Wednesday, October 20, 2010

Vsftpd + tcp_wrappers host and user access control



RHEL4 in vsftpd support at compile time has tcp_wrappers, so you can use tcp_wrappers to achieve the host access control.

Before the experiment, first said the implementation of the next order of tcp-wrappers:

First implementation of the hosts.allow, if hosts.allow inside the list, the list of the machine is allowed access; otherwise, then scroll down to hosts.deny, if the hosts.deny list inside, then refused to list the machine access, if also not (that is, which do not allow and deny list) is allowed access to the host.

Real life, host.allow can also set "Reject" feature, so generally only use / etc / hosts.allow for access control can host.

(A) of the host access control

The host (192.168.1.102) to configure vsftpd service, so in addition to 192.168.1.100 192.168.1.0/24 network segment other than to allow other hosts to access the FTP service.

Program very simple, edit / etc / hosts.allow

vsftpd: 192.168.1.100: DENY

vsftpd: 192.168.1.

Restart vsftpd, experimental purposes can be achieved, we can tcp_wrappers in the experiment will do more complex experiments.

(B) User Access Control

vsftpd flexible user access control. In the specific implementation, vsftpd user access control is divided into two categories: the first is the traditional list of users / etc / vsftpd / ftpusers, I understand it as the system list (that is, the system prohibited); second is to improve the user list file / etc / vsftpd / user_list, I understand it as they want to ban list

To realize the second list control must be inside vsftpd.conf

userlist_enable = YES

userlist_deny = YES / / This article is the system default exists, that is also unnecessary to add the system defaults to YES

userlist_file = / etc / vsftpd / usrer_list

The above simple experiment can be achieved vsftpd powerful control.







Recommended links:



wholesale kingsun V602A wifi phone java bluetooth



The Fate of Sina and Sohu, Sina too poor to only ads



Barbed Words! Photoshop Special Effects Make The Word Cactus



OPTIMISTIC about the four reasons OPhone



Mito Xiu 1 minute to create non-mainstream days



Compilers And Interpreters Report



The Complete Production Process Of A CG - 2 Color (background Color)



FLV To PSP



Premier Web Servers



Charles Zhang Said Sohu Sogou Do Not Intend To Use The Input Method Earnings



OGM to MP4



e-cology in the Pan Micro Series 42



Shi Jian: create their own aviation nerve



OGM to MKV



REVIEW Animation Tools



Wednesday, October 6, 2010

DreamweaverMX build Guestbook (4)


Dreamweaver MX Ultradev exploration (7) to create our guest book (4)

What to do now is to increase the message of the page, new.asp. Our principle is to design a good database in the previous increase in data, here we do not go through, in Figure (7-36) below.



7-36

Remember to submit data that defines the index.asp page to Oh. In order to prevent it wrong, do we want to use a behavior, but this time do not use the server behaviors, and to use DW MX own behavior on the line. Select a form after form Design -> Behaviors -> Validate Form (Design -> Behavior -> validation form), Figure (7-37) below.



7-37

Remember to plan for the f_name and f_content that the required fields on the hook, f_oicq acceptable type to Number, f_email acceptable type to Email Address.

As edit.asp (edit page), rep.asp (back page) and del.asp (delete page) is simply to accept the values passed to it in front of our display the corresponding data, and then use Updata Recordt and Delete Record server behavior Here we do not go through, and results shown in Figure (7-38,7-39,7-40) below.



7-38

Here is edit.asp page, establishing the time and the previous record set the same, but remember to apply Move To Specific Record server behavior in order to find the corresponding set of records. The above table also produced the same problems and index.asp, but should show the user name, user messages and owners back into the text box and drag the text to the corresponding database field box, the last application Updata Recordt server behavior, and then update the data back to the definition index.asp page on the line. Another point to note here, we should put the form in the large form to be effective.



7-39

This is del.asp page, the same form to build Oh, but do not put names into a text box, because only delete data, it is important also Move To Specific Record server line, and Delete Record server behavior, and finally removed the definition of Go to index.asp page.



7-40

This is rep.asp page, the page and above edit.asp page or less the same behavior using the Updata Recordt server, but the difference is that it only updated the contents of a field, ibid want to use Move To Specific Record server behavior, the Head back into the text box, so that super users can input.

OK, just lack a little bit, and to try and try again ah! ! !

