Be alert! The "hidden danger" behind the "small cigarette card"

Recently,

A game called "Smoke Card"

Quietly popular among primary and secondary school students

For the health and growth of children.

Has brought a threat that cannot be ignored.

The "cigarette card" is made of discarded cigarette cases.

The students tore off the lids of various cigarette cases.

Fold into a rectangular card

Put your hands together and hit the ground with your empty palm.

If a cigarette card is hit by the palm wind and turned over, it will win.

not only that;nay

Students will also be based on the price of cigarettes

Divide "cigarette cards" into different grades.

Some children are already familiar with the "grade" and price of cigarettes

Some students are addicted to taking "cigarette cards"

There are also students who shoot "cigarette cards" which are out of the game level.

This seemingly harmless toy

In fact, there are many hazards hidden.

Remind parents to pay attention!

The harm of "cigarette card"

Misleading smoking behavior: the "cigarette card" is based on real cigarettes, which easily makes children mistakenly think that smoking is a normal and universal behavior. This kind of misleading may lead children to form wrong values when they grow up, and even try to really smoke.

Harm to health: Although the "cigarette card" itself does not contain tobacco, long-term imitation of smoking behavior may lead children to develop bad habits, which in turn will affect respiratory system and cardiovascular health. In addition, children may eat harmful substances on the "cigarette card" by mistake during playing, which may cause potential harm to the body.

The sanitary situation is worrying: it is not difficult to find that children have become low-headed overnight, and they don’t even miss the opportunity to find cigarette cases discarded by adults when they walk! What’s more, directly rummaging through the trash can, the hygiene level of the cigarette card is naturally unimaginable, and all kinds of viruses associated with it will easily infect children and spread rapidly. Moreover, many children kneel or lie prone on the ground after class to play "cigarette card" games with their classmates, which is unsanitary and uncivilized.

Affect mental health: The popularity of "cigarette cards" may make children feel anxious and compare with others. Some children may have excessive consumption and waste in order to have more "cigarette cards" or more unique "cigarette cards" styles. This mentality is extremely unfavorable to children’s mental health and growth.

Inducing illegal crimes: Some illegal businesses may manufacture and sell fake and inferior "cigarette cards" for profit. These products may contain harmful substances and pose a threat to children’s health. At the same time, the purchase and use of fake and shoddy "cigarette cards" may also involve illegal and criminal acts, which will have a negative impact on children’s legal awareness and moral concepts.

Impairment of learning ability: Overindulgence in the collection and play of "cigarette cards" may make children ignore the cultivation of learning and interest. This bad habit will affect children’s academic performance and all-round development, and will have a negative impact on their future study and life.

How to guide children correctly

Strengthen safety education

Parents should cultivate their children’s safety awareness, guide them to understand the dangers of addiction to "cigarette card" games, guide them to establish correct values and outlook on life, enhance their self-protection awareness and resist temptation, and let them actively stay away from "cigarette card" games, and consciously do not collect, compare or play.

Insist on setting an example

Parents should be more alert to the "cigarette card", fully understand the hidden dangers of the "cigarette card" game, and do not regard the "cigarette card" game as an opportunity for children to play in childhood and integrate into the group. Do not offer "cigarette cards" and do not smoke in front of children.

Do safety supervision well.

In daily life, parents are asked to supervise their children and not to let them bring "cigarette cards" into the campus. At the same time, the waste cigarette cases at home should be destroyed immediately, and children should not be given the opportunity to contact cigarette cases.

Actively cooperate with education

For the sake of children’s healthy growth, parents are requested to earnestly assume the responsibility of guardianship, fully support and actively cooperate with the school’s education work, and jointly educate their children to stay away from the bad behavior of collecting cigarette boxes to make "cigarette cards" and participating in "cigarette cards" games.

Strengthen accompanying growth

Advocate parents and friends to put down their mobile phones as much as possible, reduce screen time, devote themselves to family life, carefully plan their leisure time with their children, take their children to participate in beneficial activities, enhance parent-child interaction and dialogue, and accompany their children to grow up healthily.

Create a smoke-free environment

Citizens should not smoke in all kinds of public places, take the initiative to participate in smoking ban and tobacco control activities, and give friendly reminders and exhortations to those who smoke and throw cigarette butts in public places to create a smoke-free environment and a beautiful home.

Source | Comprehensive CCTV News, National Committee for Young Workers, Qilu Net, etc.

Original title: "Be alert! The "hidden danger" behind the "small cigarette card"

Read the original text

Anti-counterfeiting bloggers frequently roll over, and strengthening market governance is the key.

  Author: Xiong Zhi

  After the "Arrogant Brothers" rolled over, the video bloggers who took counterfeiting as their profession stood on the cusp. According to media reports, the "anti-counterfeiting bloggers" are mainly men. When counterfeiting, they either force stall owners to smash scales or "hang" them online to put pressure on them. Because it is usually accompanied by fierce shouting and other scenes, such anti-counterfeiting is also called "roaring anti-counterfeiting"

  After the rise of short videos, counterfeiting has become a popular track. Some fake bloggers quickly went out of the circle and became "guardians of market order". The conflict of their rights protection process, amplified by video communication, attracted a large number of viewers, which not only created a huge "cool feeling" for the long-time spectators of black-hearted traders, but also accumulated considerable traffic for bloggers.

