DynamicMonitoringModelforBBSContentSecurity*JingYu,YanpingZhaoSchoolofManagement&EconomicsBeijingInstituteofTechnologyBeijingP.
R.
Chinapaopaofish@bit.
edu.
cn,zhaoyp@bit.
edu.
cnAbstract:-BulletinBoardService(BBS)communityshouldbeaharmoniouspublicspeakinglocationfullofharmlessopinions.
ThispaperanalyzesthecharacteristicsofarticlecontentinBBS,especiallyforChineseLanguage,andproposesanoveldynamicmonitoringmodelforBBScontentsecurity.
Themodelisbasedonafastmulti-patternmatchingalgorithm,andusesacombinedapproachofTextFiltering,SocialNetworkAnalysis(SNA)andspotinvestigatingmethod.
Thesystemcandiscoverillegalarticleefficiently,andidentifydangerpersonsandthebehaviorpatterndynamically.
Key-Words:-BBS;Contentsecurity;Multi-patternmatch;SNA*ThisresearchissupportedbytheNationalNaturalScienceFoundationofChina(70471064),andResearchFoundationofBeijingInstituteofTechnology(BIT-UBF-200308G10).
1IntroductionTheoryresearchesandpracticeapplicationsaboutcontentsecurityfilteringmainlyaimatordinaryWWWtextsorEmail.
However,theexistingmethodsandtechnologiesarenotverysatisfactoryinviewofBBStexts.
Thereasonsasfollows:Firstly,thearticlecontentofBBSisdisplayedincisivelyandvividly,anduselargenumbersofshorteningsymbols,fabricatingtermswhichmakethetraditionalfilteringsystemscannotdistinguish.
Secondly,BBShasextremelyquickpublicrespondandspreadspeed,sothatithasdifficultyinmonitoringBBStimelyanddynamically.
Finally,sinceBBSiscomparativelyeasyforusersregisternewaccountsatanymoment,theanalystsareoverwhelmedwiththeincompleteormisleadinginformationfrommanysources,andhavedifficultyindiscoveringtheirrelations.
Thereisaneedtohelptheanalyststoidentifykeydangerpersonswhomaybehaveseveralvirtualaccounts,andtrackandanalyzerelationdataofthem.
ThispaperproposesaninnovativedynamicmonitoringmodelforBBScontentsecurity,whichusesacombinedapproachofTextFiltering,SocialNetworkAnalysis(SNA)andspotinvestigatingmethod,especiallyefficientforChinesenaturallanguage.
Thispaperisorganizedasfollows,insection2,somerelatedworks;section3proposestheframeworkofdynamicmonitoringmodelforBBScontentsecurity;section4,mainlydesignstwocoremodules,onesupportsContentFilterbasedonanovelfastMulti-Patternmatchingalgorithm,theothersupportsLinkAnalyzer;section5,someinitialtestresults;section6,conclusionsandfuturework.
2RelatedWorkRoughlytherearethreekindsofcontentsecurityfilteringtechnologies.
Thefirstiskeyword(s)matchingalgorithms.
ThesecondisstatisticalmethodbasedonVectorSpaceModel(VSM).
Thelastoneisbasedonknowledgebase.
Themostpopularoneissimplepattern(keyword)matchingbasedonSingle-PatternorMulti-Pattern.
Thespeedofpatternmatchingalgorithmisemphasizedinordertomeettheneedofbroadbandinformationfilteringonnetwork.
However,inthepracticalapplicationoffilteringsystem,twoexistingproblemsneedtobesolved.
TheyarehowtomaketherulesforfilteringcontentandwhichkindofpatternmatchingalgorithmismoreefficienttoChineselanguagetexts.
ThesecondfilteringtechnologyisstatisticalmethodbasedonVSM,whichiscomparativelyusedmoreintextclassificationresearchthaninothers.
Theaccuracyisenhancedgreatlythroughtrainingalargeamountofclearlyclassifiedcorpusandconstructingfeaturevector(keywords)torepresenteachclass.
Butthismethodconsumesmoretimeincomputingsimilaritybetweenfeaturevectorsandthatofunknowndocuments[1].
