An exclusive report by the reception desk on the investigation report that Northwestern Polytechnical University was attacked by NSA network in the United States (Part II)

On June 22 this year, Northwestern Polytechnical University issued a "Public Statement" saying that the school was attacked by overseas cyber attacks, and then the Xi ‘an police officially filed an investigation. The China National Computer Virus Emergency Response Center and 360 Company jointly formed a technical team to participate in the technical analysis of the case, and on September 5, the first "Investigation Report on Northwestern Polytechnical University’s Cyber Attacks by NSA in the United States" was released. The investigation report pointed out that the source of this cyber attack was the specific intrusion action office under the National Security Agency (NSA). Today (27th), the technical team released the investigation report on related cyber attacks again. The report revealed that during the cyber attack on Northwestern Polytechnical University, the Office of Specific Invasion Action (TAO) built a (so-called) "legal" channel for remote access to the core data network of infrastructure operators in China, and achieved the infiltration control of China’s infrastructure.Details > >

  A number of evidences show that the National Security Agency (NSA) is behind the scenes.

  The investigation report revealed that the Office of Specific Invasion Operations (TAO) under the National Security Agency (NSA) exposed a number of technical loopholes and made many operational mistakes in the process of cyberattacks on Northwestern Polytechnical University. Relevant evidence further proved that the behind-the-scenes attack on Northwestern Polytechnical University was the NSA.

  The investigation found that when using tipoff activation command and remote control of NOPEN Trojan, the Office of Specific Invasion Operations (TAO) under the National Security Agency (NSA) must operate manually, and the actual working time of network attackers can be analyzed from the attack time of these two tools.

  First of all, according to the big data analysis of related cyber attacks, 98% of cyber attacks on Northwestern Polytechnical University are concentrated between 21: 00 and 4: 00 am Beijing time, which corresponds to 9: 00 to 16: 00 EST, and belongs to the domestic working time in the United States. Secondly, there was no cyber attack on Northwestern Polytechnical University on all Saturdays and Sundays in the United States. Thirdly, by analyzing the unique holidays in the United States, it is found that the "Memorial Day" in the United States has three days off, and the "Independence Day" in the United States has one day off. During these four days, the attacker did not carry out any attack and theft. Fourth, after a long period of close tracking of the attacks, it was found that all cyber attacks were silent during the Christmas period. Judging from the above working hours and holiday arrangements, those who attack and steal secrets against Northwestern Polytechnical University are unscrupulous and undisguised in their activities according to the schedule of working days in the United States.

  Du Zhenhua, Senior Engineer of National Computer Virus Emergency Response Center:TAO’s cyber attack on Northwestern Polytechnical University shows that the technical complexity is relatively high, the attack cycle is relatively long, and the workload of manual operation is relatively large, so under such conditions, the probability of human error is relatively high. Then these mistakes can be used by us to analyze the attribution. According to the attribution analysis, for example, the instruction string leaked in the accident this time, as well as some characteristic strings in the code, then the characteristics of this natural language reflected by it are in line with the characteristics of this English-speaking country.

  During the long-term tracking and reverse osmosis of network attackers, the technical team found that the attackers have the following language characteristics: First, the attackers have the habit of using American English; Second, the internet devices associated with the attackers are all equipped with English operating systems and various English-language applications; Third, the attacker uses the American keyboard for input.

  360 company network security expert Bian Liang:For example, we caught it once. During the attack, its command to send a script was wrong, wrong, and wrong. Then, this tool will prompt the attacker, and if something goes wrong, it will return the error information to the attacker to give him a hint. This information includes the attacker’s current operating system environment, which actually exposes that the attacker’s related information is the US War Office (TAO).

  The technical team found that at 5: 36 on May 16th, 20 ××× Beijing time, the cyberattacker used the springboard machine located in South Korea (IP: 222.122. ××××××) and attacked Northwestern Polytechnical University again with the NOPEN Trojan. When trying to invade and control a network device after the third-level infiltration of the intranet of Northwestern Polytechnical University, there was a human error when running the upload PY script tool, and the specified parameters were not modified. After the script is executed, an error message is returned, which exposes the working directory and the corresponding file name of the attacker’s online terminal. From this, it can be known that the system environment of the Trojan control terminal is Linux system, and the corresponding directory name "/etc/autoutils" is the special name of the directory of network attack weapons tools of the specific intrusion action office (TAO).

  The error message is as follows:

  Quantifier follows nothing in regex; marked by <– HERE in m/* <– HERE .log/ at https://news.cctv.com/2022/09/etc/autoutils line 4569

  The technical team found that 16 of the 41 different cyber attack weapons used in the attack on secrets of Northwestern Polytechnical University were completely consistent with the TAO weapons exposed by the "shadow broker" in 2016; Although 23 tools are not exactly the same as those exposed by the "shadow broker", their genetic similarity is as high as 97%, and they belong to the same type of weapons, but their related configurations are different; The other two tools can’t correspond to the "Shadow Broker" exposure tool, but they need to be used together with other cyber attack weapons tools of TAO, so these weapons and tools obviously have homology and belong to TAO.

  360 company network security expert Bian Liang:Every program developer or author will have his related habits, for example, it is similar to our writing style, and he won’t easily change this habit in a day or two, so the program is the same. There are many such logics in it, and its algorithm includes its data structure, so we will grasp this habit through our analysis and make a comprehensive comparison to find out whether it belongs to such an attack weapon of the same type or the same family and gene.

  The comprehensive analysis of the technical team found that in the tens of thousands of cyber attacks against targets in China, especially the thousands of cyber attacks launched against Northwestern Polytechnical University, some weapons used in the attack process were implanted with Trojans before the "shadow broker" exposed NSA weapons and equipment in 2016. According to NSA’s behavior habits, the above weapons and tools are likely to be used by TAO employees themselves.

  NSA invades China’s infrastructure-related equipment and steals user privacy data.

  It is understood that the technical team conducted forensic analysis on the traces of cyber attacks suffered by Northwestern Polytechnical University and the on-site environment through relevant technical means, and judged the attack methods and time of the specific intrusion action office (TAO) under the National Security Agency (NSA), and disclosed typical cases of related cyber attacks.

  1. Steal key sensitive data such as password and operation record of remote business management account of Northwestern Polytechnical University.

  According to the investigation report, the specific intrusion action office (TAO) under the National Security Agency (NSA) installed a sniffing tool "drinking tea" in the operation and maintenance management server of Northwestern Polytechnical University, and secretly sniffed and stole the remote maintenance management information of the operation and maintenance management personnel of Northwestern Polytechnical University for a long time, including the password of the network boundary device account, the access rights of business devices, the configuration information of routers and other devices.

  The technical team found that the types of network equipment sniffed by Northwestern Polytechnical University include fixed Internet access network equipment (routers, authentication servers, etc.), core network equipment (core routers, switches, firewalls, etc.), and also important equipment (data service platforms, etc.) of communication infrastructure operators, including account number, password, equipment configuration, network configuration and other information.

