-
Notifications
You must be signed in to change notification settings - Fork 23
/
Copy pathIT.html
216 lines (203 loc) · 79.1 KB
/
IT.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="zh-CN">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="generator" content="Python script by program.think@gmail.com" />
<meta name="provider" content="program-think.blogspot.com" />
<link type="text/css" rel="stylesheet" href="../css/program-think.css" />
<title>分类标签:IT - 编程随想的博客</title>
</head>
<body>
<div id="outer-wrapper">
<div id="content-wrapper">
<div id="main" style="width:67%;">
<h1><a href="../index.html" title="回到首页">分类标签:IT</a></h1>
<hr>
<div class="post">
<h3><a href="../2018/04/gfw-tor-browser-7.5-meek.html">“如何翻墙”系列:扫盲 TOR Browser 7.5——关于 meek 插件的配置、优化、原理</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2018-04-12</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> </div><h3><a href="../2018/02/weekly-share-118.html">每周转载:EFF 创始人约翰·佩里·巴洛和他的《赛博空间独立宣言》</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2018-02-12</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/E694BFE6B2BB.html" class="tag">政治</a> <a href="../tags/E8BDACE8BDBD.html" class="tag">转载</a> </div><h3><a href="../2017/12/howto-cover-your-tracks-10.html">如何隐藏你的踪迹,避免跨省追捕[10]:从【身份隔离】谈谈社会工程学的防范</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2017-12-31</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2017/10/gfw-news.html">2017年10月翻墙快报(兼谈用 I2P 突破封锁)</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2017-10-12</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> </div><h3><a href="../2017/09/Introduction-DHT-Kademlia-Chord.html">聊聊分布式散列表(DHT)的原理——以 Kademlia(Kad) 和 Chord 为例</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2017-09-21</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/E7BC96E7A88B.html" class="tag">编程</a> <a href="../tags/E7BC96E7A88B.E69EB6E69E84.html" class="tag">编程.架构</a> <a href="../tags/E7BC96E7A88B.E7AE97E6B395.html" class="tag">编程.算法</a> </div><h3><a href="../2017/08/GFW-Resilio-Sync.html">聊聊 GFW 如何封杀 Resilio Sync(BTSync)?以及如何【免翻墙】继续使用?</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2017-08-30</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2017/08/share-books.html">分享各类电子书(IT 、军事、历史等,43本)</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2017-08-17</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/E4B9A6E8AF842FE5BDB1E8AF84.html" class="tag">书评/影评</a> <a href="../tags/E58E86E58FB2.html" class="tag">历史</a> </div><h3><a href="../2017/06/howto-cover-your-tracks-9.html">如何隐藏你的踪迹,避免跨省追捕[9]:从【时间角度】谈谈社会工程学的防范</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2017-06-29</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2017/05/my-blog-under-government-backed-attack.html">庆贺本博荣获【更高级别朝廷认证】——谈谈近期的“帐号入侵、刷屏、钓鱼”</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2017-05-29</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> <a href="../tags/E58D9AE5AEA2E9809AE5918A.html" class="tag">博客通告</a> </div><h3><a href="../2017/05/Ransomware-Cyber-Attack.html">勒索软件是骇客攻击的新趋势,兼谈防范措施及各种误解</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2017-05-15</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2017/05/share-books.html"> 分享各类电子书(政治、历史、IT 等,39本)</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2017-05-06</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/E4B9A6E8AF842FE5BDB1E8AF84.html" class="tag">书评/影评</a> <a href="../tags/E58E86E58FB2.html" class="tag">历史</a> <a href="../tags/E694BFE6B2BB.html" class="tag">政治</a> </div><h3><a href="../2017/04/Security-Vulnerabilities-in-Windows.html">吐槽一下 Windows 的安全漏洞——严重性超乎想象</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2017-04-10</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2017/03/Why-Linux-Is-More-Secure-Than-Windows-and-macOS.html">为什么桌面系统装 Linux 可以做到更好的安全性(相比 Windows & macOS 而言)</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2017-03-27</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.Linux.html" class="tag">IT.Linux</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2016/12/share-books.html">分享各类电子书(政治、IT、历史 等,63本)</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2016-12-24</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/E4B9A6E8AF842FE5BDB1E8AF84.html" class="tag">书评/影评</a> <a href="../tags/E694BFE6B2BB.html" class="tag">政治</a> </div><h3><a href="../2016/12/howto-prevent-hacker-attack-8.html">如何防止黑客入侵[8]:物理隔离的几种玩法</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2016-12-05</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2016/10/custom-firefox-theme-without-extension.html">无需任何插件或扩展,定制 Firefox 外观</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2016-10-27</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2016/09/https-ssl-tls-3.html">扫盲 HTTPS 和 SSL/TLS 协议[3]:密钥交换(密钥协商)算法及其原理</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2016-09-30</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2016/09/About-WoSign.html">老流氓 CNNIC 的接班人——聊聊“沃通/WoSign”的那些破事儿</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2016-09-08</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4B89AE7958CE8AF84E8AEBA.html" class="tag">IT.业界评论</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2016/08/Trojan-Horse-DCM.html">如何对付公安部门的“网络临侦”?——“黑暗幽灵(DCM)木马”之随想</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2016-08-09</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2016/03/AlphaGo.html">聊聊大伙儿(包括某些职业围棋手)对 AlphaGo 的误解</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2016-03-11</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BABAE5B7A5E699BAE883BD.html" class="tag">IT.人工智能</a> <a href="../tags/E7A791E699AE.html" class="tag">科普</a> </div><h3><a href="../2016/03/GitHub-Security-Tips.html">使用 GitHub 的几种方式——兼谈安全性和隐匿性的经验</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2016-03-08</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2016/02/opensource-review-graphviz.html">开源项目:【自动】绘图工具 Graphviz——《太子党关系网络》就是用它制作</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2016-02-23</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2015/12/system-vm-7.html">扫盲操作系统虚拟机[7]:如何用“快照”辅助安全加固、强化隐私保护?