Thetwotechnologiesabove-mentionedhaveacommondisadvantageofnon-semantic.
Thecontentfilteringtechnologybasedonknowledgebaseisbecomingaresearchhotspotallovertheworld.
ThisresearchismoremeaningfultoChinesetextfilteringsinceitisbasedoncharactersetsnotwords.
JinYao-hongusesHierarchicalNetworkofConceptstheory(HNC)[2]andmatchingmethodbasedoncomplicatedChinesesemanticknowledgerules.
Itsaccuracyismorethan90%,butitsefficiencyiscomparativelyratherlow.
Wecanseespeedandaccuracyarebothimportanttothebroadbandnetworkcontentfiltering.
SoitisnecessarytoimprovetheexistingfilteringalgorithmtoadapttoChinesetextefficiently.
Someexpertsworkedonmixturedfilteringmethodresearch[3][4].
OthersapplySNAtechnologytoBBSresearch.
Forexample,VilleH.
Tuulosandetalcombinetopicmodelwithsocialnetworksforchatdatatopicmining[5].
KouZhong-baoandetaldiscoverthe"smallworld"phenomenonofBBS[6].
Buttherehasn'tbeenresearchaboutSNAappliedtoBBScontentsecuritymonitoring.
3FrameworkofDynamicMonitoringforBBSContentSecurity3.
1BBSDataSourceThedatausedinthispaperwascapturedfromTianyaClubBBS,whichisverypopularinP.
R.
China(www.
tianyaclub.
com).
ThetotalnumberofregisteredIDsisabout3,000,000andthenumberofliveusersisoftenover30,000.
SoTianyaClubprovidesaverygooddataresourceforourresearch.
Ingeneral,everyBBSismoreorlesscomposedofsomediscussiongroups(community).
Eachgrouphasaseriesofarticlesorganizedaccordingtodifferenttopics.
Thefirstarticleisinitialarticle.
Othersarereplyarticlesthatcommentsontheinitialone.
EacharticlecontainsaccountID,title,groupinformation,dateandtime,contents.
TheaccountIDofinitialarticleistheusernameofannouncer,whilethatofreplyarticleistheusernameofreplier.
SocialnetworkGemergesbecauseofthereplyrelationamongtheseaccountIDs.
EachaccountIDwhohastakenpartintopicdiscussionisanodevinG.
ThesetofvisV.
AlinkisestablishedbetweentwonodeswhenoneaccountIDrepliestotheother.
EachlinkeisanarcfromreplyIDtoinitialID.
ThesetofeisE.
AsocialnetworkinBBSisasmallworld[6].
3.
2DynamicMonitoringModelforBBSContentSecurityFig.
1presentstheframeworkofdynamicmonitoringmodelforBBScontentsecurity.
Fig.
1FrameworkofdynamicmonitoringmodelforBBScontentsecurity.
Thesystemisaimedatmonitoringterroristsordangerpersons'speechamongallLANuserswhoaccesstheBBSserver,suchasTianyaClub.
Thewholeframeworkincludesfourmodules.
(1)"CaptureandConvertData"moduleThismoduleisinchargeofcapturing,processingandconvertingBBSnetworkdataonthegatewayofLANwithfastdatapacketcaptureandprotocolanalysistechnology.
BasedonthecharacteristicofChineselanguage,the"plasmodium","synonym","meaningless"phenomenonexistsintheBBScontent.
Wegivedefinition1andexplanationhereandtheothersinthefollowingsections.
Definition1:"plasmodium"isaChineselanguagephenomenoninBBS.
Thereareafewofdeliberateinterferentialcharacters,suchas"*",writtenamongChinesecharactersbydangerpersonstoescapethefilteringsystem.
ItisbasedonnoticeablecharacterofChineselanguagedifferentfromEnglishlanguageisthatoneEnglishwordisusuallyequivalenttotwoorthreeChinesecharacters.
Forexample,thecombinationofcharacter"中"and"国"produces"中国"whichmeans"China".
Thiskindofphenomenondoesnotinfluencereaders'understanding,suchas"中*国"("中国"actually).