  But the greater the traffic, the greater the controversy. From a realistic point of view, rights protection and counterfeiting, which are rushing to traffic, have gradually begun to deteriorate, deviating from the initial intention of exposing chaos, punishing evil and promoting good. For example, the report mentioned that some anti-counterfeiting bloggers have radical rights protection and violent violence, which has intensified the conflict; Some anti-counterfeiting bloggers bring goods with their front feet and back feet, and as a result, the goods with goods also have fake and shoddy problems; There are fake bloggers, it is false to maintain market order, and it is true to blackmail businesses on the grounds of counterfeiting …

  Fake bloggers frequently roll over their cars, essentially because it was an impure business from the beginning. In order to maximize traffic and cash flow, anti-counterfeiting bloggers naturally do not hesitate to create conflicts and intensify contradictions. They can shoot whenever there is a critical point of communication, and may even go against the facts and generalize to cater to the preferences of online public opinion.

  On the other hand, the threshold of online anti-counterfeiting is low, and the traffic comes quickly, which leads to a mixed bag of participants, and some bloggers even lack basic legal awareness. For example, the fake online celebrity’s "steel-toed punishment of evil and promotion of good" blew himself up during the live broadcast, which caused great controversy and he was banned by the platform.

  For fake bloggers, of course, they should not be killed with a stick. After all, it is only part of the situation that counterfeiting becomes "fake". Moreover, some fake bloggers have shown a positive role in exposing dishonest behaviors such as market chaos. Their existence makes black-hearted traders fearful, and their anti-counterfeiting behavior has purified the market to a certain extent and safeguarded the legitimate rights and interests of consumers.

  But the problem is that there should be a bottom line for realizing traffic, and it is necessary to seek truth from facts in counterfeiting. Counterfeiting bloggers are mainly engaged in the business of network rights protection. First of all, they must abide by the law and the market order. They must not deliberately intensify contradictions or even engage in extortion in order to maximize their interests, and illegally realize them in the name of "defending justice".

  Therefore, for the deviant behavior of anti-counterfeiting bloggers, the short video platform must first compact the main responsibility and strengthen the audit. If there are false, exaggerated and misleading contents, or deliberately "fighting violence with violence", we should take decisive measures such as warning, current restriction and titles. In short, it is necessary to form positive guidance for anti-counterfeiting bloggers to prevent them from losing their bottom line in pursuit of traffic.

  Market supervision departments should also strengthen supervision and guidance for this kind of spontaneous anti-counterfeiting rights protection. For example, it is possible to establish a communication mechanism with bloggers who commit head counterfeiting and strengthen the publicity of laws and regulations; You can also cooperate with the short video platform to set up an authentication mechanism for anti-counterfeiting bloggers and officially authenticate qualified bloggers.

  Of course, it is more important to strengthen market governance and protect the rights and interests of consumers. It should be noted that anti-counterfeiting bloggers are getting more and more popular, and they are widely respected by netizens. In the final analysis, it is because of the proliferation of illegal activities such as short weight and cheating, and consumers frequently encounter fraud. It is precisely because of this kind of market chaos that it provides a living soil for anti-counterfeiting bloggers. Therefore, to standardize online counterfeiting, we must first standardize the market order and ensure that businesses operate in good faith. The market environment is clear, the business behavior is correct, and the chaos of counterfeiting and rights protection will naturally decrease. (Xiong Zhi)

[Editor in charge:
Jin lingbing
]

Accord in Beijing is on sale, with the latest offer of 114,800! Act quickly.

[car home Beijing Preferential Promotion Channel] Recently, Honda in Beijing is carrying out large-scale preferential activities, with the highest preferential amount reaching 65,000 yuan and the lowest starting price of only 114,800 yuan. If you are interested in this model, you may wish to click "Check the car price" in the quotation form to get a higher discount.

北京地区雅阁特价出售,最新报价11.48万!赶快行动

The appearance design of Accord is elegant and dynamic, and the front face adopts the family-style air intake grille design, which shows a strong visual impact with the sharp headlight group. The body lines are smooth, the overall style tends to be younger, and the handling of details also reflects the perfect combination of exquisiteness and movement.

北京地区雅阁特价出售,最新报价11.48万!赶快行动

The Accord has smooth and dynamic side lines, with a body size of 4980*1862*1449mm and a wheelbase of 2830mm, providing a spacious and comfortable interior space. The front tread is 1600mm and the rear tread is 1620mm, which further enhances the stability and handling performance of the vehicle. The front and rear tyre size are both 225/50 R17, with personalized rim design, which not only improves the visual effect, but also ensures good driving performance.

北京地区雅阁特价出售,最新报价11.48万!赶快行动

Accord’s interior design is elegant and full of science and technology. The steering wheel is wrapped in high-quality leather, which provides excellent grip and comfort. At the same time, it has the function of manual adjustment up and down and back and forth, ensuring that every driver can find the most suitable driving position. The center console is equipped with a 12.3-inch high-definition touch screen, which supports many functions, such as multimedia system, navigation, voice recognition control of telephone and air conditioner, which is convenient and fast. The seat is made of imitation leather. The main driver’s seat can adjust the front and rear, backrest and height (4 directions), while the assistant driver’s seat provides the functions of adjusting the front and rear and backrest, and the rear seat can be put down as a whole, which increases practicality and flexibility. The car is also equipped with a Type-C interface and a USB/Type-C interface, two in the front row and two in the back row, which is convenient for passengers to charge or connect devices at any time.

