10 times 10-year analysis of asset growth, are the Asia-Pacific region such as the growing number of asset acquisitions. is not unfounded. we all know, Asia and other emerging markets more dependent on bank financing structure, anti-economic fluctuations, limited capacity, and global trade patterns is that economic crises for regional infiltration. Therefore, it is likely all losses. record high growth, it is also a good hedge the business risk.
rainy day into a mature market for investment allocation, or waiting for their low volatility period, arbitrage; then, arbitrage gains further support expansion of emerging markets, mergers and acquisitions.
global bank's balance sheet structure Tip us: perhaps, the future of China's best banks, asset allocation will also need to be balanced global bank. Therefore, the banks forget it right. Why? read down to know hh
money, buy to
Chinese banks are to usher in the concentration areas in emerging markets around the configuration, or to increase their risk of fluctuations in
2006, the Chinese banking industry has entered the era of high valuations. the talk of the media on 23 March .2007, ICBC's market value reached 1.7202 trillion yuan to 1 U.S. dollar at 7.74 yuan's exchange rate, the market value of the equivalent of 222.2 billion U.S. dollars (Table 1). to know In 2006, all banks in the United States (including foreign banks and financial services group) were 868, the average market capitalization of 31 billion U.S. dollars, and the median was only 1.5 billion U.S. dollars, ranking the top 10% of the average market value of banks about 36 billion U.S. dollars. As of March 23, 2007, A-share listed banks average 4.45 times book value: Industrial and Commercial Bank 4.6 times book value, Minsheng Bank is as high as 6.13 times book value, Shenzhen Development Bank is also 5.8 times, respectively, significantly higher than the international interbank valuation. and foreign banks in 2005, the average is only 2.7 times book value also, and in other emerging markets bank valuation of only 3.3 times the average. valuations rise, the high valuation of M & A activity is the recognition of China's economic growth, Chinese banks is also a kind of rapid expansion is expected.
2001, the Chinese banks bad debts up to 25% (and companies), the face of this problem, China's banking sector has taken additional capital market and allow foreign equity participation in order to study a series of advanced risk management system reform. After a few years, asset management companies with bad assets stripping and injection of the central government, four Large state-owned commercial banks have a debt ratio decreased significantly: In 2006, ICBC's bad debt rate to 4.1%, Bank of China dropped 4.2%, 3.5% of China Construction Bank, Agricultural Bank is only one of the bad debt rate is still as high as 24% . on the expected high growth of Chinese banks, which in turn enhances the potential for the expansion of Chinese banks. to the aforementioned figures, the Industrial and Commercial Bank only spend 10% of the shares to be ranked in the top 10 M & 6% of the U.S. listed banks; in the emerging markets of the 86 commercial banks, top 10% of the banking market value of about 20 billion U.S. dollars, Industrial and Commercial Bank equivalent to only 1% of the total market value. This is the March 23, 2007 $ 1 against 7.74 yuan's exchange rate. If we consider the potential appreciation of the renminbi, the Chinese banks will be the actual cost of overseas mergers and acquisitions mm lower U.S. dollar against the RMB exchange rate if the breakthrough 7, the Chinese banks the cost of overseas M & Save 10 Qiangzai % or more.
Currently, four state-owned commercial banks, Bank of Communications, China Merchants Bank, CITIC Group, to establish a branch in Hong Kong, or are wholly owned subsidiaries. such as the Industrial and Commercial Bank unit of ICBC Asia, Bank of China subsidiary BOC Hong Kong, BOC International, and China Construction Bank's Hong Kong, Sino Gold .2006 years later, the mainland Chinese banks in Hong Kong, more active M & A activity in early .2006, Construction Bank had purchased with Hong Kong in Asian banks, although the final Bank of Asia is Malaysia's Public Bank for 4.5 billion Hong Kong dollar to go higher price, this is the trend of bank mergers and acquisitions outside the start.
2006 年 12 18, Bank of China to 965 million cash acquisition of Singapore Aircraft Leasing Corporation 100% issued share capital of .2006 December 29, the formal completion of the Construction Bank Bank of America (Asia) 100% equity interest in the acquisition, the acquisition of the total amount of close to 100 million. After the acquisition, construction, banking operations in Hong Kong to the original scale twice, first from the original loans soared to 16 9 .2006 December 30, ICBC and Bank Halim Indonesia, signed the shareholders of the acquisition agreement to acquire 90% stake in Bank Halim; another 10% of the shares 3 years later by the Industrial and Commercial Bank of selective acquisitions. The bank is currently $ 50,000,000 total assets .2007, Minsheng Bank also planned Hong Kong listing, intended to raise funds to purchase a subsidiary of ICBC in Hong Kong International Trade and Industry. h < br> Chinese banks are going out, and seems right out of the first step to the choice of Hong Kong, followed by our close to Southeast Asia, the reason is very simple, homologous to the cultural and economic effects of synergy. Asia and other emerging market assets configuration risk capital injection market, the crisis seems to lift the bad loans, but the future of China's banking sector will face more new challenges.
from the see: today's world, globalization of trade patterns to the regional economic crisis has the characteristics of penetration, mergers and acquisitions in China and other neighboring regions of Hong Kong banks, hedge not only can not play the role of economic volatility, the risk may also increase the region resonance. Malaysia from 7.3% to -7.4%, the Philippines, from 5.2% to -0.6%, Singapore from 8.3% to -1.4%, Thailand 5.9% in 1996 down to -1.4% in 1997 and further dropped to 1998 -10.5%. and emerging markets bank-dominated financial system and government subsidies under the control of position risk exposure, but also led to the banking system is highly sensitive to economic cycles, GDP will decline a few percentage points a heavy banking sector blow. the financial crisis, Indonesia's bad and doubtful debts increased from 3% before the crisis rose to 50%, Thailand's bad debt rate from 13% in 1996 rising to 43% in 1998, and even the South Korean economy is relatively stable, bad debt rate was close to 20%, other Southeast Asian countries, most of the bad debt rate of 10% or more. can be seen that the regional economy is highly linked effects (Figure 1).
According to World Bank data, the region and Most of the Chinese economy in the correlation coefficient between 0.5-0.7 times significantly higher than in mature markets such as Europe and the United States; even in Argentina, Brazil and other South American countries, due to the same economic model of developing countries, most of them also has a similar cycle with the Chinese economy (Figure 2).
too concentrated in the emerging markets asset allocation, risk diversification will not play an effective role in regional portfolio. Not only that, the South East Asia and Latin America and other countries or regions generally greater than the volatility of China, Therefore, the results of the allocation of resources may also lead to increased risk.
Risk Management: ism does not work under the policies to protect the four major banks, has not experienced the real market test. In addition to macroeconomic volatility in emerging markets outside the , and the transformation of the whole financial system risks: financial liberalization, including the impact of foreign capital, industry and the separation of mixed uncertainty of the regulatory environment, capital market financing system directly to the banking system of indirect financing of alternative threats, and new business experience the lack of such data.
the long term, the bank's competitiveness comes from the risk identification and management. Well, really the introduction of foreign regulators and operators to achieve the original intention of it? August 2006, data published by China Banking Regulatory Commission Display: foreign banks in China more than 20% bad debt ratio of 24, with more than 90% have 7. as Bank of Montreal said the head of Shanghai Representative Office, risk, foreign banks will also face. From mode. Therefore, looking forward to foreign equity participation to enhance risk control, Chinese banks may only be wishful thinking. In view of this, in order to reduce the risk of cyclical fluctuations in the Chinese economy and the reform of the financial system against the risk of trial and error, in addition to improving their own risk management system, Chinese banks should be a more effective way to what is it?
from Asia to the world, an increase of 10 times 10 to see ambush of good investment to the market fluctuations in the low discount merger arbitrage. This is the emerging markets bank, with its valuation advantage can also use the regional economic cycles are not synchronized, the expansion of globalization and the spread
risk portfolio was established in 1865, HSBC Bank (Its name Hongkong and Shanghang BankingCorporation, is a commitment to the Chinese mainland and Hong Kong markets, and radiation around the Asia-Pacific banks. the last century, 50 years, merchant banks and the Middle East, the Bank of England, set up a ; out of Asia, through the acquisition of Marine Midland Banks into the U.S. market, and then through a series of acquisitions to become the seventh largest bank in Canada In 1991, the establishment of HSBC Group, will move its headquarters from Hong Kong, the United Kingdom In 1992, the acquisition of Britain's major banks A Midland Bank.1996, through the acquisition of Brazilian banks to enter the Latin American market, in 1997, the acquisition of Argentina's sixth largest bank; December 1999, the acquisition of the former fifth largest bank in the United States, one of the Liberty Bank of .2000, the acquisition of French Seven bank CCF; 2002, the acquisition of Mexico's fourth-largest bank; the same year, Ping An Insurance bought a 10% stake in China in 2004 to further increase to 20%, becoming the second largest shareholder; 2003, the acquisition of Household International Inc U.S. ., reconstituted as the HSBC Finance Corporation; the same year, the acquisition of Mexico's largest consumer finance bank; 2004 acquisition of Britain's Marks and Spencer Money; the same year, also bought 20% stake in Bank of China; the same time, its purchase of the Industrial Bank, Hang Seng Bank 16% of the equity; December 2005, HSBC Finance Corporation acquired Metris Companies Inc., to become the nation's fifth-largest card issuer Visa and Master Card.
today, Bank. At present, the in Mexico), South America 1900. global strategy to form a global portfolio, 40% in Europe; and 50% of profits come from emerging markets, 20% from North America, 30% from Europe (Figure 3,4).
growth Tip: arbitrage periodic underestimated
In the , is underestimated from the mature market arbitrage.
as UK financial system that the country of origin of a modern financial system of the core. Then, as a Hong Kong Centre, emerging markets in Asia Pacific grew up on the bank, > The answer is: the use of the global economy arising from the economic cycle is not synchronized between the valuation, arbitrage underestimated.
globalization is , the company carried out in mature markets, ; HSBC years, major UK clearing bank Midland, holds 14.9% stake.
The 16% stake in Bank. Western countries into a temporary economic recession, banks and other financial institutions hit. British Midland, one of the major clearing banks in the huge loss of 177 million pounds in 1990, although the reduced losses and 81% the following year, but the book still amounted to 33 million pounds loss banks into capital shortages. and the Western countries depression is different from the early 90s last century, the Asia-Pacific emerging markets are enjoying high growth, joy, and its growth potential that many international investors salivating. In this context, 1992 July, billion pounds, the initial investment to pay 550 million pounds in cash. After the acquisition of Midland, European and American markets began .1999-2000, the European economy into a stagnation period (Fig. 5), size of the bank, CCF lack of fast-growing capital. to overcome the bottlenecks of growth in Europe, CCF have tried in Egypt, Brazil and other emerging markets to expand their business, but the disadvantage that it can not scale fast enough to build a diversified business portfolio, and thus can not effectively resist the cyclical nature of the local risk. therefore, CCF has been working to find a way to provide a broader space for development and support of the banks more capital. In addition to the number of European banks offered an olive branch to the CCF, but in the end for the CCF The bank has risen to fourth place ranking. In the layout of the European market, GDP real growth rate after inflation is negative, although a slight improvement in 1996, but GDP growth rate is still only 2.4%. In this context, 1996-1997, region's first federal savings and loan associations. Meanwhile, ; and one of the nation's top 5 largest banks in the WellsFargo joint venture transaction line to become the largest Western trading lines; then with the the late 90s, a continuous occurrence of financial crises in emerging markets, for the fortune in Hong Kong U.S. Bank is one of Liberty. In 1994 suffered a series of ; HSBC times, all in cash, for America's No. 2 consumer finance bank HI acquisition. HI was the area of consumer finance in the United States ranked second only to the suffering for the time being the threat of rising bad debt rate, by the end of September 2002 6 months past due bad debt ratio has risen to 4.8%, which is for a Bank of America is a very dangerous signal. proposed 14.8 billion takeover offer, of which 134 billion to 1.5 times book value, re-evaluation of assets shrunk by half.) Figure 5 and Figure 6 is easy to see, recovery period, when local banks not to recover from huge losses, some banks even on the verge of bankruptcy, can not wait for economic recovery. In this time, the The noble more fully. cyclical volatility in emerging markets more violent, low discount more lucrative arbitrage (Figure 7) In 1995, While inflation was a big clean up the banking sector, foreign banks took the opportunity to buy In 1996, Brazil has the 7th largest insurance companies and 5 of the largest fund management company .1997, market position in Argentina, acquired eight offices and increased its investment in insurance and annuity business. In 2002, of the crisis .2001 credit card business, .2001 Insurance Fund took over in July, large gains, and to promote the rapid expansion of its worldwide In 2003, But in fact periodic crises into the HI, its a lot of bad debt provision has been made a lot of company's assets shrunk .2002, $ 5,180,000,000. But, however, these are the bad debt provision as the U.S. economic recovery has been partially reversed .2004, areas the proportion of the total loan amount from the previous year also fell 2.9% to 1.7%. taking into account the expansion of the size of loans, in fact,
low M & A activities, Total operating profit gained 13.4% of the average annual growth rate of mature markets in Europe also gained on the growth rate of 12.1%, far higher than the localization of other European banks. Even the UK's biggest banks Barclays, over the past 10 years average annual growth rate of operating profit is only 9.75%; France's largest bank the have more, which makes into a low, desperate need of new capital to enter, a group of European and American financial institutions to take the opportunity to large-scale presence. which Newbridge low of 5 million U.S. dollars from the South Korean government bought Korea First Bank 51% of the shares, then the whole Bank of value less than 9 billion, while losses on up to 10 billion U.S. dollars. but 5 years later, with some of South Korea's economic recovery and the reversal of bad debts, Korea First Bank has significantly improved the performance of 10 January .2005 Japan, Korea First Bank, Newbridge Group to sell 3.25 billion in the price of Standard Chartered Bank, 5 years, earned 24 billion U.S. dollars. In addition, the German commercial banks in Korea Exchange Bank for 249 million investment, most of from the previous conversion from the Bank loan to the 27.79% stake in Korea Exchange Bank to become the second largest shareholder.
2006, the State contribution to profit before tax for the first time exceed 10 billion U.S. dollars. Figure 8 as : first in the growth potential of the region regional groupings
global strategy for the the output of good management, br>
decentralized system of risk management as a highly globalized banks, , asking them to its various branches have set up their own risk monitoring system, while the headquarters is only responsible for the high-level credit policies. that is, in business, industry, geographical position between the exposure to credit risk and capital allocation of asset allocation, Then by the subsidiary under the Headquarters of the strategic plan and position a ; in bad debt rate of around mainly by the local impact of the macroeconomic situation. In the region in the 2002 financial crisis, , as a whole, bad checks similar to the most stringent of Swiss bank (the last 5 years, the Swiss banking sector is also bad debt rate of around 3% average). decentralized model, HSBC r l as half of the proceeds from the stable, mature economy, half from the fast-growing but more volatile emerging markets, which are ...