</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2015-12-27</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2015/12/share-books.html">分享各类电子书(“牛津通识读本”专场,56本)</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2015-12-15</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/E4B9A6E8AF842FE5BDB1E8AF84.html" class="tag">书评/影评</a> <a href="../tags/E58E86E58FB2.html" class="tag">历史</a> <a href="../tags/E694BFE6B2BB.html" class="tag">政治</a> </div><h3><a href="../2015/11/share-books.html">分享各类电子书(IT、哲学、政治、社会学等,44本)</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2015-11-10</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/E4B9A6E8AF842FE5BDB1E8AF84.html" class="tag">书评/影评</a> <a href="../tags/E694BFE6B2BB.html" class="tag">政治</a> </div><h3><a href="../2015/10/dm-crypt-cryptsetup.html">扫盲 dm-crypt——多功能 Linux 磁盘加密工具(兼容 TrueCrypt & VeraCrypt)</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2015-10-27</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.Linux.html" class="tag">IT.Linux</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2015/10/VeraCrypt.html">扫盲 VeraCrypt——跨平台的 TrueCrypt 替代品</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2015-10-10</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2015/08/Technology-and-Freedom.html">“对抗专制、捍卫自由”的 N 种技术力量</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2015-08-31</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> <a href="../tags/E694BFE6B2BB.html" class="tag">政治</a> </div><h3><a href="../2015/08/gfw-lantern.html">“如何翻墙”系列:Lantern(蓝灯)——开源且跨平台的翻墙代理</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2015-08-27</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2015/08/gfw-news.html">2015年8月翻墙快报</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2015-08-07</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> </div><h3><a href="../2015/07/share-books.html">分享各类电子书(政治、军事、IT、经济 等,52本)</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2015-07-22</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/E4B9A6E8AF842FE5BDB1E8AF84.html" class="tag">书评/影评</a> <a href="../tags/E694BFE6B2BB.html" class="tag">政治</a> </div><h3><a href="../2015/05/share-books.html">分享各类电子书(政治、IT、心理学 等,41本)</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2015-05-12</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/E4B9A6E8AF842FE5BDB1E8AF84.html" class="tag">书评/影评</a> <a href="../tags/E694BFE6B2BB.html" class="tag">政治</a> </div><h3><a href="../2015/04/howto-cover-your-tracks-8.html">如何隐藏你的踪迹,避免跨省追捕[8]:如何搭配“多重代理”和“多虚拟机”</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2015-04-23</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2015/04/custom-blogger-comment.html">博客评论功能升级(智能贴图、图片代理)——兼谈“Web 图片的隐私问题及防范”</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2015-04-13</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> <a href="../tags/E58D9AE5AEA2E9809AE5918A.html" class="tag">博客通告</a> </div><h3><a href="../2015/04/Single-Point-of-Failure.html">聊聊“单点故障”——关于“德国空难”和“李光耀”的随想</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2015-04-05</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> <a href="../tags/E5ADA6E4BC9AE6809DE88083.html" class="tag">学会思考</a> <a href="../tags/E694BFE6B2BB.html" class="tag">政治</a> <a href="../tags/E694BFE6B2BB.E5B8B8E8AF86.html" class="tag">政治.常识</a> <a href="../tags/E7AEA1E79086.html" class="tag">管理</a> </div><h3><a href="../2015/03/weekly-share-82.html">每周转载:关于 GitHub 和 GFW 的 PK(第2季)</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2015-03-31</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> <a href="../tags/E694BFE6B2BB.E79C9FE79086E983A8.html" class="tag">政治.真理部</a> <a href="../tags/E8BDACE8BDBD.html" class="tag">转载</a> </div><h3><a href="../2015/03/Translation-Mistakes.html">聊聊不同学科中的坑爹翻译</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2015-03-21</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/E58E86E58FB2.html" class="tag">历史</a> <a href="../tags/E694BFE6B2BB.html" class="tag">政治</a> <a href="../tags/E7A791E699AE.html" class="tag">科普</a> </div><h3><a href="../2015/03/Tor-Arm.html">扫盲 Arm——Tor 的界面前端(替代已死亡的 Vidalia)</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2015-03-10</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2015/02/gfw-news.html">2015年2月翻墙快报(VPN Gate 和 fqrouter 双双复活)</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2015-02-28</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> </div><h3><a href="../2015/02/Is-Blogging-Dead.html">“传统博客”过时了吗?——兼谈各种媒介形态的优缺点</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2015-02-23</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4B89AE7958CE8AF84E8AEBA.html" class="tag">IT.业界评论</a> <a href="../tags/E5BF83E79086E5ADA6.html" class="tag">心理学</a> </div><h3><a href="../2015/01/BitTorrent-Sync.html">扫盲 BTSync(Resilio Sync)——不仅是同步利器,而且是【分布式】网盘</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2015-01-18</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2015/01/privacy-protection-10.html">如何保护隐私[10]:移动设备的隐私问题</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2015-01-08</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2015/01/gfw-news.html">2015年1月翻墙快报</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2015-01-06</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> </div><h3><a href="../2014/12/gfw-privoxy.html">如何用 Privoxy 辅助翻墙?</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2014-12-14</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2014/12/custom-blogger-comment.html">博客评论功能升级(“未读”状态、按时间过滤)——兼谈“为啥俺不用其它博客平台”</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2014-12-01</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> <a href="../tags/E58D9AE5AEA2E9809AE5918A.html" class="tag">博客通告</a> </div><h3><a href="../2014/11/https-ssl-tls-2.html">扫盲 HTTPS 和 SSL/TLS 协议[2]:可靠密钥交换的难点,以及身份认证的必要性</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2014-11-15</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2014/11/https-ssl-tls-1.html">扫盲 HTTPS 和 SSL/TLS 协议[1]:背景知识、协议的需求、设计的难点</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2014-11-08</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2014/11/https-ssl-tls-0.html">扫盲 HTTPS 和 SSL/TLS 协议[0]:引子</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2014-11-08</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2014/10/gfw-tor-meek.html">“如何翻墙”系列:TOR 已复活——meek 流量混淆插件的安装、优化、原理</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2014-10-19</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> </div><h3><a href="../2014/09/system-vm-6.html">扫盲操作系统虚拟机[6]:如何优化运行速度?</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2014-09-10</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2014/08/privacy-protection-9.html">如何保护隐私[9]:如何限制桌面软件的流氓行为?