Saturday, September 25, 2010

New Economy Weekly cover story: the role of Angel Zhou Hongyi and more


On many occasions, Zhou Hongyi promising not to cover up his three directions: community, search, and P2P. From his portfolio can be seen: Qihoo is a search engine, the Thunder is the P2P download software, Discuz the community and the personal space of the program provider. From 3721 to Yahoo, IDG and the odd tiger then, Zhou Hongyi t experienced entrepreneurs, venture capital, angel investment multiple roles. In his view, the domestic angel investment needs a mature game.

From the perspective of angel investors, Yahoo and Google's early investors, the returns are very impressive. So some spare cash, many Chinese people have wanted to come to play a role of an angel, but Zhou Hongyi, the domestic model of Silicon Valley has a great misunderstanding, we feel that the success of one of Silicon Valley because of the money, streets paved with gold; Second, there is no lack of innovative ideas , which are the are currently available in the country, it seems that we can copy the model of Silicon Valley, "the simple idea of money is very difficult to successfully added." Zhou said.

"Why the United States, many angel investors? Not to say that the United States, rich people, I do not think who called angel investors who have money, China is indeed more than the rich, but money does not mean that companies can do it." Zhou Hongyi, said, "angel investing at least meet the three conditions: first, the industry understand that they can plan for the direction; the second, at least done it business, knowing how business is going on, can give entrepreneurs some very specific pointers; Third, there must be good connections, give start-up financing to fund. "

Angel investment is certainly not cast money waiting to return, an angel venture capital investment is one of the largest areas of risk, so it is important to control risk. Of the angel, the certainty of the risk lies in the understanding of the industry, not only to see the present, but also be able to see the future, but also help enterprises develop strategies, planning mode. At the same time in this industry, which have the resources and can mobilize the resources to help companies find partners to help him grow.

However, domestic investors often used the money into the company, will feel that this company is their own, like the hand in management, and even venture out of the company team. Therefore, the angel investors is very important point is figure out their roles.

Early days in business, angel investors should be an auxiliary role, must be clearly aware of this enterprise is not their own. Once an angel investor in early possession of the special number of shares, such as business angels team to take 51% and 49%, the surface, this is control of the risk of angel funding, and some entrepreneurs may be willing to accept relatively large investment entrepreneurs will eventually find themselves no longer have this business, this time, the real worry for the company's highly likely to be angel investors, who are not willing to taken care of by their children at home?

In Silicon Valley, an important rule of the game is non-interference in business angel investors, the company's management team, not minding. Zhou Hongyi, said Silicon Valley in China to have a real need to empower entrepreneurs. Investment from angel to VC, is the money money, a strong contributor. Let entrepreneurs earn the most money, then is the angel and VC. Angel investment in risk control and business management between the two well coordinated.

Zhou Hongyi three companies from the investment point of view, is typical of web 2.0, and has a very strong correlation: Qihoo web 2.0 era is hoping to do something to Thunder by integrating server and P2P market space occupied by two download methods area, Discuz community solutions are to give "personal or media" web 2.0 provider basis.






Recommended links:



FTP CLIENTS Directory



M2TS to MOV



web Wizard button with automatic application no



Yum 2007 "Ten key words"



Baidu Stock Market "crazy" Hidden Undercurrent



New Audio RECORDERS



MKV to DivX



Hot Recreation



Dell CEO Or Forced To Replace Him Within A Six Potential Successors To The Election



Best Religion



How In The Short Term CMM2-goal?



Northern Rock's instant messaging



ASF TO MPEG



VBScript CStr function



Students face cold winter Employment



Monday, September 13, 2010

Feature library to create instance of IDS Intrusion Analysis (2)



Fourth, determine the characteristics of "candidate"
To better understand how to develop value based on the special header data, following an example by analyzing the whole process in detail.

