Saturday, October 23, 2010

Complementary to IPSec VPN SSL VPN


Reasonable choice of VPN

SSL VPN's strong momentum of development seems to indicate that it will replace IPSec VPN,

But careful analysis you will find no contradiction between the two

Choose the ideal virtual private networks for enterprise users is difficult, the current prevailing theory is: thunder gradually strength of the SSL VPN will quickly catch up and possibly replace the traditional IPSec VPN, this big purchase decision even more difficult. Of course, some people insist that: SSL VPN that Cinderella will soon shine, IPSec VPN will be eclipsed. This is the noise of the industry for the recent addition of a fire.

The industry believes that, IPSec been rumors put out too early, but in the field of remote access, there is no doubt a trend is very clear - stay away from IPSec, this trend stems from some very practical reasons.

Steady development

Infonetics Research is an international market research and consulting firm, is also a major professional company VPN areas. It said, SSL VPN has achieved considerable progress, as well as many IPSec VPN vendors in 2003 will continue to announced the launch of products based on SSL. This scene has now been presented before the world, Nokia, Cisco and other big players have launched around the SSL product solutions.

However, SSL still does not replace IPSec, Infonetics think so. Because of the lack of an ideal site to site to connect the SSL solution, and said remote access, and considered by many companies, may order a different remote access while deploying SSL and IPSec, but in the near future, this is unlikely to become a dominant trend .

According to a recent report by Infonetics shows, IPSec on the VPN is still the dominant terms of tunnels and encryption technology. But at the same time, SSL will continue to be attractive. By 2005, 74% of mobile workers will depend on the VPN (15% increase over 2003), growth is expected mainly from the SSL, IPSec outside of this alternative to avoid the need for client software deployment and management complexity and human needs.

The question now is, in the early stages of this market, many manufacturers on how to SSL-based product positioning seems to be no clear attitude. In the end the SSL VPN (also called application-layer VPN gateway products) as with IPSec competition or complementary? This was a marketing problem.

Infonetics that, SSL product and the final positioning of the best complementary IPSec. Most manufacturers will develop or purchase IPSec application layer VPN technology to their product line. This complementary positioning is essential to market success. If in the next 12 months, leading the market in the company decided to stir up competition between SSL and IPSec, then the market will suffer.

What difference

In the design, IPSec VPN is the nature of the security technology infrastructure. The real value of this type of VPN is that they try to improve the IP environment of security. The problem is the deployment of IPSec requires significant infrastructure transformation for remote access. Benefits to put in there, but the high cost of management. On this point, IPSec site-to-site connection is still the only option, but for other SSL VPN remote access activities also aroused interest.

However, when the first debut, IPSec VPN is considered other than remote access solutions, has a major advantage. Attraction of including IPSec VPN, which uses a centralized security and policy management components, which greatly ease the maintenance requirements.

However, recent traditional IPSec VPN, there were two main issues: first, to bring the human cost of client software, which many companies hope to avoid; second, some security issues have also been exposed, these problems mainly with the establishment of open network layer connectivity.

Preferred options

Many experts believe that the usual senior corporate users (Power User) and LAN-to-LAN connection required for function in terms of direct access to corporate networks, IPSec unrivaled. However, a typical SSL VPN are considered most suitable for remote employees to access common Web-based applications. Therefore, if you need more comprehensive, browser-based applications for access, as well as for remote employees to connect all offices, IPSec is undoubtedly the first choice.

On the other hand, SSL VPN does not require the end user's PC and laptop computers into the other client software. Some companies chose not SSL IPSec, this function does not require client software is an important factor.

In addition, SSL VPN there are other often mentioned characteristics, including lower deployment costs, reduce support and management on the day to day needs. In addition, because all external traffic is usually through a single hardware device, so that you can control access to resources and the URL.

Manufacturers in introducing such products do not need VPN client software, users can connect via the Internet to connect the task of equipment and means of access to safe access SSL tunnel. This requires additional hardware in the enterprise behind the firewall, but as long as the management company a device, not to maintain, upgrade and configure client software.

Because the end user to avoid carrying a portable computer, through any device with Internet connection can gain access, SSL is more likely to meet most of the staff of the mobile connectivity needs. But the problem is that such a program, SSL VPN encryption-level is usually higher than IPSec VPN. Therefore, despite the deployment and support costs low, and enable organizations to use a desktop computer, laptop or other means of staff Tigong use e-mail, 鐢氳嚦 rapidly, providing easy access to our partners outside the network capability, but SSL VPN still has its shortcomings.

The industry believes that these defects are usually related to client security and performance issues. E-mail and the Intranet on the case, SSL VPN is very good; but require higher security level, more complex applications, require IPSec VPN.

Connect Enterprise

Although the view was expressed that SSL really only applies to access Web-based 搴旂敤, Er Qi Ye not directly access network, Tageng for less skilled users, rather than Gaoji user, a kind But now a new 瓒嬪娍 - SSL tend to be infrastructure for technology, not just to be associated with Web application servers, deployed in network infrastructure equipment to other components of a technology.