</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2014-08-30</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2014/08/privacy-protection-8.html">如何保护隐私[8]:流氓的桌面软件有哪些替代品?</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2014-08-20</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2014/08/privacy-protection-7.html">如何保护隐私[7]:其它桌面软件的隐私问题</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2014-08-15</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2014/07/gfw-fqrouter.html">“如何翻墙”系列:fqrouter——安卓系统翻墙利器(免 ROOT)</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2014-07-31</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> </div><h3><a href="../2014/06/truecrypt-dead.html">分析一下 TrueCrypt 之死(自杀 or 他杀?),介绍一下应对措施</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2014-06-10</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2014/05/gfw-news.html">2014年5月翻墙快报(继续补充 VPN Gate 经验)</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2014-05-27</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> </div><h3><a href="../2014/04/openssl-heartbleed.html">对 OpenSSL 高危漏洞 Heartbleed 的感慨、分析和建议</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2014-04-11</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2014/03/windows-xp-dead.html">Windows XP 大限已至——要不要换系统?如何换?</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2014-03-18</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2014/02/hdd-install-windows.html">如何用【内置硬盘】全新安装 Windows 2000/XP/2003/Vista/2008/7/8(无需光驱和 USB)</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2014-02-10</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2014/01/dns.html">扫盲 DNS 原理,兼谈“域名劫持”和“域名欺骗/域名污染”</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2014-01-23</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> </div><h3><a href="../2014/01/privacy-protection-6.html">如何保护隐私[6]:如何防范“浏览器指纹”?</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2014-01-22</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2014/01/privacy-protection-5.html">如何保护隐私[5]:扫盲“浏览器指纹”</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2014-01-17</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2013/12/linux-tails-guide.html">扫盲 Tails——专门强化隐匿性的 Linux 发行版</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-12-23</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.Linux.html" class="tag">IT.Linux</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2013/12/create-bootable-usb-stick-from-iso.html">如何用 ISO 镜像制作 U 盘安装盘(通用方法、无需 WinPE)</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-12-21</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2013/11/share-books.html">分享政治类、IT类电子书(29本)</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-11-27</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/E4B9A6E8AF842FE5BDB1E8AF84.html" class="tag">书评/影评</a> <a href="../tags/E694BFE6B2BB.html" class="tag">政治</a> </div><h3><a href="../2013/11/tor-faq.html">“如何翻墙”系列:关于 TOR 的常见问题解答</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-11-11</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2013/10/linux-distributions-guide.html">扫盲 Linux:如何选择发行版</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-10-31</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.Linux.html" class="tag">IT.Linux</a> </div><h3><a href="../2013/10/linux-newbie-guide.html">扫盲 Linux:新手如何搞定 Linux 操作系统</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-10-28</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.Linux.html" class="tag">IT.Linux</a> </div><h3><a href="../2013/10/share-books.html">分享 IT 类电子书(37本)</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-10-22</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/E4B9A6E8AF842FE5BDB1E8AF84.html" class="tag">书评/影评</a> <a href="../tags/E7BC96E7A88B.html" class="tag">编程</a> </div><h3><a href="../2013/10/personal-it-infrastructure.html">磨刀不误砍柴功——聊聊个人 IT 基础设施的完善</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-10-14</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/E5ADA6E4B9A0E696B9E6B395.html" class="tag">学习方法</a> </div><h3><a href="../2013/10/truecrypt-4.html">TrueCrypt 使用经验[4]:关于隐藏卷的使用和注意事项</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-10-08</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2013/08/truecrypt-3.html">TrueCrypt 使用经验[3]:关于加密盘的破解和防范措施</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-08-16</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2013/08/truecrypt-2.html">TrueCrypt 使用经验[2]:关于加密盘的密码认证和 KeyFiles 认证</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-08-11</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2013/08/truecrypt-1.html">TrueCrypt 使用经验[1]:关于加密算法和加密盘的类型</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-08-06</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2013/07/online-backup-virtual-encrypted-disk.html">文件备份技巧:组合“虚拟加密盘”和“网盘”</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-07-26</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2013/07/privacy-protection-4.html">如何保护隐私[4]:关于浏览器的基本防范(下)</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-07-22</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2013/07/gfw-news.html">2013年7月翻墙快报(补充介绍 VPN Gate 经验)</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-07-12</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> </div><h3><a href="../2013/07/about-google-reader.html">提醒一下 Google Reader 的身后事</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-07-05</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2013/07/privacy-protection-3.html">如何保护隐私[3]:关于浏览器的基本防范(中)</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-07-01</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2013/06/privacy-protection-2.html">如何保护隐私[2]:关于浏览器的基本防范(上)</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-06-29</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2013/06/privacy-protection-1.html">如何保护隐私[1]:如何选择软件和服务?</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-06-23</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2013/06/privacy-protection-0.html">如何保护隐私[0]:为啥写这个话题?</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-06-23</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2013/06/email-subscription.html">邮件订阅功能发布——免翻墙的“Google Reader 替代品”</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-06-20</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> <a href="../tags/E58D9AE5AEA2E9809AE5918A.html" class="tag">博客通告</a> </div><h3><a href="../2013/05/google-reader-replacement.html">Google Reader 的替代品,哪个比较靠谱?