/ 
Lord of Ashes Chapter 1028
Download
https://novelcool.info/novel/Lord-of-Ashes.html
https://novelcool.info/chapter/Lord-of-Ashes-Chapter-1027/10342958/
https://novelcool.info/chapter/Lord-of-Ashes-Chapter-1029/10428018/

Lord of Ashes Chapter 1028

Gastroenteritis has not been cured. I have been relying on montmorillonite powder to harden it. Today I thought it was good, but I stopped the montmorillonite powder. After I stopped, I started to have diarrhea immediately... I feel that I will get stomach cancer after I get old. The probability should certainly be high.

So, I will update it later today, and then just refresh this chapter again.

Abstract: In order to improve the security of computer network engineering, this paper studies the security problems and countermeasures of computer network engineering, summarizes the connotation of computer network engineering security, and discusses it from the aspects of operating system and resource sharing, network protocols, and computer viruses. The computer network security problem is given and the solution strategy is given. It is concluded that the security of computer network engineering should be guaranteed from many aspects.

Keywords: computer; network engineering; security issues; countermeasures

In recent years, my country's information technology has developed rapidly, and computer networks play an irreplaceable role in all walks of life in society. People can complete the timely and efficient transmission of various information by operating the computer network system, and complete various tasks without leaving home. However, the convenience that computer networks bring to people is based on the security of network engineering. If users do not pay attention to the security risks in computer network engineering, it is likely to provide an opportunity for network infringement and threaten computer information security. . Therefore, this paper discusses the security problems and countermeasures of computer network engineering.

1 Overview of computer network engineering security

At present, computer networks have been popularized in various fields of our society. For computer network engineering security, its specific meaning is relatively rich. For example, as far as business operators are concerned, their computer network engineering security protection system should be able to meet the requirements of protection Its various business information needs to be protected from being stolen; as far as individual users are concerned, the computer network engineering security protection system in their eyes is more focused on protecting the user's own privacy and data security. But in general, the security of computer network engineering is a powerful guarantee for the security and stability of various businesses carried out by computer information systems and the integrity, validity and confidentiality of computer network information [1]. As far as the current situation of computer networks is concerned, computer data gradually presents an obvious trend of centralization, and the network environment also gradually presents an obvious trend of complexity, which brings a lot of risks to the information security of computer network engineering. Hidden danger. Especially in the initial stage of the construction of many computer network projects, engineers only comprehensively considered the adaptability and practicability of the network, and did not give deeper consideration to the security of the network. , Information security issues arise due to unreasonable factors in design, configuration, and application. Therefore, the construction of computer network engineering should not only ensure that it can implement timely and comprehensive recording and storage of various information data, but also provide sufficient network protection services, starting from hardware, software and other data information transmission media, from Technically guarantee the safety of computer network engineering.

2 Security issues in computer network engineering

2.1 Problems in computer operating system and resource sharing

The operating system is a key part of the computer, and has a non-negligible influence on the overall stability and safe operation of the computer. Therefore, it can be said that computer network security is closely related to the operating status of the operating system. If there is a problem with the operation of the computer operating system, it will be for the computer network. pose a major safety hazard. In current computers, the windows operating system of Microsoft Corporation is widely used, but the genuine version of this system is expensive, and many enterprises and individual users use pirated windows as the computer operating system, and these pirated operating systems Usually there is no sound security configuration, which may lead to some hidden dangers of network security. Various problems occur during the operation of the operating system, such as problems with system account management and port settings. The safety and stable operation of the system as a whole will bring adverse effects [2]. Computer resource sharing has a certain double-sidedness. While providing computer users with a steady stream of resources and sufficient convenience, it also brings security risks and seriously affects the security of computer network operations. As far as the concept of resource sharing itself is concerned, it mainly refers to a process of obtaining a variety of data information and resources through an open form. It can be seen that openness is its most prominent feature, which is why Internet resources such as Trojan horses and viruses Security killers provide an opportunity. In the case of sharing computer information resources, the privacy settings of computer users are relatively low, and malicious intruders can easily invade and destroy the user's computer system through illegal means, especially invading and destroying the server of the computer, which brings great harm to the computer network. security risks. In addition, because resource sharing is also reflected in computer hardware, software, terminals, etc., malicious intruders can even start from the terminal and destroy computer hardware and software through illegal means, resulting in computer users being unable to use computers to complete various tasks normally. The transmission of items of information and data will bring losses to computer users.