In addition, some of the popular SSL technology has advanced to allow reliable remote users to connect fixed equipment, and fixtures that end with a reliable PC, firewall and anti-virus and other protective measures. In short, it is only a provision for all users all the necessary features of the VPN only, and IPSec VPN The fundamental difference is that traffic is transmitted via SSL to.

However, many organizations also use SSL and IPSec VPN must have its reasons. But industry experts believe that there is no reason to use both remote access and the same time. The present IT organizations do not agree with this view, that is, within the network, which the IPSec technology into LAN-to-LAN, SSL VPN is designed to work daily and remote access.

No matter how the SSL VPN to say, companies should keep in mind: such technology can not solve all problems for everyone. SSL VPN's all about saying just a market indicator that it is the solution of certain types of problem another way: not all resolved, but certain types.

Client software is the key

It was therefore firmly believe that, IPSec is to provide site to site, the primary tool to connect, through this link, you can wide area network (WAN) on the implementation of infrastructure to infrastructure communication. The SSL VPN feature does not require client software to help reduce costs, reduce maintenance concerns about Remote Desktop.

However, SSL's limitations is that only connect via a Web browser to access the assets. Therefore, it requires some applications to have a small application that can effectively access. If the application is not a small business assets or application, in order to connect to them is more difficult. Thus, you can not, without client software environment to run, because it requires some kind of rich client software (Client-Rich) of interactive systems.

Does not require client software operating environment certainly has its efficiency and benefits, performance, coverage and application compatibility problems also exist. In this way, full use of this option appears more challenging. SSL This program can solve the problem OS client software, client software maintenance issues, but certainly not entirely replace IPSec VPN, they have different solution is to be almost no overlap of the two kinds of the number of different issues.

SSL and application security

On the need for remote access to the most companies in support of the application should include the company to maximize efficiency, productivity and profitability of the various applications needed. Although the application security to provide this coverage width, but the application of SSL VPN can support a very limited kind.

Most SSL VPN are HTTP reverse proxy, so that they are suitable for a Web-enabled applications, as long as you can through any Web browser to visit. HTTP reverse proxy support for other query / response applications, such as basic e-mail, and many business productivity tools, such as ERP and CRM, client / server applications. In order to access these types of applications, SSL VPN for remote connectivity provides a simple and economical option. It is plug and play, and does not require any additional client software or hardware.

However, the same happens this advantage of SSL VPN has become the biggest constraints: users can only access the necessary applications and data resources among a small part. SSL VPN for remote access applications can not provide a comprehensive solution, because it does not help access to internally developed applications, nor help to visit a number of channels and dynamic port requirements and the use of multiple protocols such complex applications. However, this company and remote users is a key requirement. For example, SSL VPN there is no framework to support instant messaging, multicasting, data feeds, video conferencing and VoIP.

While SSL can protect the TCP channel created by the HTTP security, but it does not apply to UDP channel. Today, however, the support of business applications required to support all types of applications: TCP and UDP, client / server and Web, readily available and internally developed programs.

Application-independent security solution should have the support of a variety of standard TCP or UDP. Application of security technology supports the use of physical network solutions. In addition to supporting a variety of procedures now, application security will also support future programs, no matter what kind of protocol or design.






相关链接:



Registry Favorites, You Make Good Use Of The Right



all about the braun series 7 790cc pulsonic SHAVER



ASF To MOV



B2G appeared in CHINA Yiwu Fair into the White House



Neusoft Nokia To Bring Children Out Of The "Chinese Courtyard"



CG (Computer Graphic) feature (CG production steps)



DVR-MS to MPG



Storage Debugging



AVI to MOV



You will enter the English phonetic it?



Wave OF mergers BI have a happy life



SPECIAL MO CD 230MB, 540MB, 640MB, 1.3GB



Recommend E-Commerce



Basic Or VB Or VB DotNet REPORT



Report Wizards And Components



Tuesday, October 19, 2010

Acer suggest possible purchase Packard Bell is actively brewing



July 25, according to media reports China Taiwan region, Acer male senior public relations executive has hinted that the island Wang, Acer PC makers do with Packard Bell in Europe to discuss matters relating to mergers and acquisitions.

Last week there were reports that Acer intends to PC manufacturers in Europe M & Packard Bell. In response, Acer senior public relations director Wang island male in a telephone interview a few days ago, said: "M & A transactions may occur in some changes, we can not release more information to determine the exact date."

Packard Bell in the Netherlands, is Europe's third-largest consumer PC manufacturer, in France, Portugal and the UK market has a strong position. Currently, Packard Bell is to Eastern Europe, the Middle East, Africa and Latin America market expansion.

For the deal, Gartner analyst Deng Yajun, said: "Packard Bell will help balance the acquisition of Acer's overall strategy in the Asia Pacific market." Deng Yajun said that in the Asian market, Acer consumers and small and medium enterprises in the markets performed well. The Packard Bell's business focus in the commercial market. Therefore, this potential deal is beneficial to the Acer.