  At 6: 52 on December 11th, 20××× Beijing time, TAO used the proxy server (IP: 130.54 .××××××) located in Kyoto University of Japan as an attack springboard, illegally invaded the "telnet" management server of the operation and maintenance network of Northwestern Polytechnical University, uploaded and installed the NOPEN Trojan, and then controlled its intranet monitoring and management server in cascade. Both of the above servers had been installed with "tea drinking" sniffing in advance. TAO remotely controls the Trojan to retrieve and download the compressed and encrypted monitoring record file, and then clears the trace and exits. Stealing data includes the management account number, password, device configuration, network configuration and other information of routers and core network devices (core routers, switches, firewalls).

  2. Steal the configuration files and log files of network equipment operation and maintenance in Northwestern Polytechnical University.

  The specific intrusion action office (TAO) under the National Security Agency (NSA) of the United States has long attacked and invaded the network operation and maintenance management server of Northwestern Polytechnical University, secretly stealing network equipment operation and maintenance configuration files and log files.

  At 10: 41 on October 11th, 20××× Beijing time, TAO invaded and controlled an intranet server of Northwestern Polytechnical University through a proxy server located in Korea (IP: 210.115 ××××××). At 10: 48, after two lateral moves, TAO invaded another intranet server, accessed the regular task configuration scripts in a specific directory, and retrieved 14 configuration files for regular tasks. Subsequently, these 14 files were stolen at one time, which can be used to perform regular cleaning, backup, power check and other operations.

  3. Infiltration control of China infrastructure core equipment.

  The specific intrusion action office (TAO) under the National Security Agency (NSA) of the United States used the password of the stolen network equipment account to enter the service network of an infrastructure operator in China as a "legitimate" status, control the related service quality monitoring system, and steal the user’s private data.

  At 22:53 on March 7th, 20××× Beijing time, the Office of Specific Invasion Operations (TAO) of the National Security Agency of the United States attacked and controlled the service server of an infrastructure operator in China through the attack agent 148.208××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××

  At 15:02 on the same day, TAO saved the queried user data in the directory of the attacked server/var/tmp/.2e434fd8aaee73e1/ERF/out/f/,and then packaged it and sent it back to the attack springboard. Subsequently, the attack traces such as infiltration tools and user data uploaded during the process of stealing secrets were quickly removed by special tools.

  Du Zhenhua, Senior Engineer of National Computer Virus Emergency Response Center:TAO used many kinds of cyber weapons in this attack against Northwestern Polytechnical University, specifically, such as acid fox, so it belongs to a typical loophole-breaking weapon. Through this middleman attack, it can deliver other cyber weapons to the victimized host in the intranet, such as anger spraying and never disclosing such persistent control weapons. It can further attack and penetrate the intranet according to this control instruction sent by TAO remotely, and move horizontally. It can deploy weapons like sniffing and stealing secrets. By sniffing and stealing weapons like drinking tea, it can steal more remote management host account passwords.

  360 company network security expert Bian Liang:Drinking tea is a weapon, which is similar to a spy in our war. It can eavesdrop on our traffic data in the network. Through the monitoring of network data, it can steal sensitive data and information related to us, just like there may be a third party listening through the wall when we are chatting.

  According to the analysis of the technical team, the Office of Specific Invasion Operations (TAO) under the National Security Agency (NSA) of the United States used the same combination of weapons and tools to "legally" control the telecommunications infrastructure networks in no less than 80 countries around the world. The technical team cooperated with the partners in Europe and Southeast Asian countries, successfully extracted and fixed the samples of the above weapons and tools, and successfully completed the technical analysis, which is planned to be released to the public in due course to help the world jointly resist and prevent the network penetration attack of NSA.

  Maintaining network security is the common responsibility of the international community.

  After continuous hard work, the technical team successfully locked in the target node, multi-stage springboard, main control platform, encrypted tunnel, attack weapon and original terminal that launched the cyber attack on Northwestern Polytechnical University by the Specific Invasion Action Office (TAO) under the National Security Agency (NSA), found the identity clues of the attacker, and successfully identified the true identities of 13 attackers.

  According to the report, the National Computer Virus Emergency Response Center and 360 Company jointly formed a technical team to participate in the technical analysis of this case. The technical team received the full support of partners from some countries in Europe and Southeast Asia, and comprehensively restored the overall profile, technical characteristics, attack weapons, attack paths and attack sources of the related attacks, and initially identified that the related attacks originated from the specific intrusion action office (TAO) of the National Security Agency (NSA). This series of research reports will provide reference cases for countries around the world to effectively discover and prevent TAO’s follow-up cyber attacks.

  Professor Zuo Xiaodong, School of Cyberspace Security, School of Public Affairs, University of Science and Technology of China:Because the network attack is cross-border, it is extremely difficult to trace the source of the network attack, both technically and procedurally.

  Experts say that cyberspace is the common home of mankind, cyber attacks are a common threat facing the whole world, and maintaining network security is the common responsibility of the international community. In response to such cyber attacks, it is even more necessary for relevant countries to work together to find out who is behind the scenes.

  On September 8, Yang Tao, Director of the Department of American Studies of the Ministry of Foreign Affairs, made solemn representations to the US Embassy in China on the cyber attack and theft of secrets by the United States against our Northwestern Polytechnical University.

  Yang Tao pointed out that a few days ago, China National Computer Virus Emergency Response Center and 360 Company released an investigation report on the cyber attack carried out by the subordinate departments of the National Security Agency in China, and the relevant facts were clear and the evidence was conclusive and sufficient. This is not the first time that the US government has carried out cyber attacks and stolen sensitive information against China institutions. The actions of the United States seriously infringe on the technical secrets of relevant institutions in China and seriously endanger the security of key infrastructure, institutions and personal information in China, and must be stopped immediately.

  (CCTV reporter Hou Jun Chen Lei Zhang Gang Dong Liangyan Chen Qingbin Han Yuxu)

Beijing area Xingtu Lanyue price reduction news, the latest offer 175,900! Quantity is limited

Welcome to the Autohome Beijing promotion channel, bringing you the latest car purchase information. Currently, a high-profile model is launching a striking promotion in the Beijing market. It is understood that the car series is attracting potential consumers with a maximum discount of up to 18,000 yuan, and the minimum selling price has been adjusted to 175,900 yuan. This undoubtedly provides consumers in Beijing with a very attractive car purchase opportunity. To take advantage of this price reduction, please click "Check Car Price" in the quotation form to get the most competitive car purchase price. Don’t miss this great opportunity not to be missed!

北京地区星途揽月降价消息,最新报价17.59万!数量有限

The exterior design of Xingtu Lanyue presents a majestic momentum. The front face adopts a family-style design language. The large-area air intake grille is as sturdy as a battle armor, and the streamlined LED headlights give the vehicle a high degree of recognition. In terms of overall style, Lanyue combines power and technology, and the body lines are smooth, showing the elegance and power of a modern urban SUV.

With its 4970mm*1940mm*1792mm body size and 2900mm wheelbase, Xingtu Lanyue presents a solid and wide body ratio. The side lines of the body are smooth and powerful, outlining the tough body profile. The front and rear wheels are 1644mm, ensuring driving stability and consistency during driving. The tire size is 245/50 R20, using stylish and excellent grip tires, and the wheel design not only enhances the vehicle’s appearance and mobility, but also ensures the handling performance during driving.