2.2 Destruction with the help of tcp/ip network protocol

The coordinated operation of network protocols has an indispensable influence on the safe and stable operation of computer systems. At present, as far as the development of computer network technology is concerned, the application of tcp/ip protocol is very popular. However, in the process of designing a computer network system, designers often do not give comprehensive, comprehensive, and in-depth consideration to the openness, interconnectivity, and security of the computer network. It is especially easy to ignore the security of the computer network and set it as trusted. The network environment leads to insufficient security of the protocol itself, which brings security risks to the computer network and provides an opportunity for malicious intruders [2]. Malicious intruders can use the server of the computer to steal various important network resources, and even maliciously tamper with various information data of computer users, so that computer users cannot accurately complete the dissemination of various information data, such as intercepting connections and stealing IP addresses wait.

2.3 Computer virus problem

Computer virus problem is an important security risk of computer network. Computer viruses have certain similarities with biological viruses in reality, that is, they attach to computer files and infect other files in the computer through self-replication. This kind of virus transmission has a certain degree of secrecy, and computer users often cannot timely Discover. Computer users may be infected by viruses when they receive emails from unknown sources or browse some web pages. After the virus enters the computer, it will transmit the virus to other files of the user on the basis of self-replication, causing serious damage to the computer network. If the computer user does not use anti-virus software to clean up the virus in a timely and effective manner, there may be Cause the computer network system to be paralyzed. At present, with the continuous improvement of the computer technology level of virus programmers, computer viruses are still being updated and upgraded, which brings severe challenges to the update and optimization of antivirus software and the security of computer network engineering.

2.4 Security Issues Related to Cloud Computing

Users will also face certain security issues when applying different cloud computing service models or deploying cloud computing service models, which can be mainly divided into two aspects: cloud provider security issues and user security issues, but in general, not all The problems are all concentrated on the cloud provider or the user. The main responsibility of the cloud provider in this process is to ensure the stability and security of the cloud computing network infrastructure, while the user should set up a certain reliability authentication Password to keep your own data and cloud applications safe. When users save data in the public cloud or log in to the application, they should do a good job of hosting the information on the corresponding cloud server. However, under the background of artificial contradictions and increasingly prominent business competition, the threat to the user's information security is more serious. From the perspective of technical security, a multi-user cloud environment is likely to cause serious computer network security problems. Different users are often isolated from each other and will not affect each other. However, in the context of the growing cloud era, these users are still It is possible to "drop in" intentionally or unintentionally, resulting in information leakage. For this part, the third-party platform is currently responsible for all data maintenance work, such as cloud encryption, digital certificate encryption, etc. Users can choose an appropriate encryption method according to the importance of their own data to maintain the security of Internet data transmission.