Monday, February 28, 2011
Sunday, February 27, 2011
Car parking spaces itch
Times reporter Chen Ching March 1, with the interests of owners of closely related lie in the The first form with the local laws and regulations to regulate residential facilities in the city. the subject of much attention, as the important to the basic civil law, property law is to identify the property, the use of property and the basic legal protection of property is important to adjust the legal property relations. It involves the country's basic economic system, but also to the specific interests of ordinary people to live and work. The aftermath of the ten years and seven historic reading, Property Law was finally ready to come. outsiders that the introduction of property law in China will continue to promote the process of building a socialist legal system. The current scholars generally agreed that the legislative process of property law in the construction of China's socialist legal system to the way a sense of history is full of step by step, but also improve China's socialist market economic development process in miniature. policy of the first clear the ground of public parking spaces in Hangzhou vested owner Construction of the bike at the standard library are all the owners of all residential areas, after the completion of the development and construction unit of the transfer free of charge to all owners. to implement the residential property management, the owners may entrust the management of property services business; failure to implement the property management of residential areas, can be entrusted board of community residents. The first clear the ground provides public parking spaces belong to all owners of all residential areas. This also means that residential property owners, the General Assembly can decide to use parking spaces, as long as the consent of all owners of parking spaces can be rented or may not be leased. Public spaces are rented or not rented in the end, if the cell in a car more than owners, we all want money, parking lot is not the likelihood of rent; if a car owner is a minority, then the possibility of leasing the large, because family car takes a certain extent, car-free family resources. can be expected in the future may become district car owners and car owners are facing a long Game. Here, the relevant legal sources, all with the use of the two a completely different gratitude, present, Hangzhou, many vehicles in the parking area less common the fact that, once the use of open spaces, residential parking will further exacerbate the chaos, therefore, from the current measurement, free use of parking within the district the possibility of very limited space. receive residential parking control using residential parking fees is still an important way, but before the difference is that this part of the parking revenue will be attributable to the district all the owners. Here, the source said, in the actual revenue management, the district should be established for the parking fees charged by a special account owned by all owners of all, in order to effectively monitor the special funds. case of residential underground garage, parking spaces and ground the attribution of so many people wearing peace idea: parking spaces do not need to buy now, and naturally to the owners for free. This in the end is not really the case? currently about underground garage (parking) the ownership, right to use ownership of the owners and developers often a major contradiction between the focus and the underground garage area (bit) sold separately, it is common practice developers. Over the years, the resulting dispute after another, the owners sued the developers, so the case is not uncommon. Nanjing Xinghan City Garden underground garage owner disputes that are more typical litigation to win the case. Xinghan Owners Committee to the City Garden, Nanjing Drum Tower District People's Court Star & Company, requesting that the district court confirmed the underground garage of the possession, use, income, sanctions on behalf of the plaintiff the right to go all the owners.'s Court: Defendant Jiang Su Xinghan Properties Limited in the decision within 10 days from the date of entry into force of the star underground parking Seoul Garden star handed over to the plaintiff board of Seoul Garden, the owners, by the star Han City Garden, all the owners to enjoy the rights and interests of the underground parking garage. On the issue of property rights and residential garage developers can be sold separately, I think that has always been clear, there is no controversy. because the Ministry of Construction as early as December 1, 1995 implementation The the common pool area houses shall be deducted as a separate space for sale or rent use of basement floor area. This clearly shows the use of space in the basement as a separate, shed, etc., developers can either lease sales. 1, 2005 18 day more clearly, Hangzhou residential area in the underground garage, parking spaces, etc. to belong, can lease sales are at a glance. because the effective implementation of this day, Article V (d) provides that: parking in residential areas into the ground, semi-underground, underground parking garage and surface parking. parking configuration standards: Huxing building area of 150 square meters or more, not less than 1 parking spaces / household ; units in the 100-149 square meters floor area of not less than 0.7 parking spaces / household; units of 80-100 square meters in floor area of not less than 0.5 parking spaces / household. units of 79 sq m floor area, not less than 0.15 parking spaces / household. residential parking standard of 10% should be configured as a temporary public parking spaces, may not be leased for sale. temporary parking free of charge by the development and construction unit handed over to the owners of the Committee, by a property management company responsible for the management. the failure to implement property management district, the committee responsible for community residents. use of the basement (except for air defense facilities), half basement, overhead garage floor storey building, width and depth should meet the national specification. garage met the registration certification requirements, the development and construction of housing units in accordance with relevant provisions of the ownership certificate to apply for the sale or rental; do not meet the registration of licensing conditions, the housing sale, garage sale the right to use in the purchase contract agreement shall be reported to the competent administrative department for the record real estate . garage in residential area of the real estate community where only the right people transferee, or where the residential real estate for the right owner or lessee of hire. now even more clearly the ownership of parking spaces on the ground, because the interest with you close and local laws and regulations of concern, Bike Library are all the owners of all residential areas, from development and construction unit after the completion of the transfer free of charge to all owners. to implement the residential property management, the owners may entrust the management of property services business; failure to implement the property management of residential areas, community residents can be entrusted to the Committee Management . fine. {of the Bar Association of Zhejiang Province Commission construction and real estate business, Hangzhou Arbitration Commission, Zhejiang Contact Law Office, Senior Counsel} market, market outlook for car owners, Hangzhou car garage parking problems encountered in private vehicles proliferation and cell planning lags behind, and now, parking spaces, years on behalf of the former building of the old district, parking is difficult to once again highlighted the problem. Fengqi Road is located in a district was built in the late nineties of last century, the residential property management on the predict the next few years the amount of cell doubling of private cars, many families are still more than a car, plus there are district offices, frequently traveling business people every day in the busy parking problems. Province as an economic development capital city of Hangzhou is suffering from the current , 2010, Hangzhou City parking aggregate demand will reach 85,896. In sharp contrast, the parking spaces in Hangzhou, the number of cars far behind the expansion has been rapid growth. reasonably necessary planning and professional management of a industry on the The residential parking is a no choice but to silently accept the way, because your home is there, you can not go very far or distant places, throw in your car there overnight. the source said, Hangzhou parking with the current market, at present most of the residential area mainly in the open air parking and underground parking dominated the way. Among them, the residential parking management is one of many property companies in particular feel the headache caused a lot of headache, On the one hand because of lack of advance planning of parking spaces, and more is the lack of effective management measures, parking is obviously unreasonable and so on, in order to solve the problem of residential parking, parking spaces, rational planning and professional management is necessary . In fact, aspects related to residential parking lot, including reasonable parking plan, with appropriate construction standards for parking spaces, parking design and so on. No matter what, the most crucial point is that the interests of residents from the community and needs, this will eventually create a harmonious and efficient parking environment. of residential parking demand factors, including population, residential area, building area, type, location, income level and so on. which, by the construction of world cities successful experience has shown that the use of urban underground space construction of public facilities and urban three-dimensional traffic system is the only way to achieve sustainable urban development. parking investment prospects experts said that as the planning behind, there are many cities in China the problem of insufficient parking spaces, a huge gap will naturally resulting in higher prices; the rapid rise in house prices, land transfer caused by the improvement of parking spaces are an important reason for rising prices. In addition, the real estate industry by the macro-control, but also allow some individual investors will look to the parking market, Parking naturally become a hot investment. Generally speaking, foreign universal adoption of high fuel tax, road toll, license tax, parking fees high limit car use, which is China's future development. In this process, may continue to create parking price. Yun Qian Jianguo, general manager and real estate, said the parking spaces in urban areas simply do not worry about not sell. Urban real estate marketing manager Tom Kay said that as many owners have two car, even if the parking spaces in urban real estate is a 1:1 ratio, it is difficult to meet their needs. Analysts said that as a residential area in Hangzhou, there is little real estate to achieve a 1:1 parking configuration, which will the growing popularity of the private car parking spaces caused by the scarcity of the future (especially in the downtown block). Secondly, the price measure, the price of downtown residential parking spaces 18-20 million, and other blocks west of the city and cross Qianjiang residential parking spaces between the price of 8.5-17 million, up by other developed cities, there are still considerable room for growth; Finally, the automobile market rose for the potential investment in domestic car parking spaces laid a good hint, the car began to tariffs stage of the lower domestic prices of a significant decline in economy car also greatly stimulate the car market continue to emerge, so that quickly flourished. part of the list real estate sales prices of parking spaces on Spring River House 22 million 25 million in favor of Lin Jin Duhua Spirit Wind 200,000 yuan underground two-story 165,000 yuan Qiantang Repulse Bay City Garden Phase II 180,000 yuan Yun-atrium garden and purple Jinchang 21-22 ten thousand yuan of modern Mandarin 170,000 yuan The Wild Frontier Territory 160,000 yuan in China The New Trend of the garage in the upscale residential district to start using mechanical parking at present, with the rapid development of China's automobile, the increasing number of car owners, the city still traffic problems have become increasingly prominent. in urban construction planning, especially in new buildings , high-end residential area on the parking spaces more and more attention, and made specific matching requirements, how the new residential area built on land with limited development area and who can save a sufficient number of parking spaces, has become a room real estate developers must consider the important issue. According to the distance, to move many of the residential property owners bring their own cars, and thus build enough parking spaces will be a strong housing sales promotion agents. how to set up in the limited space for more parking spaces to meet the parking needs of the tenants have the same time, work focused on the characteristics of access to car access to car time again put forward higher requirements. Therefore, the developer built in the district where three simple movements garage. The program and the space in the building were set on the 354 parking spaces, surface parking than the original 118 in the number tripled. Haihai Qi Park residential area on the residential construction area of 70,594 square meters, floor area ratio of 4.6, greening rate of 40%, planning requires 280 parking spaces configured. by The traditional ground parking design, the need 9800 square meters space, obviously can not be achieved. developers decided to adopt has been demonstrated after the lifting and mechanical parking class. the lifting and mechanical parking is only 3300 square meters building area about parking spaces than the traditional ground-saving two-thirds of the land area, the average area of a parking space (including access to vehicle access) is only 10.8 square meters. if you increase the parking garage floors, each parking area is also can be further reduced. The design of residential land basically resolved the contradiction between the conflict and parking spaces. experts said that despite the current mechanical parking There are many types, but the lift garage is the most prominent advantage of flexible arrangement, between buildings can take advantage of free ground, the distribution of local conditions, can further improve the land use coefficient, consistent with the surrounding environment and easy. Meanwhile, the parking garage is completed, the entire area to improve parking for the standard management and living environment quality play an important role. alone parking building blocks of upscale communities began to emerge in addition to the above exploration, the other developers have adopted the construction of a separate parking building to solve the biggest in the limited space to improve parking efficiency. by the Beijing City Wangjing New City Development Group developed Wangjing Yinlingguoji such community initiatives are taken. According to square meters, it could also stop 755, is a set of parking, car washing, heat in one, fully functional private parking garage. vehicle into parking position, the front stretching from the rear part of composite space, the parking space above the effective utilized, both to avoid the waste of space, turn the building into the deep north-south direction to shorten the 3-meter, effective control of the building size, to avoid the impact on surrounding buildings. in building height, parking building 2.6 meters using a small-storey, Without prejudice to stop using the features and the total height of the building control. Through such a design innovation and construction of a new technology, this parking building at the same site conditions and building height limit cases increased the number of actual parking. Design of Parking planning requirements exceeded the number of 8% to 755, effectively alleviate the small number of required parking spaces and contradictions. the industry, said the new parking building to improve parking garage than the average efficiency of about 20%, which is 20% Intelligent trend has become more evident. In recent years the car has become a static management and focus on the dynamic balance of new problems. management efficient, safe and reasonable, fast and convenient parking lot of automatic management system has become a large comprehensive building facilities. located in the downtown area's many senior apartments, office buildings, hotels, office buildings, playgrounds, etc. In order to ensure the safety of vehicles and transport facilities, urgent need for the high degree of automation, convenient parking automatic management system to improve parking management. Among them, Shanghai Raffles City to become one of the representatives. by the Capitaland, Sino Land, Temasek Holdings, Singavest investment, Shanghai, Nanjing Road Trading Center jointly built commercial buildings - Raffles City Shanghai's underground garage also has its own distinct characteristics . Tibet Road in Shanghai, Fuzhou Road, Singapore's Raffles City as the largest investment project in China, including a 51-storey commercial building, and a 7-storey shopping mall. where there are underground garage, three, the entire parking lot sub- for the six regions, the reasons for the direction of the vehicle, ground floor into three regions, is set to A,, B zone and C zone, three ground floor into three regions, is set to D,, E, F area region. In order to facilitate casual users looking for parking spaces in each layer are dedicated underground parking spaces LED indicates the computer screen in real time, stand-alone display device detection coil and the parking spaces, parking spaces each have a certain amount of parking to enter this level when , the corresponding layer of the parking spaces that cry 1, drove away when you stop by this layer, this layer either empty parking spaces plus 1. so run to the last space is full, a corresponding number of parking spaces empty layer begins with 1 → 0, this parking space is full, while the full digital device of this layer goes on to tell the temporary parking users do not have to look for this layer is, direct access to the next level. so stop at a glance, the lifting of unnecessary trouble finding parking spaces. depth of the central pushing Property Law Review Emerging and established the introduction of 7 property rights system in China Times reporter Ching Chen comprehensive report to adhere to the basic socialist economic system? to equal protection of the state, collective and private property rights? how to prevent the loss of state assets? charge reasonable compensation for demolition to ? housing people how to do land-use right expires? residential parking spaces in the end belongs to whom? can be said that property rights legislation covering both the country's basic economic system, but also bearing on the vital interests of a very high degree of social concern. In view of this, how to further modify and improve the draft law to establish property rights system with Chinese characteristics, has become a hot topic in two sessions this year. Authorities said the property law this information will be considered for adoption, said the central experience of ten years to develop this , dozens of changes, and record the highest number of China's legislative record in the history of the law to consider the case of the final attitude - pushing the introduction of property law. With the strong desire of the central authorities set the tone, after a variety associated with the Property Law confront cutting-edge, will also be declared by the wayside. The first to propose the proposed property law CPPCC National Committee member Wang Xiang recent interview related to media, said: Hang producers perseverance, property law will protect and create enthusiasm and creativity generated, encourage all people to create wealth. right protection to create enthusiasm and creativity generated, I created the wealth is legitimate, should be protected, you go to create the future you create the wealth will be protected. property law encourage all people to create wealth. state-owned assets is also a value-added process, will be protected by property law. should dilute the ownership, as long as you are legal, they should be protected. consideration of property law through the consideration of the NPC Standing Committee 7, also caught numerous times controversial, but mature in the dispute, and gradually form a consensus. The draft property law, if passed, will further improve the system of property rights, and greatly promote the development of market economy. Interview with Zhejiang Xing Yun Law Office of Indirect Interpretation of the draft law protection, that is, in which property law, property rights, not the level of hierarchy, whether it is state property or private property or collective property are subject to equal protection of property law. To this end, the draft property law provides a to prohibit any entity or individual to occupy, loot, privately divide, retain or destroy prohibiting any unit or individual to occupy, loot, destroy. owned by the owners. In other words, the draft will be residential roads, green space and property services to the owners there were clearly defined, and will have, ownership of the garage to resolve by agreement: club, ownership of the garage, there is agreement, as agreed ; no agreement or unknown, in the final by the owners. Clearly, developers and owners negotiated by the club, ownership of the garage reflected the principle of autonomy of civil law, and in line with market economy, but also conducive to the developer of the club, the management of the garage and maintenance. However, the draft of the agreement does not specify how ownership, practice will face many problems, for example, parking garage and whether it is necessary to distinguish between? developers and all the owners agreed or agreed with a single owner? If with all agreement is based on the majority of the owners or the owners of more than half of the total area subject to the views of the owners? if the developer agreed to return part of the owners of all parts of the garage while the garage owned by the developer agreed to all his part, is unknown as agreed? If agreement owned by developers of all, it means that developers can plot the garage, club, sold to any person other than residential property owners? the need for Yezhu enjoy priority to purchase? In addition, in practice, developers and owners of the information is not symmetry, developers accounted for obvious advantages, how to prevent developers transition to using the provisions to challenge. And, if the garage to allow developers, clubs freely transferred, leased to others, especially people other than owners, it may harm the interests of owners. background link the three concepts of property rights must be aware of the property Life explained: Property, layman's terms, a cow belonging to you, you can use it to till the fields, pulling carts, be rented out to others to use, you can also kill the beef. This is the exclusive right of disposal, any person can not interfere with you. ownership of life to explain: you have a house, you can own use; can be rented to others, collect rent; also be resold to others. this is your ownership of this building houses.