北京地区星途揽月降价消息,最新报价17.59万!数量有限

The interior design of Xingtu Lanyue is mainly based on luxury and technology, creating a delicate and comfortable driving space. The driver sits on the steering wheel wrapped in leather, which not only feels delicate to the touch, but also supports manual up and down + front and rear adjustment to ensure the best grip and operation convenience. The 15.6-inch large-size central control screen stands in the center, integrating multimedia, navigation, telephone and air conditioning control. With automatic speech recognition system, the operation is more convenient and efficient. The front and rear seats are made of high-grade leather materials. The front seats are not only equipped with heating and ventilation functions, but also the driver’s seat is equipped with electric seat memory, which further enhances the ride comfort. The passenger seat also supports front and rear adjustment and backrest adjustment, while the second row of seats supports front and rear movement and backrest adjustment to meet the needs of different passengers. In terms of convenience, the car is equipped with sufficient USB and Type-C ports, including 2 in the front row and 3 in the back row, as well as the wireless charging function of mobile phones in the front row, providing sufficient support for passengers’ electronic devices.

北京地区星途揽月降价消息,最新报价17.59万!数量有限

Xingtu Lanyue is equipped with a powerful 2.0T turbocharged engine with a maximum power of 192 kilowatts, 261 horsepower output, and 400 Nm of torque. This engine, coupled with an 8-speed automatic transmission, provides a smooth power transmission and driving experience for the vehicle.

Overall, Xingtu Lanyue has won the high praise of Autohome owners with its atmospheric and high-end exterior design, and he emphasizes the fit between its international temperament and actual needs. The power is strong and the acceleration is rapid, and the owner specifically mentions the excellent performance of the engine, which is undoubtedly a plus for his background of frequent use on the construction site. It can be seen that Xingtu Lanyue is not only a car that satisfies driving desires, but also a perfect combination of practicality and quality.

Nongfu Spring: In 2023, the net profit was 5.775421 billion yuan, an increase of 25.33% year-on-year.

2023 Interim Report 2022 Interim Report This year’s increase or decrease over the previous year (%) 2021 Interim Report Basic earnings per share (yuan) 0.51 0.41 24.39 0.36 Dividend per share (yuan) – What? – What? 0 – What? Net profit (10,000 yuan) 577542.10 460832.50 25.33 401291.80 Turnover (10,000 yuan) 2046242.50 1659876.10 23.28 1517475.70 Cash flow per share (yuan) – What? 0.53 -100 0.59 Net assets per share (yuan) 1.98 1.79 10.61 1.56

Meituan Delivery held the 717 Knight’s Day Awards Ceremony, and the "Best Growth Award" paid tribute to "former riders" from all walks of life

  7month17Day, the fifth "717Knight Festival ", Meituan delivery held" Rider Honor Ceremony "in Beijing·"Pioneer Power" Award Ceremony, presenting "Best Growth Award", "Top Ten Product Experience Officers", "Anti-Epidemic Pioneer Award" and "City Guardian" to outstanding riders9The grand prize.

  From a rider to the head of a catering brand, the Changsha guy won the "Best Growth Award"

  At the award ceremony, award-winning riders from cities and cities all over the country with outstanding professional performance gathered together. As a rider mentor who has brought nearly 1,000 "apprentices", Li Shuai of Meituan Qiqihar site was awarded the "Best Mentor Award". In order to encourage more experienced riders to become mentors, Meituan Distribution has increased the rewards for bringing new ones with old ones, and the new product "Mentor System" is launched4Over the past month, there have been110,000 riders signed up for the master group and passed the review. Cao Jinghui, a rider from Shenyang, was named the "Top Ten Product Experience Officer". According to statistics, she represents the national153The product experience officer has submitted hundreds of suggestions for product and rule optimization, many of which have been converted into tangible improvements, significantly enhancing the rider’s delivery experience.

  Li Ling delivered an acceptance speech. Photographer: Zhang Wei

  It is worth mentioning that Meituan Distribution also awarded the "Best Growth Award" to a group of strugglers who have gone out from their rider positions. Li Ling from Changsha won the award for her inspirational growth experience2022"Best Growth Award" of the year.4A few years ago, he was a rider in Changsha and was promoted to deputy stationmaster. Later, he entered the catering industry and gradually became the head of operation of a Hunan cuisine brand. Using his experience in the delivery service, he made special designs for the restaurant’s takeaway operation, such as optimizing the takeaway menu and speeding up the takeaway delivery speed, etc., to make the takeaway business thrive. "After I changed careers, some people said I was’very successful ‘," Li Ling said in his acceptance speech. "In my opinion, seizing the opportunity to grow and walking out of my own path is the real success."

  In addition, Jiangxi Ruijin rider Chen Yiwen and Beijing Dawang Road Station Chief Sun Xihe also came to the scene and received professional awards such as "Best Service Award" and "Outstanding Webmaster Award" as award-winning representatives.

  Anti-epidemic pioneers across the country appeared, and the "City Guardian" medal was10Million riders light up

  In the "Times" of the awards ceremony, Meituan Distribution presented a series of honors to riders who have performed bravely and made outstanding contributions to fighting the epidemic. "In reality, there are no heroes who fall from the sky, only ordinary people who stand up," Meituan’s senior vice president and president of Meituan’s Daojia business group said in a speech on the spot. "Our riders have only the simplest courage and sense of responsibility, but whenever they meet someone in need, they take the initiative to go to the forefront and become the person who is needed by everyone, bursting out with power that even they themselves do not realize."

  this year1In January, rider Luo Zongdong from Luzhou, Sichuan, rescued a woman who was planning to commit suicide during a meal delivery315All the riders who have come forward at a critical moment have been awarded the title of "Pioneer Rider" of the year by Meituan Delivery and corresponding rewards. Recently, Luo Zongdong was also recommended to participate in Meituan Delivery’s "Rider to University" program and enter the National Open University to study for a bachelor’s degree. "Some netizens saw my deeds online and said that there is a’bug ‘in my name, but in reality it is a’dragon’," he said. "I believe that it is not our name and occupation that defines us, but the choices we make at a critical moment. When we help others, we are also achieving better ourselves."

  Under the epidemic, riders have become an important force in fighting the epidemic and ensuring the smooth flow of the last mile of urban emergency logistics. To this end, this year’s awards ceremony has a special "Anti-Epidemic Pioneer Award", which was awarded to Mei Kailin, a rider from Jing’an Temple Station who rushed thousands of miles from Wuhan to Shanghai, Liu Li, a rider from Beijing Shuangjing Station who participated in the "domestic circulation" distribution, and a rider from Shenzhen Xinsha Station who participated in the "relay delivery" in the community. Chang Luo Zaiyan, etc10An excellent example.

  At the scene, Meituan delivery also exceeded10Ten thousand riders who stuck to their posts during the epidemic in various places lit up the "City Guardian" medal, which is not only on the rider sideAppIt shows that the rider homepage in the order details of the client is also displayed to the users of the rider service. During the epidemic in Beijing, Gao Feng, a party member and rider of Wangjing Model Station, participated in the "domestic circulation" delivery. He delivered a speech on behalf of the national "City Guardian". I firmly believe that the completion of an order is a’mission must be reached ‘. "

  In addition, the "Pioneer Station Award", which aims to recognize the advanced rider collective, was also awarded to the Ruili Center Station, which participated in the border patrol spontaneously during the epidemic, the Jiangnan West Station, which established the first rider volunteer service team in Guangzhou, and the Hangzhou Tangqi Station, which took care of disabled users for four years10A site.