3 Solutions to computer network engineering security problems

3.1 Build a complete computer network security defense system

Aiming at the security problems existing in the current computer network engineering, a complete computer network security defense system should be further constructed. The details are as follows: (1) Set up a complete firewall to prevent hackers from accessing a complete firewall system can become a powerful guarantee for the security of computer network engineering. A firewall generally refers to a protective barrier composed of hardware and software devices, which is formed from the internal and external networks on the public network interface [3]. It is a typical network access control device that can build security between IRAs. The gateway realizes the powerful protection of the computer internal network, avoids hackers from invading, accessing the computer internal network, and maintains the security of the computer network. (2) Strengthen the intrusion detection system The intrusion detection system is also an important part of the computer network security defense system. Computer users can use the intrusion detection system to identify unwanted activities in a timely manner and impose certain restrictions on various computer activities to ensure the safe operation of the computer network. Computer users can also use a hybrid intrusion detection method to establish an intrusion detection system based on the network and the host, making the computer network security active defense system more three-dimensional, and realizing effective protection of the computer network. (3) Strengthen security scanning After setting up a complete firewall system and intrusion detection system, computer users should also regularly complete computer security scanning to strengthen the screening of loopholes and security problems existing in the operation of the computer system. Timely eliminate all kinds of security risks, repair loopholes, and ensure computer network security. (4) Optimizing the use of encryption technology Encryption technology is also an indispensable part of the computer network security defense system. The security level of its operating system is c1, c2, which can accurately identify computer users and effectively control their registration. And then maintain the security of the computer network. The large-scale database management systems used in the encryption technology are windowsnt and unix, which can effectively encrypt various sensitive data in the computer system, ensure that computer vulnerabilities will not be exploited by hackers and viruses, and that the database will not be damaged by illegal intruders , to ensure the accuracy of information data transmission, and then to ensure the security and stability of the computer network system.

3.2 Strengthen the prevention of computer viruses and repair loopholes in time

At present, under the background of continuous changes in computer network technology, computer network security issues are also showing a certain trend of complexity. In particular, computer viruses have an obvious trend of complexity, which can disguise themselves as difficult-to-recognize files and URLs to induce computer users. Click, browse, and spread the virus to other files on your computer. For increasingly complex computer viruses, it is also more difficult for antivirus software to detect and kill them. Therefore, in order to effectively prevent computer viruses, computer users should start from themselves and improve their awareness of virus prevention. Reduce the possibility of computer virus intrusion. At present, as far as our country is concerned, relatively mature computer anti-virus software includes kv300, kill, etc. Users can use anti-virus cards to realize dynamic monitoring of computers and find computer viruses in time. In addition, when loopholes are detected in the computer network system, computer users should fix the loopholes as soon as possible. All-round, multi-layered prevention of virus and hacker intrusion, maintaining the security of computer network.

3.3 Utilize the access control system to do a good job of storing and backing up the data

When dealing with various security issues in computer networks, computer users can use access control systems, that is, authentication systems and access control gateways, to effectively limit information resources in all aspects of computer networks. Specifically, when using various information resources in the computer network, computer users must pass identity authentication, which can ensure the accuracy and effectiveness of the resources used by computer users. Computer users should adopt effective methods to solve various problems existing in the computer network, make careful planning of computer network usage traffic, and continuously optimize and adjust according to the actual situation to ensure that computer network resources can be fully utilized. Take advantage of [4]. In addition, it is also possible to adjust the connection point with ACL function, restrict users with the help of ip address, and complete regular modification with administrator password, so as to avoid various threats to the computer network system during operation.