Butthenegativeinfluenceof"*"isthat"中*国"cannotbematchedbythepatternof"中国".
Sothedataneedtobecleanedoutthesedeliberateinterferentialcharactersafterconverting.
ThecleanedBBSdataisstoredas.
txtfilesintheappointedsitedirectories.
(2)"ExtractInformation"moduleUsefulinformationcontainedin.
txtfilesabove-mentionedisextractedandstoredintodatabase.
Thedataisdividedintotwokindsofinformationwewilldealwith.
Onekindis"title"and"content"thatarethedealingobjectsofContentFiltermodule.
Theotherischaracterinformation,suchas"accountID","data","time"etc.
thatarethedealingobjectsofLinkAnalysismodule.
(3)"ContentFilter"and"LinkAnalyzer"modules"ContentFilter"canmonitorarticlecontentandidentifywhetheranyfilteringruleismatched.
IfthereisaBBSarticlecontainingillegalcontent,therecordofthisspeakerismarkedwithdifferentlevel.
Then"LinkAnalyzer"makesajudgmentthatwhoistheauthoroftheillegalarticle(dangerpersons)andrecordshischaracters.
Alongwiththeexpansionofdangercommunitiesmatchedwithfilteringrules,"LinkAnalyzer"canhelptoanalyzethestatusoftheseaccountIDscharactersaccordingtosomeSNAparametervalues.
Moreover,VisualizationSoftwarecanhelpsimulatecommunitystructureanddiscoverpersons'relations,communitydistribution,informationspreadchannels,behaviorpatternsandinfluencepatterns.
Thefollowingsectionintroducesthesetwocoremodulesindetails.
4TwoCoreModules4.
1Thenovelfastmulti-patternmatchingalgorithmSpeedisveryimportantinsecurityfilteringapplication.
Asystemwithlowefficiencycannotperformwellinmonitoring.
MostpopularfastmatchingalgorithmsarebasedonMulti-pattern.
ThemostnotablealgorithmsincludeAho-Corasick(shortasAC)[12]andCommentz-Walter(shortasCW)[11]algorithms.
Astringisdefinedasapattern.
TheadvantageofMulti-patternmatchingalgorithmisthatalltheoccurrencesofanygivenstringscanbefoundonlyinoneprocessofscanningtext.
Thiskindofalgorithmshastwosteps.
Firstly,foragivensetofstrings,afinitestateautomaton(orwecallitpatterntree)isconstructed.
Andthen,thetextsteamisscannedfromendtoendwiththispatterntree.
Actually,patternmatchingisaprocessofstatetransition.
Eachstateisrepresentedbyanumber.
"0"representsstartstate.
Thereisanotherspecialstate,outputstate.
Whenanoutputstateisreceived,thecorrespondingstringisemitted.
WedenoteasetofstringsbyS,andintendtodetectalltheoccurrencesofanystringsinSinatextstreamT.
Patternmatchingisthatgivenacurrentstateandthenextinputcharacter,themachinecheckstoseeifthecharactercausesafailuretransition.
Ifnot,thenitmakesatransitiontothecorrespondingstateaccordingtothecharacter.
Incaseofafailuretransitionthemachinemustreconsiderthecharactercausingthefailureforthenexttransitionandthesameprocessisrepeatedrecursivelyuntilthegivencharacterleadstoanon-failureoutputstate.
Mostmulti-patternalgorithmsusetheshiftmethodofSingle-patternmatchingalgorithmBM[13],forexample,CW.
Whenapatterncharacterisnotmatchedbythenextinputcharacter,severaltextcharacterswouldbeskippedaccordingtoashiftvalue.
Inthisway,thematchingprocessbecomesmoreefficient.
WemadecomparisontosomearticlecontentsinChineselanguageandinEnglishlanguagewithCWalgorithm.
WediscoveredthatthetraditionalkeywordsmatchingalgorithmisnotsuitableforChineselanguage.
Thereasonsasfollows:(1)Fromfig.
2(b),eachEnglishwordiscomposedof26lettersfrom'a'to'z'.