Thursday, February 24, 2011
Currency War, Economy and China under the Strategy on
We must understand that this economic crisis must move back in history, it will be difficult to see inside the key changes. So the crisis should be back from the Vietnam War from the beginning.
United States in the Vietnam War, was a substantial growth in demand because of the war made to benefit the U.S. economy. statistics, the United States 1965mm1966 two years, U.S. economic growth of more than 6%. but because of the Vietnam War, North Vietnam's support in the Chinese (the Vietnam War, Vietnam received aid from China as much as 800 billion Yuan, think about why China was self-defense against Vietnam War so hard? Ho Chi Minh City to China what to give what, do not turn against the United States after the withdrawal of identification. So, then reached the Chinese military assistance to Vietnam to move industrial equipment and are back), the war completely into a stalemate, the United States increasingly heavy defense spending, the economy was gradually drawn into the quagmire of .1967, the U.S. economy more than 6% from the previous year's GDP growth rate plummeted, with only 2%. Moreover, Since then the U.S. economy slide into recession. From December 1969, the United States began the outbreak of a new round of economic crisis, .1970, the U.S. economy is stalled.'s new president after Richard Nixon was elected in 1968 actually began the withdrawal of the preparatory work, in the 1973 Nixon in office, he finally completed the withdrawal of troops from Vietnam.
hit the U.S. this time, a sense is a blessing in disguise. because it is the United States into a quagmire in Vietnam and ultimately failed, led West and the East the pressure drop, and so is the direct result of conflict in the Soviet Union began to intensify, and eventually the formation of Sudui Li. Later, as the complete withdrawal of U.S. forces in Vietnam, there is no pressure on the former Soviet Union have begun brazenly In 1973, positive supported by the former Soviet coup in Afghanistan and the eventual regime change. But the new government took office and did not take orders from the Soviet side, but directly backward U.S., this has enraged the Soviet side, and finally in April 1978 launched another round of coup, coup fully backward this time, the Soviet side. However, a series of make Afghanistan into a Soviet satellite state of the practice, sparking a rally in the Afghan people (actually behind the United States dictates, which is between the great powers third countries fight, then normal, however, now also been performed, for example, the Kyrgyz coup earlier, re-election of Ukraine, etc.), and finally large-scale emergence of a national uprising. In this case, the Soviet authorities In order to keep their business for many years in this country control over the decision to send troops to intervene directly. Failed a copy of the U.S. war in Vietnam started! because, like the United States into the quagmire of the Vietnam War because the North Vietnamese as a major power behind (China), former Soviet Union, the war in Afghanistan, the Afghan insurgents is a powerful United States behind.
years of war, directly caused the collapse of the Soviet Union's economy and reputation in the international arena (Afghanistan is a third world country, which is directly to the former the Soviet Union lost the support of third world countries) .1989 withdrawal from Afghanistan in February, more than two years after the disintegration of the former Soviet Union! this disintegration, is actually two camps in the Soviet Union against the failure of the Soviet side, the The result is the collapse of the former Soviet Union ended.
reason for the collapse of the Soviet Union, simply because three points: 1, over-expansion led to too many enemies, especially against the Soviet Union gradually after the collapse of the socialist camp makes .2, excessive expansion of the special Afghan war is complete collapse of the Soviet economy, and the planned economy of the Soviet Union itself repair capacity than the market economy, much less the United States. U.S. standard world currency, the U.S. has a strong capital market, which makes fruitful, the United States can make use of these amendments .3 interest, the Soviet Union after the failure of the war in Afghanistan, directly to the repair has been sufficient interest in the United States gave birth. This triple pressure, and ultimately makes the polar bear its own defeat, the collapse of the former Soviet Union night.
we come back that the United States. In Vietnam, the United States military, economic, political suffered heavy losses in all directions. In order to resolve the crisis, the United States in 1971 will be the final dollar and gold decoupling, making the United States can be done by issuing excessive currency out of the crisis. After the United States in 1973 and complete withdrawal from Vietnam, Vietnam abandoned piece of turf in South Asia. But it is the so-called lost in the east corner was Sang Yu, 1973 Middle East war broke out, followed by the outbreak of the oil crisis. In fact, the United States is the opportunity.
decoupled the dollar and gold, the United States already has a junk theory, the power of money. However, this power is subject to the control of resource prices that mm. because, if you can not control the prices of resources, then U.S. junk monetary resources will inevitably lead to rising prices, while the sharp rise in resource prices will not only damage the world economy, and it will backfire on the U.S. economy. Once the world economy into an uncontrollable cycle of the U.S. dollar's international status definitely suffer or even collapse. Therefore, the United States to achieve world trade, economic, financial, currency and a series of control must be de-linked the dollar and gold, get the pricing of resources. So, in May 1973, the world's top 84 financial and politicians gathered quietly to the door of the Swedish Wallenberg banking family island resort 索尔茨约巴登. In the vividly depicts the OPEC (OPEC OPEC) oil revenue growth of about 4 times there, when the 1973 Middle East war broke out, this is one of the best starting point.
1973 年 10 months, Egypt and Syria to the Israeli war. Iraq, Jordan, Algeria, Libya, Morocco, Saudi Arabia, Sudan, Kuwait, Tunisia and the Palestine Liberation Organization were to send troops or aircraft involved in operations in the Middle East war. this war can be said that the war turned the United States earned. In fact, the U.S. director of war is simply war planning, including the outcome of the war are within the control of the United States.
around the Middle East War, Washington and London, directed a series of secret planning of actions. which, by the National Security Adviser Henry Kissinger, Nixon established a secret diplomatic channels: the United States with a strong political influence and some related promises, successfully brought under control by the Israeli ambassador in Washington, Israel's external reaction. At the same time, Kissinger has also opened up with Egypt, Syria, channels of communication on key issues through the misinformation to the two intelligence and ultimately ensure that the war broke out, also contributed to the so-called OPEC oil embargo in the wrong direction.
According to U.S. intelligence reports showed that almost all Arab countries seized on the confirmation has already begun between officials of the intelligence gathering of war have been Kissin cell pressure down. what the outcome is very simple, the U.S. support of Israel won the war, Arab oil-producing countries because the oil out of a crisis, become the common enemy of world opinion. After a series of measures taken by the United States divided the camp of the Arab countries , under pressure and the temptation to split the Arab League final, part of the country poured into the arms of the United States. petrodollars this form, the pricing power of oil speculators on Wall Street also fell into the hands thoroughly. With oil dollars tied up, the U.S. economy seventy has gradually restored in the late end of .1982, before the United States completely out of the crisis!
this time the former Soviet Union doing? into the quagmire of the war in Afghanistan it! the United States at this time to recovery, the repair is a big country gave birth rate, and the former walking in the Soviet Union is being aggressive and malignant expansion of the road. In the U.S. economy during the restoration of Israel and in June 1982 and launched on the fifth Middle East war. the war, making the Middle East and Arab countries to split completely into . In a sense, this is to divide the Arab countries the United States in a war. the interests of Israel, said that this is safe! from the U.S. perspective, U.S. oil safe! control of all of them in the United States. And the next goal is to rival the former Soviet Union!
therefore, the Afghan rebels in access to more and more U.S. support, the former Soviet Union, more and more difficult war in Afghanistan, the former Soviet Union into a Vietnam-style quagmire, the United States without know it. So, a few years, the former Soviet Union's economy is getting worse, more and more internal conflicts intensified, eventually had to withdraw from Afghanistan in 1989. withdraw from Afghanistan more than two years, the World War II Xiongbayifang the empire disintegrated.
United States in the eighties also did a what? led Western allies, forced the Japanese in 1985, signed copies of the results of a seven thousand seven hundred eighty-eight ransacked. Japan this decline, losing ten or twenty years, is lost to the third decade ahead! and originally, Japan is like a large capital markets through the gradual establishment of the economic hit from the collapse the United States. But imagine that a lack of political, military, economic range of the absolute sovereignty of the country, how could compete with its master?
the Soviet withdrawal from Afghanistan, basically in the last legs, leg to stand on the state. the United States, the complete loss of the opponent. looted after the U.S. economy, Japan has been valiant in high spirits. At this point, the meat home again, greed under Saddam Hussein in the United States feel more and more well-armed, and finally too good self- makes it feel the acquiescence of the United States have a strategic misjudgment mm invasion of Kuwait. In a sense, Saddam was self-inflicted, Saddam tried to help expand American power (in fact, after the Iran-Iraq war, has begun to alienate the United States in Iraq U.S. Congress some influential members have begun to include the poor state of human rights in Iraq, Iraq of its weapons and equipment and its rapid strengthening issues such as Israel's hostile attack on Iraq. But Saddam did not listen to Congress remarks on behalf of the U.S. government, while his family and the Bush family, the so-called personal relationships are too confident that the U.S. will eventually acquiesced in the invasion and occupation of Kuwait), and ultimately to increase their bargaining chip in the countries in the Gulf. This force eventually bound to challenge to the status of oil dollars. As a result, Americans will be counted on the meter, will be pushed into the abyss of Saddam Hussein. Saddam's family, in the U.S. in the 21st century after the war in Iraq is basically dead! it to this point, we can see the strategic error how much damage contractors, not only ruin and death, even death of the States! Iraqis became conquered people, the people in dire straits. dressed in Western democracies coat of Satan, how absurd and frightening.
1990 年 8 1 May, Iraq Kuwait broke up around the oil issue. August 2, Iraq invaded Kuwait and quickly occupied the whole territory of .8 7 May, the U.S. military to move into Saudi Arabia January 17 In 1991, the US-led multinational forces bombed Baghdad, the Gulf War the outbreak of war in the same year on February 28 over. Since then, the United States through the United Nations launched a series of sanctions against Iraq and, ultimately, the Iraq war in 2003, the occupation of Iraq completely! these actions the United States, not only is a complete split in the Arab countries, and even have come to the territory it! Gulf War, the U.S. dollar and oil bound more solid. bundle of oil dollars, the total liberation of the U.S. economy, the U.S. is simply the golden age of the nineties, the Dow after the Gulf War above 3000 mark, and all the way to the beginning of 2000 Veuve Clicquot has been approaching 12,000, or up to 4 times! from the Nasdaq is less than 700 points in 1994, more than 5,000 points for six years, this is the famous Internet bubble burst. Of course, there is also after the full explanation of the factors, but which is the basis of oil dollars and complete bundle of factors.
strong dollar makes oil bound for several years the United States and moisture, but the U.S. economy to 1994 peak. Since 1995, the U.S. economy began to decline. the real economy can not, for the United States, the country has invested in fully saturated, it can only engage in a virtual economy. the first pull U.S. stocks to attract capital to the United States engage in a virtual world economy and attract the world's capital to enter the United States; a lot of money into the United States, launched a strong dollar, strong dollar go route, continue to attract international capital into the United States; pulling crude oil prices, pushed up developing economies to continue running costs, while accelerating the Middle East oil countries make take the oil capital to continue to the United States back! Just think, the first pull U.S. stocks, pulling dollar dollar of capital, so they are hunters who. And then who? In U.S. high exchange rate when the exchange went, and then Wall Street and in the high-access disk However, the influx of capital, so take the bull not only U.S. stocks, dollar take the bull! the same time, pushed up crude oil prices are also increasing the cost of the economic performance of developing countries. In fact, take a look at more than one year after the 1995 oil price movements, trend of the dollar index will find that they are strong! What is the reason? control reasons, the capital of the control! to 1997, the U.S. selected a robbery target, developing countries in Southeast Asia, Southeast Asia, this outbreak of economic crisis!
why the United States to scramble for the developing countries in Southeast Asia? strategy for the country! because capital flows in two directions, one into the industrial capital to developing countries, and the other is the flow into the virtual capital of the United States. It exists in two directions the nature of conflict, so the need for the United States this time a vandalism, more capital will be forced back to the United States. This time, the U.S. high-tech development to a critical moment, much-needed funds, if the large financial and foreign blood transfusion, technology is likely to fall short. Therefore, the robbery started that way. The robbery is not the most important fact is directly succeeded the capital, Soros is nothing more than direct those who succeed, the real fight for the Southeast Asian economic giant things, in addition to a large hot money a large number of industrial capital because of the fear of Southeast Asian economic crisis and massive withdrawal of U.S. hedge, of course, this is a bunch of American-made high-tech concept of the attraction. Correspondingly, we can see that the dollar index in 1996-1998 significantly rise, which is a lot of capital into the U.S. to leave the scene. Meanwhile, the Nasdaq boomed since 1996, until the Internet bubble burst in 2000, actually rose to a staggering 1,000 points from 5,000 points or more. that some robbery, USA 1997 years, GDP growth reached a staggering 4.5%, which is the best year of the 90's, and then stimulated in the high-tech investment, GDP growth for three consecutive years the U.S. economy more than 4%. what a great asset to be floating in so transferred.
