<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="zh-CN" lang="zh-CN">
<head>
	<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
	<meta name="viewport" content="width=device-width, initial-scale=1.0">
	<meta name="keywords" content="SecWiki，维基，安全，资讯，专题，导航，RSS聚合，Ｗeb安全，Ｗeb安全，移动平台，二进制安全，恶意分析，网络安全，设备安全，运维技术，编程技术，书籍推荐">
	<title>SecWiki周刊（第59期)</title>
	<link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/bootstrap.css"/>
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/styles.css" />
    <link rel="stylesheet" type="text/css" href="https://secwiki.b0.upaiyun.com/css/people.css" />
    <link rel="shortcut icon" href="https://secwiki.b0.upaiyun.com/img/favicon.ico">
	<meta name="viewport" content="width=device-width, initial-scale=1.0" />
    <script src="//upcdn.b0.upaiyun.com/libs/jquery/jquery-1.8.3.min.js"></script>
</head>

<body>
<div class="navbar navbar-fixed-top"><div class="navbar-inner"><div class="container"><a class="btn btn-navbar" data-toggle="collapse" data-target="#yii_bootstrap_collapse_0"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></a><a href="/index.php" class="brand"><img src="https://secwiki.b0.upaiyun.com/logo.jpg" alt="" /></a><div class="nav-collapse collapse" id="yii_bootstrap_collapse_0"><form class="navbar-search pull-right" action="/news/search">
         <input type="text" class="search-query span2" name="wd" placeholder="SecWiki">
        </form>
    	<ul id="yw0" class="nav"><li><a href="/index.php">首页</a></li><li><a href="/event">新闻</a></li><li><a href="/news">技术</a></li><li><a href="/skill">技能</a></li><li><a href="/topic">专题</a></li><li><a href="/book">书籍</a></li><li><a href="/user/members">成员</a></li><li><a href="/opml/index">聚合</a></li><li><a href="/tougao/create">投稿</a></li></ul></div></div></div></div>
<div class="container" id="page">
			<!-- breadcrumbs -->
	
    <div style="margin-left: 15px;">
	    <div class="row-fluid">
    <div id="content">
            <link rel="stylesheet" type="text/css" href="/css/mweekly.css"/>