March 12 this year, "The Wall Street Journal," the first report, said Acer plans to acquire a PC makers this year, but is currently looking for potential targets. Then, there was news that Acer may acquisition Gateway.

March 21, Gateway spokesman David Hallisey gave denied this, saying the merger was not to discuss matters with the Acer. May, Acer has also confirmed that M & A target is not Gateway.

By the end of May, Acer chairman JT Wang said the acquisition of a PC makers plan ahead of schedule.







Recommended links:



Green Dam Is Related To The Chinese People "dignity"?



What rod dealer outlets



Neusoft Nokia To bring children out of the "Chinese courtyard"



Job on the road a few lessons to remember



ASF To AVI



Town and only "limited earnings"



Cool my music box, the new INTERFACE, mainly practical



XP and the Internet can not solve the time SYNCHRONIZATION



RECOMMEND Audio Players



Compare Firewall And Proxy Servers



3G2 to MPEG



dplay dll not found quick help



Matroska To MP4



A Fully CG Production Process - The First Draft (the Original Painting)



Photoshop rendering realistic beautiful necklace



Tuesday, October 12, 2010

Excellence comes from quality, three-dimensional interpretation PTC Shipbuilding



Excellence comes from quality, three-dimensional interpretation PTC Shipbuilding

- Interview with PTC China Sales Manager Wang Huijie

Whether eagle promoting or sparrow worth mentioning, the body of internal organs to be complete, PTC's design software has a unique advantage to meet all types of shipyards. - Wang Huijie

Interviewer: China Software Network reporter at Qiao Zhi

Respondents: PTC China Sales Manager Wang Huijie



PTC China Sales Manager Wang Huijie

Reporter: Could you talk to design the software development process in the shipbuilding industry

Wang Huijie: either ship industry or other industries, the overall trend from the technical design of computer software can not be separated. Since the computer software carrier, then the computer software itself can not be higher than many in the shipping industry, there is the same.

In fact, the ship relative to other sectors of information technology is relatively backward. From now, the ratio is two-dimensional design is very large, some the size of the shipyard, are efforts to the full three-dimensional direction, to do better now shipyard basically all of the three-dimensional. However, China's medium and small shipyards in the design is very backward, largely in collaboration with the outside world to buy such a mode of drawing. Because of different stages, it can not represent them do not design software, when the shipyard scale up, you need people to design the ship, still need the final shipyard design software.

The design software is now international pop half or full three-dimensional two-dimensional two basic software. Because the ship's own special, two-dimensional semi-application software more widely in civilian vessels. Shipbuilding is a very old industry, to form a very stable now standard, designed some of the standard methods have been internationalized. However, the military ship design differences in each country are very large, the basis and process of each country are mainly in their own R & D, the complexity of military vessels is much higher than civilian vessels, two-dimensional half the software difficult to meet military ships design requirements, so in a military ship in the application of the full three-dimensional technology. We can also see the application of military ships will gradually develop to the civilian.

In China, our largest market and the world is in the military ship, so for now we can adapt our military ships to the civilian vessels of information technology to promote the promotion, which is what we do at home.

Look at from the computer technology, 3D technology is superior to two-dimensional semi-, two-dimensional half every three to four years to once again transform. Because the design of two-dimensional semi-technological starting point of the software itself is very low, the user some of the new development of Xuqiu simply can not Manzu's, procedural changes must be enabled to Di, Ji Benshang every change Dushi right 鍓嶉潰 negation. However, the full three-dimensional software, this problem does not occur, all three-dimensional technique can last decades, but only gradually improve the bottom will not be denied.

Then forward to the needs of PDM, CAD only themselves to enhance individual ability. Now dozens of individual design needs a boat, then how to further balance the efficiency, we need a management tool to all integrated together to form a team with a design.

Reporter: PTC in the face when different customers have different product and solution?

Wang Huijie: ship boat is the most important point difference in complexity, the ship carrying more than your ability of loading other than a complete upgrade their equipment, the boat will be relatively simple point, but there are a number of professional ship special vessels, complex very high.

However, when in the design of the ship, whether eagle promoting or sparrow worth mentioning, the body's internal organs to be complete, manufacturing ships and boats, our software is in terms of the number of differences. May build a ship needs 40 individuals, but the boat made ten enough, but this is only a quantitative match.

Further in terms of software solutions, probably because of the complexity of a boat is low, for the management of data storage is easier, on the management requirements are relatively low. However, 40 people or boats for the ship parallel design, people management alone is difficult, this time to meet with management to streamline the flow of data, to ensure that the data reuse in the design of the software is not too large differences, mainly in the management software.

We are also discussing this matter, medium and small shipyards in the end What is the solution. If left intact solutions to move large shipyards, small shipyards can not stand. We feel that small shipyards need is the basic business model forming, need fast on-line, not too many special needs.

Reporter: We all know the ship's information is very low, many designers are not very familiar with design software, PTC software is the application of the shipbuilding industry and deployment?