Andthelengthofeachwordisabout5letters.
Butfromfig.
2(a)ordinaryChinesecharactersaremorethan3,000atleasttomakethebasicunitsofaword,andeachwordismadeofabouttwocharacters.
TheresultofthisdifferenceisthatChinesepatterntree(fig.
2(a))isfarwiderthanEnglishpatterntree(fig.
2(b)).
MuchmatchingtimeisconsumedinmatchingthefirstcharacterinChinesepatterntree.
Fig.
2(a)Chinesepatterntree.
Whereweuses1torepresentstring1:空军(airman)intheleftbranch,s2:飞机(airplane),s3:军队(army),s4:战争(battle),s5:前线(battlefront),s6:战场(battleground).
States:2,4,6,7,9,11representtheiroutputstates.
Fig.
2(b)Englishpatterntree.
Whereweuses1torepresentstring1:airman,intheleftbranch,s2:airplane,s3:army,s4:battle,s5:battlefront,s6:battleground.
States:6,11,14,20,26,32representtheiroutputstates.
(2)SinceanEnglishword(about5letters)islongerthanaChineseword(about2characters).
ItresultsthatChinesepatterntree(fig.
2(a))hasfewerdepths,notasmuchdeepasEnglishpatterntree(fig.
2(b)).
Andsincetheshiftvalueisdeterminedbyminimumpatternlength,Chinesewordsaretooshortandthesystemcannotsaverunningtimeinshiftstage.
OursolutionisthatallChinesecharacterscontainedinstringpatternsareorganizedaccordingtoeachcomputeduniquevalue,readintoaHashtable.
AteachnodeofHashtable,childHashtableissetdynamicallythroughcomputingthelattercharacterofthisnodeinonestring.
ThiskindoffiniteautomatonisbasedonHash.
(Seefig.
3)Fig.
3Newstringpatterntreebasedonfastmulti-patternmatchingalgorithm.
Ifastringiscomposedofthreecharacters,depth3childhashtablecanbesetdynamically.
4.
2FilteringrulesbasedonpatternThenextproblemishowtomakefilteringrules.
WeusestatisticalmethodbasedonVSM.
Themodelmapseachdocumenttoasetofnormalizedtermsasavector,whichisexpressedas(T1,W1;T2,W2;…,Tn,Wn),whereTiisafeatureterm,WiistheweightforTi.
ThetraditionalTF-IDF[14]weights:∑=++*=niikiikiikNNttfNNttft122)05.
0(log)()05.
0log()()(ω(1)Thefilteringruleswemadeshouldhaverepresentationanddiscrimination.
Thatisfeaturetermsmustrepresentthecontentofthetargetandcandiscriminateaclassofdocumentsfromothers.
ThetraditionalTF-IDFonlycancomputetheweightofaterminoneclass,butcannotdiscriminatethedifferenceofitsweightinseveralclasses.
Therefore,themodifiedTF-IDFweightsaredefinedasfollows:)1()05.
0(log)()05.
0log()()(122DCDAniikiikiikDIDINNttfNNttft**++*=∑=ω(2)DIDA(DistributionInformationamongClasses)andDIDC(DistributionInformationinsideaClass)aretwoimpactfactors.
DIDArepresentsthedistributiondifferenceoffeaturetermsamongkindsofclasses.
DIDCrepresentsthedistributiondifferenceoffeaturetermsinthesameclass.
DIDAandDIDCaredefinedasfollows:)()1())()((12kmikkiDAttfmttfttfDI=∑=(3)∑==mikikttfmttf1)(1)(Wheretfi(tk)representsthefrequencyoffeaturetermtkinclassi,mrepresentsthenumberofclasses.
Whenafeaturetermtkonlyappearsinaclass,DIDA=1anditdiscriminatesclassstrongly.
Whenthefrequencyoftkineachclassisequal,DIDA=0anditcanhardlydiscriminatesclass.
)()1())()(('12'knjkkjDCttfnttfttfDI=∑=(4)∑==njkjkttfnttf1')(1)(Wheretfj(tk)representsthefrequencyoffeaturetermtkindocumentj,nrepresentsthenumberofdocumentsinoneclass.