Chapter end

Report
<<Prev
Next>>
Catalogue
Chapter 1042
Chapter 1041
Chapter 1040
Chapter 1039
Chapter 1038
Chapter 1037
Chapter 1036
Chapter 1035
Chapter 1034
Chapter 1033
Chapter 1032
Chapter 1031
Chapter 1030
Chapter 1029
Chapter 1028
Chapter 1027
Chapter 1026
Chapter 1025
Chapter 1024
Chapter 1023
Chapter 1021
Chapter 1020
Chapter 1019
Chapter 1017
Chapter 1016
Chapter 1014
Chapter 1013
Chapter 1012
Chapter 1011
Chapter 1010
Chapter 1009
Chapter 1008
Chapter 1007
Chapter 1006
Chapter 1005
Chapter 1004
Chapter 1003
Chapter 1002
Chapter 1001
Chapter 1000
Chapter 999
Chapter 998
Chapter 997
Chapter 996
Chapter 995
Chapter 994
Chapter 993
Chapter 992
Chapter 991
Chapter 990
Chapter 989
Chapter 987
Chapter 986
Chapter 985
Chapter 984
Chapter 983
Chapter 982
Chapter 981
Chapter 980
Chapter 978
Chapter 977
Chapter 975
Chapter 974
Chapter 973
Chapter 972
Chapter 971
Chapter 970
Chapter 969
Chapter 968
Chapter 967
Chapter 966
Chapter 965
Chapter 964
Chapter 963
Chapter 962
Chapter 961
Chapter 960
Chapter 959
Chapter 958
Chapter 957
Chapter 956
Chapter 955
Chapter 954
Chapter 953
Chapter 952
Chapter 951
Chapter 950
Chapter 949
Chapter 948
Chapter 947
Chapter 946
Chapter 945
Chapter 944
Chapter 943
Chapter 942
Chapter 941
Chapter 940
Chapter 939
Chapter 938
Chapter 937
Chapter 936
Chapter 935
Chapter 934
Chapter 933
Chapter 932
Chapter 931
Chapter 930
Chapter 929
Chapter 928
Chapter 927
Chapter 926
Chapter 925
Chapter 924
Chapter 923
Chapter 922
Chapter 921
Chapter 920
Chapter 919
Chapter 918
Chapter 917
Chapter 916
Chapter 915
Chapter 914
Chapter 913
Chapter 912
Chapter 911
Chapter 910
Chapter 909
Chapter 908
Chapter 906
Chapter 905
Chapter 904
Chapter 903
Chapter 902
Chapter 900
Chapter 899
Chapter 898
Chapter 897
Chapter 896
Chapter 895
Chapter 894
Chapter 893
Chapter 892
Chapter 891
Chapter 888
Chapter 887
Chapter 886
Chapter 885
Chapter 884
Chapter 883
Chapter 882
Chapter 881
Chapter 880
Chapter 879
Chapter 877
Chapter 876
Chapter 875
Chapter 874
Chapter 873
Chapter 872
Chapter 871
Chapter 870
Chapter 869
Chapter 868
Chapter 867
Chapter 866
Chapter 865
Chapter 864
Chapter 863
Chapter 862
Chapter 861
Chapter 860
Chapter 859
Chapter 858
Chapter 857
Chapter 856
Chapter 855
Chapter 854
Chapter 853
Chapter 852
Chapter 851
Chapter 850
Chapter 849
Chapter 848
Chapter 847
Chapter 846
Chapter 845
Chapter 844
Chapter 843
Chapter 842
Chapter 841
Chapter 840
Chapter 839
Chapter 838
Chapter 836
Chapter 835
Chapter 834
Chapter 833
Chapter 832
Chapter 831
Chapter 830
Chapter 829
Chapter 828
Chapter 827
Chapter 826
Chapter 823
Chapter 822
Chapter 821
Chapter 820
Chapter 819
Chapter 818
Chapter 817
Chapter 816
Chapter 815
Chapter 814
Chapter 813
Chapter 812
Chapter 811
Chapter 810
Chapter 808
Chapter 807
Chapter 806
Chapter 805
Chapter 804
Chapter 803
Chapter 802
Chapter 799
Chapter 798
Chapter 797
Chapter 796
Chapter 795
Chapter 794
Chapter 793
Chapter 792
Chapter 791
Chapter 790
Chapter 789
Chapter 788
Chapter 787
Chapter 786
Chapter 785
Chapter 784
Chapter 783
Chapter 782
Chapter 781
Chapter 780