北京地区雅阁特价出售,最新报价11.48万!赶快行动

Accord is equipped with a 1.5T turbocharged engine with a maximum power of 141kW and a maximum torque of 260N·m, which matches CVT continuously variable transmission, providing drivers with a smooth and powerful power experience.

He is full of praise for the front face design of the new Accord. He thinks that it is not only elegant but also beautiful to cancel the chrome-plated mesh and adopt the all-black hexagonal design, especially the diamond mesh composed of polygons is even more eye-catching. At the same time, he pointed out that the slip back design not only enhances the fashion sense of the appearance, but also improves the aerodynamic performance and reduces energy consumption. In addition, he is very satisfied with the through taillight design. The overall shape is atmospheric and advanced, which fully reflects the modernity and design sense of the new Accord.

Biden meets Afghan President Ghani at the White House.

  US President Biden met with visiting Afghan President Ghani and Chairman Abdullah of the Afghan High Commission for National Reconciliation at the White House on the 25th local time to discuss bilateral relations and the situation in Afghanistan.

  Biden said at the beginning of the meeting that afternoon that the United States would not stop its political, economic and security support for Afghanistan after the withdrawal of US troops in Afghanistan. He also said that Afghans will decide the future of Afghanistan, and meaningless violence must stop.

  Ghani said that the Arab-American relationship is entering a new stage, and he respects and supports Biden’s decision to withdraw troops. He also said that the Afghan security forces had recaptured six areas from the Taliban that day.

  The White House later stated in a statement that the United States will provide Afghanistan with medical, health, humanitarian, development and security assistance, including 3 million doses of COVID-19 vaccine. Biden has asked Congress to provide 3.3 billion U.S. dollars for Afghan security forces in fiscal year 2022. The statement also said that the United States continues to urge all Afghan parties to participate in peace talks as soon as possible and meaningfully in order to achieve just and lasting reconciliation.

  Recently, there have been frequent attacks in Afghanistan, and the security situation is deteriorating. Deborah Lyons, Special Representative of the UN Secretary-General for Afghanistan, said on the 22nd that the Taliban had occupied more than 50 of the 370 regions in Afghanistan since the beginning of May.

  Biden announced in April this year that the U.S. troops stationed in Afghanistan will begin to withdraw on May 1 and withdraw completely before September 11. The US Central Command said on the 8th of this month that the withdrawal plan has been completed more than half. The Pentagon said on the 21st that the US military will flexibly adjust its withdrawal schedule according to the situation, but the goal of completing the withdrawal in September remains unchanged.

2024 Land Rover Range Rover Executive Edition 3.0T P400 HSE Long Axle Car

Tianjin Port Bonded Area Bangyu International Commitment 1. All the models sold by the company are directly connected from abroad, and the primary sources are strictly tested by the customs and put on the market, and all the models can be registered and settled in the country. The company has complete procedures (customs clearance, commodity inspection, conformity certificate, environmental protection list, purchase tax application form and electronic information form) for selling all models and enjoys the three guarantees policy 3. Free shuttle bus for customers from other places. Our company will handle the temporary national networking pass for you. 4。 The company provides follow-up services such as insurance, installment, licensing, modification, car delivery, etc. Please contact the dealer at the bottom of the article] Liu Jingli: 17694965222 "With WeChat"

The appearance of the 24 Land Rover Range Rover Executive Edition is simple and straight, and the overall shape is tough and atmospheric, which is in line with the identity of its large SUV. The front face of Land Rover Range Rover looks more square and tough, and the three-banner front air intake grille, newly designed headlights and bumpers make the brand new more powerful. Land Rover Range Rover Executive Edition is simple, angular and domineering. The rectangular honeycomb grille is a Range Rover and looks very noble.

24 Euro gasoline models
Color: Black/Pomegranate Red
Configuration: 22-wheel double blade wheel, head-up display, 1680W advanced audio, 11.4-inch rear entertainment, streaming media rearview mirror, SV black piano paint mahogany steering wheel, black piano paint panel, semi-aniline red handmade leather ceiling, semi-aniline leather seat, SV signature digital headlights, SV custom carpet,

Liu Jingli: 17694965222 "With WeChat"

The brand-new 24 Land Rover Range Rover Executive HSE is equipped with a 3.0T V6 supercharged machine and an 8-speed automatic manual transmission. Among them, the 3.0T V6 supercharged mobilization machine has a maximum power of 250kW(380ps) and a maximum torque of 450 nm (3500-5000 rpm). The reversal of the Land Rover Range Rover Executive Edition group will undoubtedly be more attractive to young consumers. Claiming the wildness of Haopai. The chic quality seeps into the depths of your heart, and there is a feeling that you can’t give up on it. In addition, the maximum crossing depth of the new Range Rover has also improved by 200mm, reaching 900mm, which has been further promoted through the process.

Liu Jingli: 17694965222 "With WeChat"

The appearance of 24 Land Rover Range Rover Range Rover is still the familiar family design of Land Rover, among which the banner mesh air intake grille is very eye-catching, with the square LED headlight group, strong and powerful bottom surround and other elements, the overall visual effect is very domineering. The straight lines on the side and the square shape of the tail once again convey the attribute of stability.