2000, the Internet bubble burst, a virtual asset bubble burst, the U.S. economy was hard hit. But in this round of asset bubbles, the United States gain the commanding heights of the high-tech, high ground on this one allow the United States through the WTO's intellectual property protection in a massive and long-term income. Why rely on a software Bill Gates could become the richest man? not that the protection of intellectual property code? that relying on high-tech monopoly, as United States brought enormous wealth! eight hundred million shirts in order for Boeing, this fair? The so-called intellectual property protection, is the power to plunder between countries. In a sense, the law depends on the legislative game Who is who in order to protect! Therefore, a country who is the constitutional protection of their fundamental, it is time to amend the constitution must be noted. as long as the essence of the constitution is not changed, any other problems in the process of development theory In their wisdom can be corrected after opening. The essence of the constitution was changed once again to change back the difficulty is that a whole nation can be a purgatory.
In any case, the Internet bubble burst, the bubble is, after all, return to the United States massive accumulation of capital. So, at this time what the United States do not protect investors, but to use every way to the capital to the trap. United States to take the following steps:
first step: use almost rose up as fast as the Nasdaq index more than five thousand points from 1,100 points to play back, so that investors can not ship. This step trap a lot of capital, such capital can not escape, all of a sudden was palpable inside the. So, we see the result, although the Nasdaq bubble burst, investors suffered heavy losses, but such as Microsoft, Oracle, Hewlett-Packard, Yahoo and other companies still live very moist, has become the world's most powerful high technology companies. because of money financial hand, the compensation may not own, the investors, these high-tech companies earlier earned pours. this process, the Fed is raising interest rates to continue to deliberate through the bubble burst . The so-called Greenspan bubble growth, but that is a beautiful lie. this world, the state capital level players will not give up all control of the capital market. The U.S. versa! Moreover, the Federal Reserve, Wall Street would have is a group of people, Alan Greenspan, but it is their agent.
Step two: take the road of a weaker dollar. Although the Nasdaq is killed, buried a lot of capital, but the overall decline in the Dow is not If there is no further investment opportunities in the United States, the capital of the withdrawal or to withdraw. capital knows no borders, not to mention the Middle East, which borders the capital did not, even the Wall Street big capital are without a motherland, they only understand money, do not well they will also withdraw, as the United States is not quite down with their relationship is the relationship between the money. Therefore, the second step must be the nineties by the weak dollar these large capital inflows to cover in, so that they can not go out from the U.S. capital markets (From this perspective, the U.S. government and Wall Street is a common interest, at least half past one of Wall Street speculators will leave the United States nest). Just think, rushed to the original $ 1, and now in the stock market lost a part of the exchange rates impairment as part of another, no one wants to cut positions flesh out, not to mention the money in the United States or the value of so much money. So, if there is no particularly good opportunity, the capital was pressed into the United States, go on to become long-term long-term capital, rooting Le. From this perspective, China must follow, but the resources are not used as in the U.S., China has its own resources. This is something not to start here.
So, starting in 2002 U.S. dollar weaker dollar to cover the capital.
third step: take the bull market in the capital market (no matter how up, Nasdaq will go up.) Dow go bull market since 2002, has been cattle in 2007 subprime crisis.
three steps, the first step well understood, without too much explanation, the second and third step is extremely complex. It contains the Afghan war, the Iraq war and ironing Greenspan level economic trends. In fact, the excessive greed of the United States, and economic trends, Greenspan tried to iron out the the future will be nailed to shame! history, will give the most fair assessment Greenspan! So, those who Alan Greenspan as a man of God, you have to own their first nail in the shame!
United States take a very good understanding of the logic of the weak dollar, is by dilution to reduce balance sheet debt pressure, to obtain greater financing capacity (it plainly, is to leverage the use of capital in their control before the crash in the world their hands). Meanwhile, in order to further control the oil resources, to 9.11 in the case as a pretext to launch war in Afghanistan (before the war against Yugoslavia was to dismember the euro, which is yet another level, the limited space will not say . But there is one thing we need to know that the euro challenge the dollar in order to establish that, so the United States launched the war dismembered dismembered Yugoslavia, making European integration to a standstill, the euro and European integration are phased to a halt.) Afghanistan, the Middle East will land dispute is the hub of Asia, Europe and Africa. So, who controls Afghanistan, in fact, the Asia, Europe and Africa to control the throat, because once the Iraq and Afghanistan put together, it can squeeze Iran's living space, or even directly Iran won. Once in Afghanistan, Iran, Iraq, all fall into American hands, not just to control oil, but also stuck in Europe, Russia, the Americans say the world is not only considered those countries a chance to even the anti- no. So, win in Afghanistan, the United States soon entered the war in Iraq broke out again. war can spur economic growth, so the war of 2001, economic growth, effective immediately, by the 2002 GDP to grow 0.8% in 2001 to 1.6% in 2002 In 2003 Iraq war, the U.S. GDP continues to grow, this trend lasted until 2004, GDP growth of 3.6% (in fact, Central Europe and Russia in the U.S. fight in Iraq when Iraq has been in operation nuclear issue, because only this war can be pushed up the cost of the United States to Iran. In fact, now the focus of the game world on the nuclear issue in Iran. the Iranian nuclear issue is how the final solution will determine the ultimate power to). < br> However, the war, a lot of money, so we need to issue a large number of dollars, so the United States to continue to issue the dollar to continue to depreciate. The money is not enough, war inevitable high consumption, so ironing Greenspan called economic plan baked. that is, in the war at the same time, the Fed continue to lower interest rates as high as 11 times in 2001 to lower interest rates, from 6.0% interest rate raised to 1.75% within a year. Meanwhile, the U.S. launched a special housing loan scheme for poor Through the purchasing power of the poor to advance economic growth (in fact, this point and let the yuan appreciate to advance China's purchasing power is substantially the same, but different way.) poor Americans almost without any guarantee for loans to buy a house (no guarantees, but the interest rate is much higher than the Fed discount rate, the so-called credit rating also), and because the property market speculation led to a very low discount rate of stir-fried, interim housing prices can offset this risk. Ever since, a large number of buildings is to unsecured form of loans sold to people who otherwise can not afford housing. In theory, the real estate bubble as long as not broken, and if the control of a reasonable size, this loan is not terrible. the reality on the contrary, the U.S. housing market prices, increasing loan size, while the U.S. government did not impose any control, but because the real estate investment to promote economic growth fueled temptation. U.S. authorities here certainly know the risks, so a new sub-loans to the core, after carefully packaged subprime financial products available, and a variety of ways and channels to the world financial institutions and investors to spread state sovereignty. This is the seeds of the subprime crisis.
U.S. Federal Reserve is actually a U.S. government issued debt way issue, that the U.S. government to issue revenue bonds as collateral, debt first by retail investors, such as sovereign wealth funds and financial institutions. subscription after the expiry of the remaining acquisition by the Federal Reserve, the Federal Reserve after the acquisition, and then release the same amount of dollars to the market. In this process, the U.S. government is constantly borrowing to play too, investors are borrowers, the Fed took the claim is enjoyed after the U.S. government and taxpayers pay the interest, but also can spit out to the market same amount of dollars. is to say, the Fed make someone else's assets to pay debt interest on U.S. taxpayers. So, this game is that the Fed will always make money, the U.S. government will never borrow; U.S. government debt is old debt make up new debt, but the actual not yet; results become: the Fed will always make money, the U.S. government will never owe. The Fed is the capitalists, the U.S. government is representative of the American people. think about cause and effect here, if the U.S. is over, the capitalists leave paper bag, and that American people? dire 啦!
However, in this world, any excessive greed will pay a price. The United States has over overdraft balance sheet makes less and less of American power (in that the taxpayer's ability to pay them the, Moreover, the United States are engaged in a rich foundation, do not pay taxes, the American middle class did not have increased ability to pay the following space), can not be quick war in Iraq and Afghanistan wars but also consumes a lot of resources. Meanwhile, Iran delayed can not win and can not get stuck on the United States put pressure on Russia and Central Europe. Finally, by 2007, due to the sharp rise in the Dow, the Dow had fitted into a lot of money around the corner, there is the urge to leave the United States. Just think, 90 red into the U.S. capital even after the Nasdaq crash was covered in, and then the dollar so they could not leave these capital gains, and if the Dow continues to rise, the capital of the first profitable, taking into account the prospect of the United States, how many capital because it is expected to withdraw from the United States? United States this is the virtual economy, where capital can withstand this withdrawal? This is America's most worried about! So in the end, this effort to iron out the economy, Greenspan had to once again pick up the additional interest rate weapon to puncture the stock market bubble, while accelerating the depreciation of the dollar, purpose is once again caught the capital. Therefore, the reality is that the sub-prime mortgage debt in the United States take the initiative to prick the bubble, which burst the bubble of the ultimate goal is to trap 90 rushed into the U.S. capital market has started to urge withdrawal of capital.
sub-prime, like a bomb detonated, wounding the others, but also let the world see the reality of the United States. sub-prime, is the Seven Injuries Boxing , not only for wound had hurt; wounding intentionally, hurt that he is helpless ah! So, after the various bailout policies have come, many countries around the world holding the rescue of their own money, only the United States to save their own The city, with other people's money. Even so, still fill the United States, the debt black hole. sub-prime crisis was due to the presence of the international game factors, the financial crisis evolving, and finally evolve into bond-style economic crisis is not over until now.
In fact, the crisis is not the final bill if the person is basically impossible to end the crisis is essentially a fight for hegemony in order to protect the United States, other countries to shake the hegemony of the war. The United States is looking to carry this debt The main crisis of the black hole to maintain hegemony, China is the best choice, since China has a large population, the demographic dividend with industrial upgrading, as well as the potential to be tapped, not to mention China in recent years has accumulated a large amount of capital, can take away those from China capital, while enjoying the benefits of cheap Chinese goods. So, the temptation to China, the United States engage in G2, it means China supports the United States continues to be the Boss, the United States to China the status of a second child, and then take the white freeload, the United States to spend money, China pays the bill! until the Chinese national power drain so far! that time, the United States can continue to look to the next object to be learned, such as India. However, when the Chinese to become a vampire sucking the essence and blood are the bladder, the Chinese people this utter friends. Therefore, China can not promise the end, so this great game played all kinds of variations on the version. For example, leads to the war in Georgia, the crisis leads to Dubai, the Greek crisis, and so on. but so far, the balance of power in all aspects United States still does not grasp the victory and hope, and as any party in Central Russia, the same for their own interests are in the game. In this square, in fact, inadequate response to the event of any party, may become the object of the other three divided . the world is so realistic and cruel. to see what the U.S. trumpeter! look at the drum for the trumpeter who cheer brainwashed! Do you think these people were sold to others also count the money for other people? sad!
In addition, Why is this so-called Master of Economics, Ph.D., professor, eight well-known economist, and so nonsense? In addition to problems is the head butt, we know the decision to head butt, but there is a brain washed, so much water. economy can not simply look to see the economic, historical picture to be opened to look for context, in addition to the economy will have to see the political, military, and the so-called historical materialism but also!
more than two in the morning, has finally finalized second! subversion of the above how much the mainstream view? his comrades, mutatis mutandis it. ins and outs of this crisis, basically clear. Who used to say so clearly over?
Copyright accounted ho blog, reproduced indicate the source; to encourage the dissemination, copying rejected
United States in the Vietnam War, was a substantial growth in demand because of the war made to benefit the U.S. economy. statistics, the United States 1965mm1966 two years, U.S. economic growth of more than 6%. but because of the Vietnam War, North Vietnam's support in the Chinese (the Vietnam War, Vietnam received aid from China as much as 800 billion Yuan, think about why China was self-defense against Vietnam War so hard? Ho Chi Minh City to China what to give what, do not turn against the United States after the withdrawal of identification. So, then reached the Chinese military assistance to Vietnam to move industrial equipment and are back), the war completely into a stalemate, the United States increasingly heavy defense spending, the economy was gradually drawn into the quagmire of .1967, the U.S. economy more than 6% from the previous year's GDP growth rate plummeted, with only 2%. Moreover, Since then the U.S. economy slide into recession. From December 1969, the United States began the outbreak of a new round of economic crisis, .1970, the U.S. economy is stalled.'s new president after Richard Nixon was elected in 1968 actually began the withdrawal of the preparatory work, in the 1973 Nixon in office, he finally completed the withdrawal of troops from Vietnam.
hit the U.S. this time, a sense is a blessing in disguise. because it is the United States into a quagmire in Vietnam and ultimately failed, led West and the East the pressure drop, and so is the direct result of conflict in the Soviet Union began to intensify, and eventually the formation of Sudui Li. Later, as the complete withdrawal of U.S. forces in Vietnam, there is no pressure on the former Soviet Union have begun brazenly In 1973, positive supported by the former Soviet coup in Afghanistan and the eventual regime change. But the new government took office and did not take orders from the Soviet side, but directly backward U.S., this has enraged the Soviet side, and finally in April 1978 launched another round of coup, coup fully backward this time, the Soviet side. However, a series of make Afghanistan into a Soviet satellite state of the practice, sparking a rally in the Afghan people (actually behind the United States dictates, which is between the great powers third countries fight, then normal, however, now also been performed, for example, the Kyrgyz coup earlier, re-election of Ukraine, etc.), and finally large-scale emergence of a national uprising. In this case, the Soviet authorities In order to keep their business for many years in this country control over the decision to send troops to intervene directly. Failed a copy of the U.S. war in Vietnam started! because, like the United States into the quagmire of the Vietnam War because the North Vietnamese as a major power behind (China), former Soviet Union, the war in Afghanistan, the Afghan insurgents is a powerful United States behind.
years of war, directly caused the collapse of the Soviet Union's economy and reputation in the international arena (Afghanistan is a third world country, which is directly to the former the Soviet Union lost the support of third world countries) .1989 withdrawal from Afghanistan in February, more than two years after the disintegration of the former Soviet Union! this disintegration, is actually two camps in the Soviet Union against the failure of the Soviet side, the The result is the collapse of the former Soviet Union ended.
reason for the collapse of the Soviet Union, simply because three points: 1, over-expansion led to too many enemies, especially against the Soviet Union gradually after the collapse of the socialist camp makes .2, excessive expansion of the special Afghan war is complete collapse of the Soviet economy, and the planned economy of the Soviet Union itself repair capacity than the market economy, much less the United States. U.S. standard world currency, the U.S. has a strong capital market, which makes fruitful, the United States can make use of these amendments .3 interest, the Soviet Union after the failure of the war in Afghanistan, directly to the repair has been sufficient interest in the United States gave birth. This triple pressure, and ultimately makes the polar bear its own defeat, the collapse of the former Soviet Union night.
we come back that the United States. In Vietnam, the United States military, economic, political suffered heavy losses in all directions. In order to resolve the crisis, the United States in 1971 will be the final dollar and gold decoupling, making the United States can be done by issuing excessive currency out of the crisis. After the United States in 1973 and complete withdrawal from Vietnam, Vietnam abandoned piece of turf in South Asia. But it is the so-called lost in the east corner was Sang Yu, 1973 Middle East war broke out, followed by the outbreak of the oil crisis. In fact, the United States is the opportunity.
decoupled the dollar and gold, the United States already has a junk theory, the power of money. However, this power is subject to the control of resource prices that mm. because, if you can not control the prices of resources, then U.S. junk monetary resources will inevitably lead to rising prices, while the sharp rise in resource prices will not only damage the world economy, and it will backfire on the U.S. economy. Once the world economy into an uncontrollable cycle of the U.S. dollar's international status definitely suffer or even collapse. Therefore, the United States to achieve world trade, economic, financial, currency and a series of control must be de-linked the dollar and gold, get the pricing of resources. So, in May 1973, the world's top 84 financial and politicians gathered quietly to the door of the Swedish Wallenberg banking family island resort 索尔茨约巴登. In the vividly depicts the OPEC (OPEC OPEC) oil revenue growth of about 4 times there, when the 1973 Middle East war broke out, this is one of the best starting point.