<h5><strong>SecWiki周刊（第59期）</strong></h5>
<blockquote> 2015/04/13-2015/04/19</blockquote>
<section id="news">
    <div class="weeklydivide">
      <strong>安全资讯</strong>
    </div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>Verizon新鲜发布2015年数据泄露调查报告DBIR<br><a target="_blank" href="http://mp.weixin.qq.com/s?__biz=MzA3MTUwMzI5Nw==&amp;mid=213825938&amp;idx=1&amp;sn=2a5ec95e8a12a5e7e6971ae76965a2cc&amp;scene=1&amp;from=groupmessage&amp;isappinstalled=0#rd">http://mp.weixin.qq.com/s?__biz=MzA3MTUwMzI5Nw==&amp;mid=213825938&amp;idx=1&amp;sn=2a5ec95e8a12a5e7e6971ae76965a2cc&amp;scene=1&amp;from=groupmessage&amp;isappinstalled=0#rd</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>The new spam: interactive robo-calls from the cloud as cheap as e-mail<br><a target="_blank" href="http://arstechnica.com/information-technology/2015/04/the-new-spam-interactive-robo-calls-from-the-cloud-as-cheap-as-e-mail/">http://arstechnica.com/information-technology/2015/04/the-new-spam-interactive-robo-calls-from-the-cloud-as-cheap-as-e-mail/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>火眼——比黑客更黑的抹黑中国之举<br><a target="_blank" href="http://mp.weixin.qq.com/s?__biz=MjM5MjEyMTcyMQ==&amp;mid=208021695&amp;idx=2&amp;sn=9c6f579e7e819f797cfc023359698c51#rd">http://mp.weixin.qq.com/s?__biz=MjM5MjEyMTcyMQ==&amp;mid=208021695&amp;idx=2&amp;sn=9c6f579e7e819f797cfc023359698c51#rd</a></div><div class="single"><span id="tags">[其它]&nbsp;&nbsp;</span>ANNOUNCING THE CYBERSECURITY 500 LIST FOR Q2 2015<br><a target="_blank" href="http://cybersecurityventures.com/cybersecurity-500-q22015/">http://cybersecurityventures.com/cybersecurity-500-q22015/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Apache Cassandra JMX/RMI Remote Code Execution<br><a target="_blank" href="https://labs.mwrinfosecurity.com/advisories/2015/04/17/apache-cassandra-jmxrmi-remote-code-execution/">https://labs.mwrinfosecurity.com/advisories/2015/04/17/apache-cassandra-jmxrmi-remote-code-execution/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>2014年网络安全年度简报<br><a target="_blank" href="http://www.antiy.com/response/2014report.html">http://www.antiy.com/response/2014report.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>全球各国黑客部队战力总览<br><a target="_blank" href="http://www.freebuf.com/news/special/63869.html">http://www.freebuf.com/news/special/63869.html</a></div></section><section id="news">
    <div class="weeklydivide">
      <strong>安全技术</strong>
    </div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>一句powershell调用mimikatz抓密码<br><a target="_blank" href="http://www.secoff.net/archives/389.html">http://www.secoff.net/archives/389.html</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>Android Art Hook 技术方案<br><a target="_blank" href="http://bbs.pediy.com/showthread.php?t=199553">http://bbs.pediy.com/showthread.php?t=199553</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>MS15-034/CVE-2015-1635 HTTP远程代码执行漏洞分析<br><a target="_blank" href="http://blogs.360.cn/blog/cve_2015_6135_http_rce_analysis/">http://blogs.360.cn/blog/cve_2015_6135_http_rce_analysis/</a></div><div class="single"><span id="tags">[文档]&nbsp;&nbsp;</span>WOT2015互联网运维与开发者大会课程资料<br><a target="_blank" href="http://pan.baidu.com/share/link?shareid=1050484341&amp;uk=1364435411">http://pan.baidu.com/share/link?shareid=1050484341&amp;uk=1364435411</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>10Kstudents video:software vulnerabilities and secure programming<br><a target="_blank" href="http://10kstudents.eu/">http://10kstudents.eu/</a></div><div class="single"><span id="tags">[论文]&nbsp;&nbsp;</span>Modern Objective-C Exploitation Techniques <br><a target="_blank" href="http://www.phrack.org/papers/modern_objc_exploitation.html">http://www.phrack.org/papers/modern_objc_exploitation.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>nmap旁站查询脚本<br><a target="_blank" href="http://www.secoff.net/archives/400.html">http://www.secoff.net/archives/400.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>pysymemu:An intel 64 symbolic emulator<br><a target="_blank" href="https://github.com/feliam/pysymemu">https://github.com/feliam/pysymemu</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Extinction Level Event: Evolution of the Sandbox<br><a target="_blank" href="http://info.lastline.com/blog/extinction-level-event-evolution-of-the-sandbox">http://info.lastline.com/blog/extinction-level-event-evolution-of-the-sandbox</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>crossdomain.xml : Beware of Wildcards<br><a target="_blank" href="http://blog.h3xstream.com/2015/04/crossdomainxml-beware-of-wildcards.html#demo_video_swf">http://blog.h3xstream.com/2015/04/crossdomainxml-beware-of-wildcards.html#demo_video_swf</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Public Block Lists of Malicious IPs and URLs<br><a target="_blank" href="http://www.selectrealsecurity.com/public-block-lists">http://www.selectrealsecurity.com/public-block-lists</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>JMX RMI Exploit<br><a target="_blank" href="http://www.n0tr00t.com/2015/04/16/JMX-RMI-Exploit.html">http://www.n0tr00t.com/2015/04/16/JMX-RMI-Exploit.html</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>Malware in the Wild: Evolving to Evade Detection<br><a target="_blank" href="http://www.slideshare.net/lastlinesecurity/malware-in-the-wild-evolving-to-evade-detection">http://www.slideshare.net/lastlinesecurity/malware-in-the-wild-evolving-to-evade-detection</a></div><div class="single"><span id="tags">[编程技术]&nbsp;&nbsp;</span>漏洞批量利用扫描框架<br><a target="_blank" href="http://blog.csdn.net/u011721501/article/details/45007923">http://blog.csdn.net/u011721501/article/details/45007923</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>深入解读：Windows HTTP.sys远程代码执行漏洞跟踪进展<br><a target="_blank" href="http://mp.weixin.qq.com/s?__biz=MjM5ODYyMTM4MA==&amp;mid=205178018&amp;idx=1&amp;sn=cea04c7ac59e47c8615d46957771ddc3#rd">http://mp.weixin.qq.com/s?__biz=MjM5ODYyMTM4MA==&amp;mid=205178018&amp;idx=1&amp;sn=cea04c7ac59e47c8615d46957771ddc3#rd</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>wot-web攻击日志分析 (1).pptx<br><a target="_blank" href="http://vdisk.weibo.com/s/vqrRvO1fQIKM">http://vdisk.weibo.com/s/vqrRvO1fQIKM</a></div><div class="single"><span id="tags">[数据挖掘]&nbsp;&nbsp;</span>数据科学家和他们的可视化工具<br><a target="_blank" href="http://djchina.org/2015/04/16/openvis_1/">http://djchina.org/2015/04/16/openvis_1/</a></div><div class="single"><span id="tags">[运维安全]&nbsp;&nbsp;</span>一种安全和威胁分类模型<br><a target="_blank" href="http://note.youdao.com/share/?id=08da332c7afdd8fe3d1b6d531ff23f9b&amp;type=note">http://note.youdao.com/share/?id=08da332c7afdd8fe3d1b6d531ff23f9b&amp;type=note</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>PDF Password Cracking With John The Ripper<br><a target="_blank" href="http://blog.didierstevens.com/2015/04/15/pdf-password-cracking-with-john-the-ripper/">http://blog.didierstevens.com/2015/04/15/pdf-password-cracking-with-john-the-ripper/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>OS X Malware Samples<br><a target="_blank" href="https://objective-see.com/malware.html">https://objective-see.com/malware.