Liu Jingli: 17694965222 "With WeChat"


The panoramic skylight equipped by Land Rover Range Rover Executive also gives consumers a more free driving experience. Land Rover Range Rover Executive Edition introduced the "dual-screen" touch screen technology for the first time. While passengers watch DVD movies, drivers can watch navigation instructions, all on the same screen. The steering wheel is relatively light, which makes driving easier, even if it is in the same direction. The new Range Rover Executive 3.0T matches a new generation of all-terrain off-road four-wheel drive system, and with the cooperation of the transfer box, the off-road performance is more powerful.

Tianjin Bangyu Automobile International Trading Co., Ltd. is a company that sells luxury car brands such as Mercedes-Benz, BMW, Porsche, Land Rover, Audi, BENTLEY, Maserati, TOYOTA, Lexus and other high-end cars. Tips: Don’t believe that low price and reliable price are more important!

Company name: Tianjin Bangyu International Trading Co., Ltd.

Tel: Liu Jingli 17694965222 "With WeChat"

Address: No.288 Jingmen Avenue, Bonded Zone, Binhai New Area, Tianjin.

Aouita was officially listed in November, 2011, and the delivery price was 349,900-600,000 in December.

On August 8, Aouita 11 and its co-branded limited edition model Aouita 011 were officially launched. The new car is positioned as a pure electric medium and large SUV, which was jointly built by Changan Automobile, Huawei and Contemporary Amperex Technology Co., Limited. Four sub-models were launched this time, and the official price range was 349,900-600,000 yuan. In terms of battery life, the new car will be available in 555 km and 680 km versions. It is reported that the new car will be delivered in December this year.

In terms of appearance, Aouita 11 adopts a typical new energy vehicle design technique, with a closed grille on the front face and a futuristic body outline, which shows its identity as a pure tram. The split headlights on the front face are sharp in shape and have an eye-catching light and shadow effect after lighting.

Coming to the side, Aouita 11′ s slip-back body and low-lying posture are very dynamic, with prominent wheel arches and straight lines, which bring a little strength and make it more tough visually. The tail contour is round and full, and the integrated through taillight is the main source of tail recognition. It is worth mentioning that the rear of the new car is also equipped with an active lifting tail, which can be lifted when the vehicle is driving at high speed, thus reducing wind resistance and improving high-speed driving stability.

In terms of size, the length, width and height of the new car are 4880/1970/1601mm and the wheelbase is 2975mm respectively. Available in 4-seat and 5-seat space layouts. In terms of body color matching, Aouita 11 offers six color matching options.

Aouita 011 is a joint limited edition model of Aouita 11, with limited sales of 500 vehicles worldwide. The whole car is painted in black, and the AVATR MMW joint logo is installed on the front brake caliper, welcome pedal, seat headrest and side door, and its unique identity is well interpreted.

As for the interior, Aouita 11 adopts an embracing cockpit to create a strong sense of encirclement for the front passengers. The minimalist interior style has a good texture, which is mainly attributed to the use of NAPPA leather, tufting, flocking, microfiber suede, soft touch paint and other materials, and the sense of luxury meets the standard of this price model. The triple screen composed of 10.25-inch full LCD instrument +15.6-inch floating central control panel +10.25-inch passenger screen has outstanding sense of science and technology. It is reported that its car is equipped with Huawei HarmonyOS OS system, and the control feeling is worth looking forward to.

The eyes came to Aouita 011, and its interior was in black color matching with its appearance. In addition, the interior of the car is also covered with handmade leather. For example, the matte surface of the seat headrest and the upper part of the steering wheel is made of Nuprima leather, and the highlight surface is made of Nappa leather, which makes the sense of high quality more prominent than that of Aouita 11.

In terms of power, Aouita 11 is built on CHN platform, equipped with Huawei DriveONE dual-motor four-wheel drive system, with total engine power of 425kW and total torque of 650N?m. The official 0-100km/h acceleration takes 3.98 seconds at the earliest.

In terms of battery life, Aouita 11 provides Contemporary Amperex Technology Co., Limited ternary lithium battery packs with two capacities of 90kWh and 116kWh, and the pure battery life of CLTC is 555 km and 680 km respectively. In terms of charging, with the 750V high-voltage platform, the charging power of the new car can reach up to 240kW, and the battery life can be increased by 200 kilometers for 10 minutes at the earliest.

Analysis of Roewe i5 Wet Dual Clutch (DCT)+1.5T Strong Performance

The progress of China brand cars in recent years is obvious to all, and some excellent achievements have been made in both internal and external design and comprehensive performance. What I bring to you today is that it has many highlights. Let’s take a look at it next.

Let’s take a look at the appearance of the Roewe i5 first. The front of the Roewe i5 is very individual, with a three-piece grille, which looks sporty. Coupled with the exquisite headlights, the overall look is full of coldness. The car is equipped with LED daytime running lights, front fog lights, headlight height adjustment, automatic opening and closing, adaptive distance light, delayed closing and so on. Come to the side of the car, the car body size is 4615MM*1818MM*1489MM, the car uses angular lines, and the car side feels very capable, with large-sized thick-walled tires, the shape is eye-catching. Looking back, the overall shape of the rear of the car echoes the front face, the taillights are very cute, and the unique exhaust pipe creates a good gas field.