We are here to consider the question, how to have administrative rights on the super-user management message then? Which can edit, delete, reply, etc.. Here we should use landing, this is a no contact with our previous server acts Log In User server behavior. Similarly, it is very easy to learn. :)

Open the login.asp page, to create a form, forms, text boxes and text boxes that the above named f_name, that the following named f_password, and to its type (type) to password, Figure (7 - 41) below.



7-41

After doing all this use of Application -> User Authentication -> Log In User (Applications -> user authentication -> user login), Figure (7-42) below.



7-42




[Next]



After clicking on the Figure (7-43) as shown in the dialog box.



7-43

Get Input Form Form: In this drop-down list, select which to accept the submission form, we have only one form here, so we do not choose.
Username Field: Select the user name here, the corresponding text box. We have defined the user name text box named f_name, so here are options f_name.
Password Field: Select the user password here, the corresponding text box, ibid.
Validate Using Connection: here choose what you want to use a database connection.
Table: To use the database to which table. Here we take note of where we want to use the admin table, though in the past we have been using f_bbs table.
Username Column: select the user name field mapping, select the database where the f_name field.
Password Column: Select the user password on the mapping of the field, ibid.
If Login Succeeds, Go To: to which, if authenticated page, where we define Home index.asp.
If Login Fails, Go To: If there is no validation to which pages, where we define the return to the sorry.asp.
Restrict Access Based On: because we want to restrict access to some pages, such as edit and delete and so on, so use to this. In the following types of choices Username and Password, the user name and password.

Click OK to complete the settings on this page.

Now we head back to look at, and we edit, asp, del.asp, rep.asp are not allowed to share casual visit, where the page should be used to protect the server behavior. Application -> Server Behaviors -> User Authentication -> Restrict Access To Pags (Applications -> server behavior -> user authentication -> pages of data protection), Figure (7 - 45) below.



7-45

Click the Figure after (7-46) as shown in the dialog box.



7-46

Restrict Ased On: page protection type, here we have chosen username and password (user name and password).
If Access Denied, Go To: If the illegal access, go to which pages, where we choose to have illegal access to login.asp (landing page).

The need to protect the page has edit.asp, del.asp, rep, asp, each page of the settings are the same, remember to set the oh.

The final sorry.asp page is a simple page, shown in Figure (7-47) below. In this "here" with a connection to the login.asp page.



7-47

Finished! Oh, I said finally done. :)






Recommended links:



XviD To WMV



3G2 to MPEG



Acrord32.exe Error Quick Repair



DVR-MS To MP4



Thursday, September 16, 2010

Exception Handling in C # (1)


Introduction: Jon Jagger President is a person through a rich, simple and thought-provoking articles written. We can visit his Web site to some, certainly benefited. This article is a relatively simple translation error which is inevitable, I hope we exhibitions.
PS: This article is very simple, if you feel you have reached a certain level, then, do not waste time ^ _ ^

1, programmable error handling painful

Exception not appear before the most classic way to handle errors is to use the error code checks the statement. Such as
public sealed class Painful
(
...
private static char [] ReadSource (string filename)
(
FileInfo file = new FileInfo (filename);
if (errorCode == 2342) goto handler;
int length = (int) file.Length;
char [] source = new char [length];
if (errorCode == -734) goto handler;
TextReader reader = file.OpenText ();
if (errorCode == 2664) goto handler;
reader.Read (source, 0, length);
if (errorCode == -5227) goto handler;
reader.Close ();
Process (filename, source);
return source;
handler:
...
)
)
This encoding tedious Fanlaifuqu, difficult to use, looks very complex, but also makes very clear the basic functions. And very easy to ignore the error (intentional or the occasional forgotten). Well now, there are many to deal with this situation, but there must be a number of approaches which are better than others.

Second, relationship separation

Exception can do the most basic thing is to allow you the basic functions of the error and to separate. In other words, we can rewrite the above as follows:
...
public sealed class PainLess
(
public static int Main (string [] args)
(
try
(
string filename = args [0];
char [] source = ReadSource (filename);
Process (filename, source);
return 0;
)
catch (SecurityException caught) (...)
catch (IOException caught) (...)
catch (OutOfMemoryException caught) (...)
...
)

private static char [] ReadSource (string filename)
(
FileInfo file = new FileInfo (filename);
int length = (int) file.Length;
char [] source = new char [length];
TextReader reader = file.OpenText ();
reader.Read (source, 0, length);
reader.Close ();
return source;
)
)
In the conversion process, the need to note the following:

1.'ve Used numbers as error codes to describe the error (a doomed approach, who knows what 2342 mean?), Now used to describe the name of the exception classes (for example: SecurityException).

