/ 
Into Unscientific Chapter 436
Download
https://www.novelcool.com/novel/Into-Unscientific.html
https://www.novelcool.com/chapter/Into-Unscientific-Chapter-435/9677717/
https://www.novelcool.com/chapter/Into-Unscientific-Chapter-437/9741769/

Into Unscientific Chapter 436

  Chapter 436 Another Battlefield (Part 2)

  The Xiao Wang that Zhan Keren spoke of was obviously Wang Qingchen from the Network Security Center of HKUST.

   As the current top expert in network security in the Academy of Sciences, this time he was also transferred to the conference site to assist in security.

  I saw him quickly block a round of attacks, and at the same time said:

   "The attack intensity is very high. DDOS, CSRF, and SYNFlood attacks are all launched. We just defended against a very strong attack five minutes ago."

   "If there is no accident, we should usher in the next round of offensive within five to eight minutes."

   "If we hadn't prepared a defense system a few days ago, I'm afraid we would have to fight the opponent with bayonets now."

  Zhan Keren immediately became more serious when he heard the words, and asked:

   "Xiao Wang, can you hold on?"

  【Can you hold it】

be honest.

  In the past six months, Wang Qingchen has heard this sentence more than once.

  Whether it is the live broadcast of HKUST cockroach disinfecting.

   It was still the day when the product 'One Mantis Killer' was first launched.

   Or the site of HKUST Public Opinion Press Conference.

  Different people asked this question to Wang Qingchen.

  Wang Qingchen's answer every time is very firm 'can', and he has indeed fulfilled his promise.

   But this time.

  He was a little unsure.

   This time, the network security team of the Academy of Sciences was divided into two groups, A and B, according to individual abilities and coping styles.

  Group B has a large number of people, about a hundred or so, defending in the Rongcheng Center, a well-known national supercomputer in Rongcheng.

  They are mainly aimed at ordinary attacks with high traffic but relatively low technical skills, such as conventional DDOS, and their function is mainly to intercept traffic.

  In game terms, it is used to clear mobs.

  As for the A module.

   is a 'special warfare' team composed of Wang Qingchen, Xiao Rong, and elites from the Information Institute of the Chinese Academy of Sciences.

  There are a total of 31 members in this group, all of them are big men with plaid shirts with high hairlines and no borders.

   You can say this.

   Except for those masters who have retired or worked in private companies, the top hackers in the domestic physique are gathered here.

   This is a lineup that can be called the top match in the cyber security circle, and it can theoretically crush 99.99% of opponents.

   But the problem is

  What Wang Qingchen, Xiao Rong and others are facing this time is the 0.01% headed by the opposite side of the sea.

   It can be seen from some habits that many of them are old acquaintances of Wang Qingchen or Huaxia Hongke.

even

  Wang Qingchen was still in an attack, and vaguely caught a glimpse of a figure that should not appear on this occasion:

   Eric Raymond.

   According to some details.

  Basically, it is possible to rule out the possibility that his apprentice or grandson participated, and it is 100% that he personally ended up.

   This big boss was pulled out, which shows how many strong soldiers have been invested in the opposite side of the sea this time, and how determined their attitude is.

without any exaggeration.

   This is the official confrontation of the highest combat power between the two sides.

   Except for the bear next door, no country can qualify to participate in either side of the two nowadays.

   So to be honest.

  Wang Qingchen really doesn't have much confidence to defend the opponent—after all, attacking is easier than defending.

  But at this juncture, he is not allowed to say dejected words, so this well-known celebrity who looks very literary suddenly gritted his teeth, and said with a straight chest:

   "No problem, Director Zhan, don't worry, I won't let those guys ruin our live broadcast!"

   After making a promise to Zhan Keren.

  Wang Qingchen immediately put his mind on network security maintenance.

  Papapa—

  The security center is filled with the sound of keyboard tapping, and the outside world seems to be full of invisible swords and swords behind the seemingly quiet live broadcast.

  After terminating a computer worm attack, a somewhat hoarse male voice suddenly came from Wang Qingchen's side:

   "Brother Yi! The TCP connection has been attacked, and the program keeps returning ACK messages!"