Whenafeaturetermtkonlyappearsinadocumentofaclass,DIDA=1anditcanhardlydiscriminatesclass.
Thisdocumentislikelytobeanexceptionofthisclass.
Whenthefrequencyoftkineachdocumentofaclassisequal,DIDA=0,itdiscriminatesclassstrongly.
ThesystemcomputestheweightsoffeaturetermsaccordingtothemodifiedTF-IDFandselectsthosetermswiththeirweightsbiggerthanathreshold.
Andmaketheselectedtermsaspatternsinthepatterntree.
Thiskindofpatternalsocanbeaddedandmodifiedmanually.
Besides,wehavespecialtreatmentforsynonymandmeaninglesswords.
Theirdefinitionsareasfollows:Definition2,synonymmeansthemeaningofonewordissimilartoanother,oradialect,oranirregularwordtorepresentameaningfulword.
Wesetonedelegatewordforasynonymlist.
Thesystemevaluatestheweightofeachwordinthislistequaltothatofdelegate.
Forexample,adelegate"弟弟妹妹"(brothersandsisters)alwaysreplacesitsshorteningsymbolsandfabricatingterms"ddmm"inthelist.
Definition3,meaninglesswords,themeaningofthesewordshasnotenoughdiscriminationamongclasses.
Someofthemneedtobeidentifiedandpickedout.
Administratorcanaddormodifythemintoastopwordlist.
4.
3LinkAnalyzerSocialnetworkanalysistheoryhasmanymeaningfulparameters[7][8],whichcanexplainsomesocialproblemsincommunityenvironment.
WeusetheseparameterstodiscoverimportantinformationfromBBScharacterrelationdata.
TheparametersasDegree,Closeness,BetweennesscandisclosethestatusofdangerpersonsinBBS,andparametersasCharacteristicpathlength,Clustercoefficientdisclosethedensedegreeofcommunityandinformationspreadspeedwithincommunity.
Degreerepresentsthenumberofedgesconnectedwithnodev.
Indegreerepresentsthenumberofreplyfromothernodestonodev.
Outdegreerepresentsthenumberofreplyfromnodevtoothernode.
ThethreeparametersevaluatethedifferenceofcorestatusamongdangeraccountIDs.
Theyaredefined:maxdeg)deg()(vvd=(5)maxdeg)deg()(invinvdin=(6)maxdeg)deg()(outvoutvdout=(7)Itholds0≤d(v),din(v),dout(v)≤1,degmax,indegmaxandoutdegmaxarethemaximumvalueofDegree,IndegreeandOutdegreerespectively.
ClosenessweighstheadjacencydegreebetweennodevandothernodesuV.
Itisdefined:∈),(1)(uvdnvclVu∈Σ=(8)Wherenrepresentsthenumberofnodes,d(v,u)representstheshortestpathlengthfromnodevtonodeuV.
Itholds0≤∈cl(v)≤1.
Betweennessrepresentsthedependingdegreeonnodevfromnodeu∈VtoothernodeszV.
Itis∈defined:∑≠≠≠≠∈=zvuvzuzunVzuzunvzunnnvbw,,0),(;,),();,()2)(1(1)((9)Wheren(u,z)isthenumberofgeodesicsfromutozandn(u,z;v)isthenumberofgeodesicsfromutozpassingthroughv.
Itholds0≤bw(v)≤1.
Characteristicpathlengthrepresentstheaverageshortestpathlengthofn(n-1)/2pairofnodes.
Itisdefined:2/)1(),(,=∑nnuvdLuv(10)ClustercoefficientistheaverageofallnodesCv.
Cvisdefined:2/)1()(ΓΕ=vvvvkkC(11)Where)deg(vkv=,)(vΓΕrepresentstheedgesthattheneighborsofnodevconnecteachother.
Wecanobtainthedynamiccharacteristicsofdangeroussocialnetwork,anddiscovernewbehaviourpatternsthroughobservingandcomparingthechangeofparametervaluesindifferenttime.
