Anti-

Read about anti-, The latest news, videos, and discussion topics about anti- from alibabacloud.com

Ministry of Commerce announces final ruling on anti-dumping investigation on imported adipic acid

The United States, the European Union such products import tax 5.0%~35.4% not equal to the "Xinhua News agency, Beijing, November 1," The Ministry of Commerce 1st issued the 78th 2009 Bulletin, published on the United States, the European Union and South Korea's import of adipic acid anti-dumping investigation final decision. Ministry of Commerce investigation organs identified as originating in the United States, the European Union and other countries and regions of the imports were investigated products exist dumping, domestic adipic acid industry suffered substantial damage, and dumping and substantial damage between the causal relationship between the decision since November 2, 2009, the import from the United States, the European Union and other countries and regions of the

China strongly dissatisfied with China's anti-subsidy for oil well pipeline

November 24, 2009, the U.S. Department of Commerce on China's export to the U.S. oil well pipe anti-dumping countervailing investigation cases announced the end of the subsidy survey, ruled that China's oil well pipe production companies have 10.36% to 15.78% of subsidies range. The spokesman said 25th that the US side continues to follow the discriminatory practices in its countervailing preliminary investigation, wrongly identified the existence of subsidies and arbitrarily raised countervailing duty rates, and China expressed strong dissatisfaction and resolute opposition. China new five Xinhua Beijing, December 31, according to the Ministry of Commerce website News, 30th, the United States International Trade Commission ...

Online game anti-money laundering related laws still missing, the settlement is very difficult

Absrtact: Online game against money laundering related laws are still missing, the settlement is very difficult year-end, consumption exuberant. A little mouse, but may accidentally Shing. Recently, many consumers across the country in the network shopping, online transfer, encountered consumption of money online game anti-money-laundering related laws are still missing, the settlement is very difficult year-end, consumption exuberant. A little mouse, but may accidentally Shing. Recently, many consumers across the country in the online shopping, online transfer, the money was transferred to the Shanghai Giant Network Technology Co., Ltd. Player account, cash, amount ...

International Day Against Drugs 360 Participated in the Anti-drug Culture Week and launched a network of anti-drug "Five Steps"

On June 26, 360, the largest Internet security service provider in China, jointly launched the anti-drug culture in Beijing with the theme of "promoting the anti-drug culture and promoting the sunshine life" jointly with the Beijing Municipal Public Security Bureau and the Municipal Anti-drug Education Base. week. As a result, 360 companies launched a network of anti-drug "five steps." In recent years, the network virus has shown a tendency of diversification and has been developed from a single virus to Trojans, phishing websites and rogue software. Today, the rapid development of the Internet economy, network services such as video, shopping, social networking, games, entertainment, investment and wealth management are increasingly developed. This also gave birth to the network ...

Six strokes to solve windows 7 patch problems

July 27, rising Company 2011 enterprise-class Nationwide tour held in Guangdong province, which is after the successful holding of Anhui province after another important province. The purpose of this tour is to reveal the latest security areas of the Internet, analyze the network and information security issues, as well as anti-virus wall, security warning equipment in the enterprise security applications. At the meeting, rising security experts said the "cloud attack" brought about by the security problems of the enterprise poses a huge threat. Recently released the first half of the 2011 Internet Security Report, said, "cloud attack (threats to Cloud)" is becoming a reality, storage ...

Rising "cloud security" at the beginning of a day to intercept 7.65 million times Trojan intrusion

Rising 2009 new products released nearly one months, there have been 80 million old users upgraded to 2009 version of the product. Based on the "cloud security" strategy developed 2009 new products, to the vast number of netizens to bring a new security experience, every day to help users intercept millions of Trojan attacks, of which January 8 is reached a record of more than 7.65 million times, of which a sample of up to 500,000 Trojans. Rising 2009 new products in the anti-horse website, anti-theft Trojan and other aspects of the effect of the user's unanimous recognition. Rising security expert Liu introduced, "cloud security" three major elements are: strong core technology and ...