Wang Huijie: Any software designers never have come into contact with from the initial contact with the process, we are by training manner. Through training, we will and customers in a project to set goals, through this project, we design with clients. As a means of introducing new applications, will lead to changes in the way the original, many of the shipyard before the introduction of our software also remain in the hand or two-dimensional stage, so in this project, we will help them make a plan to develop that they can accept the process.

In the project cycle, our engineers have been doing for the customer support of the shipyard. This shipyard has a group of people come out from the first project, the formation of seed power. Have their own internal power, they will have a positive inner loop, when the second boat on their own design, our engineers can move out of the shipyard. Through this method how to design a boat of our software knowledge transfer to users, users can form their own circle.

The benefits of doing so can reduce the user's risk. China's shipyards, most of the level design is not very high, if the users themselves to control the design of such means is very difficult, and users also face the pressure of production, then the order should not only pay shipping out on time, but also the face of the introduction of a new system, so we do, no doubt largely reduce the risk of the user.

Now, PTC in the implementation of a new approach to help users to set up a e-learning system. Traditional training methods are taught face to face, cost, and requires a fixed time, there is no way to repeat the most important in the design process can not always guide. E-learning and our way through our training courses, such as customer do if the ship design, hull structure may be ten, then the structure of this ten how to do it with our software, to do several steps, each step how to do Finally, complete the structure of command execution to complete such a course, go into the system. Users can use the process at any time, it could raise the overall level of the user study and design capabilities. PTC engineers will timely communicate with customers online. If the e-learning does not cover the content, or encountered a new problem, you can live through our consultation hotline service.

Reporter: Could you talk about the advantages of PTC's

Wang Huijie: First of all, PTC companies have unique technical advantages.

PTC ship design software was first started joining the army, and gradually extended to the civilian vessels. From the beginning of the market to determine the ship facing the software more. Military vessels from large carriers, small to a variety of boats and even underwater, the difference is very large, the software design requirements is high. Military ship is also very high surface complexity, far more than civilian vessels. Our software from the outset to take into account complex boat, dealing with complex structures, complex surfaces, the starting point of our software technology is very high, which is to be acknowledged.

Secondly, PTC software is the full three-dimensional software.

Many civilian vessels were used in two-dimensional half-way, full three-dimensional approach is a model for the future to do. Two-dimensional semi-technical way the bottleneck encountered by the chart is sure to wait until after the assessment be carried out to confirm. However, this time if there are problems, the problem has already occurred can not be inevitable. Now we go to a number of two-dimensional semi-software shipyards, their high expectations, hoping that we can use to help them convert three-dimensional way. Three-dimensional approach in the design process, we can send out the relevant results are not used until the final drawing. This early involvement of everyone, which avoid the scene of the links in the production, resulting in a range of materials and construction period can not avoid losses. We are introducing three-dimensional model, the content will be shared out very easily, compared with two-dimensional half-way can only be shared in the form of drawings, which is the technological advantages of our software.

Finally, our software is an open software.

Although the international shipping industry on many GM's standards, but, many countries due to the accumulation 涓? equipment, staffing levels and other reasons, different countries will be very different.

China's shipbuilding industry is relying more people to make up information, equipment and management with Foreign Countries. This requires taking into account the initial design, more localized content. China's shipbuilding and Europe and the United States different from South Korea, Japan, they have formed a large number of intermediate products, which is called standardization or modular. China's shipyards as infrastructure, technology accumulation, but also take time to achieve mass production outsourcing into.

Because the existence of objective reasons, we do ship the software in China, many local custom. Because our software is open, users can use this software to increase the number of new needs adjustment. The same software in different applications of the shipyard is not the same; the same tonnage, not the same point of understanding; although to achieve the same purpose, but the expressions are different, requiring the software is open to to meet individual requirements shipyard. Our software is open, fully meet the individual needs of Chinese shipyards.

Reporter: You just said, for China's shipyards to do a lot of things that you have to do specifically talk about what things?

Wang Huijie: First of all, the company will collect the special needs of Chinese customers will demand in China to find out the common, and the new version adding new features, adjusting the resolution of the original function, which is our company has been doing thing.

Second, the company will support the customer's custom development. We will, through open interfaces and use of training and consulting services, enabling users to have R & D capability. Our typical case is Wuchang Shipyard has developed a very complete system, after we recommended, many users have with their development efforts, to carry out the work of the local shipping information, the company has been promoting the localization of .

Finally, our company in the coming year to R & D center in Shanghai. PTC Corporation, China's shipbuilding industry very seriously. We can see that China's shipbuilding industry is the world's fastest growing, China's government also has a very clear position: from 2010 to 2020, China's shipbuilding shipbuilding power to a power shift from the ship. China's industrial structure from the whole, China's population structure, vigorously develop the shipbuilding industry is not wrong, it adapted to national conditions of China as a whole.鍥犳锛孭TC鍏徃浼氬湪涓婃捣寤虹珛鐮斿彂涓績锛屾潵鏇村ソ銆佹洿璐磋繎鐨勬敮鎸佷腑鍥界殑閫犺埞涓氱殑鍙戝睍銆?br />
銆??璁拌?锛氳鎮ㄨ皥璋圥TC鍏徃鍦ㄤ腑鍥界殑閫犺埞涓氭墍闈复鐨勫帇鍔涳紝鏈洪亣鍜屽洶澧?

