Skip to main content

标 题: Re: 请问怎么知道flickr上哪些图是有版权的

http://gengwg.blogspot.com/发信人: coppoia (merlot), 信区: StartUp
标  题: Re: 请问怎么知道flickr上哪些图是有版权的
发信站: BBS 未名空间站 (Wed Jul 31 17:31:25 2013, 美东)


其实所有的照片图片都有版权的。   flicker 上有个section 是大家把自己想给其他
人免费使用自己照片放上去的。  但那里没什么好照片。 


不清楚你为什么问。  要是自己需要用照片的话, 现在好多专门卖照片的公司。 他们
有海量的照片。 价格也不贵。     当然因为有了这些公司。 也就有了专门在网上抓
非法盗用他人照片的公司。  听说比卖照片还赚钱。   你要也是想抓使用盗版照片的
。  可以到网上查查他们怎么做的。  这已经是个挺成熟的行业。 

如果你建立买卖照片的平台。  可以看看shutterstock的发家史。  ceo是个IT guy.
开了十几件小软件公司。  做够了。 因为平时喜欢摄影。  就去专业做摄影。 卖照片
。  发现没有太好的卖照片的平台。  就自己建了一个。  让大家都可以去卖自己的照
片。  买照片的人也可以大大的降低成本。  这个公司已经上市了。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...