  The speaker was a middle-aged man with dark circles under his eyes, his hair was disheveled like a bird's nest, and he was clearly a middle-aged Internet addict.

   What he called out was not Wang Qingchen's name, but Wang Qingchen's code name in the Honker League:

   Wings of Chaos.

   That's right.

  This person was also one of the members of the Honker Alliance back then, and participated in the Sino-US hacker war that year.

   Or to be precise.

  Of the 31 people present, more than 60% were members of the Honker League.

  The remaining part basically overlaps with Wang Qingchen, Xiaorong and others.

  Either they are the apprentices they personally brought up.

   Or have studied their courses.

   This is actually quite normal.

  After all, the top hackers in the country entered the Sino-US hacker war at the beginning, and there were not a few of them who were included like Wang Qingchen.

  Even Xiaorong is no exception—he has been working for the country for 15 years, and then he was recruited by Xu Yun to Huadun Biology.

   Heard the news from the man with dark circles.

  Wang Qingchen immediately started to defend.

  TCP problems belong to the category of SYNFlood attacks, that is, flood attacks, which are much more difficult than simple DDOS attacks—of course, this refers to DDOS attacks below a certain level.

   Students who have been programmers in this life should know it.

  Usually the establishment of a TCP connection includes 3 steps:

  The client sends a SYN packet to the server;

  The server allocates certain resources and returns a SYN/ACK packet, and waits for the last ACK packet of connection establishment;

  Finally, the client sends an ACK message.

   In this way, the connection between the two is established, and data can be transmitted through the connection.

  The process of SYNFlood attack is to frantically send SYN packets without returning ACK packets.

  When the server does not receive the confirmation packet from the client.

  The specification standard stipulates that the SYN/ACK request packet must be resent, and this entry will not be deleted from the unconnected queue until it times out.

  SYNFlood attacks consume CPU and memory resources, resulting in excessive system resource usage, inability to respond to other operations, or failure to respond to normal network requests.

  At the same time, because TCP/IP believes in the source address of the message.

  The attacker can forge the source IP address, which makes it very difficult to trace.

   It is impossible to disconnect the network during the live broadcast, so Wang Qingchen and others must solve this problem before the server is overloaded.

  Wang Qingchen first used the netstat-na command to check the connection status of the lower ports, and found that the queue was filled with a large number of semi-connections, and the destination port numbers were all uncommonly used port 23.

  See this scenario.

  Wang Qingchen quickly established a gateway timeout setting and increased the maximum half connection to strengthen the TCP/IP protocol line.

influenced by.

  Part of the external video signal paused, the screen went black for a full 6.7 seconds, and question marks flashed across the live broadcast platform instantly.

   Fortunately, this pause did not last long, and Wang Qingchen took this opportunity to complete the setting of the filtering gateway.

  Attack suspended for now.

  But before Wang Qingchen had time to take a breath, another exclamation came to mind:

   "Oops, my link layer is under attack! TCP is a feint!"

  Wang Qingchen was taken aback for a moment.

   Fortunately, there were not many capable people on the scene. Before Wang Qingchen could respond, another expert from the Information Institute of the Chinese Academy of Sciences helped fill in the vacancy.

After a few minutes.

  The entire loophole was completely plugged.

  The tasks faced by Team A are urgent and difficult, but the number is not many.

  So after solving these problems.

  Wang Qingchen and others finally ushered in a chance to breathe.

   "Here, Xiao Wang."

  Xiao Rong at the side of Wang Qingchen's seat threw a can of magic claws at him, and after Wang Qingchen took a big gulp, he asked meaningfully:

   "Xiao Wang, do you feel that this wave of attacks is familiar?"

  Wang Qingchen was slightly taken aback, and said in surprise:

   "Why, Brother Rong, you feel the same way? I thought I was thinking too much."

  Xiao Rong was silent for a moment when he saw this, and an inexplicable smile rose from the corner of his mouth:

   "It seems that I didn't feel wrong Xiao Wang, those real old friends from 2001 came."

  When Xiao Rong said these words, there was still a trace of emotional fighting spirit in his eyes.

   Mentioned earlier.

  The Rabbit Eagle hacker battle in 2001 was the most intense and well-known Internet battle in China's history.

  However, although we broke through many websites across the sea in that war, our own damage was not small.