1973 年 10 months, Egypt and Syria to the Israeli war. Iraq, Jordan, Algeria, Libya, Morocco, Saudi Arabia, Sudan, Kuwait, Tunisia and the Palestine Liberation Organization were to send troops or aircraft involved in operations in the Middle East war. this war can be said that the war turned the United States earned. In fact, the U.S. director of war is simply war planning, including the outcome of the war are within the control of the United States.
around the Middle East War, Washington and London, directed a series of secret planning of actions. which, by the National Security Adviser Henry Kissinger, Nixon established a secret diplomatic channels: the United States with a strong political influence and some related promises, successfully brought under control by the Israeli ambassador in Washington, Israel's external reaction. At the same time, Kissinger has also opened up with Egypt, Syria, channels of communication on key issues through the misinformation to the two intelligence and ultimately ensure that the war broke out, also contributed to the so-called OPEC oil embargo in the wrong direction.
According to U.S. intelligence reports showed that almost all Arab countries seized on the confirmation has already begun between officials of the intelligence gathering of war have been Kissin cell pressure down. what the outcome is very simple, the U.S. support of Israel won the war, Arab oil-producing countries because the oil out of a crisis, become the common enemy of world opinion. After a series of measures taken by the United States divided the camp of the Arab countries , under pressure and the temptation to split the Arab League final, part of the country poured into the arms of the United States. petrodollars this form, the pricing power of oil speculators on Wall Street also fell into the hands thoroughly. With oil dollars tied up, the U.S. economy seventy has gradually restored in the late end of .1982, before the United States completely out of the crisis!
this time the former Soviet Union doing? into the quagmire of the war in Afghanistan it! the United States at this time to recovery, the repair is a big country gave birth rate, and the former walking in the Soviet Union is being aggressive and malignant expansion of the road. In the U.S. economy during the restoration of Israel and in June 1982 and launched on the fifth Middle East war. the war, making the Middle East and Arab countries to split completely into . In a sense, this is to divide the Arab countries the United States in a war. the interests of Israel, said that this is safe! from the U.S. perspective, U.S. oil safe! control of all of them in the United States. And the next goal is to rival the former Soviet Union!
therefore, the Afghan rebels in access to more and more U.S. support, the former Soviet Union, more and more difficult war in Afghanistan, the former Soviet Union into a Vietnam-style quagmire, the United States without know it. So, a few years, the former Soviet Union's economy is getting worse, more and more internal conflicts intensified, eventually had to withdraw from Afghanistan in 1989. withdraw from Afghanistan more than two years, the World War II Xiongbayifang the empire disintegrated.
United States in the eighties also did a what? led Western allies, forced the Japanese in 1985, signed copies of the results of a seven thousand seven hundred eighty-eight ransacked. Japan this decline, losing ten or twenty years, is lost to the third decade ahead! and originally, Japan is like a large capital markets through the gradual establishment of the economic hit from the collapse the United States. But imagine that a lack of political, military, economic range of the absolute sovereignty of the country, how could compete with its master?
the Soviet withdrawal from Afghanistan, basically in the last legs, leg to stand on the state. the United States, the complete loss of the opponent. looted after the U.S. economy, Japan has been valiant in high spirits. At this point, the meat home again, greed under Saddam Hussein in the United States feel more and more well-armed, and finally too good self- makes it feel the acquiescence of the United States have a strategic misjudgment mm invasion of Kuwait. In a sense, Saddam was self-inflicted, Saddam tried to help expand American power (in fact, after the Iran-Iraq war, has begun to alienate the United States in Iraq U.S. Congress some influential members have begun to include the poor state of human rights in Iraq, Iraq of its weapons and equipment and its rapid strengthening issues such as Israel's hostile attack on Iraq. But Saddam did not listen to Congress remarks on behalf of the U.S. government, while his family and the Bush family, the so-called personal relationships are too confident that the U.S. will eventually acquiesced in the invasion and occupation of Kuwait), and ultimately to increase their bargaining chip in the countries in the Gulf. This force eventually bound to challenge to the status of oil dollars. As a result, Americans will be counted on the meter, will be pushed into the abyss of Saddam Hussein. Saddam's family, in the U.S. in the 21st century after the war in Iraq is basically dead! it to this point, we can see the strategic error how much damage contractors, not only ruin and death, even death of the States! Iraqis became conquered people, the people in dire straits. dressed in Western democracies coat of Satan, how absurd and frightening.
1990 年 8 1 May, Iraq Kuwait broke up around the oil issue. August 2, Iraq invaded Kuwait and quickly occupied the whole territory of .8 7 May, the U.S. military to move into Saudi Arabia January 17 In 1991, the US-led multinational forces bombed Baghdad, the Gulf War the outbreak of war in the same year on February 28 over. Since then, the United States through the United Nations launched a series of sanctions against Iraq and, ultimately, the Iraq war in 2003, the occupation of Iraq completely! these actions the United States, not only is a complete split in the Arab countries, and even have come to the territory it! Gulf War, the U.S. dollar and oil bound more solid. bundle of oil dollars, the total liberation of the U.S. economy, the U.S. is simply the golden age of the nineties, the Dow after the Gulf War above 3000 mark, and all the way to the beginning of 2000 Veuve Clicquot has been approaching 12,000, or up to 4 times! from the Nasdaq is less than 700 points in 1994, more than 5,000 points for six years, this is the famous Internet bubble burst. Of course, there is also after the full explanation of the factors, but which is the basis of oil dollars and complete bundle of factors.
strong dollar makes oil bound for several years the United States and moisture, but the U.S. economy to 1994 peak. Since 1995, the U.S. economy began to decline. the real economy can not, for the United States, the country has invested in fully saturated, it can only engage in a virtual economy. the first pull U.S. stocks to attract capital to the United States engage in a virtual world economy and attract the world's capital to enter the United States; a lot of money into the United States, launched a strong dollar, strong dollar go route, continue to attract international capital into the United States; pulling crude oil prices, pushed up developing economies to continue running costs, while accelerating the Middle East oil countries make take the oil capital to continue to the United States back! Just think, the first pull U.S. stocks, pulling dollar dollar of capital, so they are hunters who. And then who? In U.S. high exchange rate when the exchange went, and then Wall Street and in the high-access disk However, the influx of capital, so take the bull not only U.S. stocks, dollar take the bull! the same time, pushed up crude oil prices are also increasing the cost of the economic performance of developing countries. In fact, take a look at more than one year after the 1995 oil price movements, trend of the dollar index will find that they are strong! What is the reason? control reasons, the capital of the control! to 1997, the U.S. selected a robbery target, developing countries in Southeast Asia, Southeast Asia, this outbreak of economic crisis!
why the United States to scramble for the developing countries in Southeast Asia? strategy for the country! because capital flows in two directions, one into the industrial capital to developing countries, and the other is the flow into the virtual capital of the United States. It exists in two directions the nature of conflict, so the need for the United States this time a vandalism, more capital will be forced back to the United States. This time, the U.S. high-tech development to a critical moment, much-needed funds, if the large financial and foreign blood transfusion, technology is likely to fall short. Therefore, the robbery started that way. The robbery is not the most important fact is directly succeeded the capital, Soros is nothing more than direct those who succeed, the real fight for the Southeast Asian economic giant things, in addition to a large hot money a large number of industrial capital because of the fear of Southeast Asian economic crisis and massive withdrawal of U.S. hedge, of course, this is a bunch of American-made high-tech concept of the attraction. Correspondingly, we can see that the dollar index in 1996-1998 significantly rise, which is a lot of capital into the U.S. to leave the scene. Meanwhile, the Nasdaq boomed since 1996, until the Internet bubble burst in 2000, actually rose to a staggering 1,000 points from 5,000 points or more. that some robbery, USA 1997 years, GDP growth reached a staggering 4.5%, which is the best year of the 90's, and then stimulated in the high-tech investment, GDP growth for three consecutive years the U.S. economy more than 4%. what a great asset to be floating in so transferred.
2000, the Internet bubble burst, a virtual asset bubble burst, the U.S. economy was hard hit. But in this round of asset bubbles, the United States gain the commanding heights of the high-tech, high ground on this one allow the United States through the WTO's intellectual property protection in a massive and long-term income. Why rely on a software Bill Gates could become the richest man? not that the protection of intellectual property code? that relying on high-tech monopoly, as United States brought enormous wealth! eight hundred million shirts in order for Boeing, this fair? The so-called intellectual property protection, is the power to plunder between countries. In a sense, the law depends on the legislative game Who is who in order to protect! Therefore, a country who is the constitutional protection of their fundamental, it is time to amend the constitution must be noted. as long as the essence of the constitution is not changed, any other problems in the process of development theory In their wisdom can be corrected after opening. The essence of the constitution was changed once again to change back the difficulty is that a whole nation can be a purgatory.
In any case, the Internet bubble burst, the bubble is, after all, return to the United States massive accumulation of capital. So, at this time what the United States do not protect investors, but to use every way to the capital to the trap. United States to take the following steps:
first step: use almost rose up as fast as the Nasdaq index more than five thousand points from 1,100 points to play back, so that investors can not ship. This step trap a lot of capital, such capital can not escape, all of a sudden was palpable inside the. So, we see the result, although the Nasdaq bubble burst, investors suffered heavy losses, but such as Microsoft, Oracle, Hewlett-Packard, Yahoo and other companies still live very moist, has become the world's most powerful high technology companies. because of money financial hand, the compensation may not own, the investors, these high-tech companies earlier earned pours. this process, the Fed is raising interest rates to continue to deliberate through the bubble burst . The so-called Greenspan bubble growth, but that is a beautiful lie. this world, the state capital level players will not give up all control of the capital market. The U.S. versa! Moreover, the Federal Reserve, Wall Street would have is a group of people, Alan Greenspan, but it is their agent.
Step two: take the road of a weaker dollar. Although the Nasdaq is killed, buried a lot of capital, but the overall decline in the Dow is not If there is no further investment opportunities in the United States, the capital of the withdrawal or to withdraw. capital knows no borders, not to mention the Middle East, which borders the capital did not, even the Wall Street big capital are without a motherland, they only understand money, do not well they will also withdraw, as the United States is not quite down with their relationship is the relationship between the money. Therefore, the second step must be the nineties by the weak dollar these large capital inflows to cover in, so that they can not go out from the U.S. capital markets (From this perspective, the U.S. government and Wall Street is a common interest, at least half past one of Wall Street speculators will leave the United States nest). Just think, rushed to the original $ 1, and now in the stock market lost a part of the exchange rates impairment as part of another, no one wants to cut positions flesh out, not to mention the money in the United States or the value of so much money. So, if there is no particularly good opportunity, the capital was pressed into the United States, go on to become long-term long-term capital, rooting Le. From this perspective, China must follow, but the resources are not used as in the U.S., China has its own resources. This is something not to start here.
So, starting in 2002 U.S. dollar weaker dollar to cover the capital.
third step: take the bull market in the capital market (no matter how up, Nasdaq will go up.) Dow go bull market since 2002, has been cattle in 2007 subprime crisis.
three steps, the first step well understood, without too much explanation, the second and third step is extremely complex. It contains the Afghan war, the Iraq war and ironing Greenspan level economic trends. In fact, the excessive greed of the United States, and economic trends, Greenspan tried to iron out the the future will be nailed to shame! history, will give the most fair assessment Greenspan! So, those who Alan Greenspan as a man of God, you have to own their first nail in the shame!
United States take a very good understanding of the logic of the weak dollar, is by dilution to reduce balance sheet debt pressure, to obtain greater financing capacity (it plainly, is to leverage the use of capital in their control before the crash in the world their hands). Meanwhile, in order to further control the oil resources, to 9.11 in the case as a pretext to launch war in Afghanistan (before the war against Yugoslavia was to dismember the euro, which is yet another level, the limited space will not say . But there is one thing we need to know that the euro challenge the dollar in order to establish that, so the United States launched the war dismembered dismembered Yugoslavia, making European integration to a standstill, the euro and European integration are phased to a halt.) Afghanistan, the Middle East will land dispute is the hub of Asia, Europe and Africa. So, who controls Afghanistan, in fact, the Asia, Europe and Africa to control the throat, because once the Iraq and Afghanistan put together, it can squeeze Iran's living space, or even directly Iran won. Once in Afghanistan, Iran, Iraq, all fall into American hands, not just to control oil, but also stuck in Europe, Russia, the Americans say the world is not only considered those countries a chance to even the anti- no. So, win in Afghanistan, the United States soon entered the war in Iraq broke out again. war can spur economic growth, so the war of 2001, economic growth, effective immediately, by the 2002 GDP to grow 0.8% in 2001 to 1.6% in 2002 In 2003 Iraq war, the U.S. GDP continues to grow, this trend lasted until 2004, GDP growth of 3.6% (in fact, Central Europe and Russia in the U.S. fight in Iraq when Iraq has been in operation nuclear issue, because only this war can be pushed up the cost of the United States to Iran. In fact, now the focus of the game world on the nuclear issue in Iran. the Iranian nuclear issue is how the final solution will determine the ultimate power to). < br> However, the war, a lot of money, so we need to issue a large number of dollars, so the United States to continue to issue the dollar to continue to depreciate. The money is not enough, war inevitable high consumption, so ironing Greenspan called economic plan baked. that is, in the war at the same time, the Fed continue to lower interest rates as high as 11 times in 2001 to lower interest rates, from 6.0% interest rate raised to 1.75% within a year. Meanwhile, the U.S. launched a special housing loan scheme for poor Through the purchasing power of the poor to advance economic growth (in fact, this point and let the yuan appreciate to advance China's purchasing power is substantially the same, but different way.) poor Americans almost without any guarantee for loans to buy a house (no guarantees, but the interest rate is much higher than the Fed discount rate, the so-called credit rating also), and because the property market speculation led to a very low discount rate of stir-fried, interim housing prices can offset this risk. Ever since, a large number of buildings is to unsecured form of loans sold to people who otherwise can not afford housing. In theory, the real estate bubble as long as not broken, and if the control of a reasonable size, this loan is not terrible. the reality on the contrary, the U.S. housing market prices, increasing loan size, while the U.S. government did not impose any control, but because the real estate investment to promote economic growth fueled temptation. U.S. authorities here certainly know the risks, so a new sub-loans to the core, after carefully packaged subprime financial products available, and a variety of ways and channels to the world financial institutions and investors to spread state sovereignty. This is the seeds of the subprime crisis.