銆??鐜嬫収鏉帮細瀵规垜浠琍TC鍏徃鏉ヨ锛屼腑鍥界殑鑸硅埗甯傚満澧為暱杩欎箞蹇紝杩欐槸涓?釜寰堝ソ鐨勬満閬囥?寰堝鑸瑰巶鐨勮鍗曢兘鎺ュ埌浜?012銆?013骞达紝浼佷笟鎬ヤ簬鎻愰珮鏁翠綋鐨勮璁¤兘鍔涖?鐢熼暱鑳藉姏锛岃繖鏍锋墠浼氭帴鍒版洿澶氱殑璁㈠崟銆傝繖鏍风粰浜嗘垜浠緢澶氱殑鏈轰細锛屼絾鍚屾椂涔熼?鎴愬緢澶氭柊鐨勯棶棰樸?

銆??涓浗鑸瑰巶鐨勮繀閫熻啫鑳?紝鍥犱负澧為暱寰堝揩锛屽鑷磋埞鍘傝嚜韬病鏈夋椂闂村悜鍥介檯浼樼鐨勮埞鍘傚涔狅紝杩欏鎴戜滑鏉ヨ鏄釜鎸戞垬銆傛垜浠蛋璁胯繃寰堝鑸瑰巶锛屼粬浠嚜宸遍兘璇翠笉娓呰嚜宸辩殑闇?眰锛岃?鍙嶈繃鏉ラ棶鎴戜滑鑳戒笉鑳藉憡璇変粬浠竴涓湁鏁堢殑鏂规硶銆傝繖涓嶆槸鎴戜滑淇℃伅鍖栫殑杞欢鍏徃鐨勪簨鎯咃紝杩欏簲褰撴槸鍜ㄨ鍋氱殑浜嬫儏銆備絾鏄紝涓浗鑸瑰巶瀵瑰挩璇㈠叕鍙哥殑鐞嗚В鏈変竴瀹氱殑闅滅閫氬父鏄挩璇㈠叕鍙告湁浜嗚В鍐虫柟妗堬紝鐒跺悗甯姪鑸瑰巶瀹炴柦鏂规鍚庯紝杩欐椂鑸瑰巶鎵嶄細鍑哄挩璇㈣垂銆?br />
銆??鎴戜滑鐜板湪涔熷湪鍋氳繖鏂归潰鐨勪竴浜涚爺绌讹紝鍖呮嫭鎴戜滑鐮旂┒涓皬浼佷笟鎬庝箞閫犺埞锛屾垜浠篃鎻愬嚭浜嗚嚜宸辩殑鐞嗚В銆傚鏋滃鎴锋帴鍙椾簡鎴戜滑鐨勭湅娉曪紝閭d箞锛屾垜浠彲鑳芥棭涓?偣鍗犳嵁鑷繁鐨勫競鍦恒?杩欐槸鎴戜滑闈复鐨勯棶棰橈紝鍚屾椂涔熸槸鏈洪亣銆傚鏋滄垜浠殑涓?簺瑙傜偣鐢ㄦ埛鎺ュ彈浜嗭紝瀵逛簬鎴戜滑鏉ヨ灏嗕細鏄竴涓緢濂界殑鏈轰細銆?br />






相关链接:



How To Change Swf Files To Matroska



MKV To Zune



Password Managers evaluation



Faster "Save All"



PS produced with small fine pixel button



My Favorite Games Kids



Production of football Photoshop 7.0



The fate of Sina and Sohu, Sina too poor to only ads



Overall Bandwidth Of Thunder Edge Broadcasting Below To See New Resolution



Raffles shipyard with Dassault Systemes PLM Goes Digital



Report DEVELOPMENT



Why Not Read The Disk Drive?



VOB To WMV



brief BROWSERS



MPEG To MOV



Tuesday, October 5, 2010

Pipeline


This talk will explore the channels and see what it is, to what purpose. To make it more lively and interesting, I will use the Edit control, how to change the background color and text color to illustrate this technique.

Theory:

Channel itself is the two side channels. You can use pipes between processes, data exchange within the same process, just as portable wireless telephones. One end of the pipe to the other, he can make use of communication channels and you had.

There are two channels, namely, the famous pipe and anonymous pipes. Anonymous pipe is a pipe has no name, that does not need to know when to use them in their names. The famous pipe on the contrary, before use must know its name.

Features can also be classified according to the pipeline, that is one-way or two-way. One-way pipeline, the data could only move along one direction, from one end of the flow of the other side, while two-way channels of data can be exchanged freely between both ends. Anonymous pipes are often famous for one-way pipe is usually a two-way. Famous pipe commonly used for multiple clients contact a server network environment.