   Throughout the ten-day offensive and defensive battle.

  Huaxia destroyed more than 1,000 websites, including more than 600 important websites—under the background of 2001, this number covers a very wide range.

  Across the sea, as many as 1,600 websites were destroyed, including 900 important websites.

   Only relatively speaking, our portal has not been compromised.

  So at that time, the battle was said to be 'offensive and defensive', but in fact it was almost all about offense.

  The length of the defense is actually very small.

   By the way.

   The tactic of pulling out the network cable was also carried forward in that battle

   Now 20 years have passed.

  Xiao Rong never expected that she would unexpectedly reunite with those old friends on this occasion.

To know.

  In the previous attacks, Xiao Rong saw some acquaintances here and there.

  But the number of those figures is generally only one or two, and some of them were later determined to be the actions of the opponent's apprentice—after all, the magnitude of the previous incidents was not high.

  But today, what Xiaorong and the others met was not as simple as one or two acquaintances.

  For example, this feint.

  This is Kevin Poulsen's famous skill

   That's right.

   Kevin Poulsen.

   He was one of the top five hackers across the sea, hacked into the Wunasha Building, and was the first computer criminal to be accused of espionage.

  However, Kevin Poulsen was incorporated after he was released from prison in 1996. He was working as an investigative reporter on the surface, but he was actually working for the opposite side of the sea.

   In the hacker wars of 2001.

   The Chinese Academy of Sciences' Education and Research Network, Pig Farm Portal, and Shuguang BBS are all well-known websites led by Kevin Poulsen.

  And now Kevin Poulsen can show up.

  Be conservative.

  At least 50% of the old acquaintances from that year should also appear today.

   After confirming the 'reunion of old friends'.

  Wang Qingchen and Xiao Rong once again scored 120 points, and quickly returned to their seats to wait.

   For the next ten minutes.

  Although Group A still encountered several attacks, it was generally calm.

  However, Wang Qingchen and Xiao Rong didn't have the slightest intention to slack off.

  They knew very well that those old friends were all masters of big money.

   If you don't make a move, it's fine, and if you make a move, it will be a stormy sea.

   Another four minutes passed.

  Wang Qingchen suddenly stared:

   "Brother Rong, here we come!"

   In fact, there is no need for Wang Qingchen to remind, Xiaorong also noticed the change of the detector in front of him:

  In just five seconds, the live broadcast server encountered a DDOS attack with a peak value of 0.11Tbps!

  DDOS attack is a common bot attack, common DDOS attack script kiddies can do it, and it is not difficult to defend against it.

  But if it is a high-level DDOS attack, it is another concept.

   The highest DDOS attack in Huaxia occurred on April 8, 2018.

   At that time, a game of Tencent Cloud suffered 7 consecutive DDoS attacks from 19:13 to 19:50, with a peak value of 1.23Tbps.

   That's 1.23 megabits per second.

  The 'appetizer' that Wang Qingchen and the others encountered today reached 1/10 of the original record.

   Almost in just a few seconds.

  Xiao Rong realized the identity of the other party:

  The king of DDOS across the sea, Setu!

   This is also one of the core members who attacked Huaxia Internet at the beginning.

  However, unlike Kevin Poulsen, who went to prison first and then was incorporated, he has been serving the official across the sea since his debut.

   In a sense.

  He is the 'Honker' across the sea.

   Fortunately, the Chinese Academy of Sciences was well prepared for the hacker attack this time, and prepared a high-level bandwidth in advance.

  In the case of bandwidth hard resistance.

  Xiao Rong cleaned and drained the water, and finally contained Setu's offensive.

   and the price

   is the video quality of all viewers in the live broadcast room, which has been slightly reduced by half a stop.

   Fortunately, at this time, many institutions are still conducting experiments, and the camera perspective is either overlooking the whole world, or locking on the commentators of their respective media.

  The reduction in image quality is relatively insignificant.

  But for Xiaorong and others, this is just the beginning

  Setu's attack involved Xiaorong, the most capable hacker on the scene, making him temporarily unable to get out to help others.

at the same time.

   Across the distant sea.