U.S. Federal Reserve is actually a U.S. government issued debt way issue, that the U.S. government to issue revenue bonds as collateral, debt first by retail investors, such as sovereign wealth funds and financial institutions. subscription after the expiry of the remaining acquisition by the Federal Reserve, the Federal Reserve after the acquisition, and then release the same amount of dollars to the market. In this process, the U.S. government is constantly borrowing to play too, investors are borrowers, the Fed took the claim is enjoyed after the U.S. government and taxpayers pay the interest, but also can spit out to the market same amount of dollars. is to say, the Fed make someone else's assets to pay debt interest on U.S. taxpayers. So, this game is that the Fed will always make money, the U.S. government will never borrow; U.S. government debt is old debt make up new debt, but the actual not yet; results become: the Fed will always make money, the U.S. government will never owe. The Fed is the capitalists, the U.S. government is representative of the American people. think about cause and effect here, if the U.S. is over, the capitalists leave paper bag, and that American people? dire 啦!
However, in this world, any excessive greed will pay a price. The United States has over overdraft balance sheet makes less and less of American power (in that the taxpayer's ability to pay them the, Moreover, the United States are engaged in a rich foundation, do not pay taxes, the American middle class did not have increased ability to pay the following space), can not be quick war in Iraq and Afghanistan wars but also consumes a lot of resources. Meanwhile, Iran delayed can not win and can not get stuck on the United States put pressure on Russia and Central Europe. Finally, by 2007, due to the sharp rise in the Dow, the Dow had fitted into a lot of money around the corner, there is the urge to leave the United States. Just think, 90 red into the U.S. capital even after the Nasdaq crash was covered in, and then the dollar so they could not leave these capital gains, and if the Dow continues to rise, the capital of the first profitable, taking into account the prospect of the United States, how many capital because it is expected to withdraw from the United States? United States this is the virtual economy, where capital can withstand this withdrawal? This is America's most worried about! So in the end, this effort to iron out the economy, Greenspan had to once again pick up the additional interest rate weapon to puncture the stock market bubble, while accelerating the depreciation of the dollar, purpose is once again caught the capital. Therefore, the reality is that the sub-prime mortgage debt in the United States take the initiative to prick the bubble, which burst the bubble of the ultimate goal is to trap 90 rushed into the U.S. capital market has started to urge withdrawal of capital.
sub-prime, like a bomb detonated, wounding the others, but also let the world see the reality of the United States. sub-prime, is the Seven Injuries Boxing , not only for wound had hurt; wounding intentionally, hurt that he is helpless ah! So, after the various bailout policies have come, many countries around the world holding the rescue of their own money, only the United States to save their own The city, with other people's money. Even so, still fill the United States, the debt black hole. sub-prime crisis was due to the presence of the international game factors, the financial crisis evolving, and finally evolve into bond-style economic crisis is not over until now.
In fact, the crisis is not the final bill if the person is basically impossible to end the crisis is essentially a fight for hegemony in order to protect the United States, other countries to shake the hegemony of the war. The United States is looking to carry this debt The main crisis of the black hole to maintain hegemony, China is the best choice, since China has a large population, the demographic dividend with industrial upgrading, as well as the potential to be tapped, not to mention China in recent years has accumulated a large amount of capital, can take away those from China capital, while enjoying the benefits of cheap Chinese goods. So, the temptation to China, the United States engage in G2, it means China supports the United States continues to be the Boss, the United States to China the status of a second child, and then take the white freeload, the United States to spend money, China pays the bill! until the Chinese national power drain so far! that time, the United States can continue to look to the next object to be learned, such as India. However, when the Chinese to become a vampire sucking the essence and blood are the bladder, the Chinese people this utter friends. Therefore, China can not promise the end, so this great game played all kinds of variations on the version. For example, leads to the war in Georgia, the crisis leads to Dubai, the Greek crisis, and so on. but so far, the balance of power in all aspects United States still does not grasp the victory and hope, and as any party in Central Russia, the same for their own interests are in the game. In this square, in fact, inadequate response to the event of any party, may become the object of the other three divided . the world is so realistic and cruel. to see what the U.S. trumpeter! look at the drum for the trumpeter who cheer brainwashed! Do you think these people were sold to others also count the money for other people? sad!
In addition, Why is this so-called Master of Economics, Ph.D., professor, eight well-known economist, and so nonsense? In addition to problems is the head butt, we know the decision to head butt, but there is a brain washed, so much water. economy can not simply look to see the economic, historical picture to be opened to look for context, in addition to the economy will have to see the political, military, and the so-called historical materialism but also!
more than two in the morning, has finally finalized second! subversion of the above how much the mainstream view? his comrades, mutatis mutandis it. ins and outs of this crisis, basically clear. Who used to say so clearly over?
Copyright accounted ho blog, reproduced indicate the source; to encourage the dissemination, copying rejected
Wednesday, February 23, 2011
All the most detailed history of the most asked hacking on the phenomenon of
First of all ask you a few questions, we condemnation to see if the situation on you.
1, how many computers are not equipped with anti-virus software, firewalls, or how many people have installed and used correctly; < br> 2, how many people asked in the play was in full swing when the QQ chat;
3, how many people have installed the system when using a tomato garden and a series of so-called computer company dedicated system disk;
4 , how many people do not care every day's an endless stream of Microsoft patches;
5, how many people can not stand the temptation to go PLMM video or photos;
6, the number of people at home, no computer No password or password complexity;
7, how many home computer is on GUEST account and log in using non-Administrator account login, despite setting a password, but the highest authority of the Administrator account but no password (please find out What these words mean);
8, the number of people online in the company or agency, have a hardware firewall will not do any preventive measures;
9, the number of people using the plug-in;
10, there How many people are in a very insecure Internet cafes;
11, how many people will see some unsafe sites (pornography, violence, etc.);
12, how many people like to readily link to some unknown point;
13, a small number of people like to seek cheaper, I believe in the path or the stranger asked to see the unofficial news site;
14, how many people see other people hacking jealous, go online to search for your download Trojan The following detailed talks. Speaking of hacking, you can not talk about hacking QQ. I would like to ask the number of stolen hang QQ, certainly far more than the number of stolen numbers game. For most Internet users, QQ hacking may is their first contact with the hacking phenomenon. early steal No. Q There are two main methods.
one kind of Trojan horse is a local machine. This is a very common method, and is very simple, as long as you can have a QQ (or asked) Trojan on the line, this software can be everywhere, high number of random sites where hackers can find a small, and its working principle is very simple, first of all it has the record, type it password can be automatically recorded, when the Trojans were (asked) it begins to record keyboard input, and some will first pop up a Trojan disguised as windows and QQ landing window, waiting for you to numbers, passwords are entered after the point of identification, it will prompt for password is not correct, then pop off the real the login box, regardless of which method is more, this time your QQ number + password has been sent to the mailbox of the person hacking. (asked where this phenomenon does not appear, because the two different data authentication here talk about). In this way those who generally require hacking to steal objects have access to a computer, for online games is, under normal circumstances is not realistic, but also do not have much practical value.
II is a kind of Trojan horse remote machine. principle is the same way and the only difference is that hacking does not need access to a computer to steal objects, a way to transfer files through the Trojan plant.
understand the principle, the theft of method is very simple.
early hacking tool also exhaustive software is non-stop combination of data from 1 until test the true password. This tool is the least practical value, but the password is simple for those who , that was very dangerous.
the first category above, can be attributed to the keylogger to steal. Simply put, is to use the Trojan records the action under your keyboard, record account number and password. Therefore, for this of the most common way of hacking, Guangyu developed a soft keyboard. you will be prompted to log in and use the soft keyboard input is more secure, they consider that is the problem. with the software disk, Trojans can not record the keyboard stuff. So, you Guangyu in the security aspects can not say no substantive action, they really made some improvements.
problem is getting a soft keyboard on the end of the story begin? completely wrong. even said that the blunt point, this only However, self-deceiving, became deaf ears m display a.
asked about what the soft keyboard works: the user asks for a password when you log in, you can use the mouse to click the soft key on the keyboard to enter a password, but each times asked to open the login window, the soft keys on the keyboard are random changes to ensure that the password is not keylogging Trojan to steal. and the preparation of the Trojan hackers took advantage of some of the user's habits and inertia Psychology: asked that the landing window with a soft keyboard, by mouse clicks you can enter the password to the password security is not guaranteed to be stolen. In fact, the Trojan has been asked to consider the soft keyboard to use password-protected security measures The Trojan is activated, the soft keyboard window, trying to intercept a text message sent to the soft keyboard input for user account information to break through the soft keyboard password protection technology. In fact, more and more specialized Daohao who have abandoned the traditional way to record keyboard, and not very effective with the current measures to prevent a memory recorder mode.
I try to use simple language to understand about the problem. memory, is one speaking from the hardware section, but from the role in terms of computer storage is an important space for all temporary files. Some people think I do anything on their computer, read what the point of what, I shut the machine no one will know, the actual Not so on. you point a mouse, press the keyboard, open a file, all the actions of all the memory in the computer or have a record. know who will be able to find the machine code to open the computer record. Of course, do not know the person in front of you computer is heavenly. memory to record all of the memory can record changes in this sense, whether you enter the password point do not point the keyboard is no different. As long as you entered, even with the stylus, Trojan will also be recorded to capture the action of memory to be stolen. Even so, landing, or recommend the use of soft keyboard, even if the possibility of reduction of 1% of the stolen Ye Hao.
Some people say to not say no up against the law?
So, let us talk about the other security measures Guangyu: Password security card. a secret security card, in accordance with the idea Guangyu, the account is to add a safety lock, the randomly generated password Even those who master the features that make hacking your account and password can not log in without the state card. This is a good starting point, but also a lot of games now common security methods. But how effective is it? asked the brothers, you Is there no one with the secret state security card stolen you?
single case is: absolutely ... with the soft keyboard, like a thankless task Guangyu again. No card we usually also pay attention to points With the card, not a lot of people wary of that card on me, is absolutely safe. This is completely wrong. talked about this, we talk about the other famous hacker software: gray pigeons.
simple terms , gray pigeon to remotely control a computer program, strictly speaking, can be regarded as a kind of Trojan horse in the. Many people may have used remote assistance on QQ, the information sent to assist other party has accepted to enter the other side after desktop, control the other computer. the principle of gray pigeons here do not speak, only that he also played the role of such a remote control, of course, this is not require your consent. here Incidentally, Microsoft from the WINDOWS XP, system integration of the what to do. If your computer does not have the password or the password is simple, you can imagine what will happen. Do not say you are at home, how others will know where you are? Do not ask this naive question, I told you to slow time slow talks. Therefore, unless really necessary, turn off the remote desktop service. As to how relations, this is not a computer school, interested to me talk about that later.
back gray pigeons. how hacking? The fact is not hacking, but Pirates of the equipment, the other does not need your account password, account password is up to you to visit. that a simple point of it, this is the official website of a typical example. Add your first friend that you want to buy good equipment, so that no one place you go to him. you get to that found themselves without their own computer control. the other side of your equipment thrown on the ground, then pick away. Of course, this situation provided that your equipment is not locked, or to identify the main. Do not think that no such person, such person may not unusual, especially with the protection of people is a lot of cards, so you are not under any circumstances relaxed vigilance can be locked as locked in the short term is not prepared to sell the main things that must be recognized.
talked about this, and take out a topic: storage lock.
This is the 3rd largest Guangyu security measures, has long been equivalent to a Level 2 password. one to say this, but also the old saying: the heart is good, the effect is minimal. Some people think that once this protection is a big leap, to maximize the protection of the warehouse security. even number stolen, the player can come back to find something with warehouse comeback. But the truth is not so good imagination. seen I said above that, you dare to have this much confidence in the protection layer 2 it? However, the principle of stealing the inner code and the above mentioned is slightly different. specific principle I do not remember, long time no contact with this. But one thing you know, you need to steal the password to the inner open. That is the other side even if you already know the account and password, he will not wash number, so you only under the condition without knowing the correct password to open the warehouse, he can succeed. Of course, for you to know stresses do not have any meaning. Since they do not know is stolen, there is how can I make an effective defense?
Much has been said above, the method is also a wide range, but the premise is the same: to your computer a Trojan and connected to the network. Here's to specifically talk about the Trojans, so that we have a clearer understanding.
all the Trojans, are to exe at the end. QQ, or other contact so, upload to the exe files with the end of all please be careful. generally after the Trojans are not reflected in the double-click. But some people will use exe files exe files combiner will combine `` so that you run, you can run a program other and not to make their Trojan was found. there are those who will use the more popular the previous year to run winrar extracting exe files tied to a fixed directory, this is not to say this. In short, you are all accepted exe file to have to be careful! It is worth mentioning that many people would say you see his picture in the online `such is www .****. com / tupian.htm this web site, the general When you go, there is indeed seen pictures, but please be careful on those pages to see the pictures mostly jpg, gif.jpeg, such as the image format at the end of the URL, because this is the most popular in recent years I have seen is also the most vulnerable people in the network the way a horse ..
Some people have said, I installed antivirus software, each receiving a first anti-virus stuff automatically. I say, not so naive, anti-virus software So everything the world will have peace. now faster than a variant of trojan update anti-virus software is faster, otherwise there will not be so many people to play cat and big David Panda burning incense games.
Finally, a simple talk again Some protective measures it, the role of limited, but 1% can reduce the theft may be good.