2. The relationship between exception class is not closely linked. On the contrary, used to describe a class of error of integer code describing the error code must be unique.

3. ReadSource method did not throw no details. Throw in the C # note is not required.

However, the most noteworthy are: To compare the two codes, ReadSource very clear, simple and clear. It now contains only the basic functions necessary to achieve its statement, did not show obvious error handling. This is because if the exception occurs, the call stack will be self-started. This version is we want to "ideal" version.

However, the exception allows us to close this ReadSource ideal version, the same time, we get it to stop. ReadSource is a code example, it requested resource (a TextReader), use of resources (Read), and the release of resources (Close).

The problem is if the requested resource exception occurred during, then resources will not be released. Solution of this problem is a part of this article. However, the "ideal" in the ReadSource version is still useful. We will use it as the following evaluation of several versions of ReadSource reference.






Recommended links:



Joan Chen: "Nuclear High-based" special to be drying faster



Jack Ma, Alibaba will open a Large envelope puzzle



Feature Library To Create Instance Of IDS Intrusion Analysis (2)



Wizard Icons



Modern Shipbuilding Process



Low back not just a Cheap PC



Infomation Gallery And Cataloging Tools



Convert m4a to mp3 online



how to convert avi to mpg



Fireworks produced blue and white porcelain button



Easy to use Terminal AND Telnet Clients



H264 format



10 tips to help you PASS the interview off



flv to mp3 converter free



Compare Games Sports



FMC from Theory to practice



Monday, August 2, 2010

flash hand-painted butterflies (only six steps to complete)



Hello everybody, I'm Argus. No long hair thing, and today made a small tutorial flash painted butterfly, very simple, can be practicing the same hand. I was divided into six steps (do not know why always love in six steps, before the blink of the tutorial is six steps). Follow suit it, very simple.

1: First draw wings, you can use the pen. Adjusted gradually to about it ...






Figure 1

2: copy, flip. Adjust position.






Figure 2

3: art, body parts, as is the simple lines (the best time of the new layer of paint, because after do the animation)






Figure 3






Figure 4

4: Fill color. Irregular or simple graphics, border color is black, 2 pixels. Fill three or four color, orange color on it. Border thickness and color according to their size of the graph control.






Figure 5

5: The following wings, roughly the same way, only to be more careful.






Figure 6

6: basically completed, I felt a little something, observed that too few elements, modification of look, Figure:






Figure 7

Copy the same image look around and completed. I am here only to initiate a good future, how to do animation art, to apply where to go, you can play for free Oh!






Figure 8







Recommended links:



Town and only "LIMITED earnings"



Mp3 To Aac



youtube video Formats



Reviews Audio Recorders



CCTV denied billion purchase broadcast rights for English Premier League: or 25 million U.S. dollars



Best Install And Setup



E-Commerce Comparison



China will in the end of this year or early next year 3G license issuance



Fans Paradise - Watch The Game With Three Arms PPMate



New Timers And Time Synch



The PROCESS of selling a few tricks to meet with CEOs



251 hospitals and Receive paperless



Photoshop retouching images (9) to remove the object



Workflow REFLECT one of the series - why not use them?



CONVERTING mov to wmv



avi to mp4 converter



Can all four Fanggao Peng effectiveness of the upper floor by Show



Wednesday, July 21, 2010

Do not let the knowledge base has become garbage



Souls of knowledge management is not a panacea, KM business without the right strategic objectives, if not properly resolve the human side face the dilemma of combining technology, KM may be thrown into the trash - this paper five cases are noteworthy.

Knowledge management for large enterprises now have the basic concepts are also able to realize that knowledge management is indeed a powerful tool to enhance the competitiveness of enterprises. Although many people have explicit knowledge, tacit knowledge, learning organizations, the letter catchy term, but fear the boss of the moment, or little knowledge of the promotion of KM; or not enter, or kept off their feet, to reduce the knowledge Management should value.
Some enterprises will want to be too simple knowledge management that build the Notes or the Exchange platform for employees to share Office document files, and then designate a Chief Knowledge Officer (CKO, Chief Knowledge Officer), and then run several knowledge management the book club, that is knowledge management.