</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-05-30</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2013/05/howto-anti-it-audit-2.html">如何对付公司的监控[2]:规避“主机行为审计”</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-05-17</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2013/05/howto-anti-it-audit-1.html">如何对付公司的监控[1]:规避“网络行为审计”</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-05-09</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2013/05/howto-anti-it-audit-0.html">如何对付公司的监控[0]:概述</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-05-09</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2013/04/gfw-vpngate.html">“如何翻墙”系列:扫盲 VPN Gate——分布式的 VPN 服务器</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-04-19</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> </div><h3><a href="../2013/03/internet-resource-discovery-3.html">如何挖掘网络资源[3]:解答 Google 搜索的常见问题(FAQs)</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-03-22</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/E5ADA6E4B9A0E696B9E6B395.html" class="tag">学习方法</a> </div><h3><a href="../2013/03/weekly-share-44.html">每周转载:Google Reader 之死</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-03-19</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4B89AE7958CE8AF84E8AEBA.html" class="tag">IT.业界评论</a> <a href="../tags/E8BDACE8BDBD.html" class="tag">转载</a> </div><h3><a href="../2013/03/google-reader-dead.html">Google Reader 之死——原因分析、应对措施、教训</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-03-15</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4B89AE7958CE8AF84E8AEBA.html" class="tag">IT.业界评论</a> </div><h3><a href="../2013/03/internet-resource-discovery-2.html">如何挖掘网络资源[2]:Google 搜索的基本语法</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-03-14</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/E5ADA6E4B9A0E696B9E6B395.html" class="tag">学习方法</a> </div><h3><a href="../2013/03/internet-resource-discovery-1.html">如何挖掘网络资源[1]:网站的类型和使用场景</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-03-09</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/E5ADA6E4B9A0E696B9E6B395.html" class="tag">学习方法</a> </div><h3><a href="../2013/03/internet-resource-discovery-0.html">如何挖掘网络资源[0]:为啥要写这个话题?</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-03-08</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/E5ADA6E4B9A0E696B9E6B395.html" class="tag">学习方法</a> </div><h3><a href="../2013/02/weekly-share-41.html">每周转载:天朝御用骇客是如何暴露的?</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-02-25</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> <a href="../tags/E8BDACE8BDBD.html" class="tag">转载</a> </div><h3><a href="../2013/02/file-integrity-check.html">扫盲文件完整性校验——关于散列值和数字签名</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-02-12</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2013/02/weekly-share-39.html">每周转载:关于 GitHub 和 GFW 的 PK</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-02-04</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> <a href="../tags/E8BDACE8BDBD.html" class="tag">转载</a> </div><h3><a href="../2013/01/cross-host-use-gfw-tool.html">多台电脑如何共享翻墙通道</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-01-24</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> </div><h3><a href="../2013/01/weekly-share-37.html">每周转载:关于黑客文化和黑客精神</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-01-22</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4B89AE7958CE8AF84E8AEBA.html" class="tag">IT.业界评论</a> <a href="../tags/E8BDACE8BDBD.html" class="tag">转载</a> </div><h3><a href="../2013/01/gfw-news.html">2013年1月翻墙快报</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-01-11</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> </div><h3><a href="../2013/01/howto-cover-your-tracks-7.html">如何隐藏你的踪迹,避免跨省追捕[7]:用虚拟机隐匿公网IP(配置图解)</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-01-08</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2013/01/howto-cover-your-tracks-6.html">如何隐藏你的踪迹,避免跨省追捕[6]:用虚拟机隐匿公网IP(原理介绍)</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2013-01-03</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2012/12/system-vm-5.html">扫盲操作系统虚拟机[5]:虚拟系统的配置(多图)</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2012-12-22</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2012/12/system-vm-4.html">扫盲操作系统虚拟机[4]:虚拟系统的安装(多图)</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2012-12-02</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2012/11/system-vm-3.html">扫盲操作系统虚拟机[3]:虚拟机软件的选择</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2012-11-30</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2012/11/gfw-news.html">2012年11月翻墙快报(用I2P突破18大期间的封锁)</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2012-11-16</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> </div><h3><a href="../2012/11/system-vm-2.html">扫盲操作系统虚拟机[2]:介绍各种应用场景</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2012-11-08</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2012/10/system-vm-1.html">扫盲操作系统虚拟机[1]:基本概念和功能简介</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2012-10-27</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2012/10/system-vm-0.html">扫盲操作系统虚拟机[0]:概述</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2012-10-27</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2012/10/howto-prevent-hacker-attack-7.html">如何防止黑客入侵[7]:Web相关的防范 (下)</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2012-10-17</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2012/09/gfw-news.html">2012年9月翻墙快报(兼谈复活 TOR 的方法)</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2012-09-20</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> </div><h3><a href="../2012/09/howto-prevent-hacker-attack-6.html">如何防止黑客入侵[6]:Web相关的防范 (中)</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2012-09-08</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2012/08/howto-prevent-hacker-attack-5.html">如何防止黑客入侵[5]:Web相关的防范 (上)</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2012-08-31</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2012/07/gfw-news.html">2012年7月翻墙快报</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2012-07-12</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> </div><h3><a href="../2012/07/weekly-share-10.html">每周转载:关于人工智能对人类的影响(网文3篇)</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2012-07-01</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BABAE5B7A5E699BAE883BD.html" class="tag">IT.