Sitting in the car, the overall visual effect of Roewe i5 interior is very distinctive and the visual effect is good. The steering wheel of the car is very simple in shape, equipped with functions such as manual adjustment of the steering wheel up and down, and the grip is full and delicate. Let’s take a look at the central control. The car is decorated with a fashionable touch-control LCD central control screen, which makes the interior design quite layered and conforms to the mainstream aesthetics. The dashboard and seats are equally eye-catching. The dashboard of the car presents a clean and refreshing design style, and the sports atmosphere is relatively in place. The car uses a leather-like seat, and the seat is wrapped in place, which is basically enough for daily use.

Roewe i5 is matched with a wet dual clutch (DCT) gearbox, with a maximum power of 127KW and a maximum torque of 275N.m, with good power performance.

Roewe i5 is equipped with driving mode selection, remote control key, traction control (ASR/TCS, etc.), Bluetooth /WIFI connection, full-speed adaptive cruise and other configurations, which is worthy of praise.

To sum up: the car is a very suitable choice for many families with a moderate size, and the internal space is enough for daily use.

An exclusive report by the reception desk on the investigation report that Northwestern Polytechnical University was attacked by NSA network in the United States (Part II)

On June 22 this year, Northwestern Polytechnical University issued a "Public Statement" saying that the school was attacked by overseas cyber attacks, and then the Xi ‘an police officially filed an investigation. The China National Computer Virus Emergency Response Center and 360 Company jointly formed a technical team to participate in the technical analysis of the case, and on September 5, the first "Investigation Report on Northwestern Polytechnical University’s Cyber Attacks by NSA in the United States" was released. The investigation report pointed out that the source of this cyber attack was the specific intrusion action office under the National Security Agency (NSA). Today (27th), the technical team released the investigation report on related cyber attacks again. The report revealed that during the cyber attack on Northwestern Polytechnical University, the Office of Specific Invasion Action (TAO) built a (so-called) "legal" channel for remote access to the core data network of infrastructure operators in China, and achieved the infiltration control of China’s infrastructure.Details > >

  A number of evidences show that the National Security Agency (NSA) is behind the scenes.

  The investigation report revealed that the Office of Specific Invasion Operations (TAO) under the National Security Agency (NSA) exposed a number of technical loopholes and made many operational mistakes in the process of cyberattacks on Northwestern Polytechnical University. Relevant evidence further proved that the behind-the-scenes attack on Northwestern Polytechnical University was the NSA.

  The investigation found that when using tipoff activation command and remote control of NOPEN Trojan, the Office of Specific Invasion Operations (TAO) under the National Security Agency (NSA) must operate manually, and the actual working time of network attackers can be analyzed from the attack time of these two tools.

  First of all, according to the big data analysis of related cyber attacks, 98% of cyber attacks on Northwestern Polytechnical University are concentrated between 21: 00 and 4: 00 am Beijing time, which corresponds to 9: 00 to 16: 00 EST, and belongs to the domestic working time in the United States. Secondly, there was no cyber attack on Northwestern Polytechnical University on all Saturdays and Sundays in the United States. Thirdly, by analyzing the unique holidays in the United States, it is found that the "Memorial Day" in the United States has three days off, and the "Independence Day" in the United States has one day off. During these four days, the attacker did not carry out any attack and theft. Fourth, after a long period of close tracking of the attacks, it was found that all cyber attacks were silent during the Christmas period. Judging from the above working hours and holiday arrangements, those who attack and steal secrets against Northwestern Polytechnical University are unscrupulous and undisguised in their activities according to the schedule of working days in the United States.

  Du Zhenhua, Senior Engineer of National Computer Virus Emergency Response Center:TAO’s cyber attack on Northwestern Polytechnical University shows that the technical complexity is relatively high, the attack cycle is relatively long, and the workload of manual operation is relatively large, so under such conditions, the probability of human error is relatively high. Then these mistakes can be used by us to analyze the attribution. According to the attribution analysis, for example, the instruction string leaked in the accident this time, as well as some characteristic strings in the code, then the characteristics of this natural language reflected by it are in line with the characteristics of this English-speaking country.

  During the long-term tracking and reverse osmosis of network attackers, the technical team found that the attackers have the following language characteristics: First, the attackers have the habit of using American English; Second, the internet devices associated with the attackers are all equipped with English operating systems and various English-language applications; Third, the attacker uses the American keyboard for input.

  360 company network security expert Bian Liang:For example, we caught it once. During the attack, its command to send a script was wrong, wrong, and wrong. Then, this tool will prompt the attacker, and if something goes wrong, it will return the error information to the attacker to give him a hint. This information includes the attacker’s current operating system environment, which actually exposes that the attacker’s related information is the US War Office (TAO).

  The technical team found that at 5: 36 on May 16th, 20 ××× Beijing time, the cyberattacker used the springboard machine located in South Korea (IP: 222.122. ××××××) and attacked Northwestern Polytechnical University again with the NOPEN Trojan. When trying to invade and control a network device after the third-level infiltration of the intranet of Northwestern Polytechnical University, there was a human error when running the upload PY script tool, and the specified parameters were not modified. After the script is executed, an error message is returned, which exposes the working directory and the corresponding file name of the attacker’s online terminal. From this, it can be known that the system environment of the Trojan control terminal is Linux system, and the corresponding directory name "/etc/autoutils" is the special name of the directory of network attack weapons tools of the specific intrusion action office (TAO).