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Bypassing kernel ASLR  Target : Windows 10<br><a target="_blank" href="https://drive.google.com/file/d/0B3P18M-shbwrNWZTa181ZWRCclk/edit">https://drive.google.com/file/d/0B3P18M-shbwrNWZTa181ZWRCclk/edit</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>The Chronicles of the Hellsing APT: the Empire Strikes Back<br><a target="_blank" href="https://securelist.com/analysis/publications/69567/the-chronicles-of-the-hellsing-apt-the-empire-strikes-back/">https://securelist.com/analysis/publications/69567/the-chronicles-of-the-hellsing-apt-the-empire-strikes-back/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>APT30 AND THE MECHANICS OF A LONG-RUNNING CYBER<br><a target="_blank" href="https://www2.fireeye.com/rs/fireye/images/rpt-apt30.pdf">https://www2.fireeye.com/rs/fireye/images/rpt-apt30.pdf</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>One Day with Cortana Script Engine<br><a target="_blank" href="http://security-is-just-an-illusion.blogspot.com/2013/11/one-day-with-cortana-script-engine.html">http://security-is-just-an-illusion.blogspot.com/2013/11/one-day-with-cortana-script-engine.html</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>What the Ridiculous Fuck, D-Link<br><a target="_blank" href="http://www.devttys0.com/2015/04/what-the-ridiculous-fuck-d-link/">http://www.devttys0.com/2015/04/what-the-ridiculous-fuck-d-link/</a></div><div class="single"><span id="tags">[恶意分析]&nbsp;&nbsp;</span>一个盗取用户淘宝信息的木马分析<br><a target="_blank" href="http://blogs.360.cn/blog/taobao_information_trojan/">http://blogs.360.cn/blog/taobao_information_trojan/</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>AppUse(Android测试平台)用户手册 v2-2<br><a target="_blank" href="http://drops.wooyun.org/tools/5599">http://drops.wooyun.org/tools/5599</a></div><div class="single"><span id="tags">[杂志]&nbsp;&nbsp;</span>Modern Objective-C Exploitation Techniques<br><a target="_blank" href="http://www.phrack.com/papers/modern_objc_exploitation.html">http://www.phrack.com/papers/modern_objc_exploitation.html</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>Google’s April Fool’s prank inadvertently broke their security<br><a target="_blank" href="http://news.netcraft.com/archives/2015/04/17/googles-april-fools-prank-inadvertently-broke-their-security.html">http://news.netcraft.com/archives/2015/04/17/googles-april-fools-prank-inadvertently-broke-their-security.html</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>New POS Malware Emerges<br><a target="_blank" href="https://www.trustwave.com/Resources/SpiderLabs-Blog/New-POS-Malware-Emerges---Punkey/">https://www.trustwave.com/Resources/SpiderLabs-Blog/New-POS-Malware-Emerges---Punkey/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>An Analysis Of MS15-034<br><a target="_blank" href="http://www.securitysift.com/an-analysis-of-ms15-034/">http://www.securitysift.com/an-analysis-of-ms15-034/</a></div><div class="single"><span id="tags">[取证分析]&nbsp;&nbsp;</span>iPhone 目标分析及使用 UDID 实施入侵<br><a target="_blank" href="http://blog.knownsec.com/2015/04/iphone-target-analysis-and-exploitation-with-appleudid/">http://blog.knownsec.com/2015/04/iphone-target-analysis-and-exploitation-with-appleudid/</a></div><div class="single"><span id="tags">[Web安全]&nbsp;&nbsp;</span>NodeJS 应用仓库钓鱼<br><a target="_blank" href="http://www.cnblogs.com/index-html/p/npm_package_phishing.html">http://www.cnblogs.com/index-html/p/npm_package_phishing.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>解读“重定向SMB”攻击<br><a target="_blank" href="http://drops.wooyun.org/papers/5723">http://drops.wooyun.org/papers/5723</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>Hard Disk Firmware Hacking (Part 2)<br><a target="_blank" href="http://www.malwaretech.com/2015/04/hard-disk-firmware-hacking-part-2.html">http://www.malwaretech.com/2015/04/hard-disk-firmware-hacking-part-2.html</a></div><div class="single"><span id="tags">[设备安全]&nbsp;&nbsp;</span>Hard Disk Firmware Hacking (Part 1)<br><a target="_blank" href="http://www.malwaretech.com/2015/04/hard-disk-firmware-hacking-part-1.html">http://www.malwaretech.com/2015/04/hard-disk-firmware-hacking-part-1.html</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Analysis of Flash Player shared ByteArray Use-After-Free Vulnerability<br><a target="_blank" href="https://blog.coresecurity.com/2015/04/13/analysis-of-adobe-flash-player-shared-bytearray-use-after-free-vulnerability/">https://blog.coresecurity.com/2015/04/13/analysis-of-adobe-flash-player-shared-bytearray-use-after-free-vulnerability/</a></div><div class="single"><span id="tags">[漏洞分析]&nbsp;&nbsp;</span>Secunia Research details the Vulnerability in Oracle Outside In<br><a target="_blank" href="http://secunia.com/blog/secunia-research-details-the-vulnerability-in-oracle-outside-in--424/">http://secunia.com/blog/secunia-research-details-the-vulnerability-in-oracle-outside-in--424/</a></div><div class="single"><span id="tags">[移动安全]&nbsp;&nbsp;</span>关于移动端的钓鱼式攻击<br><a target="_blank" href="http://coolshell.cn/articles/17066.html">http://coolshell.cn/articles/17066.html</a></div><div class="single"><span id="tags">[杂志]&nbsp;&nbsp;</span>《安全参考》HACKCTO-201504-28<br><a target="_blank" href="http://pan.baidu.com/s/1c04e7Kk">http://pan.baidu.com/s/1c04e7Kk</a></div></section>
<section id="news">
        <pre style="margin-top: 15px; margin-bottom: 15px; padding: 6px 10px; max-width: 100%; color: rgb(62, 62, 62); background-color: rgb(255, 255, 255); -webkit-print-color-adjust: exact; border-width: 1px; border-style: solid; border-color: rgb(204, 204, 204); font-size: 13px; line-height: 19px; overflow: auto; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;"><code class="" style="max-width: 100%; -webkit-print-color-adjust: exact; border-width: initial; border-style: none; border-color: initial; background-color: transparent; border-radius: 3px; box-sizing: border-box !important; word-wrap: break-word !important;">-----微信ID：SecWiki-----
SecWiki，5年来一直专注安全技术资讯分析！
SecWiki：https://www.sec-wiki.com</code></pre>
    <p style="max-width: 100%; min-height: 1em; color: rgb(62, 62, 62); font-size: 16px; white-space: normal; background-color: rgb(255, 255, 255); box-sizing: border-box !important; word-wrap: break-word !important;"><span style="max-width: 100%; font-size: 14px; box-sizing: border-box !important; word-wrap: break-word !important;">本期原文地址:<span style="max-width: 100%; font-family: Helvetica, arial, sans-serif; box-sizing: border-box !important; word-wrap: break-word !important;">&nbsp;<a href="https://www.sec-wiki.com/weekly/59">SecWiki周刊(第59期)</a></span><br style="max-width: 100%; box-sizing: border-box !important; word-wrap: break-word !important;"></span></p>
</section>
    </div><!-- content -->
</div>
    </div>
</div>