人工智能</a> <a href="../tags/E8BDACE8BDBD.html" class="tag">转载</a> </div><h3><a href="../2012/06/gfw-i2p.html">“如何翻墙”系列:简单扫盲 I2P 的使用</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2012-06-15</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2012/04/gfw-news.html">2012年4月翻墙快报</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2012-04-17</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> </div><h3><a href="../2012/03/howto-cover-your-tracks-5.html">如何隐藏你的踪迹,避免跨省追捕[5]:用多重代理隐匿公网IP</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2012-03-13</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2012/02/microblog-and-time-management.html">为啥俺不常用微博?——兼谈时间管理心得</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2012-02-28</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4B89AE7958CE8AF84E8AEBA.html" class="tag">IT.业界评论</a> <a href="../tags/E7AEA1E79086.html" class="tag">管理</a> </div><h3><a href="../2012/02/gfw-news.html">2012年2月翻墙快报</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2012-02-13</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> </div><h3><a href="../2012/02/howto-cover-your-tracks-4.html">如何隐藏你的踪迹,避免跨省追捕[4]:通讯工具的防范</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2012-02-05</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2011/12/csdn-renren-password-analysis.html">CSDN 及人人网的用户密码分析</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2011-12-24</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2011/12/gfw-psiphon.html">赛风又活过来了</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2011-12-18</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> </div><h3><a href="../2011/12/gfw-wujie.html">“如何翻墙”系列:新版本无界——赛风3失效后的另一个选择</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2011-12-12</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2011/11/greasemonkey-scripts-for-google-reader.html">如何用 GreaseMonkey 扩展 Google Reader</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2011-11-02</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2011/10/gfw-psiphon.html">“如何翻墙”系列:双管齐下的赛风3</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2011-10-25</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2011/09/gfw-vpn-hotspot-shield.html">“如何翻墙”系列:扫盲 VPN 翻墙——以 Hotspot Shield 为例</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2011-09-30</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2011/09/gfw-faq.html">常见翻墙问题答疑 {2012-02-13}</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2011-09-22</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> </div><h3><a href="../2011/08/google-acquire-motorola.html">Google 收购摩托罗拉移动,仅仅是为了专利吗?</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2011-08-17</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4B89AE7958CE8AF84E8AEBA.html" class="tag">IT.业界评论</a> </div><h3><a href="../2011/06/use-image-hide-information.html">用图片隐藏信息的技术实现</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2011-06-02</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2011/05/use-image-hide-gfw-tool.html">“如何翻墙”系列:用图片传播翻墙软件</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2011-05-28</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> </div><h3><a href="../2011/05/through-gfw-with-skype.html">“如何翻墙”系列:基于 Skype 翻墙</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2011-05-22</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2011/05/recommend-truecrypt.html">TrueCrypt——文件加密的法宝</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2011-05-18</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2011/05/file-encryption-overview.html">文件加密的扫盲介绍</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2011-05-14</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2011/03/how-to-get-gfw-tools.html">“如何翻墙”系列:获取翻墙软件方法大全</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2011-03-13</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> </div><h3><a href="../2010/09/auto-response-email-change.html">"如何翻墙"系列:通过邮件获取翻墙扫盲帖(邮件地址变更)</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2010-09-29</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> </div><h3><a href="../2010/09/use-email-get-gfw-howto.html">"如何翻墙"系列:通过邮件获取翻墙扫盲帖</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2010-09-27</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> </div><h3><a href="../2010/08/howto-prevent-hacker-attack-4.html">如何防止黑客入侵[4]:安全漏洞的基本防范</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2010-08-02</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2010/06/howto-prevent-hacker-attack-3.html">如何防止黑客入侵[3]:如何构造安全的口令/密码</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2010-06-20</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2010/06/howto-prevent-hacker-attack-2.html">如何防止黑客入侵[2]:攻击者如何搞定你的口令/密码?</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2010-06-15</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2010/06/howto-prevent-hacker-attack-1.html">如何防止黑客入侵[1]:避免使用高权限用户</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2010-06-08</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2010/06/howto-prevent-hacker-attack-0.html">如何防止黑客入侵[0]:概述</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2010-06-08</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2010/05/apple-market-value.html">高处不胜寒的苹果</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2010-05-31</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4B89AE7958CE8AF84E8AEBA.html" class="tag">IT.业界评论</a> </div><h3><a href="../2010/05/howto-cover-your-tracks-3.html">如何隐藏你的踪迹,避免跨省追捕[3]:操作系统的防范</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2010-05-18</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2010/04/howto-cover-your-tracks-2.html">如何隐藏你的踪迹,避免跨省追捕[2]:个人软件的防范</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2010-04-27</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2010/04/howto-cover-your-tracks-1.html">如何隐藏你的踪迹,避免跨省追捕[1]:网络方面的防范</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2010-04-23</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2010/04/howto-cover-your-tracks-0.html">如何隐藏你的踪迹,避免跨省追捕[0]:为啥要写此文?