  Festival care covers work and life, strengthening riders’ professional identity and sense of collective belonging

  At the awards ceremony,8The children of the riders brought poetry reading performances, all of whom came from the Kangaroo Baby Home established by Meituan Distribution·Collaborator Childhood. As the first community children’s home in the country for the children of takeaway riders, Kangaroo Baby Home provides children with comprehensive community services such as after-school care and interest education. This year717During the Knight Festival, Meituan Delivery also held a "Rider Family Day" for Kangaroo Baby Home, organizing activities such as parent-child garden parties and visits to the China Science and Technology Museum, so that riders can spend happy hours with their children.

  The children of "Kangaroo Baby Home" brought a poetry reading performance. Photographer: Zhang Wei

  In order to allow the majority of riders to live a Knight’s Day with a sense of professional identity and collective belonging, more holiday care activities are still being carried out one after another, including exclusive gift distribution for Knight’s Day, site parties, and free haircuts for riders. In order to strengthen the safety of riders’ summer delivery, Meituan delivery has exceeded100More cities have set up heatstroke prevention stations to provide riders with rest places and supplies to cool off the heat, and distribute heatstroke prevention materials such as sunscreen products and commonly used medicines in summer. In Beijing, Shenzhen, Hangzhou, Guangzhou, Yangzhou, Chengdu and Wuhan7In this city, Meituan’s rider health examination vehicle has also taken to the streets, providing a convenient service of "on-the-go inspection".

  Wang Puzhong said that in the past year, the majority of riders have shown "vanguard strength" in their own work and social responsibility, and Meituan will continue to be their strong backing and make unremitting efforts under the guidance of governments at all levels to make the job of riders more secure and promising.

Overview of new mobile phones in the first half of 2023

The release schedule of mainstream brand new products in the first half of 2023 is as follows:

(The first half of the year ends on June 30th)

January 2023:

January 4th, one plus eleven, January 6th, Glory 80 Pro Direct Screen Edition, January 9th, OPPO A56s.

February 2023:

February 2nd Samsung Galaxy S23/ Samsung Galaxy S23+/ Samsung Galaxy S23 Ultra

February 7 plus Ace 2

February 9, my true self GT Neo5/ my true self GT Neo5 240W

February 27th Glory Magic5/ Glory Magic5 Pro/ Glory Magic5 to Edition.

March 2023:

March 3rd Huawei nova 10 Youth Edition, March 7th Nubian Z50 Ultra/ One Plus Ace 2V

March 16th iQOO Z7i, March 20th iQOO Z7/iQOO Z7x

March 21st OPPO Find X6 Pro

On March 23rd, Huawei P60/ Huawei P60 Pro/ Huawei P60 Art/ Huawei Mate X3/ Huawei Mate X3 Collection Edition.

On March 24, Huawei enjoyed 60

March 28th Redmi Note 12 Turbo/ Glory Play7T/ Glory Play7T Pro

On March 30th, OPPO A1x 5G/ Meizu 20/ Meizu 20 PRO/ Meizu 20 INFINITY Unbounded Edition

On March 31st, Samsung Galaxy A54 5G

In April 2023:

April 1st vivo Y11, April 3rd GT Neo5 SE, April 11th OPPO A1 5G

April 13th Tencent ROG mobile phone 7, Tencent ROG mobile phone 7 Pro

April 17th Huawei nova 11/ Huawei nova 11 Pro/ Huawei nova 11 Ultra

April 18th Xiaomi 13 Ultra, April 20th vivo X Flip, vivo X Fold 2

April 21st Glory X50i, April 23rd vivo Y78+, April 29th Redmi Note 12R Pro

May 2023:

May 10, true self 11/ true self 11 Pro/ true self 11 Pro+/vivo Y78

Sony Xperia 1 V on May 11th, Glory Play 40 on May 17th, Huawei Enjoy 60 Pro and Nubian N5 on May 18th.

May 20th vivo S17e, May 21st OPPO A1 Vibrant Edition

May 23rd OPPO K11x/iQOO Neo8/iQOO Neo8 Pro

May 24th oppo Reno 10/oppo Reno 10 pro/oppo Reno 10 pro+

May 25th Xiaomi Civi 3, May 29th vivo Y35+/ Glory 90/ Glory 90 Pro

May 30th, Redmi Note 12T Pro, May 31st, vivo S17/vivo S17t/vivo S17 Pro

June 2023:

June 1st moto razr 40/moto razr 40 Ultra

June 26th vivo X90s, June 29th Redmi Note 12R

In the first half of 2023, the timetable of new mobile phone products released by mainstream mobile phone brands is as shown above, and each family has taken out the housekeeping skills to make products that meet the tonality of their own brands. I will select five representative models for detailed explanation, ranking them in no particular order, without making specific recommendations.

1. Xiaomi 13 Ultra: Leica’s ultimate image flagship with full flavor.

Xiaomi’s flagship image with the slogan "This is a Leica" represents the change of image aesthetics of domestic users-from the original "what you see is what you get" of Apple to the personalized "Leica flavor" of image style.

The design of Xiaomi 13 Ultra has made great sacrifices for the image, or "features"?

Because it is equipped with four main-camera-level image sensitive elements, the whole camera module part bulges like never before, which also leads to the curve of the back of the fuselage like the streamline of the camera, which has a visual sense of "downhill", which is a feel challenge for users who are used to using the straightener.

However, such a camera-like mobile phone with a professional photography suit can be described as the ultimate change in the form of moving images, and it also strengthens the image characteristics of Xiaomi 13 Ultra.

After the listing of Xiaomi 13 Ultra, it also triggered a watermark frenzy. At one time, all kinds of camera frames imitating Xiaomi red and white Leica watermarks rose on various social platforms.

Xiaomi 13 Ultra has a variety of built-in image functions that are compatible with Leica style, such as Leica filter and master lens bag, and the flagship mobile phone 16GB+1TB, which focuses on the original Leica flavor image style, is priced at 7299 yuan.

Xiaomi 13 Ultra is equipped with Leica optical full-focus four-shot, professional 2K super color quasi-screen, second-generation Snapdragon 8 mobile platform, LPDDR5X full blood version +UFS4.0, Xiaomi surging P2 fast charging chip, Xiaomi surging G1 battery management chip, 90W wired second charging, 50W wireless second charging, and IP68 waterproof and dustproof support.

2, glory 90 Pro: the first 3840Hz UHF PWM dimming risk-free eye protection screen

Glory 90 Pro is a machine that focuses on portrait photography. Its performance configuration is the second generation Snapdragon 8 mobile platform in 2023. Using the first generation Snapdragon 8+ mobile platform, its performance is absolutely sufficient.