  The Pentagon. (This place name is not very easy to describe in Chinese characters. It seems a bit sensitive. I don't know where it is. I can Baidu it. I will refer to it in English.)

  In a closed but quite open room.

  Hundreds of programmers are rapidly typing on the keyboard in front of the computer.

  These programmers have different skin colors, some are white, some are Hispanic, and some are black.

   There are even a few

  Asian.

  In the front area of ​​the room, there is an area that seems to have a higher standard, and a man is sitting in one of the positions, typing commands cracklingly.

  This person should be a Hispanic in terms of skin color, in his forties, with fairly regular facial features.

  However, every ten seconds, the muscles on his left face would twitch heavily. It seemed that there was some problem with the facial nerves.

   And behind this person are surrounded by six men, all of whom seem to be in their forties or fifties.

after awhile.

  The man in the seat let out a groan, clenched his fist with his left hand, and hammered on the palm of his right hand angrily:

   "FXXK!"

   Behind him, a big man with a round belly and a beard saw this, and couldn't help but whistled:

   "Aha, Setu, I'm willing to bet and lose, and I'm sincerely offering $100."

  The man named Setu reached into his trouser pocket a few times, took out a crumpled banknote, and slapped it on the table angrily:

   "Take it!"

  The bearded man was humming the tune of 'la la la' while happily picking up the money:

   "Setu, I haven't seen you for so many years, and your technology hasn't improved much. Is this the king of DDOS?"

  Setu's facial muscles twitched violently again. He didn't know whether it was because of anger or the original nerve twitch, but he couldn't help but raised a **** towards the other party:

   "Shut up you, 100 dollars can't stop your broken mouth, the same loose thing from front to back, do you know who is on the other side?"

  The bearded man didn't seem to care about Setu's sarcasm at all, but asked curiously:

"who is it?"

  Setu glanced at him:

   "xiaorong, the accuracy is not less than 90%."

   Heard the name xiaorong.

  The surrounding atmosphere suddenly froze, and the smile of the bearded man also instantly subsided.

   A few seconds passed.

  One of the handsome guys who looked somewhat similar to Beckham suddenly showed a tyranny in his eyes that didn't match his appearance:

   "So it was him"

  These people present had participated in the hacker war 20 years ago, so they were naturally impressed by Xiaorong, the main attacker who once planted the national flag on the homepage of the White House official website.

   This is indeed a difficult opponent.

  The handsome guy who spoke at the end had a big fall on Xiao Rong.

   Just when the atmosphere was a little dignified.

   A little gray-haired old man walked up to the front left of the crowd, and asked Setu and others:

   "Several, how is the situation now? Can you break through the defense of the Chinese people?"

  Setu shook his head, sighed, and explained:

   "Sorry, Mr. Abbott, I failed too."

   "The defense system of the Chinese Academy of Sciences has a preliminary screening module. It should be specially prepared for this live broadcast these days. The logic and code are perfectly matched."

   "If we don't break this layer of defense, we can only play 50 to 60% of the effect when we invade."

   "I'm not afraid of xiaorong in a full-strength battle, but the outcome is in the balance. In addition to the blocking of this module, I will definitely not be able to capture the core node—not to mention that there is not only xiaorong on the opposite side."

  The rest of the people also nodded in agreement.

  Although their experience of watching the game behind is not as intuitive as that of Setu, a lot of information can still be detected.

   As Setu said.

  The Chinese Academy of Sciences directly blocked many applications for overseas visits, forming a solid protective layer.

  Using film and television works as an example, it is a bit like the barrier that Hogwarts put up before the final battle in Harry Potter and the Deathly Hallows.

   Unless this barrier is broken, it will never be possible to enter the frontal battlefield.

   Not to mention that before Setu made a move, several of them also tried to attack, and the effect was not very satisfactory.

  See this scenario.

  The little old man named Albert looked around a few people and asked:

   "Gentlemen. Oh, and this psychic woman, are you sure we can't break through the defense of the Chinese Academy of Sciences through a frontal assault, are you?"

  Everyone nodded without hesitation:

   "Exactly."

"I am very sure."

   "I'm sorry, it's true. After all, the Chinese Academy of Sciences has a long time to build a defense system in advance"

   "Mr. Abbott, I said please call me Ms. Salfin"

   After getting a positive answer from everyone.