</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2010-04-23</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2010/03/prepare-when-google-leave.html">如果 Google 退出中国,我们该如何应对?</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2010-03-20</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> </div><h3><a href="../2010/03/choose-free-gate.html">“如何翻墙”系列:自由門——TOR 被封之后的另一个选择</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2010-03-10</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2010/02/remove-cnnic-cert.html">CNNIC 证书的危害及各种清除方法</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2010-02-16</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2010/02/about-cnnic.html">CNNIC 干过的那些破事儿</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2010-02-11</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4B89AE7958CE8AF84E8AEBA.html" class="tag">IT.业界评论</a> </div><h3><a href="../2010/02/introduce-digital-certificate-and-ca.html">数字证书及 CA 的扫盲介绍</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2010-02-08</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2009/10/use-people-war-to-anti-gfw.html">面对墙,我们所能做的就是——让 GFW 陷入到人民战争的汪洋大海</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2009-10-13</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> <a href="../tags/E694BFE6B2BB.html" class="tag">政治</a> </div><h3><a href="../2009/09/break-through-gfw-with-tor.html">“如何翻墙”系列:戴“套”翻墻的方法</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2009-09-26</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> </div><h3><a href="../2009/07/microblog-blocked-by-gfw.html">从微博客被封杀说开去</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2009-07-23</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4B89AE7958CE8AF84E8AEBA.html" class="tag">IT.业界评论</a> <a href="../tags/E694BFE6B2BB.html" class="tag">政治</a> <a href="../tags/E697B6E4BA8BE8AF84E8AEBA.html" class="tag">时事评论</a> </div><h3><a href="../2009/07/break-through-berlin-wall.html">学习一下德国人民的翻墙精神</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2009-07-16</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> <a href="../tags/E694BFE6B2BB.html" class="tag">政治</a> </div><h3><a href="../2009/07/social-engineering-5-defend.html">信息安全之社会工程学[5]:如何防范?</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2009-07-07</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2009/06/opensource-review-revision-control.html">开源点评:源代码版本控制系统介绍</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2009-06-22</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> <a href="../tags/E7BC96E7A88B.html" class="tag">编程</a> <a href="../tags/E7BC96E7A88B.E8BDAFE4BBB6E5B7A5E7A88B.html" class="tag">编程.软件工程</a> </div><h3><a href="../2009/06/social-engineering-4-example.html">信息安全之社会工程学[4]:综合运用举例</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2009-06-07</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2009/05/social-engineering-3-influence.html">信息安全之社会工程学[3]:攻击手法之施加影响</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2009-05-19</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> <a href="../tags/E5BF83E79086E5ADA6.html" class="tag">心理学</a> </div><h3><a href="../2009/05/how-to-break-through-gfw.html">如何翻墙?——写在 BlogSpot 被封之后 {2015-08-28}</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2009-05-16</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> </div><h3><a href="../2009/05/social-engineering-2-pretend.html">信息安全之社会工程学[2]:攻击手法之假冒身份</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2009-05-09</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2009/05/social-engineering-1-gather-information.html">信息安全之社会工程学[1]:攻击手法之信息收集</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2009-05-06</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2009/05/social-engineering-0-overview.html">信息安全之社会工程学[0]:基本常识扫盲</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2009-05-05</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> </div><h3><a href="../2009/04/oracle-buy-sun.html">Oracle 收购 SUN,会有啥影响?</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2009-04-21</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4B89AE7958CE8AF84E8AEBA.html" class="tag">IT.业界评论</a> </div><h3><a href="../2009/04/microsoft-need-twitter-to-pk-google.html">微软需要 Twitter 来对抗 Google</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2009-04-05</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4B89AE7958CE8AF84E8AEBA.html" class="tag">IT.业界评论</a> </div><h3><a href="../2009/02/ria-review-flash-silverlight-javafx.html">三种主流 RIA 技术之争,你该如何选型?</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2009-02-05</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4B89AE7958CE8AF84E8AEBA.html" class="tag">IT.业界评论</a> </div><h3><a href="../2009/02/google-search-fatal-bug.html">从 Google 搜索的严重 bug 想开去</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2009-02-01</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4B89AE7958CE8AF84E8AEBA.html" class="tag">IT.业界评论</a> </div><h3><a href="../2009/01/twitter-and-break-news-and-people.html">从 Twitter 的突发新闻报道看草根记者的崛起</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2009-01-24</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/IT.E4B89AE7958CE8AF84E8AEBA.html" class="tag">IT.业界评论</a> </div><h3><a href="../2009/01/choose-it-book.html">如何选择 IT 技术书籍</a></h3><div class="post-info" style="margin-bottom:30px;"><span class="date-header">2009-01-21</span><a href="../tags/IT.html" class="tag">IT</a> <a href="../tags/E4B9A6E8AF842FE5BDB1E8AF84.html" class="tag">书评/影评</a> </div>
</div>
</div>
<div id="sidebar-wrapper">
<div class="sidebar section" id="sidebar">
<div class="widget HTML" id="BlogAbout">
<div class="widget-content">
<img src="../images/thinker.jpg" alt="编程随想的Logo" title="编程随想的Logo"><br>
<br>
<img src="../images/favicon/blogspot.ico" height="16" width="16"><a href="https://program-think.blogspot.com/" target="_blank" title="博客主站点 (BlogSpot)">博客主站点 (BlogSpot)</a><br>
<img src="../images/favicon/gmail.ico" height="16" width="16"><a href="mailto:program.think@gmail.com" target="_blank" title="俺的邮箱 (Gmail)">俺的邮箱 (Gmail)</a><br>
<img src="../images/favicon/google-plus.ico" height="16" width="16"><a href="https://plus.google.com/113559088971921339544/posts" target="_blank" title="俺的Google+">俺的Google+</a><br>
<img src="../images/favicon/twitter.ico" height="16" width="16"><a href="https://twitter.com/programthink" target="_blank" title="俺的推特 (@programthink)">俺的推特 (@programthink)</a><br>