Chapter 779
Chapter 778
Chapter 777
Chapter 776
Chapter 775
Chapter 774
Chapter 773
Chapter 772
Chapter 771
Chapter 770
Chapter 769
Chapter 768
Chapter 767
Chapter 766
Chapter 764
Chapter 763
Chapter 762
Chapter 761
Chapter 760
Chapter 759
Chapter 758
Chapter 757
Chapter 756
Chapter 755
Chapter 752
Chapter 751
Chapter 750
Chapter 749
Chapter 748
Chapter 747
Chapter 746
Chapter 745
Chapter 744
Chapter 743
Chapter 742
Chapter 741
Chapter 739
Chapter 738
Chapter 737
Chapter 736
Chapter 735
Chapter 734
Chapter 733
Chapter 732
Chapter 731
Chapter 730
Chapter 729
Chapter 728
Chapter 727
Chapter 726
Chapter 725
Chapter 724
Chapter 723
Chapter 722
Chapter 721
Chapter 720
Chapter 719
Chapter 716
Chapter 715
Chapter 714
Chapter 713
Chapter 712
Chapter 711
Chapter 710
Chapter 709
Chapter 708
Chapter 706
Chapter 705
Chapter 704
Chapter 703
Chapter 702
Chapter 701
Chapter 700
Chapter 699
Chapter 698
Chapter 697
Chapter 696
Chapter 695
Chapter 694
Chapter 693
Chapter 692
Chapter 691
Chapter 690
Chapter 689
Chapter 688
Chapter 687
Chapter 684
Chapter 683
Chapter 682
Chapter 681
Chapter 680
Chapter 679
Chapter 678
Chapter 677
Chapter 676
Chapter 675
Chapter 674
Chapter 673
Chapter 672
Chapter 671
Chapter 670
Chapter 669
Chapter 668
Chapter 667
Chapter 666
Chapter 665
Chapter 664
Chapter 663
Chapter 662
Chapter 661
Chapter 660
Chapter 659
Chapter 658
Chapter 657
Chapter 656
Chapter 655
Chapter 654
Chapter 653
Chapter 652
Chapter 651
Chapter 650
Chapter 648
Chapter 647
Chapter 645
Chapter 644
Chapter 643
Chapter 642
Chapter 641
Chapter 640
Chapter 639
Chapter 638
Chapter 637
Chapter 636
Chapter 635
Chapter 634
Chapter 633
Chapter 630
Chapter 629
Chapter 628
Chapter 627
Chapter 626
Chapter 625
Chapter 624
Chapter 623
Chapter 622
Chapter 621
Chapter 620
Chapter 619
Chapter 618
Chapter 617
Chapter 616
Chapter 615
Chapter 614
Chapter 613
Chapter 612
Chapter 611
Chapter 610
Chapter 609
Chapter 607
Chapter 606
Chapter 605
Chapter 604
Chapter 603
Chapter 602
Chapter 601
Chapter 600
Chapter 599
Chapter 598
Chapter 597
Chapter 596
Chapter 595
Chapter 594
Chapter 593
Chapter 592
Chapter 591
Chapter 590
Chapter 589
Chapter 588
Chapter 587
Chapter 586
Chapter 585
Chapter 584
Chapter 583
Chapter 582
Chapter 581
Chapter 580
Chapter 579
Chapter 578
Chapter 577
Chapter 576
Chapter 575
Chapter 574
Chapter 573
Chapter 572
Chapter 571
Chapter 570
Chapter 569
Chapter 568
Chapter 567
Chapter 566
Chapter 565
Chapter 564
Chapter 563
Chapter 562
Chapter 561
Chapter 560
Chapter 559
Chapter 558
Chapter 557
Chapter 556
Chapter 555
Chapter 554
Chapter 553
Chapter 552
Chapter 551
Chapter 550
Chapter 549
Chapter 548
Chapter 547
Chapter 546
Chapter 545
Chapter 544
Chapter 543
Chapter 542
Chapter 541
Chapter 540
Chapter 539
Chapter 538
Chapter 537
Chapter 536
Chapter 535
Chapter 534
Chapter 533
Chapter 532
Chapter 530
Chapter 529
Chapter 528
Chapter 527
Chapter 526
Chapter 525
Chapter 524
Chapter 523
Chapter 522
Chapter 521
Chapter 520
Chapter 519
Chapter 517
Chapter 515
Chapter 514
Chapter 513
Chapter 512
Chapter 511
Chapter 510
Chapter 509