Synscan is a popular system for scanning and detection tool, because its code is used to create the beginning of the Ramen worm fragments and steal the show in early 2001. Synscan with the implementation of behavior is typical, it sends packets with a variety of distinguished features, including:

IP address information from different sources
TCP source port 21, destination port 21
Service Type 0
IP identification number 39426 (IP identification number)
SYN and FIN flag set
Different set of serial numbers (sequence numbers set)
Confirmation number of different collections (acknowledgment numbers set)
TCP window size 1028

Here we screened the data above, to see which features more suitable to do data. We are looking for is illegal, unusual or suspicious data, the majority of cases, this all reflects the loopholes exploited by attackers or they use special technology. The following are characteristics of the data candidates:

Only with the SYN and FIN flag set of data packets, which is recognized as signs of malicious behavior.

ACK flag not set, but with different values of the data packet confirmation number, but normally should be 0.

Source port and destination port are set to 21 packets, often associated with the FTP server. Port the same situation that are generally known as "reflexive" (reflexive), in addition to some particular individual, such as NetBIOS when the newsletter, under normal circumstances should not have this phenomenon. "Reflexivity" TCP port itself does not violate the standard, but in most cases they are not expected values. For example, in a normal FTP dialogue, the destination port is usually 21, but the source port is usually higher than 1023.

TCP window size to 1028, IP identification numbers of all packets for 39,426. According to IP RFC's definition, two class rooms in the data value should be different, so, if sustained, would show that the suspicious.

5, announced the best features of "winner"

From these four candidates, we can select a single feature as the header-based data, a number of combinations can be selected as the feature data.

Select a data as the feature has great limitations. For example, a simple feature can only sign with the SYN and FIN packets, although this may well suggest that we might have a suspicious behavior, but why not give place for more information. SYN and FIN are usually combined with attacks on fences and other equipment, as long as they appear, they indicate the scan is taking place, information is being collected, the attacker will begin. But only those it, what we need is more detailed information.

Select more than four joint as the feature data is not realistic, because it looks a little too special. Although the act to provide accurate information, but as more than just use a data feature, the lack of efficiency would appear far. In fact, the feature definition always in efficiency and achieve a compromise between accuracy. In most cases, the simple features of complex features more likely than false positives (false positives), because the former is common; complex features more likely than a simple feature omission (false negatives), because the former is too full, a software attack a feature will change as time goes on.

More does not work, less is not entirely by the actual conditions. For example, we want to determine possible tool for attacking what is, then the SYN and FIN flags in addition to other, but also what other properties? "Reflexivity" port though suspicious, but many tools are used to it, and some of the normal communications have this phenomenon, it is not appropriate selected features. TCP window size of 1028 despite a bit suspicious, but it can also happen naturally. The same IP identification number 39426. ACK ACK flag value is not obviously illegal, so it is suitable for selected characteristics of the data. Of course, according to the different environment, timely adjustment or combination of features of the data, is the only way to achieve optimal results.

Next we create a real feature, used to find and identify synscan TCP packet sent in each of the following attributes:

Only the SYN and FIN flag set
IP identification number is 39426
TCP window size to 1028

The first project is too general, the second and third joint projects in the same situation in the packet are not so many, so these three items together can define a detailed features of the. Together with other synscan property does not significantly improve the accuracy of features, can only increase the cost of resources. This, the software features that distinguish synscan to create finished.







Recommended links:



Solaris Cryptographic Framework password system



ASP And PHP Storage



Ultimate registry operations - lock REGISTRY



Report Calculators And Converters



IDC how to charge only REASONABLE



Hewlett-Packard REPORTED fiscal second quarter 2006: revenue of 22.6 billion U.S. dollars



blackberry video format



Easy to use Games Simulation



C # drag and drop source Xiangjie 1



convert mp4 to AVI



SAN terminology Reference Table



dvd RIPPER



World-class - And Stronger - So Long - Bigger



Black July - Daohao Trojan collective "home for dinner"



3gpp converter