This talk will discuss it in detail anonymous pipe. Anonymous pipe main purpose is as a parent and child process, child process, the link between the communication channel. Problems in dealing with the console, anonymous pipe is quite useful. Console application that is input and output using the console as a Win32 application. A console like a DOS window. But the console application is really, truly 32-bit application, it can use other graphics programs, like GUI function, but it happens to use the console Bale.

Console application there are three criteria used to handle input and output, which is the standard input, standard output and standard error handles. Standard input for reading from console, or access information to the console standard output is used to write or print information. Standard error could not redirect the output for reporting errors.

Console application can be obtained by calling the function GetStdHandle to handle these three. A graphical application without the console, if one calls GetStdHandle will return error; If you really want to use the console, you can call AllocConsole to allocate a new console to use, but when processing is complete, do not forget to call FreeConsole the release of the console.

Anonymous pipes used most of its function is redirect the child process standard input and standard output. Parent process can be a console or a graphics program, and the child process must be a console application. As we all know, the console application using the standard input and output handles. To redirect input and output, you have to point to pipe with one end of the handle to replace the standard handle. Console application does not know what we used to point at one end of the handle of any pipeline, which will handle the handle as a standard look. To use object-oriented terminology, this is a polymorphism. Because the child process without any change, so this method is very useful.

Console Application on another point to be grasped is that it was standard from which the handle. When a console application is created, the parent has two options: for the child process to create a new console or to the child process inherits its own console. If you use the latter, then the parent process itself must be a console application, or if a GUI application, it must first call AllocConsole assigned a console.

By calling CreatePipe to create an anonymous pipe, and its prototype is:

CreatePipe proto pReadHandle: DWORD, pWriteHandle: DWORD, pPipeAttributes: DWORD, nBufferSize: DWORD

pReadHandle double word pointer variable point to read end of pipe handle.
pWriteHandle double word pointer variable point to pipe write end of the handle
pPipeAttributes double word pointer variable, point SECUR99vY_ATTRIBUTES structure, can be used to decide whether to read and write handles inherited by child processes
nBufferSize proposed pipeline to leave the buffer size of the user, it is only suggested values can be NULL to use default values
If the function succeeds the return value is nonzero, and zero otherwise. After a successful call, you get two handles, a point to read the pipe end and the other pointing to the write end of pipe. Now I will take focus to redirect the output of sub-standard console application to your process steps required. Note that this method is different from my Borland's API reference on the case. Win32 API Reference on the assumption that the parent process is a console application, so the child process to inherit the standard handles it. In most cases, however, we need to redirect the output to the console application GUI application.

Create anonymous pipe to use CreatePipe, also do not forget to SECUR99vY_ATTRIBUTES structural members bInheritable set to TRUE, it can inherit the handle.

Now ready to create the process CreateProcess function of the parameters, it can only load the child console application. STARTUPINFO is an important structure, which determines the child process the appearance of the main window appears, it is our essential goal. Through this structure can hide the main window and the pipe handle is passed to the child process.

The following are the members must be filled:

cb STARTUPINFO the size of the structure
dwFlags binary flag, which determines the structure of which members of the force also determines the main window is displayed or hidden state. In our program, a combination of the use STARTF_USESHOWWINDOW and STARTF_USESTDHANDLES
hStdOutput and hStdError you want to use the child process standard output and standard error handles, for us, we will write end of pipe as a child process standard output and error. So when the child process standard output or standard error to send a message, it actually put the information passed to the parent process through a pipe
wShowWindow decision to show or hide the main window is. We do not want to show the child process's main window, so to the members buy into SW_HIDE
Call CreateProcess to create a child process, but after the success of the child process calls still is active. It was put into the memory but did not immediately run.

In the process of closing the parent write end of pipe is necessary. This is because the parent process does not use the pipeline to write the handle, and if there are two write a pipeline terminal, will not work, so we read out the data from the pipeline must be closed before the end of the pipeline to write. But not closed before calling CreateProcess, or pipe it broke. You should just return CreateProcess and reading the data written before the closure of the pipeline end.

Function ReadFile can now read side Reading in the pipeline data. By using ReadFile, can make the child process is running. It will begin and when it to standard output (actually the writing end of pipe) to write data, the data will be sent to the read end of pipe. It should be kept calling ReadFile until it returns 0, that is no longer read the data. Reading from the data channel you can make any deal, in our case it is displayed in the Edit control.

I remember reading after use closed pipe handle.

Code example:


.386
. Model flat, stdcall
option casemap: none
include masm32includewindows.inc
include masm32includeuser32.inc
include masm32includekernel32.inc
include masm32includegdi32.inc
includelib masm32libgdi32.lib
includelib masm32libuser32.lib
includelib masm32libkernel32.lib
WinMain PROTO: DWORD,: DWORD,: DWORD,: DWORD

. Const
IDR_MAINMENU equ 101; the ID of the main menu
IDM_ASSEMBLE equ 40001

. Data
ClassName db "PipeWinClass", 0
AppName db "One-way Pipe Example", 0 EditClass db "ED99v", 0
CreatePipeError db "Error during pipe creation", 0
CreateProcessError db "Error during process creation", 0
CommandLine db "ml / c / coff / Cp test.asm", 0

. Data?
hInstance HINSTANCE?
hwndEdit dd?

