Thursday, September 23, 2010

Flash5 ActionScript Advanced Programming Guide (6)


Third, the use of custom functions

Adding the concept of function may be Flash5 of the ActionScript language to improve in most flash content of the fans excited. Because in the old version of FAS, in order to achieve trigonometric functions like function, Flash animators have a lot of the set had a lot of instructions and commands among the roaming call, not to facilitate the implementation of efficient and low, and often in order to avoid hell, "200,000 lines" limit (this limit be eliminated in Flash5) and their brains tricks. Now, with the function, my friends, what we are afraid!

May be some familiar with the Java or C / C + + programming flashers have to say, and the concept of function is not very common thing in, what good talk. Actually not that simple. As I put it separately brought out to be a long introduction, we will certainly have an unusual between. Here we take a look at what it has mystery. In order to highlight key points, this section just talk about the use of custom functions, system function and pre-defined command object member functions for later revisit.

1, the custom function in the form and function

In accordance with Flash5 ActionScript orthodox interpretation of the online help, self-defined function expression of known function and unknown function is divided into two types. As follows:
function functionname ([argument0, argument1, ... argumentN]) (
statement (s)
)
function ([argument0, argument1, ... argumentN]) (
statement (s)
)
One well-known function can be used as a general sense, the function or a custom object constructor; unknown function specifically designed for the custom object loading methods (ie member functions). The following examples of these three functions:

(1) for general functions (features: You can return to the values):
function add10 (x) (
return x +10;
)
trace (add (10));

(2) as a constructor function (features: use of targeting members of this assignment, this is required):
function box (l, t, r, b) (
this.left = l;
this.top = t;
this.right = r;
this.bottom = b;
)

(3) used as a method of loading custom objects (features: in the constructor name added. Prototype that load method, which is required):
box.prototype.area = function () (
return (this.right-this.left) * (this.bottom-this.top);
)






Recommended links:



Overcome stage fright interview the 10 candidates recruited nirvana



PICK up phone 2



OGM Converter



Wang Wenjing's plan and action



Dealers Sustained growth Quartet



"Grey Dove" Into A Small Penguin Confuse Users Into A "chicken"



IDC Perspective



MOV to MP4



Report Languages Education



E-cology In The Pan Micro Series 54



Brief Science - Screen Savers



SWF to MP4



Sold 250 million shares of Stone would definitely quit Sina Sina



Thursday, September 16, 2010

Waterproof Wall - terminology to explain



In the field of computer security, firewall and waterproof walls are a very similar name. Firewall is installed in different networks (such as a trusted internal network and the untrusted public network) or network security domain combinations between the number of components. It can monitor, limit, change the data flow across the firewall, as far as possible within the network on the external screen of information, structure and operating conditions, in order to achieve network security. Logically, a firewall is a separator, a limiter, is a parser to effectively monitor the internal network and the Internet between any activities to ensure that the internal network security.

As a result, we know that a firewall to prevent external network through the isolation of the internal network to attack, it passively inspect all network packets flow through to block the communication security policy violations. Firewalls are based on the work of a basic assumption: it is located inside and outside the network access point, and there is no other bypass external gateway is based on this assumption, the firewall within the network became the protector. But, obviously, for internal security, the firewall can do nothing.

Waterproof wall thus came into being, and the traditional firewall concept is completely different, waterproof wall design to prevent leakage of internal information like water. The birth of a firewall is to prevent outside intrusion. It is a monitoring system within the network, at the internal network, at any time monitor the security situation within the host. If the fire is to prevent the spread of external threats to internal, then water is the means to prevent the leakage of internal information. Visible, waterproof wall is a network monitoring system within this very image of a call.

Simple waterproof wall by the probe and the monitoring center. In general, which consists of three structures: high-level user interface layer, real-time updates based within the network topology to provide system configuration, policy configuration, real-time monitoring, audit reports, security alarm and other functions; low-level modules layer, the distribution of the probe in the composition of each host; middle layer of the security services, real-time information collected from the lower to the senior report or alarm, and record the whole system of audit information, to prepare for queries or generate reports.

Waterproof wall generally has the following major functions: information leakage prevention, to prevent the internal network host, network, storage media, printers and other media, intentionally or unintentionally Kuosan local confidential information; system user management system records the user login information for the provide the basis for future safety audits; system resources, security management, limited hardware and software installation, uninstall, control the operation of a specific procedure to restrict the system into Safe Mode, rename the control file and delete operations; real-time health monitoring system, through the Intranet real-time capture and record screen host, to monitor internal security personnel to deter malicious insiders, and after the issue of security and provide the basis of its source, when necessary, can also be involved in direct control security of the host I / O devices such as keyboard, mouse, etc.; information security audit, network security audit record information, and provide the host within the network usage, security event analysis report.

In summary, the water wall is a firewall, virtual private networks, intrusion detection systems and other safety equipment, security services provided by an effective complement. On the overall security system, it is also an integral part. Although information security products, including encryption, antivirus, firewall, anti-electromagnetic radiation, platform systems, electronic authentication, vulnerability scanning, intrusion detection, identification authentication, physical security protection system and other ten series, but these products can only be part of the solution , not the whole problem.

According to international authorities CSI / FBI statistical data provided, and aggressive behavior in many cases, the most important time is the most secure information leakage; attacks were mainly from within, not from outside hackers. Well, there is no readily available information technology or products can block the leakage of the tap it? Waterproof wall system, such a system is adopted.

Waterproof wall system is composed of Internet access security control, computer control port security, procedures, use of safety control, safety control file copy, CD burner safety control, file and print security control, illegal invasion of security control, security control hardware resources, operating behavior management, remote surveillance, immunization and virus hackers trojan from a centralized management platform.







Recommended links:



2006: Five suspense Notebook



Youtube M2ts



Let Gmail tell friends where you live



My favorite Firewall And Proxy Servers



Intermediate hospital "backward" sample



Simple Compilers And Interpreters



P2P affected 90% of operator revenue flow erosion



Free mp3 to aac converter



Inventory And Barcoding Directory



To work time "to steal food," the employee settings, "HEALTH Model"



convert .mod to .mpg



TD commercial trial on April 1 the minimum consumption of 118 yuan a complete experience



WINDOWS 7 rmvb



When The "vision" Into A "trap"



Tomato Garden, charged by: the United States has a lot of piracy