   Abbott stood in place like a statue, with a dignified and complicated expression on his face.

   seems

   is weighing something.

  As the head of The Pentagon's China Strategy Department, Abbott has already stepped into the upper echelons of power across the sea.

   Whether it is the information they have or the vision to look at things, they are far beyond the reach of hackers like Setu.

  It can be said that since October 1, 1972, the blockade of China has never stopped across the sea.

   It started with technology, trade, and equipment.

  In the past 30 years, it has turned to education and awareness, doing everything possible to implement "de-Chineseization".

   Very representative is the word New Year.

   They worked with Bangzi one after another, spent eight years with great patience, and forcibly changed "chinesenewyear" to "LunarNewYear".

   Now "LunarNewYear" on the extranet has become synonymous with political correctness, euphemistically called the Lunar New Year in the East Asian cultural circle.

   Eight years, just for such a word.

   There are many, many similar small actions.

   While blocking and suppressing China's right to speak, they are distorting China's right to public opinion.

  For example, a certain neon company released a poster of a dog in the flowers on the day of the martyr's sacrifice, and it was also accompanied by the great fortune teller Yongmei.

  Such an obvious sarcasm, there are still some people who complained about domestic glass hearts after the company's microblog was officially banned.

   How ridiculous.

all in all.

under these circumstances.

   Abbott, or the will behind him, will never allow Huaxia to have such an important right to define in the field of particle physics.

  Otherwise, it's not just basic physics that will be affected by then—a senior who held the same position as Abbott decades ago, named Daniel Kimbell, once stumbled on this matter.

  Daniel Kimbell once said a word in his autobiography with great regret:

  "We have made countless wise decisions in our relations with China, but the failure of that decision to release people made all previous correct decisions meaningless—if we had known today, we should have given up those 11 captive pilots."

  Thus, although this confrontation only took place online, the nature of the confrontation involved is no less than that of the original incident.

  The practice of the Chinese Academy of Sciences to list all the institutions in the rankings for live broadcast has made all the proposals in front of the stage of Haidian abolished.

   That is to say

   Now the only turning point is the dark side of The Pentagon.

   As long as the live broadcast signal is cut off, the "power" of the Chinese Academy of Sciences enveloping the public will be cut off.

  Tomorrow will still be beautiful.

   Maybe Huaxia can win a Nobel Prize for this achievement, and then that's all.

   Lack of live broadcast rankings and public attention, everything can be re-managed.

   In the words of the Chinese people.

   This is a two-sided

   The battle of the national destiny!

  (end of this chapter)