. Code
start:
invoke GetModuleHandle, NULL
mov hInstance, eax
invoke WinMain, hInstance, NULL, NULL, SW_SHOWDEFAULT
invoke ExitProcess, eax

WinMain proc hInst: DWORD, hPrevInst: DWORD, CmdLine: DWORD, CmdShow: DWORD
LOCAL wc: WNDCLASSEX
LOCAL msg: MSG
LOCAL hwnd: HWND
mov wc.cbSize, SIZEOF WNDCLASSEX
mov wc.style, CS_HREDRAW or CS_VREDRAW mov wc.lpfnWndProc, OFFSET WndProc
mov wc.cbClsExtra, NULL
mov wc.cbWndExtra, NULL
push hInst
pop wc.hInstance
mov wc.hbrBackground, COLOR_APPWORKSPACE
mov wc.lpszMenuName, IDR_MAINMENU
mov wc.lpszClassName, OFFSET ClassName
invoke LoadIcon, NULL, IDI_APPLICATION
mov wc.hIcon, eax
mov wc.hIconSm, eax
invoke LoadCursor, NULL, IDC_ARROW
mov wc.hCursor, eax
invoke RegisterClassEx, addr wc
invoke CreateWindowEx, WS_EX_CLIENTEDGE, ADDR ClassName, ADDR AppName, WS_OVERLAPPEDWINDOW + WS_VISIBLE, CW_USEDEFAULT, CW_USEDEFAULT, 400,200, NULL, NULL, hInst, NULL
mov hwnd, eax
. While TRUE
invoke GetMessage, ADDR msg, NULL, 0,0
. BREAK. IF (! Eax)
invoke TranslateMessage, ADDR msg
invoke DispatchMessage, ADDR msg
. Endw
mov eax, msg.wParam
ret
WinMain endp

WndProc proc hWnd: HWND, uMsg: UINT, wParam: WPARAM, lParam: LPARAM
LOCAL rect: RECT
LOCAL hRead: DWORD
LOCAL hWrite: DWORD
LOCAL startupinfo: STARTUPINFO
LOCAL pinfo: PROCESS_INFORMATION
LOCAL buffer [1024]: byte
LOCAL bytesRead: DWORD
LOCAL hdc: DWORD
LOCAL sat: SECUR99vY_ATTRIBUTES
. If uMsg == WM_CREATE
invoke CreateWindowEx, NULL, addr EditClass, NULL, WS_CHILD + WS_VISIBLE + ES_MULTILINE + ES_AUTOHSCROLL + ES_AUTOVSCROLL, 0, 0, 0, 0, hWnd, NULL, hInstance, NULL
mov hwndEdit, eax
. Elseif uMsg == WM_CTLCOLORED99v
invoke SetTextColor, wParam, Yellow
invoke SetBkColor, wParam, Black
invoke GetStockObject, BLACK_BRUSH
ret
. Elseif uMsg == WM_SIZE
mov edx, lParam
mov ecx, edx
shr ecx, 16
and edx, 0ffffh
invoke MoveWindow, hwndEdit, 0,0, edx, ecx, TRUE
. Elseif uMsg == WM_COMMAND
. If lParam == 0
mov eax, wParam
. If ax == IDM_ASSEMBLE
mov sat.niLength, sizeof SECUR99vY_ATTRIBUTES
mov sat.lpSecurityDescriptor, NULL
mov sat.bInheritHandle, TRUE
invoke CreatePipe, addr hRead, addr hWrite, addr sat, NULL
. If eax == NULL
invoke MessageBox, hWnd, addr CreatePipeError, addr AppName, MB_ICnERROR + MB_OK
. Else
mov startupinfo.cb, sizeof STARTUPINFO
invoke GetStartupInfo, addr startupinfo
mov eax, hWrite
mov startupinfo.hStdOutput, eax
mov startupinfo.hStdError, eax
mov startupinfo.dwFlags, STARTF_USESHOWWINDOW + STARTF_USESTDHANDLES
mov startupinfo.wShowWindow, SW_HIDE
invoke CreateProcess, NULL, addr CommandLine, NULL, NULL, TRUE, NULL, NULL, NULL, addr startupinfo, addr pinfo
. If eax == NULL
invoke MessageBox, hWnd, addr CreateProcessError, addr AppName, MB_ICnERROR + MB_OK
. Else
invoke CloseHandle, hWrite
. While TRUE
invoke RtlZeroMemory, addr buffer, 1024
invoke ReadFile, hRead, addr buffer, 1023, addr bytesRead, NULL
. If eax == NULL
. Break
. Endif
invoke SendMessage, hwndEdit, EM_SETSEL, -1,0
invoke SendMessage, hwndEdit, EM_REPLACESEL, FALSE, addr buffer
. Endw
. Endif
invoke CloseHandle, hRead
. Endif
. Endif
. Endif
. Elseif uMsg == WM_DESTROY
invoke PostQuitMessage, NULL
. Else
invoke DefWindowProc, hWnd, uMsg, wParam, lParam ret
. Endif
xor eax, eax
ret
WndProc endp
end start
Analysis:

This example calls ml.exe to compile a program called test.asm, and redirect the output to the client area ml.exe the Edit control. When the program is loaded, as usual to register the window class and create the main window. In the main window is created in the process of the first thing to do is to create the output for the display program ml.exe Edit control.