First of all, anti-virus software and firewall, or want.
course, this is the computer for the purposes of their own. In recent years, Gradually a large number of anti-virus software coming to the fore. In the past, many families find spending hundred dollars to buy anti-virus software is too extravagant, but now the whole world as more and more attention to security issues, and more ordinary families are genuine anti-virus installed software. on the Rising, the price of 298, the real price of shipping around 130, with the market fluctuate, but also in the so. I am not advertising to the Rising can only say that I am using it all these years feel good.
you will not believe this day and age there is a free lunch, if you really account for their own safety, to stop eating dead chickens and other things for free Kabbah. That thing is really a lot of problems. For example, Trojan -PSW.Win32.Delf.eve Kabbah this trojan is specifically made loopholes in the dead chickens, it will modify the computer's system time, so that dead chicken anti-virus software failure Kabbah.
problems on antivirus software, I still have a specialized in the following description, in the hope that we can be helpful.
Second, the Internet cafes friends, please be careful.
you will say, Internet bars installed recovery card, all right. However, reduction card can only restore the system disk the contents of the data on other disks can not control. Yes, he was able to restart after installing all the programs previously cleared, but you think about it, sometimes even into the memory of the Trojans reload systems can not be deleted, you expect him to restore a 40 dollar card capable of performing the arduous mission clearly Trojans?? think of was dead pixels, some Internet cafes probably hacking the industry itself is a part of the chain, something which not easy to say.
Third, do not use a secret because of security card to the effect, locking the locking of the game, identify the main Lord of the recognition.
Fourth, the fact is most important. concentrate on playing your game.
do all day and parents unknown PLMM East, the West family of short, give you a video or photos you're elated, and by that time your number will be enough. In short sentence if any did not know you from QQ, pass over the things you do not take. the game was about to add you QQ get too excited.
Fifth, do not be silly people pull eight school ridiculed hacking.
hacking is not under MP3, search online under the Trojan download, you can search a lot. Do you think people can learn hacking down under friends?? you really sell the hacking as a cabbage ah? Some people take advantage of other people ready to do some net horse tool to generate web pages Trojans. as long as you visit his website, in fact, is the same horse in his net, the net horse is popular for the latest vulnerabilities do percent. Internet search to provide the so-called Trojan download site, I'm sure at least one half of the page itself implanted Trojan horses, waiting for people who dream of overnight riches the players learn to walk into the door. not so number of others you get your number has been flying out.
In fact, here is to remind you not to go to bad sites, including the so-called Trojan download site, sex and violence stops and so on. Of course, the Internet is not only these sites the existence of malicious code analysis from international experts, the current Ninety per cent of commercial websites are there different levels of background holes. NetEase is nothing less than formal, right? but before the pick up children is linked to the horse Netease event created a hubbub. If you are at the wrong time just in the wrong place, and it had to recognize inverted luck.
Sixth, the two need to pay particular attention to the process: expolrer.exe and spoolsv.exe.
Most of these two processes is the process of the computer must be running (spoolsv.exe process is related to the printer, if not related to the operation of the printer about to end). This two processes are the most likely to be implanted Trojan horses, and the specific In most cases the performance of the system to boot into the load time after a particularly long (about 1 minute or so back to normal). Do not think that there is no harm to normal. This situation is obvious, but not simple to solve (spoolsv.exe can be turned off, but expolrer.exe not). the general anti-virus software in most cases can not solve this problem (in the author's experience, this virus is not a solution for). Again, this is not the school computer, the computer professional After more talk about things. In the past, such a Trojan horse typically does not affect the user's account, its role is to affect the system rather than hacking. However, recently, the emergence of a new Trojan Trojan / PSW.Moshou.aql . This is the file name from the 10 random characters. Modify the registry, trojans automatically start running. player's game account, the game code, game area and other information services, and the player in the background information to hackers on the specified remote server. This Trojan is a malicious DLL file will be injected into the system, crucial in the process of loading operation, hidden self, and prevent killing. As a result of special skills, even if a malicious DLL file is running, the hard drive can not find traces of malicious DLL files. So, when everyone's computer exporer. exe process again an exception, must not be careless.
the seventh, I did not believe that anybody really believe BB to send the game spread, and to receive prizes of strange news, until one day a close encounter people are really fooled by such a strange message, was stolen on the site number, it felt very ashamed. On this point, really do not know what to say. so people incurable.
eighth, resistance off message.
this for some friends who may not be realistic, but it really is a very effective defense approach. previously mentioned, no matter what kind of Trojan horse to steal account largely accepted to be sent via email. Guangyu the server is not easy to be exploited so easily by hackers turn to other servers. The simplest is the mail server. do not need to deal with what you can through your mail gateway or firewall to force against the implementation of the Simple Mail Transfer Protocol ( SMTP, etc.) can completely prevent your computer to send e-mail. In this way, even if the other side of the Trojans, it has been effective, can not get the envelope containing your account information.
ninth game in the landing process, the non-normal pop-up window must be careful.
Recently, there has been called is to you click on this window: OK or Cancel. In fact, most players will not consider click been implanted with Trojan, which is very hidden, the player generally does not pay attention to this little incident. In this situation, you can press ESC to exit or restart the computer directly and thoroughly anti-virus.
tenth, will channel special attention to see this player.
Recently, a new online game hacking tool has emerged. The Trojan drew on the part of the concept of social engineering, that players in the game, such as online games, suddenly, is bound to will immediately log in again to continue the game, hackers took advantage of online game players accustomed to the operation of the general, quit the game to force the players to induce the player to re-sign in and wait for an opportunity to steal online game account and password. In this regard, if the player encountered in the course of the game suddenly quit the game, must be especially careful. the first detailed examination of the various startup parameters confirm the Windows system without exception, reboot the system to conduct the game. or you can use with active defense capabilities to install security software, to Centering online account with a lock.
example (Trojan-PSW.Win32.MiFeng.ai.dll) has adopted a new hacking tool above. The Trojan itself is for the online game two main program), forced to end, then the game will suddenly break, log back in the game until the player took the opportunity to steal online game account and password, the virus will steal the account password encrypted prepared to receive through the mail and web space Send to hacking hackers. If you in the game, the game suddenly interrupted, it is likely that you have in this Trojan virus, please do not be careless.
told top ten, certainly there are many ways to note , but I am not remember, we do can only say that these many, hope that we can take a closer look, do no harm.
below, a separate piece of secluded talk about the killing antivirus software and trojan problems.
I discussed above ten, the first thing we talked about the anti-virus software. For most ordinary players, stand-alone version of the antivirus software is the most important, or is the only way of protection. In fact, it is also true is the most effective protection method. In theory, in a newly installed, there is no damage to the system of genuine anti-virus software installed and up to date, open all the active defense, the player is generally not the infringement Trojan. Of course, this is kind of ideal state, a lot of players playing the game some more or less during the accident, so everything has drawbacks.
Many players have asked the author, saying that my computer is genuine anti-virus installed software, and antivirus every day, but the computer simply no Trojan, Trojan horses and even specialized Zhuanshagongju also find no exception, but the number is stolen, how is this going on here?
I say: kill does not mean less security. because there is a trojan called free kill!
the first to remind everyone that the killing was a relatively free word, for the current technology, the Trojan horse to avoid killing success rate is not high (in multi-engine test basis). but the user is relatively simple to install security software, so the production of targeted Trojan horse to avoid killing, for individual users is absolutely free to kill.
first to introduce a technology: rootkit.Rootkit came in the tenth century, the early 90s, literally, is a system-level management tool, is actually a kernel-level hackers use malicious tools, the most common application is to hide the whereabouts mm Trojan horse program files completely hidden, and registration process tables and analysis tools can make the general system failure, can not capture any clues. drive technology for the use of the characteristics of Rootkit, Rootkit detection and removal of the need to use higher levels of driver-level programming techniques, in-depth analysis to determine the kernel. For Rootkit detection and removal technology is the current international anti-virus industry, cutting-edge technology.
Next we will look at ways in which hackers are free to kill to achieve the purpose.
to everyone familiar with the gray pigeon cases. We first create a common gray pigeons Trojan server, and then anti-virus scanning software, can be found, the vast majority of anti-virus engines are able to identify the Trojan.
broadly divided into two encryption methods to avoid killing code , flower orders, packers, importers and modify the program manual DIY PE. The hand operation is not recommended, because this procedure to produce results is good, but too complex and require a strong basis for the assembly language, and have some knowledge of Windows kernel. the specific process I can not say here. After treatment, re-enter the antivirus software to scan and found that the virus can be identified as anti-virus engine is running out.
use of the means to protect themselves Rootkit Trojan documents, they use the use of protected visual hiding, even if the use of WINDOWS folder search function, select For such a It does not matter, the purpose is not want you to understand, but to tell you, not to God as hacking, any person who can not put your number by air stole the. summed up saying: The most important active defense, lust greedy undesirable
1, how many computers are not equipped with anti-virus software, firewalls, or how many people have installed and used correctly; < br> 2, how many people asked in the play was in full swing when the QQ chat;
3, how many people have installed the system when using a tomato garden and a series of so-called computer company dedicated system disk;
4 , how many people do not care every day's an endless stream of Microsoft patches;
5, how many people can not stand the temptation to go PLMM video or photos;
6, the number of people at home, no computer No password or password complexity;
7, how many home computer is on GUEST account and log in using non-Administrator account login, despite setting a password, but the highest authority of the Administrator account but no password (please find out What these words mean);
8, the number of people online in the company or agency, have a hardware firewall will not do any preventive measures;
9, the number of people using the plug-in;
10, there How many people are in a very insecure Internet cafes;
11, how many people will see some unsafe sites (pornography, violence, etc.);
12, how many people like to readily link to some unknown point;
13, a small number of people like to seek cheaper, I believe in the path or the stranger asked to see the unofficial news site;
14, how many people see other people hacking jealous, go online to search for your download Trojan The following detailed talks. Speaking of hacking, you can not talk about hacking QQ. I would like to ask the number of stolen hang QQ, certainly far more than the number of stolen numbers game. For most Internet users, QQ hacking may is their first contact with the hacking phenomenon. early steal No. Q There are two main methods.
one kind of Trojan horse is a local machine. This is a very common method, and is very simple, as long as you can have a QQ (or asked) Trojan on the line, this software can be everywhere, high number of random sites where hackers can find a small, and its working principle is very simple, first of all it has the record, type it password can be automatically recorded, when the Trojans were (asked) it begins to record keyboard input, and some will first pop up a Trojan disguised as windows and QQ landing window, waiting for you to numbers, passwords are entered after the point of identification, it will prompt for password is not correct, then pop off the real the login box, regardless of which method is more, this time your QQ number + password has been sent to the mailbox of the person hacking. (asked where this phenomenon does not appear, because the two different data authentication here talk about). In this way those who generally require hacking to steal objects have access to a computer, for online games is, under normal circumstances is not realistic, but also do not have much practical value.
II is a kind of Trojan horse remote machine. principle is the same way and the only difference is that hacking does not need access to a computer to steal objects, a way to transfer files through the Trojan plant.
understand the principle, the theft of method is very simple.
early hacking tool also exhaustive software is non-stop combination of data from 1 until test the true password. This tool is the least practical value, but the password is simple for those who , that was very dangerous.
the first category above, can be attributed to the keylogger to steal. Simply put, is to use the Trojan records the action under your keyboard, record account number and password. Therefore, for this of the most common way of hacking, Guangyu developed a soft keyboard. you will be prompted to log in and use the soft keyboard input is more secure, they consider that is the problem. with the software disk, Trojans can not record the keyboard stuff. So, you Guangyu in the security aspects can not say no substantive action, they really made some improvements.
problem is getting a soft keyboard on the end of the story begin? completely wrong. even said that the blunt point, this only However, self-deceiving, became deaf ears m display a.
asked about what the soft keyboard works: the user asks for a password when you log in, you can use the mouse to click the soft key on the keyboard to enter a password, but each times asked to open the login window, the soft keys on the keyboard are random changes to ensure that the password is not keylogging Trojan to steal. and the preparation of the Trojan hackers took advantage of some of the user's habits and inertia Psychology: asked that the landing window with a soft keyboard, by mouse clicks you can enter the password to the password security is not guaranteed to be stolen. In fact, the Trojan has been asked to consider the soft keyboard to use password-protected security measures The Trojan is activated, the soft keyboard window, trying to intercept a text message sent to the soft keyboard input for user account information to break through the soft keyboard password protection technology. In fact, more and more specialized Daohao who have abandoned the traditional way to record keyboard, and not very effective with the current measures to prevent a memory recorder mode.
I try to use simple language to understand about the problem. memory, is one speaking from the hardware section, but from the role in terms of computer storage is an important space for all temporary files. Some people think I do anything on their computer, read what the point of what, I shut the machine no one will know, the actual Not so on. you point a mouse, press the keyboard, open a file, all the actions of all the memory in the computer or have a record. know who will be able to find the machine code to open the computer record. Of course, do not know the person in front of you computer is heavenly. memory to record all of the memory can record changes in this sense, whether you enter the password point do not point the keyboard is no different. As long as you entered, even with the stylus, Trojan will also be recorded to capture the action of memory to be stolen. Even so, landing, or recommend the use of soft keyboard, even if the possibility of reduction of 1% of the stolen Ye Hao.
Some people say to not say no up against the law?
So, let us talk about the other security measures Guangyu: Password security card. a secret security card, in accordance with the idea Guangyu, the account is to add a safety lock, the randomly generated password Even those who master the features that make hacking your account and password can not log in without the state card. This is a good starting point, but also a lot of games now common security methods. But how effective is it? asked the brothers, you Is there no one with the secret state security card stolen you?
single case is: absolutely ... with the soft keyboard, like a thankless task Guangyu again. No card we usually also pay attention to points With the card, not a lot of people wary of that card on me, is absolutely safe. This is completely wrong. talked about this, we talk about the other famous hacker software: gray pigeons.
simple terms , gray pigeon to remotely control a computer program, strictly speaking, can be regarded as a kind of Trojan horse in the. Many people may have used remote assistance on QQ, the information sent to assist other party has accepted to enter the other side after desktop, control the other computer. the principle of gray pigeons here do not speak, only that he also played the role of such a remote control, of course, this is not require your consent. here Incidentally, Microsoft from the WINDOWS XP, system integration of the what to do. If your computer does not have the password or the password is simple, you can imagine what will happen. Do not say you are at home, how others will know where you are? Do not ask this naive question, I told you to slow time slow talks. Therefore, unless really necessary, turn off the remote desktop service. As to how relations, this is not a computer school, interested to me talk about that later.
back gray pigeons. how hacking? The fact is not hacking, but Pirates of the equipment, the other does not need your account password, account password is up to you to visit. that a simple point of it, this is the official website of a typical example. Add your first friend that you want to buy good equipment, so that no one place you go to him. you get to that found themselves without their own computer control. the other side of your equipment thrown on the ground, then pick away. Of course, this situation provided that your equipment is not locked, or to identify the main. Do not think that no such person, such person may not unusual, especially with the protection of people is a lot of cards, so you are not under any circumstances relaxed vigilance can be locked as locked in the short term is not prepared to sell the main things that must be recognized.
talked about this, and take out a topic: storage lock.