Chapter end

Report
<<Prev
Next>>
Catalogue
Chapter 746
Chapter 745
Chapter 744
Chapter 743
Chapter 742
Chapter 741
Chapter 740
Chapter 739
Chapter 738
Chapter 737
Chapter 736
Chapter 735
Chapter 734
Chapter 733
Chapter 731
Chapter 730
Chapter 729
Chapter 728
Chapter 727
Chapter 726
Chapter 725
Chapter 724
Chapter 723
Chapter 722
Chapter 721
Chapter 720
Chapter 719
Chapter 718
Chapter 717
Chapter 716
Chapter 715
Chapter 714
Chapter 713
Chapter 712
Chapter 711
Chapter 710
Chapter 709
Chapter 708
Chapter 707
Chapter 706
Chapter 704
Chapter 703
Chapter 702
Chapter 701
Chapter 700
Chapter 699
Chapter 698
Chapter 697
Chapter 696
Chapter 695
Chapter 694
Chapter 693
Chapter 692
Chapter 691
Chapter 690
Chapter 689
Chapter 688
Chapter 687
Chapter 686
Chapter 685
Chapter 684
Chapter 683
Chapter 682
Chapter 681
Chapter 680
Chapter 679
Chapter 678
Chapter 677
Chapter 676
Chapter 675
Chapter 674
Chapter 673
Chapter 672
Chapter 671
Chapter 670
Chapter 669
Chapter 668
Chapter 667
Chapter 666
Chapter 665
Chapter 664
Chapter 663
Chapter 662
Chapter 661
Chapter 660
Chapter 659
Chapter 658
Chapter 657
Chapter 656
Chapter 655
Chapter 654
Chapter 653
Chapter 652
Chapter 651
Chapter 650
Chapter 649
Chapter 648
Chapter 647
Chapter 646
Chapter 645
Chapter 643
Chapter 642
Chapter 641
Chapter 640
Chapter 639
Chapter 638
Chapter 637
Chapter 636
Chapter 635
Chapter 634
Chapter 633
Chapter 632
Chapter 631
Chapter 630
Chapter 629
Chapter 628
Chapter 627
Chapter 625
Chapter 624
Chapter 623
Chapter 622
Chapter 621
Chapter 620
Chapter 619
Chapter 618
Chapter 617
Chapter 616
Chapter 615
Chapter 614
Chapter 613
Chapter 612
Chapter 611
Chapter 610
Chapter 609
Chapter 608
Chapter 607
Chapter 606
Chapter 605
Chapter 604
Chapter 603
Chapter 602
Chapter 601
Chapter 600
Chapter 599
Chapter 598
Chapter 597
Chapter 596
Chapter 595
Chapter 594
Chapter 593
Chapter 592
Chapter 591
Chapter 590
Chapter 589
Chapter 588
Chapter 587
Chapter 586
Chapter 585
Chapter 584
Chapter 583
Chapter 582
Chapter 581
Chapter 580
Chapter 579
Chapter 578
Chapter 577
Chapter 576
Chapter 575
Chapter 574
Chapter 573
Chapter 572
Chapter 571
Chapter 570
Chapter 569
Chapter 568
Chapter 567
Chapter 566
Chapter 565
Chapter 564
Chapter 563
Chapter 562
Chapter 561
Chapter 560
Chapter 559
Chapter 558
Chapter 557
Chapter 556
Chapter 555
Chapter 554
Chapter 553
Chapter 552
Chapter 551
Chapter 550
Chapter 549
Chapter 548
Chapter 547
Chapter 546
Chapter 545
Chapter 544
Chapter 543
Chapter 542
Chapter 541
Chapter 540
Chapter 539
Chapter 538
Chapter 537
Chapter 536
Chapter 535
Chapter 534
Chapter 533
Chapter 532
Chapter 531
Chapter 530
Chapter 529
Chapter 528
Chapter 527
Chapter 526
Chapter 525
Chapter 524
Chapter 523
Chapter 522
Chapter 521
Chapter 520
Chapter 519
Chapter 518
Chapter 517
Chapter 516
Chapter 515
Chapter 514
Chapter 513
Chapter 512
Chapter 511
Chapter 510
Chapter 509
Chapter 508
Chapter 507
Chapter 506
Chapter 505
Chapter 504
Chapter 503
Chapter 502
Chapter 501
Chapter 500
Chapter 499
Chapter 498
Chapter 497
Chapter 496
Chapter 495
Chapter 494
Chapter 493
Chapter 492
Chapter 491
Chapter 490
Chapter 489
Chapter 488
Chapter 487
Chapter 486
Chapter 483
Chapter 482
Chapter 481
Chapter 480
Chapter 479
Chapter 478
Chapter 477
Chapter 476
Chapter 475
Chapter 474
Chapter 473
Chapter 472
Chapter 471
Chapter 470
Chapter 469
Chapter 468
Chapter 467
Chapter 466
Chapter 465
Chapter 464