  The error message is as follows:

  Quantifier follows nothing in regex; marked by <– HERE in m/* <– HERE .log/ at https://news.cctv.com/2022/09/etc/autoutils line 4569

  The technical team found that 16 of the 41 different cyber attack weapons used in the attack on secrets of Northwestern Polytechnical University were completely consistent with the TAO weapons exposed by the "shadow broker" in 2016; Although 23 tools are not exactly the same as those exposed by the "shadow broker", their genetic similarity is as high as 97%, and they belong to the same type of weapons, but their related configurations are different; The other two tools can’t correspond to the "Shadow Broker" exposure tool, but they need to be used together with other cyber attack weapons tools of TAO, so these weapons and tools obviously have homology and belong to TAO.

  360 company network security expert Bian Liang:Every program developer or author will have his related habits, for example, it is similar to our writing style, and he won’t easily change this habit in a day or two, so the program is the same. There are many such logics in it, and its algorithm includes its data structure, so we will grasp this habit through our analysis and make a comprehensive comparison to find out whether it belongs to such an attack weapon of the same type or the same family and gene.

  The comprehensive analysis of the technical team found that in the tens of thousands of cyber attacks against targets in China, especially the thousands of cyber attacks launched against Northwestern Polytechnical University, some weapons used in the attack process were implanted with Trojans before the "shadow broker" exposed NSA weapons and equipment in 2016. According to NSA’s behavior habits, the above weapons and tools are likely to be used by TAO employees themselves.

  NSA invades China’s infrastructure-related equipment and steals user privacy data.

  It is understood that the technical team conducted forensic analysis on the traces of cyber attacks suffered by Northwestern Polytechnical University and the on-site environment through relevant technical means, and judged the attack methods and time of the specific intrusion action office (TAO) under the National Security Agency (NSA), and disclosed typical cases of related cyber attacks.

  1. Steal key sensitive data such as password and operation record of remote business management account of Northwestern Polytechnical University.

  According to the investigation report, the specific intrusion action office (TAO) under the National Security Agency (NSA) installed a sniffing tool "drinking tea" in the operation and maintenance management server of Northwestern Polytechnical University, and secretly sniffed and stole the remote maintenance management information of the operation and maintenance management personnel of Northwestern Polytechnical University for a long time, including the password of the network boundary device account, the access rights of business devices, the configuration information of routers and other devices.

  The technical team found that the types of network equipment sniffed by Northwestern Polytechnical University include fixed Internet access network equipment (routers, authentication servers, etc.), core network equipment (core routers, switches, firewalls, etc.), and also important equipment (data service platforms, etc.) of communication infrastructure operators, including account number, password, equipment configuration, network configuration and other information.

  At 6: 52 on December 11th, 20××× Beijing time, TAO used the proxy server (IP: 130.54 .××××××) located in Kyoto University of Japan as an attack springboard, illegally invaded the "telnet" management server of the operation and maintenance network of Northwestern Polytechnical University, uploaded and installed the NOPEN Trojan, and then controlled its intranet monitoring and management server in cascade. Both of the above servers had been installed with "tea drinking" sniffing in advance. TAO remotely controls the Trojan to retrieve and download the compressed and encrypted monitoring record file, and then clears the trace and exits. Stealing data includes the management account number, password, device configuration, network configuration and other information of routers and core network devices (core routers, switches, firewalls).

  2. Steal the configuration files and log files of network equipment operation and maintenance in Northwestern Polytechnical University.

  The specific intrusion action office (TAO) under the National Security Agency (NSA) of the United States has long attacked and invaded the network operation and maintenance management server of Northwestern Polytechnical University, secretly stealing network equipment operation and maintenance configuration files and log files.

  At 10: 41 on October 11th, 20××× Beijing time, TAO invaded and controlled an intranet server of Northwestern Polytechnical University through a proxy server located in Korea (IP: 210.115 ××××××). At 10: 48, after two lateral moves, TAO invaded another intranet server, accessed the regular task configuration scripts in a specific directory, and retrieved 14 configuration files for regular tasks. Subsequently, these 14 files were stolen at one time, which can be used to perform regular cleaning, backup, power check and other operations.

  3. Infiltration control of China infrastructure core equipment.

  The specific intrusion action office (TAO) under the National Security Agency (NSA) of the United States used the password of the stolen network equipment account to enter the service network of an infrastructure operator in China as a "legitimate" status, control the related service quality monitoring system, and steal the user’s private data.

  At 22:53 on March 7th, 20××× Beijing time, the Office of Specific Invasion Operations (TAO) of the National Security Agency of the United States attacked and controlled the service server of an infrastructure operator in China through the attack agent 148.208××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××

  At 15:02 on the same day, TAO saved the queried user data in the directory of the attacked server/var/tmp/.2e434fd8aaee73e1/ERF/out/f/,and then packaged it and sent it back to the attack springboard. Subsequently, the attack traces such as infiltration tools and user data uploaded during the process of stealing secrets were quickly removed by special tools.