Weusetheequationsumexpressionasfollows:2112))()((tptppmiii∑==(12)Wheremrepresentsthenumberofparameters,t1andt2representtwodifferenttimes,pi(t)representsthevalueofparameteriattimet.
Ifthevalueofpisbiggerthanthreshold,thereisanotablepatternvariance.
Thesystemneedtomonitorandanalyzeagain.
5InitialTestingResultsThefollowfiguresandtablesaresometestresults.
Inthefigures,The33accountIDsarefilteredoutbecausethecontentoftheirarticlesismatchedbythefilteringrulesofmilitaryaffairsclass.
Theydiscussedaroundthistopic.
Weusespotinvestigatingmethodstotracksomevitallinkclues.
Thismethodcontainsthreestepsasfollows:StepOne:GeneralInvestigationWeconsiderallaccountIDsasawhole.
Infig.
4thereareseveralcliquesinthiscommunity.
Thecentralkeypersonsofcliquesareobvious.
ID1andID7havebiggernodesanddeepercolor.
AndthearticlesfromID18,ID19,ID20andID21cannotarouseotherpersons'interest.
WecanidentifyeachIDcharacter'sstatusthroughcomputingSNAparametervalues.
(Seetab.
1)Fig.
4Generalinvestigation.
Tab.
1TopthreeaccountIDswithmaximumparametervalues.
ThistablerepresentsthetopthreekeyaccountIDsaccordingtothemaximumparametervalues.
WefindID1andID7havehighercentralityandareconsideredasleaders.
StepTwo:PartitionInvestigationWeneedtopaymoreattentiontothetwoleadersID1andID7.
ThepartitiongroupwecaredalsoincludestheaccountIDswhichhaverelationtoeitherID1orID7.
(Seefig.
5)Fig.
5.
Partitioninvestigation.
Wecanfindanimportantrolethatmaybeignoredinstep1.
HeisID10.
HenotonlyrepliedID1,butalsorepliedID7.
AlthoughhehasnothighcentralityasID1andID7,hemaybetheinformationsource.
StepThree:IndividualInvestigationWeshouldemphasisoninvestigatingthekeypersonsandtheirrepliers.
Wecanfindmoreneighborhoodinformationandclues.
Fig.
6.
Individualinvestigation.
Infig.
6,nineaccountIDsrepliedID1exceptID4.
ID1repliedID4unexpectedly.
WesupposethatanothercliquewillcomeuparoundID4.
6ConclusionsandFutureWorkThispaperintroducestheBBScontentsecurityframeworkroughly.
ThedynamicmonitoringmodelusesacombinedapproachofTextFiltering,SocialNetworkAnalysis(SNA)andspotinvestigatingmethod.
Inthecontentfiltering,anovelfastmulti-patternmatchingalgorithmisproposedandmoreefficientforChineselanguageespecially.
Inordertoimprovetheeffectofcontentfiltering,wedesigntoaddasemanticfunctioninthecontentfiltermodulebasedonknowledgerules.
Besides,moreBBSdataminingworkneedtodowithSNAtheory.
References:[1]HeJing,LiuHai-yan,Real-timeContentFilteringBasedonVectorSpaceModel,ComputerEngineering,Vol.
30,No.
15,2004,8,pp.
26-27.
[2]JinYao-hong,DesignandImplementationofSemantic-basedTextFilteringSystem,ComputerEngineeringandApplication,No.
17,2003,pp.
22-25.
[3]SUGui-yang,LIJian-hua,MAYing-hua,etal,Improvingtheprecisionofthekeyword-matchingpornographictextfilteringmethodusingahybridmodel,JournalofZhejiangUniversitySCIENCE,Vol.
5,No.
9,2004,pp.
1106-1113.
[4]LiuChang-yu,TangChang-jie,YuZhong-hua,BayesDiscriminatorforBBSDocumentBasedonLatentSemanticAnalysis,ChineseJournalofComputers,Vol.
27,No.
4,2004,pp.
566-572.
[5]VilleH.