Chapter 463
Chapter 462
Chapter 461
Chapter 460
Chapter 459
Chapter 458
Chapter 457
Chapter 456
Chapter 455
Chapter 454
Chapter 453
Chapter 452
Chapter 451
Chapter 449
Chapter 448
Chapter 447
Chapter 446
Chapter 445
Chapter 444
Chapter 443
Chapter 442
Chapter 441
Chapter 440
Chapter 439
Chapter 438
Chapter 437
Chapter 436
Chapter 435
Chapter 434
Chapter 433
Chapter 432
Chapter 431
Chapter 429
Chapter 428
Chapter 427
Chapter 426
Chapter 425
Chapter 424
Chapter 423
Chapter 422
Chapter 421
Chapter 420
Chapter 419
Chapter 418
Chapter 417
Chapter 416
Chapter 415
Chapter 414
Chapter 413
Chapter 412
Chapter 411
Chapter 410
Chapter 409
Chapter 408
Chapter 407
Chapter 406
Chapter 405
Chapter 404
Chapter 403
Chapter 402
Chapter 401
Chapter 400
Chapter 399
Chapter 395
Chapter 394
Chapter 393
Chapter 392
Chapter 391
Chapter 390
Chapter 389
Chapter 388
Chapter 387
Chapter 386
Chapter 385
Chapter 384
Chapter 383
Chapter 382
Chapter 381
Chapter 380
Chapter 379
Chapter 378
Chapter 377
Chapter 376
Chapter 375
Chapter 374
Chapter 373
Chapter 372
Chapter 371
Chapter 370
Chapter 369
Chapter 368
Chapter 367
Chapter 366
Chapter 365
Chapter 364
Chapter 363
Chapter 362
Chapter 361
Chapter 360
Chapter 359
Chapter 358
Chapter 357
Chapter 356
Chapter 355
Chapter 354
Chapter 353
Chapter 352
Chapter 351
Chapter 350
Chapter 349
Chapter 348
Chapter 347
Chapter 346
Chapter 345
Chapter 344
Chapter 343
Chapter 342
Chapter 341
Chapter 340
Chapter 339
Chapter 338
Chapter 337
Chapter 336
Chapter 335
Chapter 334
Chapter 333
Chapter 332
Chapter 331
Chapter 330
Chapter 329
Chapter 328
Chapter 327
Chapter 326
Chapter 324
Chapter 322
Chapter 321
Chapter 320
Chapter 319
Chapter 318
Chapter 317
Chapter 316
Chapter 315
Chapter 314
Chapter 313
Chapter 312
Chapter 311
Chapter 310
Chapter 309
Chapter 308
Chapter 307
Chapter 306
Chapter 305
Chapter 304
Chapter 303
Chapter 302
Chapter 301
Chapter 300
Chapter 299
Chapter 298
Chapter 297
Chapter 296
Chapter 295
Chapter 294
Chapter 293
Chapter 292
Chapter 291
Chapter 290
Chapter 289
Chapter 288
Chapter 287
Chapter 286
Chapter 285
Chapter 284
Chapter 283
Chapter 282
Chapter 281
Chapter 280
Chapter 279
Chapter 278
Chapter 277
Chapter 276
Chapter 275
Chapter 274
Chapter 273
Chapter 272
Chapter 271
Chapter 270
Chapter 269
Chapter 268
Chapter 267
Chapter 266
Chapter 265
Chapter 264
Chapter 263
Chapter 262
Chapter 261
Chapter 260
Chapter 259
Chapter 258
Chapter 257
Chapter 256
Chapter 255
Chapter 254
Chapter 253
Chapter 252
Chapter 251
Chapter 250
Chapter 249
Chapter 248
Chapter 247
Chapter 246
Chapter 245
Chapter 244
Chapter 243
Chapter 242
Chapter 241
Chapter 240
Chapter 239
Chapter 238
Chapter 237
Chapter 236
Chapter 235
Chapter 234
Chapter 233
Chapter 232
Chapter 231
Chapter 230
Chapter 229
Chapter 228
Chapter 227
Chapter 226
Chapter 225
Chapter 224
Chapter 223
Chapter 222
Chapter 221
Chapter 220
Chapter 219
Chapter 218
Chapter 217
Chapter 216
Chapter 215
Chapter 214
Chapter 213
Chapter 212
Chapter 211
Chapter 210
Chapter 209
Chapter 208
Chapter 207
Chapter 206
Chapter 205
Chapter 204
Chapter 203
Chapter 202
Chapter 201
Chapter 200
Chapter 199
Chapter 198
Chapter 197
Chapter 196
Chapter 195
Chapter 194
Chapter 193
Chapter 192
Chapter 191
Chapter 190
Chapter 189
Chapter 188
Chapter 187
Chapter 186
Chapter 185
Chapter 184
Chapter 183
Chapter 182
Chapter 181
Chapter 180
Chapter 179
Chapter 178
Chapter 177