<div id="footer" class="footer">
		<div class="container"  style="margin-top: 5px;">
			<div class="span3">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">最新公告</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='http://www.sec-wiki.com/about/donate'>2016-01-01 打赏功能开通</a><br>
						<a href='http://www.sec-wiki.com/about/join'>2015-01-05 如何加入SecWiki</a><br>
						<a href='http://www.sec-wiki.com/about/submit'>2014-08-08 如何快捷提交资讯</a><br>
						<a href='http://www.sec-wiki.com/about/index'>2012-07-01 关于SecWiki</a><br>
				</div>
			</div>

			<div class="span5">
				<div class="one-third column">
					<h5 class="title">
						<a target="_blank" href="/nav/index">友情链接</a>						<span class="line"></span>
					</h5>
					<p>
						<a href='https://www.secsilo.com/'>安全沙漏</a>&nbsp;
						<a href='http://www.freebuf.com/'>Freebuf</a>&nbsp;
						<a href='http://www.anquanquan.info/'>安全圈</a>&nbsp;
						<a href='http://navisec.it/'>Navisec</a>&nbsp;
                        <a href='http://das.scusec.org'>小黑屋</a>&nbsp;
                        <a href='http://www.polaris-lab.com/'>勾陈Lab</a>
                        <br>
						<a href='http://www.ijiandao.com'>网络尖刀</a>&nbsp;
                        <a href='http://www.shellpub.com/'>ShellPub</a>&nbsp;
                        <a href='http://www.secpulse.com/?secwiki'>SecPulse</a>&nbsp;
                        <a href='https://www.secquan.org/'>圈子</a>
                        <a href='http://bluereader.org/'>深蓝阅读</a>&nbsp;<br>
                        <a href='http://www.bugbank.cn/'>漏洞银行</a>
                        <a href='http://bobao.360.cn/'>安全客</a>
                        <a href='http://www.secfree.com/'>指尖安全</a>
                        <a href='https://www.easyaq.com/'>E安全</a>
                        <a href='http://www.vipread.com/'>安全slide</a>