Tuulos,HenryTirri,Combiningtopicmodelsandsocialnetworksforchatdatamining,Proceedings-IEEE/WIC/ACMInternationalConferenceonWebIntelligence,WI2004,2004,pp.
206-213.
[6]KouZhong-bao,ZhangChang-shui,Replynetworksonabulletinboardsystem,PhysicalReviewE(Statistical,Nonlinear,andSoftMatterPhysics),Vol.
67,No.
3,March,2003,pp.
36117-1-6.
[7]PetterHolme,CharacteristicsofSmallWorldNetworks,http://www.
tp.
umu.
se/_kim/Network/holme1.
pdf,20th,April,2001.
[8]D.
J.
Watts,S.
H.
Strogatz,CollectiveDynamicsof`Small-World'Networks,Nature,1998,pp.
393-440.
[9]Commentz-WalterB,Astring-matchingalgorithmfastontheaverage,Proc6thInternationalColloquiumonAutomataLanguagesandProgramming,1979,pp.
118-132.
[10]AhoAV,CorasickMJ,Efficientstringmatching:anaidtobibliographicsearch,CommunicationsoftheACM,No.
18,1975,pp.
333-340.
[11]BoyerRS,MooreJS,Afaststring-searchingalgorithm,CommunicationsoftheACM,No.
20,1977,pp.
762-772.
[12]Salton,G.
(Ed.
),AutomaticTextProcessing.
AddisonWesley,Massachusetts,1989.
搬瓦工和Vultr哪个好?搬瓦工和Vultr都是非常火爆的国外VPS,可以说是国内网友买的最多的两家,那么搬瓦工和Vultr哪个好?如果要选择VPS,首先我们要考虑成本、服务器质量以及产品的售后服务。老玩家都知道目前在国内最受欢迎的国外VPS服务商vultr和搬瓦工口碑都很不错。搬瓦工和Vultr哪个稳定?搬瓦工和Vultr哪个速度快?为了回答这些问题,本文从线路、速度、功能、售后等多方面对比这两...
RAKsmart发布了新年钜惠活动,即日起到2月28日,商家每天推出限量服务器秒杀,美国服务器每月30美元起,新上了韩国服务器、GPU服务器、香港/日本/美国常规+站群服务器、1-10Gbps不限流量大带宽服务器等大量库存;VPS主机全场提供7折优惠码,同时针对部分特惠套餐无码直购每月仅1.99美元,支持使用PayPal或者支付宝等方式付款,有中英文网页及客服支持。爆款秒杀10台/天可选精品网/大...
韩国云服务器哪个好?韩国云服务器好用吗?韩国是距离我国很近的一个国家,很多站长用户在考虑国外云服务器时,也会将韩国云服务器列入其中。绝大部分用户都是接触的免备案香港和美国居多,在加上服务器确实不错,所以形成了习惯性依赖。但也有不少用户开始寻找其它的海外免备案云服务器,比如韩国云服务器。下面云服务器网(yuntue.com)就推荐最好用的韩国cn2云服务器,韩国CN2云服务器租用推荐。为什么推荐租用...
tianyaclub为你推荐
租车平台哪个好共享汽车现在哪个平台的比较好?视频制作软件哪个好手机短视频制作哪个软件好985和211哪个好想问问大学211和985有什么不同吗?手机杀毒软件哪个好什么手机杀毒软件最好用?ps软件哪个好PS软件用哪种比较好?急用!云盘哪个好哪个网盘好用 而且下载速度快 还免费美国国际集团世界五百强企业前五十名是哪些?qq空间登录网页版网页版QQ怎么登陆qq空间登录界面我的手机QQ打开应该是九个选项,什么空间,但是现在打开怎么直接是QQ登录界面,这个撇手机东莞电信宽带东莞电信宽带资费怎样?
安徽虚拟主机 org域名 上海域名注册 hawkhost 165邮箱 网通服务器托管 免费cdn 鲁诺 能外链的相册 申请免费空间和域名 万网服务器 碳云 服务器是什么 studentmain 国内免备案空间 腾讯qq空间登录首页 dhcp服务器是什么 博世报警主机 北京自住房申请网站 789加速器 更多