This is the 3rd largest Guangyu security measures, has long been equivalent to a Level 2 password. one to say this, but also the old saying: the heart is good, the effect is minimal. Some people think that once this protection is a big leap, to maximize the protection of the warehouse security. even number stolen, the player can come back to find something with warehouse comeback. But the truth is not so good imagination. seen I said above that, you dare to have this much confidence in the protection layer 2 it? However, the principle of stealing the inner code and the above mentioned is slightly different. specific principle I do not remember, long time no contact with this. But one thing you know, you need to steal the password to the inner open. That is the other side even if you already know the account and password, he will not wash number, so you only under the condition without knowing the correct password to open the warehouse, he can succeed. Of course, for you to know stresses do not have any meaning. Since they do not know is stolen, there is how can I make an effective defense?
Much has been said above, the method is also a wide range, but the premise is the same: to your computer a Trojan and connected to the network. Here's to specifically talk about the Trojans, so that we have a clearer understanding.
all the Trojans, are to exe at the end. QQ, or other contact so, upload to the exe files with the end of all please be careful. generally after the Trojans are not reflected in the double-click. But some people will use exe files exe files combiner will combine `` so that you run, you can run a program other and not to make their Trojan was found. there are those who will use the more popular the previous year to run winrar extracting exe files tied to a fixed directory, this is not to say this. In short, you are all accepted exe file to have to be careful! It is worth mentioning that many people would say you see his picture in the online `such is www .****. com / tupian.htm this web site, the general When you go, there is indeed seen pictures, but please be careful on those pages to see the pictures mostly jpg, gif.jpeg, such as the image format at the end of the URL, because this is the most popular in recent years I have seen is also the most vulnerable people in the network the way a horse ..
Some people have said, I installed antivirus software, each receiving a first anti-virus stuff automatically. I say, not so naive, anti-virus software So everything the world will have peace. now faster than a variant of trojan update anti-virus software is faster, otherwise there will not be so many people to play cat and big David Panda burning incense games.
Finally, a simple talk again Some protective measures it, the role of limited, but 1% can reduce the theft may be good.
First of all, anti-virus software and firewall, or want.
course, this is the computer for the purposes of their own. In recent years, Gradually a large number of anti-virus software coming to the fore. In the past, many families find spending hundred dollars to buy anti-virus software is too extravagant, but now the whole world as more and more attention to security issues, and more ordinary families are genuine anti-virus installed software. on the Rising, the price of 298, the real price of shipping around 130, with the market fluctuate, but also in the so. I am not advertising to the Rising can only say that I am using it all these years feel good.
you will not believe this day and age there is a free lunch, if you really account for their own safety, to stop eating dead chickens and other things for free Kabbah. That thing is really a lot of problems. For example, Trojan -PSW.Win32.Delf.eve Kabbah this trojan is specifically made loopholes in the dead chickens, it will modify the computer's system time, so that dead chicken anti-virus software failure Kabbah.
problems on antivirus software, I still have a specialized in the following description, in the hope that we can be helpful.
Second, the Internet cafes friends, please be careful.
you will say, Internet bars installed recovery card, all right. However, reduction card can only restore the system disk the contents of the data on other disks can not control. Yes, he was able to restart after installing all the programs previously cleared, but you think about it, sometimes even into the memory of the Trojans reload systems can not be deleted, you expect him to restore a 40 dollar card capable of performing the arduous mission clearly Trojans?? think of was dead pixels, some Internet cafes probably hacking the industry itself is a part of the chain, something which not easy to say.
Third, do not use a secret because of security card to the effect, locking the locking of the game, identify the main Lord of the recognition.
Fourth, the fact is most important. concentrate on playing your game.
do all day and parents unknown PLMM East, the West family of short, give you a video or photos you're elated, and by that time your number will be enough. In short sentence if any did not know you from QQ, pass over the things you do not take. the game was about to add you QQ get too excited.
Fifth, do not be silly people pull eight school ridiculed hacking.
hacking is not under MP3, search online under the Trojan download, you can search a lot. Do you think people can learn hacking down under friends?? you really sell the hacking as a cabbage ah? Some people take advantage of other people ready to do some net horse tool to generate web pages Trojans. as long as you visit his website, in fact, is the same horse in his net, the net horse is popular for the latest vulnerabilities do percent. Internet search to provide the so-called Trojan download site, I'm sure at least one half of the page itself implanted Trojan horses, waiting for people who dream of overnight riches the players learn to walk into the door. not so number of others you get your number has been flying out.
In fact, here is to remind you not to go to bad sites, including the so-called Trojan download site, sex and violence stops and so on. Of course, the Internet is not only these sites the existence of malicious code analysis from international experts, the current Ninety per cent of commercial websites are there different levels of background holes. NetEase is nothing less than formal, right? but before the pick up children is linked to the horse Netease event created a hubbub. If you are at the wrong time just in the wrong place, and it had to recognize inverted luck.
Sixth, the two need to pay particular attention to the process: expolrer.exe and spoolsv.exe.
Most of these two processes is the process of the computer must be running (spoolsv.exe process is related to the printer, if not related to the operation of the printer about to end). This two processes are the most likely to be implanted Trojan horses, and the specific In most cases the performance of the system to boot into the load time after a particularly long (about 1 minute or so back to normal). Do not think that there is no harm to normal. This situation is obvious, but not simple to solve (spoolsv.exe can be turned off, but expolrer.exe not). the general anti-virus software in most cases can not solve this problem (in the author's experience, this virus is not a solution for). Again, this is not the school computer, the computer professional After more talk about things. In the past, such a Trojan horse typically does not affect the user's account, its role is to affect the system rather than hacking. However, recently, the emergence of a new Trojan Trojan / PSW.Moshou.aql . This is the file name from the 10 random characters. Modify the registry, trojans automatically start running. player's game account, the game code, game area and other information services, and the player in the background information to hackers on the specified remote server. This Trojan is a malicious DLL file will be injected into the system, crucial in the process of loading operation, hidden self, and prevent killing. As a result of special skills, even if a malicious DLL file is running, the hard drive can not find traces of malicious DLL files. So, when everyone's computer exporer. exe process again an exception, must not be careless.
the seventh, I did not believe that anybody really believe BB to send the game spread, and to receive prizes of strange news, until one day a close encounter people are really fooled by such a strange message, was stolen on the site number, it felt very ashamed. On this point, really do not know what to say. so people incurable.
eighth, resistance off message.
this for some friends who may not be realistic, but it really is a very effective defense approach. previously mentioned, no matter what kind of Trojan horse to steal account largely accepted to be sent via email. Guangyu the server is not easy to be exploited so easily by hackers turn to other servers. The simplest is the mail server. do not need to deal with what you can through your mail gateway or firewall to force against the implementation of the Simple Mail Transfer Protocol ( SMTP, etc.) can completely prevent your computer to send e-mail. In this way, even if the other side of the Trojans, it has been effective, can not get the envelope containing your account information.
ninth game in the landing process, the non-normal pop-up window must be careful.
Recently, there has been called is to you click on this window: OK or Cancel. In fact, most players will not consider click been implanted with Trojan, which is very hidden, the player generally does not pay attention to this little incident. In this situation, you can press ESC to exit or restart the computer directly and thoroughly anti-virus.
tenth, will channel special attention to see this player.
Recently, a new online game hacking tool has emerged. The Trojan drew on the part of the concept of social engineering, that players in the game, such as online games, suddenly, is bound to will immediately log in again to continue the game, hackers took advantage of online game players accustomed to the operation of the general, quit the game to force the players to induce the player to re-sign in and wait for an opportunity to steal online game account and password. In this regard, if the player encountered in the course of the game suddenly quit the game, must be especially careful. the first detailed examination of the various startup parameters confirm the Windows system without exception, reboot the system to conduct the game. or you can use with active defense capabilities to install security software, to Centering online account with a lock.
example (Trojan-PSW.Win32.MiFeng.ai.dll) has adopted a new hacking tool above. The Trojan itself is for the online game two main program), forced to end, then the game will suddenly break, log back in the game until the player took the opportunity to steal online game account and password, the virus will steal the account password encrypted prepared to receive through the mail and web space Send to hacking hackers. If you in the game, the game suddenly interrupted, it is likely that you have in this Trojan virus, please do not be careless.
told top ten, certainly there are many ways to note , but I am not remember, we do can only say that these many, hope that we can take a closer look, do no harm.
below, a separate piece of secluded talk about the killing antivirus software and trojan problems.
I discussed above ten, the first thing we talked about the anti-virus software. For most ordinary players, stand-alone version of the antivirus software is the most important, or is the only way of protection. In fact, it is also true is the most effective protection method. In theory, in a newly installed, there is no damage to the system of genuine anti-virus software installed and up to date, open all the active defense, the player is generally not the infringement Trojan. Of course, this is kind of ideal state, a lot of players playing the game some more or less during the accident, so everything has drawbacks.
Many players have asked the author, saying that my computer is genuine anti-virus installed software, and antivirus every day, but the computer simply no Trojan, Trojan horses and even specialized Zhuanshagongju also find no exception, but the number is stolen, how is this going on here?
I say: kill does not mean less security. because there is a trojan called free kill!
the first to remind everyone that the killing was a relatively free word, for the current technology, the Trojan horse to avoid killing success rate is not high (in multi-engine test basis). but the user is relatively simple to install security software, so the production of targeted Trojan horse to avoid killing, for individual users is absolutely free to kill.
first to introduce a technology: rootkit.Rootkit came in the tenth century, the early 90s, literally, is a system-level management tool, is actually a kernel-level hackers use malicious tools, the most common application is to hide the whereabouts mm Trojan horse program files completely hidden, and registration process tables and analysis tools can make the general system failure, can not capture any clues. drive technology for the use of the characteristics of Rootkit, Rootkit detection and removal of the need to use higher levels of driver-level programming techniques, in-depth analysis to determine the kernel. For Rootkit detection and removal technology is the current international anti-virus industry, cutting-edge technology.
Next we will look at ways in which hackers are free to kill to achieve the purpose.
to everyone familiar with the gray pigeon cases. We first create a common gray pigeons Trojan server, and then anti-virus scanning software, can be found, the vast majority of anti-virus engines are able to identify the Trojan.
broadly divided into two encryption methods to avoid killing code , flower orders, packers, importers and modify the program manual DIY PE. The hand operation is not recommended, because this procedure to produce results is good, but too complex and require a strong basis for the assembly language, and have some knowledge of Windows kernel. the specific process I can not say here. After treatment, re-enter the antivirus software to scan and found that the virus can be identified as anti-virus engine is running out.
use of the means to protect themselves Rootkit Trojan documents, they use the use of protected visual hiding, even if the use of WINDOWS folder search function, select For such a It does not matter, the purpose is not want you to understand, but to tell you, not to God as hacking, any person who can not put your number by air stole the. summed up saying: The most important active defense, lust greedy undesirable
Tuesday, February 22, 2011
Glomerulonephritis, a serious kidney disease hospitals do
Glomerulonephritis, a serious impact on the quality of people's life and work, due to work overload, and lack of health awareness, many people got the disease. All day long plagued by the symptoms caused by the disease. So, glomerulonephritis Is it serious? up on the serious problem of glomerulonephritis to specific analysis of the specific disease. patients of different individual constitution, the condition of different factors are all affected. To cure glomerulonephritis should maintain a healthy attitude and actively cooperate with medical treatment and perseverance. chronic nephritis network of experts pointed out that the symptoms of glomerulonephritis are complex, often common symptoms of edema, increased foam in urine, hematuria, lower back pain, high blood pressure. edema . nephritis edema often appear first in the eyelids, face, scrotum and other areas relatively loose, since only lower limb edema, in severe cases can also be edema, a few people may also have ascites. urine bubbles increased. urine increased foam phenomenon is often a protein, generally speaking, the more bubbles, the more protein. hematuria. Under normal circumstances, urine is the naked eye can not see the blood, and to no red blood cells under a microscope, it means that if there is gross hematuria urinary red blood cell inside a lot. However, this does not mean that the color red and the urine is hematuria, of course, how to prevent kidney hypertensive uremic _1945 Hospital of Weifang, but that does not mean necessarily nephritis. In addition, hematuria lesbians to note is not caused by the menstrual period, so to avoid the menstrual period when the urine test. lower back pain. glomerular nephritis patients often show no obvious back pain, but some patients found that nephritis, the kidney that Yan is back sick, why we feel back pain, back pain such as pyelonephritis and a large back pain of kidney stones, pyelonephritis back pain mostly on one side, and kidney stones is severe back pain and many more in the thigh side radiation, Wenzhou kidney hospital. hypertension. nephritis may be associated with or without hypertension, but if the development to uremia, is often accompanied by high blood pressure, and difficult to control, in general, have high blood pressure in the nephritis the prognosis is often worse than in patients without hypertension. glomerular nephritis serious? In fact, as long as the early detection of disease through effective treatment is not cause serious consequences, and the vast majority is better or can be controlled. The quality of treatment efficacy depends on the timely, reasonable, and conditioning on the patient's own (such as diet, rest). People have this incorrect view, first because of their disease is hidden, difficult to be detected early, when a large number of renal tissue injury, when loss of function to the treatment, when compared to late; Second, some patients with symptoms after treatment, self feel good, that the illness has recovered, to the neglect of treatment and follow-up period of consolidation, when treatment when feeling unwell again, the nature of the disease have occurred in the nature of change. so each renal disease regardless of how the disease should regularly review, monitor the development of the disease. examination of the disease include blood, urine and renal function examination and other biochemical tests, the current means of checking the disease faster updates, such as kidney health checks have been upgraded from a B-ultrasound examination ECT, ECT inspection can measure kidney perfusion, renal secretion and can accurately measure glomerular filtration rate (GFR), renal diagnosis for doctors to provide a reliable basis for further examination in nephritis renal biopsy of the trend to replace. as long as the early detection of glomerulonephritis, then effective treatment will not cause serious consequences, so we have to actively cooperate with the doctors for an early resumption of health, high creatinine renal insufficiency is why? _2086 Red Sun kidney hospital. Expert Tip: Weifang red sun kidney hospital after years of research, intervention proposed gene therapy for kidney treatment of the disease has created a new possibility, the use of Integrated Traditional and Western patients for kidney patients discharged. have any questions at any time call our free advice hotline :400-6031-120.