The design is also exquisite. It is a good machine in the first half of 2023, focusing on images and balancing performance. It has a 200-megapixel rear sensor, a 50-megapixel front portrait lens, a good design, and a 100W fast charge++5000mAh battery. 16GB+256GB version of official website costs 3599 yuan.

It’s not that Glory 90 Pro has good configuration and image characteristics at the price of 3,000 yuan, but the first 3840Hz ultra-high frequency dimming screen in this industry, which also triggered a confrontation with the former owner’s executives about whether product users need such a high-frequency screen. Glory thinks that the higher the frequency, the better the eye health of users. On the other hand, it thinks that dimming with more than 1,000 frequencies will be enough to increase power consumption.

In any case, if you are a user who is sensitive to stroboscopic, you should be careful to choose some screen eye protection parameters. As long as your eyes are not uncomfortable during actual viewing, it is suitable, and everything is based on real body feeling.

3. Huawei P60 Pro: Unique aesthetic design and Beidou satellite blessing.

2023 can be said to be the year of Huawei’s return. This domestic mobile phone giant, which once hardened Apple by itself, will come out in the suppressed winter.

The design of Huawei P60 Pro is still so unique and unique. Huawei has a magical power and can always find a wonderful balance between product recognition and industrial aesthetics.

Although Huawei P60 Pro only has 4G, due to well-known reasons, everyone is quite considerate, what’s more, everyone thinks that upgrading 5G is no different from the original 4G …

Thanks to Huawei XMAGE image algorithm, the image level of Huawei P60 Pro is the first echelon. The rear 48 million main camera supports OIS optical image stabilization, the 13 million pixel super wide angle and the 48 million pixel telephoto support OIS optical image stabilization.

The fuselage uses the first generation Snapdragon 8+ mobile platform, supports 88W fast charging, 4815mAh battery screen, uses Kunlun glass, supports IP68, and also supports extremely advanced two-way Beidou satellite information. Life-related functions are all important functions.

Top with 12GB+512GB version, the current price in official website is 7288 yuan.

4, OPPO Find X6 Pro: Hasselblad, the main night scene shooting.

The image flagship OPPO Find X6 Pro, which also focuses on Hasselblad image style, is also a flagship configuration. It is equipped with the second generation Snapdragon 8 mobile platform, LPDDR5X, UFS4.0, Pro-XDR technology on the screen, 100W super flash charging +5000mAh battery, and Wi-Fi7 and IP68.

On the image, there is a 50-megapixel sensor with three main cameras. Wide-angle and telephoto support OIS optical defense. Ultra-wide-angle adopts a closed-loop focusing motor and supports 4cm macro shooting.

The image style highlights the professional image texture, and the top is equipped with 16GB+512GB version. At present, the price in JD.COM is 6799 yuan.

5, vivo X Flip: stylish and compact, novel and fun.

Vivo x flip of vivo may be the representative of another trend in the development of mobile phone form today. Small folding screen mobile phone: cute, decorative, and directly pokes the hearts of female users who love beauty.

Especially when the size and color of vivo X Flip can accurately match the colorful small bags of girls, it makes vivo X Flip have unique fashion attributes.

Look, with this fashionable color scheme and lovely external screen design, the external screen experience of vivo X Flip is the same as that of the internal screen, and you can browse the little red book, reply to WeChat messages and watch videos without opening the internal screen during the fragmentation time. You can also use a variety of folding screens to achieve the operating experience. For users who have never used a folding screen mobile phone, it is enough to be happy with the unique use of the folding screen mobile phone.

In configuration, vivo X Flip is equipped with the first generation Snapdragon 8+ mobile platform, LPDDR5, UFS3.1 and 44W fast-charging battery equivalent to 4400mAh.

The image is double-shot, 5000 pixels main shot, supporting OIS optical image stabilization; The 12-megapixel super wide-angle lens supports AF autofocus and macro shooting.

Vivo X Flip is currently equipped with 12GB+512GB official website at a price of 6639 yuan.

Summary:

In the first half of the year, major brands have updated their product lines, including high-end flagship models, mid-range cost-effective models, and low-end mobile models. Even Meizu has released new mobile phones. In the second half of the year, when the competition for mobile phone products is more intense, which newly released mobile phones will win our attention? Next we haveOverview of new mobile phones of mainstream brands in the second half of 2023,Stay tuned!

Orders have been placed in the Lantern Festival, and Fenghua Bulong’s orders have exploded.

  "year of the loong Spring Festival orders burst! Our whole family is too busy to mobilize. "

  The son dances dragons, the daughter designs dragons, and the wife makes dragons … Every Spring Festival, the family of Chen Xingguo, the national inheritor of Fenghua Bulong, also ushered in the busiest moment of the year.

  Dragon dance orders are scheduled for the Lantern Festival.

  "Our dragon dance team is busier this year than in previous years, and the orders are scheduled for the Lantern Festival. This year, we received an invitation from Huizhou, Guangdong Province. " Chen Liangliang, the son of Chen Hangguo and the provincial inheritor of Fenghua Bulong, estimated that there were two performances every day in recent days.

  This year is year of the loong, and dragon dancing has become an indispensable "standard".

  Recently, the Fenghua Tiaozhai Dragon Dance Team, headed by Chen Liangliang, presented a wonderful dragon dance performance to the audience at the opening ceremony of the non-legacy market in Nantang Old Street.

  The Dragon Ball moves up and down in the hands of the dragon dancers. The dragon dancers follow the rhythm of the Dragon Ball, sometimes leaping and rising, sometimes swimming and hovering, making the dragon seem to have life.

  During the performance, the dragon dancers also changed their formations from time to time, sometimes jumping and sometimes sneaking, showing the shape and charm of the dragon to the fullest.

  "No shortage of orders, lack of people! Our dragon dance team has a full schedule. " When interviewed by reporters, Chen Liangliang and his teammates were on their way to the next village to perform.

  Careful observation of Chen Liangliang’s palm shows that the yellowing calluses are particularly obvious, which are left by holding the dragon pole all the year round.

  Chen Liangliang said that the most common thing his father said to him was that the key to dragon dancing is to make the dragon "live", not only in action, but also in expression. There is no shortcut, only persistent training.

  Chen Liangliang studied dragon dancing with his father since he was a child. He began to dance dragon in Tiaozhai Primary School at the age of 7. At the age of 26, he became an international referee and coach for dragon and lion dancing. Now he is a provincial non-genetic inheritor, which has provoked the burden of inheritance and innovation of Fenghua Bulong.

  "On the basis of traditional retro routines, we have arranged some new movements, especially combined with local elements in Fenghua, not only to dance with vigor, but also to dance with characteristics, so as to make everyone shine." Chen Liangliang revealed that he is currently studying how to combine Fenghua Bulong with Fenghua’s specialty peaches to create a set of "Peach Blossom Dragons".

  This year, Fenghua Bulong will also carry out in-depth cooperation with Tencent’s mobile games, which is the first case of cross-border cooperation between Ningbo Intangible Heritage and e-sports games.

  By then, Fenghua Bulong’s cultural elements, performance routines and the image of the inheritor will be reflected in the game, so that more young people can understand, love and spread the legacy.

  Young people relay to hold up the banner of dragon dance

  For Chen Xingguo’s family, making and dancing Bulong is a matter of persistence and inheritance.

