{"id":8003,"date":"2012-02-17T15:01:33","date_gmt":"2012-02-17T07:01:33","guid":{"rendered":"http:\/\/telecnsr.com\/?p=8003"},"modified":"2013-07-23T19:53:55","modified_gmt":"2013-07-23T11:53:55","slug":"g-data-cloudsecurity","status":"publish","type":"post","link":"https:\/\/telecnsr.com\/8003\/","title":{"rendered":"[\u514d\u8cbb] G Data CloudSecurity \u7db2\u8def\u91e3\u9b5a\u3001\u7db2\u9801\u60e1\u610f\u7a0b\u5f0f\u9632\u8b77\u5de5\u5177"},"content":{"rendered":"

G Data<\/a> \u662f\u570b\u5916\u9084\u9817\u6709\u540d\u6c23\u7684\u4e00\u6b3e\u9632\u6bd2\u8edf\u9ad4<\/a>\uff0c\u900f\u904e\u5167\u5efa\u7684\u96d9\u5f15\u64ce\u6383\u6bd2\u80fd\u529b\uff0c\u591a\u6b21\u5728\u5404\u7a2e\u9632\u6bd2\u8a55\u6e2c\u6392\u884c\u699c\u4e2d\u540d\u5217\u524d\u8305\u3002\u525b\u525b\u770b\u5230\u539f\u4f86 G Data<\/a> \u5c07\u5176\u9632\u6bd2\u8edf\u9ad4\u4e2d\u7684 Web \u9632\u8b77\u529f\u80fd\u53e6\u5916\u6316\u51fa\u4f86\u505a\u6210\u4e00\u500b\u514d\u8cbb\u7684\u7db2\u9801\u6aa2\u6e2c\u5de5\u5177\uff0c\u76ee\u524d\u53ef\u652f\u63f4 IE \u53ca Firefox \u7b49\u700f\u89bd\u5668\uff0c\u6b64\u5de5\u5177\u53ef\u5728\u6211\u5011\u700f\u89bd\u7db2\u9801\u6642\uff0c\u9810\u5148\u6aa2\u6e2c\u8a72\u9801\u9762\u662f\u5426\u5305\u542b\u60e1\u610f\u7a0b\u5f0f\u6216\u662f\u5426\u70ba\u91e3\u9b5a\u7db2\u7ad9\u3002 <\/p>\n

\u6b64\u5de5\u5177\u4e3b\u8981\u662f\u91dd\u5c0d\u5e02\u9762\u4e0a\u5f88\u591a\u514d\u8cbb\u6216\u4ed8\u8cbb\u9632\u6bd2\u8edf\u9ad4\u5c0d\u65bc\u7db2\u9801\u6aa2\u6e2c\u529f\u80fd\u7684\u4e0d\u8db3\u800c\u63a8\u51fa\u7684\uff0c\u800c\u5927\u90e8\u5206\u7db2\u53cb\u53ef\u80fd\u6703\u63a5\u89f8\u75c5\u6bd2\u7684\u9014\u5f91\u5927\u6982\u4e5f\u90fd\u662f\u5f9e\u7db2\u8def\u800c\u4f86\u3002 <\/p>\n

\u5982\u679c\u4f60\u66fe\u7d93\u9047\u5230\u5e33\u865f\u5bc6\u78bc\u88ab\u5077\u800c\u96fb\u8166\u537b\u6383\u4e0d\u51fa\u4efb\u4f55\u75c5\u6bd2\uff0c\u90a3\u4e5f\u6709\u53ef\u80fd\u662f\u4e0a\u4e86\u300c\u91e3\u9b5a\u7db2\u7ad9<\/strong>\u300d\u7684\u7576\u3002\u5728\u770b\u8d77\u4f86\u50cf\u662f\u5b98\u65b9\u7db2\u7ad9\u4f46\u5be6\u969b\u4e0a\u537b\u662f\u5077\u4eba\u5bc6\u78bc\u7684\u5047\u7db2\u7ad9\u4e2d\u514d\u8cbb\u9001\u51fa\u4f60\u7684\u5bc6\u78bc\u800c\u4e0d\u81ea\u77e5\uff0c\u985e\u4f3c\u9019\u985e\u7684\u91e3\u9b5a\u653b\u64ca\u8207\u7db2\u8def\u60e1\u610f\u7a0b\u5f0f\uff0c\u90fd\u53ef\u900f\u904e G Data CloudSecurity<\/strong> \u4f86\u505a\u7b2c\u4e00\u9053\u9632\u7dda\u3002 <\/p>\n

\u6ce8\u610f\uff01<\/strong>G Data CloudSecurity \u662f\u4ee5 IE \u8207 Firefox \u7b49\u700f\u89bd\u5668\u7684\u5916\u639b\u7a0b\u5f0f\u7684\u65b9\u5f0f\u5728\u6211\u5011\u4e0a\u7db2\u6642\u9032\u884c\u5075\u6e2c\u8207\u4fdd\u8b77\uff0c\u6b64\u5de5\u5177\u4e0d\u80fd\u53d6\u4ee3\u5b8c\u6574\u529f\u80fd\u7684\u9632\u6bd2\u8edf\u9ad4\uff0c\u4f46\u53ef\u8207\u4efb\u4f55\u9632\u6bd2\u8edf\u9ad4\u76f8\u5bb9\u3001\u540c\u6642\u5b89\u88dd\u3002\u5efa\u8b70\u5728\u672a\u63d0\u4f9b\u7db2\u9801\u6aa2\u6e2c\u529f\u80fd\u7684\u9632\u6bd2\u8edf\u9ad4\u8207\u96fb\u8166\u74b0\u5883\u4e2d\u4f7f\u7528\u3002<\/p>\n

<\/p>\n

\n

\u2587 \u8edf\u9ad4\u5c0f\u6a94\u6848 \u2587<\/strong><\/font>     (\u932f\u8aa4\u3001\u7248\u672c\u66f4\u65b0\u56de\u5831)<\/font><\/a><\/p>\n

  • \u8edf\u9ad4\u540d\u7a31\uff1a<\/strong>G Data CloudSecurity <\/li>\n
  • \u8edf\u9ad4\u8a9e\u8a00\uff1a<\/strong>\u82f1\u6587 <\/li>\n
  • \u8edf\u9ad4\u6027\u8cea\uff1a<\/strong>\u514d\u8cbb\u8edf\u9ad4 <\/li>\n
  • \u6a94\u6848\u5927\u5c0f\uff1a<\/strong>6.<\/a>10 MB <\/li>\n
  • \u7cfb\u7d71\u652f\u63f4\uff1a<\/strong>Windows XP\/Vista\/Win7 <\/li>\n
  • \u5b98\u65b9\u7db2\u7ad9\uff1a<\/strong>http:\/\/www.free-cloudsecurity.com\/<\/a> <\/li>\n
  • \u8edf\u9ad4\u4e0b\u8f09\uff1a<\/strong><\/font>\u6309\u9019\u88e1<\/a> <\/li>\n<\/blockquote>\n
    \n

    G Data CloudSecurity \u7522\u54c1\u7279\u8272\uff1a<\/strong> \uff08\u8f49\u8cbc\u81ea\u5b98\u65b9\u7db2\u7ad9\uff09 <\/p>\n