Things, of course not so simple.

KM should not be taken lightly push

Many of the staff responsible for promoting the KM first encountered practical difficulties is that in the end only benefit any information into the Knowledge Base? Information filtering, sorting, classification, there is no principle can refer to? The second common problem is how to encourage employees to share and willing to contribute? What incentives can refer to? How the system integration and performance? In addition, when the company has been a part of e-knowledge is complete, access control should be how to prevent the outflow of the employees, to file the hands of competitors?

Knowledge-sharing or protection, has practice management needs and concerns. But most importantly, if there is no reason why the first companies to promote KM clearly defined strategic objectives, it is easy to mistake the next Fan "someone's pet" or "overkill" of problems, then we may all end up to the original Knowledge has become a pile of Garbage!

Someone's pet core competitiveness is not clear

"Someone's pet" of problems, mostly resulting from their core competencies (Core Competence) ill-defined, let us look at specific cases.

Case 1: Shanghai Yonghe King soymilk, has been successfully developed in China chain management system. Had to develop the chain system, the formula must be written into all kinds of flavors, "Standard Operating Manual", the owners are worried that once standardized, staff turnover will be taking its Know-how, and to train more potential competitors. Introducing the international financial resources in, a measure of its advantages and disadvantages, decided to take a more open strategy, entirely written Biaozhun Hua's operating procedures, complemented by intensive training programs for staff, Zhongyushiqi successful in quickly Fazhanchengwei covers Shanghai, Beijing's Daxing chain pathway.

Case 2: Taiwan's business network in a home shopping industry who have a variety of page specification, ordering process, feedback mechanisms such as the production of standard procedures into the web page, Bu Guoque Huaiyiziliao outflow to Jingzhengduishou may Yijing, Yin Wei seems Jing Zheng opponents to sneak into the company as employees recently, the standard procedure of its specification data acquisition upon completion of the separation, so that continued loss of competitiveness, operating performance deteriorating, so the industry plan to all of the standard operating procedures, adopt a strict reading them altogether restrictions and encryption measures to improve the competitiveness of the phenomenon of a gradual loss.

Many businesses have become accustomed to "hold back" approach to maintain a competitive advantage, but also to see things in the end retained on the right or wrong.

Shanghai Yonghe King milk taste is the core competitiveness? Internet companies a reason for poor performance, because the standard operating procedures and web design process due to the outflow of it?

By Tiffany King's case, the rapid development of chain systems and logistics systems, staff training mode, is the key to its success, taste loss formula, and the competitiveness of its core fundamentally no direct relationship, or McDonald's employees in the work-study students, not to have become a potential competitor of McDonald's?

Case of an Internet company, just let new employees to reach out to core competencies from that to information, is showing internal controls and contract law services staff side management measures, there is no comprehensive plan, sufficient seeds of future failure seed. And the Internet company's weak operating performance, I am afraid its business model and charging bias is the major reason for pride in the industry standard workflow procedures for loss of or not, in fact, sluggish business conditions and no direct relationship.

Overkill, do not understand human nature and technology area

"Overkill: it may be human nature, science and technology issues arising from surface and solving is not a correct understanding.

Case 3: a domestic electronics OEM manufacturers, to prevent the outflow of core R & D knowledge, build a complex information system, the various layers of encrypted files is not permitted without authorization store colleagues, modify, print, upload, download, The editing of any action, we need through the "File System Control Center" to sign the nuclear process "verified before publication, printed or circulated. But in a second Information Center Inventory were surprised to find that employees can file for E-mail folder files in the way, transmitted to servers outside the company, and a number of designs have been flight.

Although information technology can protect important files Buzhi Yu lost or copied, but still not 100% prevent theft and break caring people, spent a lot of money by the build layers of protection and centralized control of the inconvenience, but sometimes more caring people want to challenge and stimulate the ambition to break, only through the legal side of the norm, and for the conduct of the examination and long-term supplementary education in order to reduce the probability of outflow of the core knowledge content.