  Du Zhenhua, Senior Engineer of National Computer Virus Emergency Response Center:TAO used many kinds of cyber weapons in this attack against Northwestern Polytechnical University, specifically, such as acid fox, so it belongs to a typical loophole-breaking weapon. Through this middleman attack, it can deliver other cyber weapons to the victimized host in the intranet, such as anger spraying and never disclosing such persistent control weapons. It can further attack and penetrate the intranet according to this control instruction sent by TAO remotely, and move horizontally. It can deploy weapons like sniffing and stealing secrets. By sniffing and stealing weapons like drinking tea, it can steal more remote management host account passwords.

  360 company network security expert Bian Liang:Drinking tea is a weapon, which is similar to a spy in our war. It can eavesdrop on our traffic data in the network. Through the monitoring of network data, it can steal sensitive data and information related to us, just like there may be a third party listening through the wall when we are chatting.

  According to the analysis of the technical team, the Office of Specific Invasion Operations (TAO) under the National Security Agency (NSA) of the United States used the same combination of weapons and tools to "legally" control the telecommunications infrastructure networks in no less than 80 countries around the world. The technical team cooperated with the partners in Europe and Southeast Asian countries, successfully extracted and fixed the samples of the above weapons and tools, and successfully completed the technical analysis, which is planned to be released to the public in due course to help the world jointly resist and prevent the network penetration attack of NSA.

  Maintaining network security is the common responsibility of the international community.

  After continuous hard work, the technical team successfully locked in the target node, multi-stage springboard, main control platform, encrypted tunnel, attack weapon and original terminal that launched the cyber attack on Northwestern Polytechnical University by the Specific Invasion Action Office (TAO) under the National Security Agency (NSA), found the identity clues of the attacker, and successfully identified the true identities of 13 attackers.

  According to the report, the National Computer Virus Emergency Response Center and 360 Company jointly formed a technical team to participate in the technical analysis of this case. The technical team received the full support of partners from some countries in Europe and Southeast Asia, and comprehensively restored the overall profile, technical characteristics, attack weapons, attack paths and attack sources of the related attacks, and initially identified that the related attacks originated from the specific intrusion action office (TAO) of the National Security Agency (NSA). This series of research reports will provide reference cases for countries around the world to effectively discover and prevent TAO’s follow-up cyber attacks.

  Professor Zuo Xiaodong, School of Cyberspace Security, School of Public Affairs, University of Science and Technology of China:Because the network attack is cross-border, it is extremely difficult to trace the source of the network attack, both technically and procedurally.

  Experts say that cyberspace is the common home of mankind, cyber attacks are a common threat facing the whole world, and maintaining network security is the common responsibility of the international community. In response to such cyber attacks, it is even more necessary for relevant countries to work together to find out who is behind the scenes.

  On September 8, Yang Tao, Director of the Department of American Studies of the Ministry of Foreign Affairs, made solemn representations to the US Embassy in China on the cyber attack and theft of secrets by the United States against our Northwestern Polytechnical University.

  Yang Tao pointed out that a few days ago, China National Computer Virus Emergency Response Center and 360 Company released an investigation report on the cyber attack carried out by the subordinate departments of the National Security Agency in China, and the relevant facts were clear and the evidence was conclusive and sufficient. This is not the first time that the US government has carried out cyber attacks and stolen sensitive information against China institutions. The actions of the United States seriously infringe on the technical secrets of relevant institutions in China and seriously endanger the security of key infrastructure, institutions and personal information in China, and must be stopped immediately.

  (CCTV reporter Hou Jun Chen Lei Zhang Gang Dong Liangyan Chen Qingbin Han Yuxu)

A shares rose across the board on the 10th, with the Shanghai Composite Index up 0.96% and more than 3,400 shares floating red.

  Beijing, May 10 (Xinhua), the client of Chinanews.com, was not affected by the overnight decline in European and American stock markets. A shares rose across the board on the 10th, with technology stocks such as food and beverage, brokerage and 5G concept leading the gains, while other sectors such as hydrogen energy, industrial hemp and second child concept were eye-catching.

  Overnight (May 9), European and American stocks closed down across the board. The US stock market Dow fell 0.54%, the Nasdaq fell 0.41%, and the S&P 500 index fell 0.30%, hitting a new low since April 2. STOXX Europe 600 Index decreased by 1.65%.

  On May 10th, the Shanghai Composite Index opened at 2878.23 points, an increase of 0.96%. The Shenzhen Component Index reported 8988.92 points, up 1.26%; Growth enterprise market index reported 1489.19 points, up 1.34%.

  On the disk, individual stocks generally rose. At present, more than 3,400 stocks in the two cities rose, and less than 200 stocks floated green. Shipping, brewing, brokerage, software services, communication equipment and other industry sectors were among the top gainers.

  In recent trading days, the Shanghai Composite Index fluctuated repeatedly below 2900 points, and the market trading activity dropped significantly. The single-day turnover of the two cities in the past two days was less than 500 billion yuan.

  China securities journal’s article said that in retrospect, the A-share bull market has always gone up and down sharply, and on the way up, there will always be one or two "diving" under the joint action of internal and external factors. At present, the market has limited room to fall, and the rebound momentum is gestating.

  Some analysts believe that the trend logic behind the stock market operation has not changed since the beginning of the year, and the main contradiction in the market operation will shift from interest rate downward policy friendliness to economic recovery and fundamental inflection point.