Korea to promote minors at specific time can not play

In order to prevent underage young players too addicted to the game, South Korea is actively and deeply promote the "youth anti-addiction system."  South Korean lawmakers are considering pushing players under the age of 18 to be unable to connect to online game servers for a specific period of time, according to South Korean foreign reports. The call in South Korea, known as a "limited-time shutdown system", has sparked discussion recently, with some parents asking game companies to block links to game servers for their children at specific times, such as classes. The South Korean parliament is discussing the content of the game industry revitalization Bill, hoping to specify the game company's Guardian needs ...

Arnold Schwarzenegger hard to Terminator E3 organizers say anti-violence unconstitutional

E3, ESA (American Entertainment Software Association (Entertainment Software Association), responded to a recent bill in California that banned the sale of violent video games to minors. Michael Gallagher, president and chief executive of ESA, issued a brief statement saying the proposed law was clearly in violation of the U.S. Constitution.  The Association will submit the relevant legal basis to the Supreme Court. A few days ago, the California Supreme Court began to re-examine the California State Senator Yu Yin ...

Anti-gamer game "crack" built-in Twitter interaction

Today, addicted to the game has become a social problem and more attention, each section of the game has introduced a variety of measures to prevent addiction, but the effect is not ideal. Experts have explained that addicted to the game because of communication problems, players into the game, in the game to put more emotion, and the less communication between relatives.  A foreign online games "fissure: Trana God Domain" announced that will be built in the game of Twitter, to facilitate the player with friends and family contact and communication, used to prevent the player too addicted to the game. Recently, online games "fissure: Trana God domain" Game developers trion Wo ...

The thief changed his mobile card to unlock the security software two SMS caught the thief

You want to change your card after you steal it? Do not dream, you have been the mobile phone anti-theft software on the stare. Recently, a thief in Fuzhou staged a "shooting the foot" farce. The defendant Chen wants to be stolen mobile phone unlock, so two consecutive SIM card to operate, did not expect the phone has long been "360 mobile phone defender" lock, and his number was sent to the owner of the machine. 360 Mobile Guardian Two text messages let Chen some nowhere to hide. It is reported that Chen, while no one in Fuzhou, a company office thief take a step iPhone4. For the use of mobile phones for their own, Chen, two consecutive insert ...

Network security deployment and implementation based on private cloud security platform

1, the background of cloud technology and the current situation in our country, anti-virus technology originated from the 1990s, based on a variety of signature detection methods of malicious code and based on file data, program behavior heuristic detection. With the development of cloud computing technology, manufacturers have put forward their own cloud security technology concepts and corresponding products.   However, most of these products do not deviate from the feature detection method, but the feature extraction and matching calculation methods have changed. The first is the migration of virus signatures from the client to the Cloud collection. In order to solve the file data constantly expanding, evil ...

Lenovo Network UTM system based on cloud security

National information security leading enterprise Lenovo network in the 2009 Unified Threat Management (UTM) product market share first, continue to increase investment in product development, July 2010 released the new UTM, in a significant increase in the original 6 major functions (firewall, VPN, antivirus gateway, intrusion protection, Anti-spam, web filtering, based on the latest development of the new cloud based active cloud defense function, the Internet's first threat to the "malicious site" has a qualitative leap in the protection effect. At the same time, this product combined with intelligent security management and continuous security services, play ...

Cellocloud; Lead mail protection into the new realm of cloud security

2009/4/21–gartner's latest "phishing report" points out that phishing has exploded in 2008, with a single U.S. victim of up to 5 million people. Although there are 70% of enterprises, organizations and service providers to take some of the mail threat of defensive measures, but these traditional anti-spam technology is a major issue of timeliness, interception speed can not keep up with the changes in spam, the face of a new type of mail attack behavior helpless, resulting in spam rampant, mail fraud pouring problem. According to the Radicati group ...

Antivirus software vendor Layout cloud Security

In recent years, with the popularization of the Internet, the threshold of malicious programs has been gradually reduced, the number of malicious software has increased rapidly, which poses a great threat to Internet security. Jinshan Poison PA Global Anti-Virus Monitoring Center statistics show that the number of computer viruses in 2007 to 283,000, 2008 soared to 13.596 million species, only one year increased by more than 47 times times. In addition to the surge in the number of computer viruses, network attacks, combined attacks highlighted, which led to the use of local virus database to be killing the way to prevent the ever-changing and growing security threats. To make up for the traditional anti-virus methods, ...