Between line to avoid diminishing marginal utility

The level of knowledge and information value, not in the rich or not, but that is timely, appropriate manner, too. Enterprises will build a rich knowledge base, to attract creative colleagues on the line or reading; or active form of electronic newspaper delivered to colleagues in the mailbox. Regardless of form, must be a clear understanding of the knowledge content of diminishing marginal utility, Knowledge and Garbage often the difference between a fine line between.

Case 4: A manufacturing industries across the Taiwan and mainland China have the Intranet system and build a complete Notes database, is the progressive implementation of KM plan database for KM colleagues, quite a lot of due diligence of the input database, but found in very low utilization rate of employees. The typhoon also makes the owner's good intentions to promote KM greatly reduced the staff there is no consensus on the KM, the work of colleagues enthusiasm gradually reduced, so that the hard build the KM system, the surface more and more like a formulaic effort.

Case 5: A business colleagues, knowledge management, there is a substantial interest in new knowledge, keen to play the role of communicators from time to time to the latest information, new knowledge industry, and personal experience feelings, to e-newspaper form sent to all company stationary colleagues, but they inadvertently discovered one day, its hard editor of the newsletter was identified as disturb the work of several colleagues spam (Junk Mail), readily Jiu threw "recycle bin" ; deleted, so that the peer disappointment.

A well-planned, KM rich knowledge base, but can not lead to colleagues interested in the use of information technology can no longer solve the problem. Only through community operation mechanism and performance appraisal system with the actual combination of enthusiastic participation is the key trigger colleagues. The enthusiastic colleagues to email colleagues in the various wealth of information, if not the correct form, not the right time, delivered to the hands do not need, it is likely to become another man's junk.

If the promotion of KM process, place the following types of signs, it can get special attention, because your Knowledge will most likely be in the near time Garbage.
Knowledge management become the seven signs of spam

First, knowledge of supply and demand imbalance, expectations vary.

Knowledge of the supply side and demand-side, have different perceptions of each other, excessive expectations, often disappointing start. For example, the source company just to continue to expand the knowledge base, I hope lots of learned new knowledge workers, do not ask why the demand for employees new knowledge; or lots of creative businesses want employees to share, but not allow employees to share knowledge, to lift the threat of flu, will make knowledge management encountered great obstacles to the promotion.

Second, the outdated and can not immediately convey knowledge.

Knowledge of the benefits are time-sensitive. But the "timeliness" in the definition, referring to the users need the time, rather than the time happened to the information, news and history Douyou its value, but users need to access the data under certain conditions Mouzhong, Que can not immediately respond to his complete information, knowledge transfer results will be significantly reduced.

Third, solve practical problems or effective.

Knowledge of the content on the workers in the work if you can not produce real help to solve a specific problem, or to assist decision-making support, even with more information, at most, only Bale played the role of the library.

Fourth, not the right situation, not the correct form.

R & D-based and marketing-oriented companies, need to collect information and knowledge development course to be different; the rapid development of the enterprise, and organized the burden of enterprises, the knowledge transfer methods should be used, is also different. Knowledge, newsletters, discussion boards, document libraries, e-Learning tools such as knowledge of different content are also different areas of application and application time.

Fifth, the transfer to the wrong person.

Production, marketing, human capital, R & D, financial and other business functional, or project members, the knowledge needs of different course, absolutely can not meet all the needs of specific knowledge should be limited scope, limited functionality, the provision of the most complete content. This is precisely why the recent enterprise portal (EIP, Enterprise Information Portal) and knowledge management system so closely related reasons.

Sixth, the use of low knowledge base.

No matter how you consider the fine, how deployment of the full, a bar to drink without user knowledge base, there is no value at all.

Seventh, no effective diffusion, dissemination and sharing.

E-business knowledge to the ultimate goal is to quickly spread, disseminate, share and enjoy their cost. Therefore, access control within a specific staff for specific knowledge sharing and distribution, should have full freedom, to protect the data encryption and related technologies, is another issue. If you just want to record and store documents and files in the past, then you really need document management functionality should only be just.

KM to create a knowledge-based enterprises

Knowledge-sharing or protection, representing the two extreme measures, to be in different situations, to play a different role. To share strategies, should the community (Community) started the business, whether actual or virtual community, need to create a well-coordinated groups (Collaboration) environment, to take protective strategies, information security technology should surface, then the legal contract with employees face in order to achieve concrete results.