  Chen Xingguo, who is 65 years old this year, has been attached to dragon dancing for nearly 50 years. "Our Chinese nation is a descendant of the dragon. My greatest wish is to hope that Fenghua Bulong can be passed down for a long time and carry forward the spirit of the dragon."

  "I am relieved that there are successors!" Now, Chen Xingguo is extremely proud to see his son Chen Liangliang become the soul of the Dragon Dance Team, taking the Dragon Dance to a bigger stage, and his daughter Chen Jingjing opening a shop in Taobao and pushing Fenghua Bulong to the world.

  At present, the "Chen Dragon" produced by Chen Xingguo’s family has broken more than ten thousand pieces, which not only swims in the land of China, but also has been exported to more than ten countries such as the United States, Britain, South Korea, Spain, Japan, Singapore and Turkey, and the dragon culture has also spread all over the world.

  The Dragon Dance Team of Tiaozhai Village in Fenghua, led by Chen Liangliang, not only inherited the excellent traditional routines and skills of Fenghua Bulong, but also introduced new modeling movements and routines. At present, the Dragon Dance Team consists of 22 young adults, the oldest being 38 years old and the youngest being only 17 years old.

  Last year, Tiaozhai Village Dragon Dance Team participated in the warm-up performance of the opening ceremony of the 4th Asian Paralympic Games in Hangzhou, and together with several other dragon dance teams from all over the country, staged a wonderful "Hundred Dragons War".

  "This is an opportunity for Fenghua Bulong to go global. We all hope to present the charm of Fenghua Bulong in the most perfect state, and it is worthwhile to work hard and get tired again." Chen Liangliang, who was the leader, recalled the training scene at that time.

  In January this year, Chen Liangliang was invited to participate in the 11th annual exhibition "Dragon and Lion Dance Training Course" in He Xinchun, North and South Tianshan Mountains, and carried out the teaching work for half a month. This is the farthest footprint of Fenghua Bulong in China.

  "I feel very honored to be invited to Fuhai County, Altay, Xinjiang, which is more than 4,000 kilometers away from Fenghua, and to bring the traditional culture of my hometown to the northwest of the motherland." Chen Liangliang introduced that he took 75 class hours of training, trained more than 130 students, and set up six dragon dance teams for the local area.

  Fenghua Bulong has not only attracted much attention in China, but also "flew" to the international stage many times: he went to London, England to participate in the cultural exhibition of the Olympic Games, the performance of Shakespeare’s Drama Festival, and went to South Korea to participate in the "Daegu Colorful Celebration", which made Fenghua Bulong shine on the international stage.

  Chen Liangliang leads Fenghua Bulong to perform in South Korea. 

  "I want more people to know about dragon dance. Now dragon dance is not only a traditional culture and art, but also a sports event. We have also promoted it to kindergartens, primary and secondary schools and even universities." Chen Liangliang said.

  Chen Liangliang, who has deep affection for dragon dance, made his twins join the dragon dance team.

  "When I was in kindergarten, my father gave me a stick and asked me to start from the basic skills of the eight-character dragon dance. It took several hours to practice. Now I also give my child a stick. This tradition should start with dolls. " Chen Liangliang said, I have always kept in mind my father’s words, "What my ancestors left behind, if I don’t do it, it will be gone."

  Dragon dance moves constantly bring forth the old and bring forth the new, making Fenghua Bulong’s performance more colorful; The members of the dragon dance team have new faces one after another and become younger, which makes Chen Xingguo particularly happy: "Young people have already held up the banner of dragon dance."

Nearly ten reviews will accompany you for the summer vacation! Take stock of the Steam online games you can play during the summer vacation.

Summer vacation is coming, and it’s time to have fun again. Of course, this refers to a specific group of people who have summer vacation, hehe. So what games do you want to play during the almost two months of summer vacation? This article will take a look at the online game of Steam that you can play during the summer vacation. Those classic games that are already familiar are not recommended, and the games that were released in the first half of this year and have a good reputation are mainly recommended.

Farlight 84

Steam favorable rate: 85%, especially favorable.

Sunset Afterglow is a great escape game developed by Lilith. In the game, players, as the survivors of the electronic zombie crisis in the world, settle on the water mobile platform named "Isle City" around the Kanguang coastline. Players will be launched into every corner of the unknown world to fight, survive and explore through water platform cannons, and collect different objects to build their own homes.

The afterglow of doomsday provides players with a variety of game experiences, among which survival mode, as the first mode, will meet the players first. In survival mode, players can move quickly through fast maneuvering jet flight and energy elastic board in the battlefield. Prism Military Industry, 9A Military Industry, Murphy Security Industry, and Wasteland Self-made Military Industry, as the four major military brands in the new world, will give players weapons with different styles.

Players can drive chariots, multi-legged, flying and other vehicles to participate in the battle in the battlefield, and get a refreshing and exciting combat experience. In addition, the original power system can provide energy for weapons, vehicles, jetpacks and energy shields, and provide players with more combat options besides traditional weapons!

Pixel storm

Steam favorable rate: 90%, especially favorable.

"BattleBit Remastered" is a large-scale multiplayer online military shooting game produced and distributed by the Turkish team SgtOkiDoki. It focuses on a large battlefield with 254 people and two armies, and diversified ground and air war vehicles. The game started its first experience on June 15th, and its popularity kept rising in a week, and it was highly praised and recommended by players. Recently, the number of top players has exceeded 60,000, and it has far surpassed Battlefield 2042 in Steam, and will soon be tied with Call of Duty: Modern Warfare 2.

As its name suggests, BattleBit Remastered is often translated into Pixel Storm and Pixel BattleField in Chinese, which is not only deliberately close to Battlefield in name, but also quite similar in content, which is completely a low-grade battlefield. Players shoot and fight in the first person, adopt professional settings, buildings can be destroyed, and they can drive tanks, planes and ships … All kinds of settings can be seen to be similar to the battlefield.

Players can use more than 45 kinds of guns, and can customize their accessories. There are more than 19 maps and there are differences between day and night, and the number of people in a game can be as high as 254. Not only is the design huge, but the content is also very serious, and the feedback of shooting and the explosion effect are not lazy.

Escape: trial

Steam favorable rate: 94%, especially favorable.

Players who like horror games will certainly be familiar with the Escape series. "Escape Trial" is the third mainline game in the "Escape" series. Players can play alone or work in teams of four.

The Escape Trial took place during the Cold War, and Murkov Company recruited "volunteers" for its experiment. These experiments will test the morality and reason of the players, and can be conducted by one person or by up to four people. If you have played the previous games, the game mechanism will be very familiar: running, hiding, sneaking, and trying your best to survive.

Players will get tools, upgrades and additional skills to form an advantage, such as slowing down the enemy or becoming more concealed. Your role is customizable. Their goal is to collect enough documents about Murkov’s torture, but the final result remains to be seen.

Street fighter 6

Steam favorable rate: 91%, especially favorable.

Players who like fighting games are certainly familiar with the Street Fighter series. The latest series, Street Fighter 6, was officially released on June 2nd. Those who like fighting games can play in the summer vacation.