Anti-flow London Olympic IT administrators and servers eat and live

The 2012 London Olympics are coming, Interxion, a data center management company in the Netherlands, revealed today that the mission-critical server room in London is equipped with a capsule bed for employees to sleep with, and they believe that a large influx of viewers could cause heavy server pressure and congestion,   Therefore, the room must be equipped with a reasonable number of employees 24 hours to ensure the normal operation of the London Olympic IT support, imagine the life of these IT workers during the Olympic Games: The narrow space, behind the server buzzing breathing sound ... (Responsible editor: The good of the Legacy)

South Airlines "W cabin" nest case many people were checked

Summary: The anti-corruption storm that stretches over the state-owned enterprises has not unexpectedly spread to the Civil aviation field, this time the triggering place still is China Southern Airlines Company Limited (hereinafter called Southern Airlines). This reporter November 27 through a number of channels confirmed, including Marketing Management Committee (hereinafter referred to as the "anti-corruption storm" in state-owned enterprises did not accidentally spread to the field of civil aviation, this time the trigger is still China Southern Airlines Co., Ltd. (hereinafter called Southern Airlines). This reporter November 27 through a number of channels confirmed, including marketing Management Committee (...)

"Play King" of the "new Pearl Princess" online less than a week, ratings hit the way the surge soared

After a round of anti-theft storms, at present, the video site piracy has been greatly reduced, but, in the new "pearl" ratings hot, and the content of the same broadcast in the context of the media, the Sohu video cost of the exclusive purchase of the documentary suffered a network theft. It is reported that the theft of new "also beads" documentary films are well-known in the industry 5 video sites.   Reporter obtained the latest news, the documentary copyright Fangjongyao Company and access to exclusive authorized Sohu Video has been jointly launched advocacy action, to the piracy site issued a lawyer letter, and will take legal action. Exclusive authorization of the documentary was stolen by Joan ...

360 security guard official microblogging release message

Not long ago, 360 security guards official Weibo released news, said the new security guard will be with a mysterious product "fit". August 31 Morning, its latest release of the 9.5Beta version finally revealed the answer, the original is 360 security guards joined the 360 mobile phone guardian of the physical examination, mobile anti-theft, WiFi health screening and many other functions, complete the PC and mobile phone through to facilitate the user a key to solve the PC and mobile phone security issues. Industry comments that, as more and more netizens have a PC and smart phones and many other Internet equipment, 360 security guards and mobile guards This "fit" in convenient ...

Another way of thinking about website anti-malicious clicks

Absrtact: 1.5 months ago, Guangzhou Yi Tiger published a "miserable, web site is malicious brush flow, introduced the easy Tiger interconnection encounter malicious brush with malicious peers when the flow of some experience and views, here, easy Tiger again talk about the site is malicious brush flow solution. By the way, 1.5 months ago, Guangzhou Yi Tiger released a" tragic, Web site is malicious brush flow, introduced the easy Tiger interconnection encounter malicious brush with malicious peers when the flow of some experience and views, here, easy Tiger again to talk about the site is malicious brush flow of solutions. By the way, talk about the malicious click of another way of thinking. From the malicious brush ...

Qualcomm accepts 975 million dollars fine

Absrtact: The NDRC's antitrust investigation of Qualcomm has finally ended, with Qualcomm paying 975 million of dollars in fines to reconcile and creating the highest record of China's anti-monopoly fines.   In addition, the NDRC has asked Qualcomm to make a number of adjustments to China's smartphone patent licensing. The National Development and Reform Commission has finally drawn a full stop on Qualcomm's antitrust investigation, which has created the highest record of China's anti-monopoly fines by paying 975 million of dollars in fines for reconciliation. In addition, the NDRC has asked Qualcomm to make a number of adjustments to China's smartphone patent licensing. Although there have been rumors that Qualcomm will defend itself ...

Total Pages: 47 1 .... 5 6 7 8 9 .... 47 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.