In between sharing and protection, Knowledge, or the value of Garbage is often very subjective and different time, different objects may have different interpretations. In the process of e-business, first learn how to locate a good sense of proportion above, avoid Knowledge into Garbage; further, the eyes of others Garbage converted into their Knowledge, may qualify as a true "knowledge enterprise" ; right?







Recommended links:



3gpp converter



converting mp4 to mp3



VIDEO format



Shop Themes And Wallpaper



MPC To Zune Deluxe



How-to Pocket PC Converter



Fireworks produced with Logo



Debugging Expert



Unicom FRANKLY difficult to govern without legal constraint SP is critical violations



dvd ripper



Youtube Movie to MPG Home



Professional CDA RA MP3 to WMA Convert



Analysis of Concepts of J2ME



Thursday, July 8, 2010

Youtube Video to PSP Home

It's most popular and very easy to use YouTube tools. helps you Fast download, convert, play, manage your favorite YouTube videos. If you're a YouTube fan, you'll love YouTube tool! is the most powerful YouTube assistant on the planet. YouTube tool easily: 1. Fast downloads YouTube videos, 2. Supports unlimited simultaneous downloads (a real time saver!), 3. Automatically names the downloaded video the same as the YouTube title, 4. Converts YouTube videos to various video formats, including Video, DVD, VCD, AVI, MPG, MPEG, Divx, Xvid, WMV, RM, RMVB, MOV, MP4, 3GP, SWF, DAT, H264, VOB, Flash, PDA, M4V, 3G2, AMV, CDA, DV,QuickTime, ASX, TV, VHS, FLV, H264, BDMV, MAC, Apple TV, Zune, iPod, PDA, PSP, PS2, PS3, Xbox, Xbox 360, Mobile Phone, Cell Phone, Blackberry, Wii, Laptops, Printers, Palm OS, Pocket PC, PPC, Treo, Psion, EPOC, iphone.
Supports YouTube video or any .flv and .swf file as input file. Supports not only YouTube video, but also various video formats as input file, including avi, DivX, XviD, rm, rmvb, MOV, MPEG, WMV. Supports a wide variety of output file format., including avi, DivX, XviD, rm, rmvb, MOV, MPEG, WMV. Provides various profiles, these profiles can meet the needs of most people. - is the most powerful YouTube assistant on the planet.



Recommand Link:



Youtube to Treo Ultra



Youtube to PPC Today



Youtube Video to Flash Products



Lists Log Analysers



Youtube Video To Divx Top Rated



Youtube to wmv



LasVegas Flash Converter



Storage Terminal And Telnet Clients



free mp4 to mpeg CONVERTER



flv to 3gp converter free download



Good Cartoons - Screen Savers



Youtube Movie to iphone TODAY



BLISS M4P VQF to M3U Editing



Fast DVD to iPhone Converter



CONVERT aiff to mp3



Friday, July 2, 2010

Christmasgift DVD Manager

Christmasgift DVD Manager is a easy-to-use and high speed All-in-One AVI, MPG, MPEG 1/2/4, WMV, MOV, MP4, RM, RMVB, DivX, Xvid, ASF, 3GP, Youtube FLV to DVD VOB manager. This software can burn video to DVD and convert video to VOB and finish all your tasks with the fastest speed possible and the best quality available. No one will ask how to make a DVD video anymore once they try this great video to VOB manager. We highly recommend this program because we think it will make your multimedia life a lot easier and more enjoyable. It allows you to specify NTSC or PAL format, adjust 4:3 or 16:9 video aspect, and burn either DVD disc or ISO file. By setting bitrate and framerate, you can get excellent quality on TV screen. Just free download and enjoy it right now! DVD Manager helps you not only to slide show your favorite photos on TV but also watch video files on your computer or on your TV.



Recommand Link:



M3U ID3 to M3U



ColeSoft Video To Apple TV Converter



How-to MOV to DVD



Photo Screensaver Maker



Ever DVD-Audio AMR CD-R to ID3 Backup



Christmas-Idea SVCD VCD DVD to PS2



video to Sony NWZ-E436FPNK CONVERTER



Happiness SVCD To FLV



Ever MP3 Music M4P To DVD-Audio Recorder



Compare FTP Clients



Swift DVD To PS2 Flash Myspace Video



Swift PDA Google VIDEO Convert



Strategy And War Games Infomation



Archos



Mobile Phone M3U to M4P



Cartoons - Screen SAVERS Expert