<img src="../images/favicon/github.ico" height="16" width="16"><a href="https://github.com/programthink" target="_blank" title="俺的收藏 (GitHub)">俺的收藏 (GitHub)</a><br>
</div>
</div>
<div class="widget HTML" id="BlogFeed">
<h2 class="title">订阅博客</h2>
<div class="widget-content">
<a href="https://feeds2.feedburner.com/programthink" target="_blank" title="RSS 订阅">
<img src="../images/feed-icon-animated.gif" alt="RSS 订阅" border="0"></a>
<a href="../2013/06/email-subscription.html" title="邮件订阅">
<img src="../images/email-icon.png" alt="邮件订阅" border="0"></a><br>
</div>
</div>
<div class="widget Text" id="BlogDesc">
<h2 class="title">博客主要内容</h2>
<div class="widget-content">
★提升思维能力<br>★普及政治常识<br>★各种翻墙姿势<br>★党国的阴暗面<br>★网络安全知识<br>★软件开发技术
</div>
</div>
<div class="widget Label" id="BlogTags">
<h2>分类标签</h2>
<div class="widget-content list-label-widget-content">
<ul>
<li><a href="../tags/IT.html" class="tag">IT</a> (170)</li><li><a href="../tags/IT.Linux.html" class="tag">IT.Linux</a> (5)</li><li><a href="../tags/IT.E4B89AE7958CE8AF84E8AEBA.html" class="tag">IT.业界评论</a> (15)</li><li><a href="../tags/IT.E4BABAE5B7A5E699BAE883BD.html" class="tag">IT.人工智能</a> (3)</li><li><a href="../tags/IT.E4BFA1E681AFE5AE89E585A8.html" class="tag">IT.信息安全</a> (76)</li><li><a href="../tags/IT.E7BFBBE5A299.html" class="tag">IT.翻墙</a> (45)</li><li><a href="../tags/IT.E8BDAFE4BBB6E4BB8BE7BB8D.html" class="tag">IT.软件介绍</a> (40)</li><li><a href="../tags/E4B9A6E8AF842FE5BDB1E8AF84.html" class="tag">书评/影评</a> (45)</li><li><a href="../tags/E5869BE4BA8B.html" class="tag">军事</a> (8)</li><li><a href="../tags/E58D9AE5AEA2E9809AE5918A.html" class="tag">博客通告</a> (30)</li><li><a href="../tags/E58E86E58FB2.html" class="tag">历史</a> (72)</li><li><a href="../tags/E5A496E4BAA4.html" class="tag">外交</a> (11)</li><li><a href="../tags/E5ADA6E4B9A0E696B9E6B395.html" class="tag">学习方法</a> (11)</li><li><a href="../tags/E5ADA6E4BC9AE6809DE88083.html" class="tag">学会思考</a> (20)</li><li><a href="../tags/E5BF83E79086E5ADA6.html" class="tag">心理学</a> (27)</li><li><a href="../tags/E694BFE6B2BB.html" class="tag">政治</a> (221)</li><li><a href="../tags/E694BFE6B2BB.E585ABE58DA6.html" class="tag">政治.八卦</a> (19)</li><li><a href="../tags/E694BFE6B2BB.E585B1E4BAA7E8BF90E58AA8.html" class="tag">政治.共产运动</a> (11)</li><li><a href="../tags/E694BFE6B2BB.E5B8B8E8AF86.html" class="tag">政治.常识</a> (21)</li><li><a href="../tags/E694BFE6B2BB.E69D83E8B4B5.html" class="tag">政治.权贵</a> (26)</li><li><a href="../tags/E694BFE6B2BB.E6B395E588B6.html" class="tag">政治.法制</a> (16)</li><li><a href="../tags/E694BFE6B2BB.E79C9FE79086E983A8.html" class="tag">政治.真理部</a> (31)</li><li><a href="../tags/E694BFE6B2BB.E88590E8B4A5.html" class="tag">政治.腐败</a> (18)</li><li><a href="../tags/E69599E882B2.html" class="tag">教育</a> (1)</li><li><a href="../tags/E697B6E4BA8BE8AF84E8AEBA.html" class="tag">时事评论</a> (133)</li><li><a href="../tags/E78EAFE4BF9D.html" class="tag">环保</a> (11)</li><li><a href="../tags/E7A791E699AE.html" class="tag">科普</a> (3)</li><li><a href="../tags/E7AEA1E79086.html" class="tag">管理</a> (16)</li><li><a href="../tags/E7BB8FE6B58E.html" class="tag">经济</a> (20)</li><li><a href="../tags/E7BC96E7A88B.html" class="tag">编程</a> (66)</li><li><a href="../tags/E7BC96E7A88B.C.html" class="tag">编程.C</a> (15)</li><li><a href="../tags/E7BC96E7A88B.Java.html" class="tag">编程.Java</a> (12)</li><li><a href="../tags/E7BC96E7A88B.Python.html" class="tag">编程.Python</a> (8)</li><li><a href="../tags/E7BC96E7A88B.E5A49AE7BABFE7A88B.html" class="tag">编程.多线程</a> (6)</li><li><a href="../tags/E7BC96E7A88B.E5BC80E6BA90E9A1B9E79BAE.html" class="tag">编程.开源项目</a> (8)</li><li><a href="../tags/E7BC96E7A88B.E680A7E883BDE4BC98E58C96.html" class="tag">编程.性能优化</a> (6)</li><li><a href="../tags/E7BC96E7A88B.E69EB6E69E84.html" class="tag">编程.架构</a> (7)</li><li><a href="../tags/E7BC96E7A88B.E7AE97E6B395.html" class="tag">编程.算法</a> (2)</li><li><a href="../tags/E7BC96E7A88B.E8BDAFE4BBB6E5B7A5E7A88B.html" class="tag">编程.软件工程</a> (13)</li><li><a href="../tags/E8818CE59CBAE782B9E6BBB4.html" class="tag">职场点滴</a> (17)</li><li><a href="../tags/E8BDACE8BDBD.html" class="tag">转载</a> (125)</li>
</ul>
</div>
</div>
<div class="widget Label" id="BlogRecommend">
<div class="widget-content">
<h2>推荐帖子(翻墙技术)</h2>
<ul>
<li><a href='../2009/05/how-to-break-through-gfw.html'>如何翻墙(全方位入门扫盲)</a></li>
<li><a href='../2011/09/gfw-faq.html'>常见翻墙问题答疑</a></li>
<li><a href='../2011/03/how-to-get-gfw-tools.html'>获取翻墙软件方法大全</a></li>
<li><a href='../2013/01/cross-host-use-gfw-tool.html'>多台电脑如何共享翻墙通道</a></li>
<li><a href='../2013/11/tor-faq.html'>关于 TOR 的常见问题解答</a></li>
<li><a href='../2009/07/break-through-berlin-wall.html'>学习一下德国人民的翻墙精神</a></li>
</ul>
<h2>推荐帖子(网络安全)</h2>
<ul>
<li><a href='../2015/08/Technology-and-Freedom.html'>“对抗专制、捍卫自由”的 N 种技术力量</a></li>
<li><a href='../2010/06/howto-prevent-hacker-attack-0.html'>如何防止黑客入侵(系列)</a></li>
<li><a href='../2013/06/privacy-protection-0.html'>如何保护隐私(系列)</a></li>
<li><a href='../2010/04/howto-cover-your-tracks-0.html'>如何隐藏你的踪迹,避免跨省追捕(系列)</a></li>
<li><a href='../2012/10/system-vm-0.html'>扫盲操作系统虚拟机(系列)</a></li>
<li><a href='../2011/05/recommend-truecrypt.html#index'>TrueCrypt 的扫盲教程和高级教程</a></li>
<li><a href='../2011/05/file-encryption-overview.html'>文件加密的扫盲介绍</a></li>
<li><a href='../2013/07/online-backup-virtual-encrypted-disk.html'>文件备份技巧:组合“虚拟加密盘”和“网盘”</a></li>
<li><a href='../2013/02/file-integrity-check.html'>扫盲文件完整性校验——关于散列值和数字签名</a></li>
<li><a href='../2009/05/social-engineering-0-overview.html'>社会工程学扫盲(系列)</a></li>
<li><a href='../2013/02/weekly-share-41.html'>天朝御用骇客是如何暴露的?</a></li>
</ul>
<h2>推荐帖子(学会思考)</h2>
<ul>
<li><a href='../2013/04/how-to-read-book.html'>《如何阅读一本书》——书评及内容纲要</a></li>
<li><a href='../2010/10/book-review-asking-right-questions.html'>书评:《学会提问——批判性思维指南》</a></li>
<li><a href='../2013/09/knowledge-structure.html'>如何完善自己的知识结构</a></li>
<li><a href='../2009/02/study-technology-in-three-steps.html'>学习技术的三部曲:WHAT、HOW、WHY</a></li>
<li><a href='../2012/03/think-what-how-why.html'>用提问促进思维——再谈 WHAT HOW WHY 三部曲</a></li>
<li><a href='../2013/05/difference-between-fact-and-opinion.html'>批判性思维扫盲:学会区分"事实"与"观点"</a></li>
<li><a href='../2014/02/brainwash-and-idiot.html'>聊聊洗脑和脑残——分析"脑残的起源"和"脑残的觉醒"</a></li>
<li><a href='../2014/12/brainwash-using-real-data.html'>比“欺骗”更狡猾的洗脑——基于【真实数据】进行忽悠</a></li>
<li><a href='../2014/01/doublethink.html'>比"欺骗"更有效的洗脑手法——基于"双重思想"的思维控制</a></li>