Now interesting things come, we will change this Edit control text color and background color. When the Edit control will repaint the client area, it will send WM_CTLCOLORED99v message parent window. Parameters wParam contains the controls for painting the client area of their device descriptor handle (HDC). We can use this mechanism to modify the characteristics of HDC.

. Elseif uMsg == WM_CTLCOLORED99v
invoke SetTextColor, wParam, Yellow
invoke SetTextColor, wParam, Black
invoke GetStockObject, BLACK_BRUSH
ret
SetTextColor the text color to yellow, the background color to black. Finally, we return to a black by calling GetStockObject and get a handle brush. Processing WM_CTLCOLORED99v must return a brush handle, because Windows will use the brush to repaint the background of Edit control. In this case, I hope the background is black, it returns the handle of a black brush.

Now when the user selects Assemble sub-menu, it will create an anonymous pipe.

. If ax == IDM_ASSEMBLE
mov sat.niLength, sizeof SECUR99vY_ATTRIBUTES
mov sat.lpSecurityDescriptor, NULL
mov sat.bInheritHandle, TRUE

Before calling CreatePipe must be filled SECUR99vY_ATTRIBUTES structure. If we do not care about security, you can fill in the lpSecurityDescriptor members of NULL. bInheritHandle you must be TRUE, so the pipeline can only be inherited by child processes handle.

invoke CreatePipe, addr hRead, addr hWrite, addr sat, NULL

After that, we call CreatePipe to create a pipeline, if successful, then the variable hRead and hWrite will be filled pipe corresponding read and write end of the handle end.

mov startupinfo.cb, sizeof STARTUPINFO
invoke GetStartupInfo, addr startupinfo
mov eax, hWrite
mov startupinfo.hStdOutput, eax
mov startupinfo.hStdError, eax
mov startupinfo.dwFlags, STARTF_USESHOWWINDOW + STARTF_USESTDHANDLES
mov startupinfo.wShowWindow, SW_HIDE

The next step is to complete the structure of the STARTUPINFO. Call GetStartupinfo parent process with the default values to fill STARTUPINFO structure. If you want to both work in Windows9x and Windows NT, we need to call GetStartupInfo to fill STARTUPINFO structure. Call returns, you can modify the important members of the. Because we want the child process output to the parent process rather than the default standard output and standard error, so we hStdOutput and hStdError Ode to write into the pipe end of the handle. To hide the main window of the child process, must be assigned to member variables wShowWidow SW_HIDE. Finally, the members assigned to STARTF_USESHOWWINDOW and STARTF_USESTDHANDLES dwFlags to specify the members of the hStdOutput, hStdError and wShowWindow is effective.

invoke CreateProcess, NULL, addr CommandLine, NULL, NULL, TRUE, NULL, NULL, NULL, addr startupinfo, addr pinfo

Now call CreateProcess to create a child process. Note To make the pipe work, the parameter bInheritHandles must be set to TRUE. invoke CloseHandle, hWrite successfully created after the child process, the parent process must close the write end of pipe. We have to write end of the handle to pass through the structure STARTUPINFO a child process. If you do not shut down, then there are two write-side pipe, but this channel will not work. Therefore, it must create a child process, but after reading the data to close the handle.

. While TRUE
invoke RtlZeroMemory, addr buffer, 1024
invoke ReadFile, hRead, addr buffer, 1023, addr bytesRead, NULL
. If eax == NULL
. Break
. Endif
invoke SendMessage, hwndEdit, EM_SETSEL, -1,0
invoke SendMessage, hwndEdit, EM_REPLACESEL, FALSE, addr buffer
. Endw

Are now ready to process standard output from the child read the data. Until no more data, and that only when the ReadFile returns NULL out of circulation, or that it will be waiting for data. Before we call the ReadFile call RtlZeroMemory to clear the memory, and replaced with a pipe read handle file handles. Note that the maximum length of read data 1023 (sizeof (buffer) -1), because we need to accept the character into an Edit control that can handle ASCII string. When ReadFile returns, put the data passed to Edit control. However, this has a small problem, if you use SetWindowText API to write data to the Edit control, the new data will overwrite the old data already exists, and we want to add new data behind the existing data. To achieve this goal, first by sending a message wParam is -1 the EM_SETSEL, the Edit control the input focus moves to the end of the text; and then send a message to add data back EM_REPLACESEL.

invoke CloseHandle, hRead

When ReadFile returns NULL when out of loop on the read handle and close the pipeline.






Recommended links:



3G2 To MOV



RMVB To MP4



windows ie repair tool repair these pc errors



MKV to MP4