path time to set the path of the time;
Joystick allows you to use the game controller to manually adjust the path;
Test noise measurement noise generator used to trigger on / off;
Ultrafunk an effect in the final : WahWah (wah-wah sound)
wahwah is wahwah guitar effects. whawh first appeared in 1966, is a classic guitar effects.
Mode option, choice of three different wah control. < br> Manual (manual), use the slider manufacturing Wah wah sound, the same as using the traditional foot.
Auto (auto) under a certain speed (BPM) automated manufacturing wah.
Triggered (trigger) when threshold value of the voice over on the right to start the wah effect. To use this approach, you need to set the threshold (limit) and attack (from the sound) / release time (release time).
wah envelope control state (that is similar to control wah guitar effects pedal with their feet the same). This parameter in the three modes have different roles. In manual mode, you must use this parameter to control the wah effect . In automatic mode, this parameter is used to set the starting point for wah effects. In Triggered mode, this parameter represents the maximum value of the wah effect, which is the wah range.
Tempo (speed) is only valid in the automatic mode , set the wah modulation speed. range: 1 to 300 BPM
Attack, effective only in trigger mode, that is, from the sound of time, it is said that when the wah is triggered, how long to reach the highest value of the results.
Release, effective only in trigger mode, is the release time, it is said that when the trigger after the end (that is, when the input level below the limit), after a minimum amount of time to return results.
Threshold (threshold) valid only in the trigger mode, said maximum amount when the input level, wah effects started.
2. audio plug-ins (Wave3.0) effects of various profile! (last)
the first results: AudioTrack ( audio tracks)
it is common for normally we see the track, and a combination of 4 EQ equalization, compression, noise gate three effects. If you've used T-racks (mastering software), You will find it very similar to the function of AudioTrack. but T-racks to be pretty much the interface. The figure is AudioTrack (audio track) interface:
use it, you can work the whole mix stand firm ...