<li><a href='../2009/07/book-review-are-your-lights-on.html'>书评:《你的灯亮着吗?——找到问题的真正所在》</a></li>
<li><a href='../2010/07/silent-proof.html'>思维的误区:忽视沉默的大多数</a></li>
<li><a href='../2011/03/logical-fallacies.html'>扫盲逻辑谬误——以五毛言论为反面教材</a></li>
</ul>
<h2>推荐帖子(心理学)</h2>
<ul>
<li><a href='../2015/05/Survivorship-Bias.html'>思维的误区:幸存者偏见</a></li>
<li><a href='../2012/12/emperor-complex.html'>天朝民众的心理分析:圣君情结</a></li>
<li><a href='../2012/06/stockholm-syndrome.html'>天朝民众的心理分析:斯德哥尔摩综合症</a></li>
<li><a href='../2014/05/fans-and-idolatry.html'>不要成为“粉丝”——谈谈“偶像崇拜”的成因和危害</a></li>
<li><a href='../2010/02/about-mental-model.html'>认识你自己——有关心智模式的扫盲介绍</a></li>
<li><a href='../2009/05/halo-effect.html'>光环效应引发的认知误区</a></li>
<li><a href='../2010/04/how-to-attribute-success-failure.html'>你是怎么看待成败的——兼谈有效归因</a></li>
<li><a href='../2012/01/stockdale-paradox.html'>如何面对困境——兼谈"斯托克戴尔悖论"</a></li>
<li><a href='../2012/06/book-review-road-less-traveled.html'>书评:《少有人走的路——心智成熟的旅程》</a></li>
</ul>
<h2>推荐帖子(政治)</h2>
<ul>
<li><a href='../2011/06/june-fourth-incident-0.html'>回顾"六四"(系列)</a></li>
<li><a href='../2011/12/revolution-0.html'>谈革命(系列)</a></li>
<li><a href='../2013/12/political-concepts-state-citizenship-etc.html'>政治常识扫盲:理清"国家、政体、公民、政府、政党"等概念</a></li>
<li><a href='../2014/02/freedom-of-speech.html'>政治常识扫盲:澄清"言论自由"的各种误区</a></li>
<li><a href='../2013/04/more-supervision-less-thankfulness.html'>对政府——多些"监督问责",少些"煽情感动"</a></li>
<li><a href='../2010/11/institutionalize.html'>谈谈体制化,并推荐《肖申克的救赎》</a></li>
<li><a href='../2012/07/form-of-government.html'>扫盲常见的政治体制</a></li>
<li><a href='../2016/06/USA-Separation-of-Powers-with-Balances.html'>聊聊美国政体中的权力制衡——不仅仅是三权分立</a></li>
<li><a href='../2015/01/Communism-Nazism-Caesaropapism.html'>人类自由的三大死敌——谈谈"共产运动、纳粹主义、政教合一"的共性</a></li>
<li><a href='../2012/03/national-people-congress.html'>看看全国人大代表都是啥货色——兼谈"议会道路的改良"行不通</a></li>
<li><a href='../2013/11/political-reform-or-economic-reform.html'>若政治制度不公平,则经济改革无意义</a></li>
<li><a href='../2012/07/tacitus-trap.html'>朝廷为何落入"塔西佗陷阱"</a></li>
<li><a href='../2013/02/film-soviet-story.html'>《苏维埃往事》——看清苏联和纳粹的共同本质</a></li>
<li><a href='../2012/10/history-of-red-khmers.html'>最"纯正"的共产主义政权——红色高棉简史</a></li>
<li><a href='../2012/08/environment-pollution-in-china.html'>谈谈环保问题的根源和解决之道</a></li>
<li><a href='../2012/07/weekly-share-12.html'>汇总天朝的雷人语录 (定期更新)</a></li>
</ul>
<h2>推荐帖子(历史)</h2>
<ul>
<li><a href='../2011/06/june-fourth-incident-0.html'>回顾"六四"(系列)</a></li>
<li><a href='../2012/05/three-years-famine-0.html'>谈谈三年大饥荒(系列)</a></li>
<li><a href='../2014/07/artists-and-ccp.html'>面对共产党——民国人文大师的众生相</a></li>
<li><a href='../2016/01/Taiwan-Political-Movements.html'>台湾民主运动和独立运动简史</a></li>
<li><a href='../2010/09/censorship-of-images.html'>看看真理部是如何 PS 照片的</a></li>
<li><a href='../2013/08/korean-war.html'>谈谈真理部对朝鲜战争的忽悠</a></li>
<li><a href='../2010/09/sino-japanese-war.html'>谈谈真理部对抗战历史的篡改</a></li>
<li><a href='../2014/04/history-china-fallen-behind-europe.html'>中国是从哪个朝代开始落后于西方?</a></li>
<li><a href='../2011/03/ccp-vs-japanese.html'>谁是最可恨的人?——写给仇日愤青们</a></li>
<li><a href='../2014/03/propaganda-for-patriotism.html'>分析爱国主义忽悠的常见类型——顺便戳穿几个流传很广的谣言</a></li>
<li><a href='../2015/11/Why-Islam-Is-Different-from-Other-Religions.html'>伊斯兰教为何如此奇葩?</a></li>
</ul>
<h2>推荐帖子(编程技术)</h2>
<ul>
<li><a href='../2012/05/weekly-share-5.html'>学习编程语言的3篇好文章</a></li>
<li><a href='../2009/08/why-choose-python-0-overview.html'>为什么俺推荐 Python(系列)</a></li>
<li><a href='../2009/03/producer-consumer-pattern-0-overview.html'>架构设计:生产者/消费者模式</a></li>
<li><a href='../2009/02/multi-process-vs-multi-thread.html'>架构设计:进程还是线程?</a></li>
<li><a href='../2009/02/how-to-choose-opensource-project.html'>如何选择开源项目?</a></li>
<li><a href='../2009/02/cxx-object-destroy-overview.html'>C++对象是怎么死的?(系列)</a></li>
<li><a href='../2009/01/cxx-cross-platform-develop-0-overview.html'>C++的移植性和跨平台开发(系列)</a></li>
<li><a href='../2009/03/java-performance-tuning-0-overview.html'>Java 性能优化(系列)</a></li>
<li><a href='../2009/01/defect-of-java-beginner-0-overview.html'>Java 新手的通病(系列)</a></li>
</ul>
<h2>推荐帖子(职场点滴)</h2>
<ul>
<li><a href='../2015/12/Hobbies-and-Interests.html'>什么是【真正的】兴趣爱好?以及它有啥好处?</a></li>
<li><a href='../2015/06/The-Mythical-Theories-of-Success.html'>成功学批判——简述其危害性及各种谬误</a></li>
<li><a href='../2009/01/0.html'>如何成为优秀开发人员(系列)</a></li>
<li><a href='../2009/11/job-hopping.html'>跳还是不跳,是一个问题?</a></li>
<li><a href='../2009/09/how-to-personal-branding.html'>如何包装个人品牌?</a></li>
</ul>
<h2>推荐帖子(企业管理)</h2>
<ul>
<li><a href='../2011/03/hiring-experience-0.html'>俺的招聘经验(系列)</a></li>
<li><a href='../2009/04/defect-of-hire.html'>招聘的误区</a></li>
<li><a href='../2009/03/80-20-principle-3-management-hire.html'>如何找到优秀的开发人才?</a></li>
<li><a href='../2016/04/Andy-Grove-Quotes-on-Leadership.html'>硅谷 CEO 们的教父——分享安迪·格鲁夫的管理经验</a></li>
</ul>
</div>
</div>
<div class="widget HTML" id="BlogSearch">
<h2 class="title">博客站内搜索 (需联网)</h2>
<div class="widget-content">
<img src="../images/search/google.png" alt="Google" border="0"><br>
<form method="GET" action="https://encrypted.google.com/search" target="_blank">
<input name="ie" value="UTF-8" type="hidden">
<input name="oe" value="UTF-8" type="hidden">
<input name="sitesearch" value="program-think.blogspot.com" type="hidden">
<input name="q" size="32" maxlength="128" type="text">
<input name="search" value="Google" type="submit">
</form>
<br>
<img src="../images/search/bing.png" alt="Bing" border="0"><br>
<form method="GET" action="http://www.bing.com/search" target="_blank">
<input name="q1" value="site:program-think.blogspot.com" type="hidden">
<input name="q" size="32" maxlength="128" type="text">
<input name="search" value="Bing" type="submit">
</form>
</div>
</div>
<div class="widget BlogArchive" id="BlogArchive">
<h2>历史归档</h2>
<div class="widget-content">
<ul>
<li><a href="../archive/2018.html">2018</a> (17)</li><li><a href="../archive/2017.html">2017</a> (34)</li><li><a href="../archive/2016.html">2016</a> (37)</li><li><a href="../archive/2015.html">2015</a> (61)</li><li><a href="../archive/2014.html">2014</a> (76)</li><li><a href="../archive/2013.html">2013</a> (96)</li><li><a href="../archive/2012.html">2012</a> (109)</li><li><a href="../archive/2011.html">2011</a> (58)</li><li><a href="../archive/2010.html">2010</a> (40)</li><li><a href="../archive/2009.html">2009</a> (93)</li>
</ul>
</div>
</div>
</div> <!--sidebar-->
</div> <!--sidebar-wrapper-->
</div> <!-- end content-wrapper -->
</div> <!-- end outer-wrapper -->
</body>
</html>