  According to data released by the National Bureau of Statistics on the 9th, the consumer price index (CPI) rose by 2.5% year-on-year in April, hitting a six-month high and rising by 0.1% quarter-on-quarter. In April, PPI rose by 0.9% year-on-year, with an increase of 0.5 percentage points from the previous month and 0.3% from the previous month.

  Northeast Securities believes that the market may overestimate the pressure of rising inflation on future monetary policy, and the price increase of pig price list varieties has not spread, and the probability of marginal monetary policy turning loose in the future is greater, which will help improve the liquidity of the stock market.

  According to data released by the People’s Bank of China on the 9th, RMB loans increased by 1.02 trillion yuan in April, a year-on-year decrease of 161.5 billion yuan. At the end of April, the balance of broad money (M2) was 188.47 trillion yuan, up 8.5% year-on-year, and the growth rate was 0.1 percentage point lower than that at the end of last month.

  Experts believe that the growth rate of social financing dropped slightly in April, but the overall growth continued to rebound, indicating that the financing environment of the real economy still improved compared with 2018.

  In the view of some research institutions, the decline in new credit in April was mainly due to seasonal factors, and the credit expansion rate was generally stable. The tone of prudent monetary policy has not changed. It is still the key to steady economic growth to dredge the transmission mechanism of monetary policy and keep the "quantity" moderate and "price" reasonable in the future.

  Li Jing, vice chairman of JPMorgan Chase Asia-Pacific region, also said recently that she is optimistic about the performance of China stock market. Loose fiscal and monetary policies and moderate economic recovery; Market valuation is more attractive at the beginning of this year; RMB exchange rate is stable; The Fed’s policy stance is more moderate; China’s support for capital market financing policy and other five factors will bring benefits to the stock market.

3.0T+ wet dual clutch (DCT)=340 HP, playing space magic.

As a top-class product for the future, it has not completely broken the current design idea, but evolved again on the basis of the existing design language. In terms of line sense, Audi A6L adopts Audi family style with smooth lines, hexagonal large mouth grille is very solemn, and the shape of headlights on both sides is quite a bright spot. After the headlights are lit, they look very energetic. Viewed from the side of the whole car body, the new car is still a luxurious slip-back, and the tradition of wide C-pillar continues, with 20-diameter rear wheels at the front end, which helps to highlight the shape of Audi A6L. The tail gas field is still relatively low-key, and the tail light group is also simple and fashionable, especially the brake light, which echoes the front daytime light.

Audi A6L’s interior design is quite fashionable, and the visual effect is classic and atmospheric without losing the sense of hierarchy. In similar price models, this design can make people simple and generous. Configuration is definitely one of the strengths of Audi A6L. The car is equipped with an electric four-way adjustable leather steering wheel and optional steering wheel heating function. In the central control room and the door handle, a lot of plastic, leather and metal materials are used to cover and wrap it, which feels fashionable. It is equipped with a 10.1-inch touch LCD screen with clear display and luxurious design. The front row is also equipped with an automatic air conditioning control system to freely debug the most comfortable space atmosphere. .

The length, width and height are 5038×1886×1475mm respectively, and the wheelbase has reached 3024 mm. In the same class, the wheelbase of Audi A6L ranks 9th. One bright spot is that its width reaches 1886mm, which reflects that the horizontal space inside the car is not bad. Audi A6L55 TFSI quattro flagship elegant skylight provides a wider field of vision, which can create a better visual environment and good sensitivity for the rear passengers and increase the light entrance for the whole vehicle. Audi A6L’s trunk volume ranks 20th among the models of the same price and class. The storage space in the car is quite satisfactory and basically sufficient. The interior space of the luggage compartment is relatively regular, with very good longitudinal depth and high expansibility, and the space performance is generally ideal.

Audi A6L is equipped with a combination of 3.0 turbocharged engine (direct injection) and wet dual clutch (DCT). The whole power parameters are superior in power performance among engines of the same class, which can provide better power performance. The official measured acceleration of Audi A6L is 5.6S, ranking 26th among the medium and large-sized vehicles with more than 800,000.

The active/passive safety configuration of Audi A6L is complete, includingAutomatic parkingZero tire pressure endurance tireAutomatic parkingSteep slope descenthill start assist controlknee airbagHUD head-up displayAnti-lock braking (ABS)Braking force distribution (EBD/CBC, etc.)Brake assist (EBA/BAS, etc.)Traction control (ASR/TCS, etc.)Active noise reductionEngine start and stopSide safety air curtainWireless charging of mobile phonenight vision systemLED daytime running lightsForward reversing radarTire pressure monitoringSteering wheel heatingBody stability control (ESP/DSC, etc.)Rear reversing radarFatigue reminderRemote parkingChild seat interfaceLane keeping (LKAS)Equal configuration.

Among them,Automatic parkingYou can avoid stepping on the brakes for a long time or needing to pull frequently;Steep slope descentCan safely pass through steep slope road conditions at low speed;knee airbagReduce the injury of the car interior to the occupant’s knees in the secondary collision.

If the above data and participation can’t fully understand the Audi A6L, then we can give you a more comprehensive reference based on the word-of-mouth information of users who have purchased the Audi A6L in history. It can be seen that people are most satisfied with the bright space of the Audi A6L, and the beautiful keys and good design are also the points that people like it.