                        <a href="/link">更多</a>
					</p>
				</div>
			</div>

			<div class="span2">
			    <div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/index">SecWiki公众号</a>						<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/weixin.jpg">
					</div>
				</div>
			</div>

			<div class="span2">
				<div class="one-third column">
					<h5 class="title">
					<a target="_blank" href="/about/donate">安全学术圈</a>					<span class="line"></span>
					</h5>
					<div style="margin-top:15px; width: 90px; height: 90px;">
						<img src="https://secwiki.b0.upaiyun.com/secquan.jpg">
					</div>
				</div>
			</div>

		</div>
		<div class="container" style="margin-top:5px;margin-bottom: 10px;">
			<div class="span9">
					Copyright &copy;
					2019                    琼ICP备16003361号-4
                    SecWiki
					<a href="/news/rss">
						<img src="/img/rss.gif" border="0" width="36px" height="14px" alt="订阅SecWiki">
					</a>
					<a href="https://www.upyun.com/">
						<img src="https://secwiki.b0.upaiyun.com/upyun.png" width="80" border="0" alt="UPYUN">
					</a>
					<a href="http://www.vultr.com/?ref=6885244">
						<img src="https://secwiki.b0.upaiyun.com/vultr.png" width="100" border="0" alt="vultr">
					</a>&nbsp;&nbsp;
			</div>
		</div>
</div><!-- footer -->
<div id="csswithjs">
        <script type="text/javascript">
            var _bdhmProtocol = (("https:" == document.location.protocol) ? " https://" : " http://");
            document.write(unescape("%3Cscript src='" + _bdhmProtocol + "hm.baidu.com/h.js%3Fbad84ea1f314383f8da7949aad5c2199' type='text/javascript'%3E%3C/script%3E"));
    </script>
</div>
<script type="text/javascript" src="https://secwiki.b0.upaiyun.com/js/bs.min.js"></script>
<script type="text/javascript">
/*<![CDATA[*/
jQuery(function($) {
jQuery('[data-toggle=popover]').popover();
jQuery('body').tooltip({"selector":"[data-toggle=tooltip]"});
jQuery('#yii_bootstrap_collapse_0').collapse({'parent':false,'toggle':false});
});
/*]]>*/
</script>
</body>
<!-- page -->
</html>