Street Fighter 6 adopts the RE engine developed by Capcom, which is very different from previous works such as Street Fighter 4 and Street Fighter 5 in style and theme. It is more urban and grounded, emphasizing the "street" part of Street Fighter.

The painting will be a combination of realism and graffiti art, changing from ink painting style to street painting style. generate’s paint special effects on heavy blows and moves make the whole painting very impactful. Long, Chun-Li and other old characters also adopted different character designs and costumes, and added unique new characters.

Street Fighter 6 will have three modes of play, namely, the traditional fighting mode "fighting battlefield", the fighting center for players to learn and learn, and the immersive plot mode "traveling around the world" for single play.

In the immersive story mode "Traveling Around the World" of single-player play, players can create a protagonist who will be a member of the player’s avatar, interact with the residents of the street fighter world, learn moves from Long and Chun-Li, and fight against various enemies.

Meet the Creator

Steam favorable rate: 74%, mostly favorable.

"Meet the Creator" is a post-apocalyptic game with its own level. Each level is designed by the player himself, and the construction and sneak attack are completed in the first person. Design a position full of traps and guards alone or in cooperation with many people, or carry out fast-paced battles in an orderly manner and sneak up on other players’ positions.

You are the caretaker of Chimera, and Chimera is a living experiment created as a last resort to save life on earth. Take part in a strategic battle for the most precious resource on earth, which is also the key to the evolution of your Chimera: pure genetic material.

Build and reinforce labyrinthine outposts to extract and protect your genetic material. Sneak into other players’ outposts and use your brains to get more genetic material. Fight for life adaptation, upgrade and evolution.

Build a sinister death trap like a maze to lure other players in and kill them with wisdom. Clever use of massive customizable bricks, traps and guards. Pre-record patrol routes for your guards with innovative AI recording system.

Players can also share your outpost and watch other players come to challenge. Harvest trophies from the dead, and learn from the survivors how to strengthen your outpost and how not to lose progress and resources when robbed.

Dead island 2

https://store.epicgames.com/zh-CN/p/dead-island-2

Players who like to fight zombies can also choose dead island 2 to experience it. dead island is an orthodox role-playing game, which provides a lot of exciting tasks, unprecedented characters and thrilling vulgar plots, so that players can really immerse themselves in a distorted world view. In addition, there is a wonderful and exaggerated cooperation mode, which can be carried out by up to three players, ensuring that players can spend a very long and violent journey in Los Angeles.

The game takes the "city of angels" Los Angeles, which was invaded by terrorists, as the stage, and includes classic landmarks from the green suburbs of Beverly Hills to the coastal path of Venice Beach. Players can choose six characters with different personalities and lines, customize the ability of each character, and try the most intense and bloody first-person crazy battle through a brand-new skill system. There will be plenty of weapons and tactical and brutal options for players to deal with the swarming zombies.

There are six characters to choose from in the game, each with its own unique personality and dialogue. Players can completely customize the ability of each killer, and use the brand-new skill system to let players immediately redistribute their abilities and try out the craziest combination. The game also has dozens of unique zombie types, each with its own variation, attack mode and hundreds of Los Angeles-themed modeling changes.

Small world

Steam favorable rate: 86%, especially favorable.

Small World is an open-world, survival, online multiplayer game and adventure game. It is set in a familiar environment and the players are reduced to the size of a small insect. From the bottom of the food chain, players must survive by foraging, making and exploring seemingly abandoned places that are now recycled by nature.

With the progress of players, they will be able to create powerful armor and weapons, and even tame small animals into mounts, so that they can accept greater challenges. Working with other players, the ultimate goal is to conquer the biggest and most terrible creatures in the world.

In the game, players will cross a puddle like a lake, climb a giant tree like a skyscraper, cross a crack like the thousands of feet abyss on the road, and experience the huge open world from a new perspective. Explore dense jungles, dangerous swamps, and strange ruins left by predecessors. Find the hidden NPCs all over the world, get world view information and all kinds of knowledge, and learn how to survive in the vast wild.

In the game, players can unlock various recipes and instructions and tame various insects and creatures into mounts. You can also collect or refine resources and build camps with different grades of materials such as leaves, branches or rocks. Choose your favorite corner in the vast world and start building, or climb the towering tree and build the base camp at the top of the tree.

Players can also collect powerful armor with various resistances and functions, mix and match them in their own way, and create your own unique style. Want to slide in the air? Just put on the wing armor; Like swinging from tree to tree? Equip the grappling hook! There are all kinds of choices waiting for you!

Son of the forest

Steam favorable rate: 83%, especially favorable.

Players who like the open world survival game are definitely familiar with the game "Forest". Of course, many people should be tired of playing "Forest", and now we can play the sequel "Son of the Forest".

In Son of the Forest, players are sent to an isolated island to find a missing billionaire, only to find themselves trapped in a purgatory occupied by cannibals. Players need to make tools and weapons, build houses and try their best to survive, whether alone or with friends.

In the game, players will be able to experience complete freedom, and players can explore the world in their own way. Decide for yourself what to do, where to go, and how to live best. No NPC will order you or assign you tasks that you don’t want to accomplish at all. You are the one who gives the orders, and your fate is up to you.

At the same time, on this isolated island, players need to fight against all kinds of mutant creatures. Some look just like human beings, while others are not from the mortal world. You need to bring pistols, axes, electric batons and other weapons to protect yourself and the people you care about.

Wild heart

Steam favorable rate: 47%, with mixed opinions.

Players who like fighting games but don’t want to play monster hunters can try "Wild Heart", which was created by Japanese studio Omega Force, which developed the series of games "True Three Kingdoms", and received great assistance from EA Originals. "Wild Heart" will lead players to Japan in the feudal era and start an epic adventure in this fantasy world.

The background of Heart of the Wild is based on the Japanese fantasy land "Azuma" (ぁずま) during the feudal period, which was ravaged by the original tame "beast", and the environment was greatly impacted and the people sacrificed heavily. After a fierce battle with the winter wolf "Deathstalker", the player will become the holder of a life control technology and shoulder the heavy responsibility of restoring the balance of the earth.

Wild Heart supports three people to fight online. Players can use umbrellas, chain blades, Tatsu Yamashiro, bows and arrows to fight against various monsters in Japanese folklore. Players can also use the "clever system" to assist their hunting, which is somewhat similar to the trap in Monster Hunter.

However, compared with the simple trap in Monster Hunter, the "skill system" in "Wild Heart" is more powerful, which can not only restrict the activities of wild animals, but also help players attack wild animals, provide BUFF, convenience, as mounts and so on.

《Warlander》

Steam favorable rate: 60%, with mixed opinions.

"Warlander" is an exciting third-person online multiplayer game. Its unique style incorporates medieval-like background settings, magical items and abilities, and even powerful robots. In a fierce small-scale battle and an epic castle siege that can accommodate up to 100 players, players need to make good use of the powerful fighting power of soldiers, priests and wizards, as well as siege devices and catastrophic destructive spells to control the battlefield.