Chapter 176
Chapter 175
Chapter 174
Chapter 173
Chapter 172
Chapter 171
Chapter 170
Chapter 169
Chapter 168
Chapter 167
Chapter 166
Chapter 165
Chapter 164
Chapter 163
Chapter 162
Chapter 161
Chapter 160
Chapter 159
Chapter 158
Chapter 157
Chapter 156
Chapter 155
Chapter 154
Chapter 153
Chapter 152
Chapter 151
Chapter 150
Chapter 149
Chapter 148
Chapter 147
Chapter 146
Chapter 145
Chapter 144
Chapter 143
Chapter 142
Chapter 141
Chapter 140
Chapter 139
Chapter 138
Chapter 137
Chapter 136
Chapter 135
Chapter 134
Chapter 133
Chapter 132
Chapter 131
Chapter 130
Chapter 129
Chapter 128
Chapter 127
Chapter 126
Chapter 125
Chapter 124
Chapter 123
Chapter 122
Chapter 121
Chapter 120
Chapter 119
Chapter 118
Chapter 117
Chapter 116
Chapter 115
Chapter 114
Chapter 113
Chapter 112
Chapter 111
Chapter 110
Chapter 109
Chapter 108
Chapter 107
Chapter 106
Chapter 105
Chapter 104
Chapter 103
Chapter 102
Chapter 101
Chapter 100
Chapter 99
Chapter 98
Chapter 97
Chapter 96
Chapter 95
Chapter 94
Chapter 93
Chapter 92
Chapter 91
Chapter 90
Chapter 89
Chapter 88
Chapter 87
Chapter 86
Chapter 85
Chapter 84
Chapter 83
Chapter 82
Chapter 81
Chapter 80
Chapter 79
Chapter 78
Chapter 77
Chapter 76
Chapter 75
Chapter 74
Chapter 73
Chapter 72
Chapter 71
Chapter 70
Chapter 69
Chapter 68
Chapter 67
Chapter 66
Chapter 65
Chapter 64
Chapter 63
Chapter 62
Chapter 61
Chapter 60
Chapter 59
Chapter 58
Chapter 57
Chapter 56
Chapter 55
Chapter 54
Chapter 53
Chapter 52
Chapter 51
Chapter 50
Chapter 49
Chapter 48
Chapter 47
Chapter 46
Chapter 45
Chapter 44
Chapter 43
Chapter 42
Chapter 41
Chapter 40
Chapter 39
Chapter 38
Chapter 37
Chapter 36
Chapter 35
Chapter 34
Chapter 33
Chapter 32
Chapter 31
Chapter 30
Chapter 29
Chapter 28
Chapter 27
Chapter 26
Chapter 25
Chapter 24
Chapter 23
Chapter 22
Chapter 21
Chapter 20
Chapter 19
Chapter 18
Chapter 17
Chapter 16
Chapter 15
Chapter 14
Chapter 13
Chapter 12
Chapter 11
Chapter 10
Chapter 9
Chapter 8
Chapter 7
Chapter 6
Chapter 5
Chapter 4
Chapter 3
Chapter 2
Chapter 1
~
~
~
~
~
~
~
~
~
~
~
~
~
~
~
~
~
~
Setting
Font
Arial
Georgia
Comic Sans MS
Font size
14
Background
Report
Donate
Oh o, this user has not set a donation button.
English
Español
lingua italiana
Русский язык
Portugués
Deutsch
Success Warn New Timeout NO YES Summary More details Please rate this book Please write down your comment Reply Follow Followed This is the last chapter. Are you sure to delete? Account We've sent email to you successfully. You can check your email and reset password. You've reset your password successfully. We're going to the login page. Read Your cover's min size should be 160*160px Your cover's type should be .jpg/.jpeg/.png This book hasn't have any chapter yet. This is the first chapter This is the last chapter We're going to home page. * Book name can't be empty. * Book name has existed. At least one picture Book cover is required Please enter chapter name Create Successfully Modify successfully Fail to modify Fail Error Code Edit Delete Just Are you sure to delete? This volume still has chapters Create Chapter Fold Delete successfully Please enter the chapter name~ Then click 'choose pictures' button Are you sure to cancel publishing it? Picture can't be smaller than 300*300 Failed Name can't be empty Email's format is wrong Password can't be empty Must be 6 to 14 characters Please verify your password again