快节奏的战斗和精明的决策是游戏的亮点,玩家需要不折不扣地履行自己的团队职责,或是用防攻城武器保卫己方城堡和核心,在战场上扫荡以拦截敌人、占领塔楼,并用投石器发动强大的攻击;

或是通过攻城器和史诗级的灾难级法术潜入敌军的城堡主楼。打败敌军、建造设备和完成目标能让自己获得勇者点数,这些点数可用来强化自己的角色,并帮助你在战斗中扭转战局!

玩家可以为自己的角色挑选适宜的职业,深入打造一套独具一格的角色阵容。每个角色都能拥有属于自己的一套由各种稀有度与定制装备、技能和天赋所组成的装备配置,以及特定的表情和舞蹈动作。构建平衡的卡组、寻找特定的角色,或以各种方式游玩你最喜欢的职业,再将他们送入战场。

根据己方指挥官的指示战略性地扫荡和控制战场,掌握复活用的高塔并利用现有的攻城装置扫除敌军据点的防御工事。摧毁城门、城墙和桥梁以阻断敌方的进军路线,或是创造出攻陷敌军城堡主楼的新路径,还可以通过结盟或破坏联盟的方式操纵战局的走向。

Industrial design works collection version improves tips!

Authorization | Huangshan first painting

Part 1: Type of typography

The type of works of the works can be roughly divided into parallel type, slanted, full version, free type, symmetrical, left and right divided, up and down, gravity, detail, background type.

01 / sided form

The elements perform a differential arrangement of different positions, and the screen has relatively symmetrical feeling by both connection and different elements.

Scheduled application

Picture application

Product typesetting application

Squiry in parallelized multi-use for pictures and product color, material research analysis, etc.

02 / slide typesetting

Type elements and texts in the shape of a curve, or tilt the picture, so that the layout exhibits unstable visual sensation, and the overall is more rhyme.

Scheduled application

Photo application

Product typesetting application

03 / full version

The text is placed on the image on the arranging, which can be placed in the middle, or it can be placed in the middle, but also intersect, but there must be a certain logic.

Full version of the application

Full version of the product typography

Full version of the graphic version

04 / free form

There is no regular typography, the layout is very lively, to avoid the integrity of the typography, incomplete.

Do not recommend product typography

05 / Symmetrical Form

Give human rationality, the feeling of work, but avoid the visual sensation of the dead plate.

Symmetric form application

06 / left

The layout is divided into two parts, the layout of the balance, forming a strong comparison effect, wearing the text, making the layout more coordinated.

Application of left and right divided layout

Photo application

Applications

07 / up and down segmentation

The layout is divided into two parts, the picture can be a single can also be a single, highlighting the energetic atmosphere, the text is light and free, you can write it.

Up and down segmentation is easy to operate, text and content can be discharged from the layout for the vertical version.

Application of up and down partial layout

Photo application

Applications

08 / gravity form

The entire layout has a focus and highlights the visual focus.

Cardiological form layout application

Applications

Photo application

09- Detail form

Highlight the material and function of the product through the magnification of the product details. Enhance the visual effect of the picture.

Detail form layout application

Applications

10 / background form

Place the product in the background template environment.

Applications

Background form layout application

Part II: Tips

Type of skills can be roughly divided into four types, text skills, lend white skills, graphic skills, color skills.

01 / font skill

Select the most comfortable font size

The font size of the font size has a relatively regular magnification, that is, 0.5 times relationship growth

Select the level of the font

Multiple family text information block processing relationship, visual experience between different locations, text blocks, pay attention to the comfort of the font spacing and the line spacing.

Select the level of the font

Different dimensional texts on the above visual experience.

Font selection

Understand the character of the font, avoid using the default font to avoid using the transition to use and ugly fonts, pay attention to avoid simultaneous use of both fonts and two or more different colors.

Font selection

Pay attention to the readability of the text, do not leave a lonely word, use small uppercase letters and carefully use the text of the text.

02 / Dossy Tips

What is a white?

Even if we call it "white", it does not mean that the actual space must be white.

As long as you don’t repeat any graphics or elements on the page. It originates from traditional art, which is originally the difference in the shape of the user more accurately.

Dossy is a space between each element and the surrounding space. When the designer talks about the white: they are actually negative space.

The word "negative space" originated in conflict, blank spaces can be filled with any color. The actual white and "留 白" "negative space" did not really associate, "darker" and "negative space" can be used interchangeably.

Do you want to leave?

Dossy is the basic element of the design, leaving a white simply is a premeditated guidance reader to capture the information necessary to express the information.

And improve the visual feeling of reading.

In the layout of the work set, there is enough space to reserve enough space, do not let information are too stacked, accounting for full space. Too many information will directly lead to a decrease in the interest of the examiner, and a slightly sparse version of the typography will make reading more comfortable.

Picture with text

Dossy is a simple art. You don’t have to pursue information on the page and drawings. Appropriate leaves give people a reading rest, and you can also cause unlimited imagination.

03 / graphic skills

A / Emphasize graphic comparison, increasing visual readability

Using contrast color and complementary color, enhance the readability of information, select the main color according to the subject, and use another color to match the decoration, produce visual tension, attract reading readers.

A

B

B / Weak background

Weak background, fuzzy color reduces the level of reading order,

Highlight design destination visuality and information readability,

The weakening of the background, the convexity of the text will make information reading more visual impact.

A

B

Weak background, emphasizing information.

C / segmentation geometry screen

Add a rectangular boundary box other than the text or set a color block under text, forming a product label, and the relationship is generated by the background and label, allowing the user to focus on the geometry.

Through the segmentation of the geometric frame, the reader’s vision center is focused on the information points within the frame.

D / gold segmentation skills

Gold segmentation: The ratio of the shorter portion of the line segment is equal to the longer portion and the overall length ratio, and its ratio is about 0.618.

A

B

Layout: Set the size into a gold segmentation ratio.

Rebum: Use the gold segmentation ratio to control the white space.

Content: Try to utilize the proportion of gold.

04 / color skills

A / contrast color

Two colors of the 12 color phase rings are 120 ° color. The matching method of the color color can generally use the color of the picture very jumped. It is now much more than sports products.

B / same color

Then there are two colors of the 12 color phase rings in the color of 30 °. Use the similar color on the product to enhance the overall feeling of the picture.

C / complementary color

The distance between the two colors in the 12-color ring is 180 ° color. The complementary color is exaggerated, and the visual impact is very strong.

D / neighboring color

The distance between the two colors in the 12 color phase ring is 60 ° color. The neighboring color is a relaxed feeling.

Co-like – then two colors of the two colors in the 12-color rings in the color of 30 °. Use the similar color on the product to enhance the overall feeling of the picture.

Complementary Color – The distance between the two colors in the 12-color ring is 180 ° color. The complementary color is exaggerated, and the visual impact is very strong.

Neighborhood – The distance between the two colors in the 12-color ring is 60 ° color. The neighboring color is a relaxed feeling.

Color of the golden rule – 6: 3: 1

The main color is a proportion of 60%, and the secondary color is 30% ratio, and the auxiliary color is a 10% ratio. Generally, the color of the color of the color is followed in the product color matching.

6: 3: 1

Color golden law is reflected in the product

Children’s products generally use multiple colors or irregular use of colors

finally

You can follow this or a certain way to type and layout, but the products and rhythm of each person are different, so everyone finds the style and typography of our products. It is also important.