Chapter 508
Chapter 507
Chapter 506
Chapter 505
Chapter 504
Chapter 503
Chapter 502
Chapter 501
Chapter 500
Chapter 499
Chapter 498
Chapter 497
Chapter 496
Chapter 495
Chapter 494
Chapter 493
Chapter 492
Chapter 491
Chapter 490
Chapter 489
Chapter 488
Chapter 487
Chapter 486
Chapter 485
Chapter 484
Chapter 483
Chapter 482
Chapter 481
Chapter 480
Chapter 479
Chapter 478
Chapter 477
Chapter 476
Chapter 475
Chapter 474
Chapter 473
Chapter 471
Chapter 470
Chapter 468
Chapter 467
Chapter 466
Chapter 465
Chapter 464
Chapter 463
Chapter 462
Chapter 461
Chapter 460
Chapter 459
Chapter 458
Chapter 457
Chapter 456
Chapter 455
Chapter 454
Chapter 453
Chapter 452
Chapter 451
Chapter 450
Chapter 448
Chapter 446
Chapter 445
Chapter 444
Chapter 443
Chapter 442
Chapter 441
Chapter 440
Chapter 439
Chapter 438
Chapter 437
Chapter 436
Chapter 435
Chapter 434
Chapter 433
Chapter 432
Chapter 431
Chapter 430
Chapter 429
Chapter 428
Chapter 427
Chapter 426
Chapter 425
Chapter 424
Chapter 423
Chapter 422
Chapter 421
Chapter 420
Chapter 419
Chapter 418
Chapter 417
Chapter 416
Chapter 415
Chapter 414
Chapter 413
Chapter 412
Chapter 411
Chapter 410
Chapter 409
Chapter 408
Chapter 407
Chapter 406
Chapter 405
Chapter 404
Chapter 403
Chapter 402
Chapter 401
Chapter 400
Chapter 399
Chapter 398
Chapter 397
Chapter 396
Chapter 395
Chapter 394
Chapter 393
Chapter 392
Chapter 391
Chapter 390
Chapter 389
Chapter 388
Chapter 387
Chapter 386
Chapter 385
Chapter 384
Chapter 383
Chapter 382
Chapter 381
Chapter 380
Chapter 379
Chapter 378
Chapter 377
Chapter 376
Chapter 375
Chapter 374
Chapter 373
Chapter 372
Chapter 371
Chapter 370
Chapter 369
Chapter 368
Chapter 367
Chapter 366
Chapter 365
Chapter 364
Chapter 363
Chapter 362
Chapter 361
Chapter 360
Chapter 359
Chapter 358
Chapter 357
Chapter 356
Chapter 355
Chapter 354
Chapter 352
Chapter 351
Chapter 350
Chapter 349
Chapter 348
Chapter 347
Chapter 346
Chapter 345
Chapter 344
Chapter 343
Chapter 342
Chapter 341
Chapter 340
Chapter 339
Chapter 338
Chapter 337
Chapter 336
Chapter 335
Chapter 334
Chapter 333
Chapter 332
Chapter 331
Chapter 330
Chapter 329
Chapter 328
Chapter 327
Chapter 326
Chapter 325
Chapter 324
Chapter 323
Chapter 322
Chapter 321
Chapter 320
Chapter 319
Chapter 317
Chapter 316
Chapter 315
Chapter 314
Chapter 313
Chapter 312
Chapter 311
Chapter 310
Chapter 309
Chapter 308
Chapter 307
Chapter 306
Chapter 305
Chapter 304
Chapter 303
Chapter 302
Chapter 301
Chapter 300
Chapter 299
Chapter 298
Chapter 297
Chapter 296
Chapter 294
Chapter 293
Chapter 292
Chapter 291
Chapter 290
Chapter 289
Chapter 288
Chapter 287
Chapter 286
Chapter 285
Chapter 284
Chapter 283
Chapter 282
Chapter 281
Chapter 280
Chapter 279
Chapter 278
Chapter 277
Chapter 274
Chapter 272
Chapter 271
Chapter 270
Chapter 269
Chapter 268
Chapter 267
Chapter 266
Chapter 265
Chapter 264
Chapter 263
Chapter 262
Chapter 261
Chapter 260
Chapter 259
Chapter 258
Chapter 257
Chapter 256
Chapter 254
Chapter 252
Chapter 251
Chapter 250
Chapter 249
Chapter 248
Chapter 247
Chapter 246
Chapter 245
Chapter 244
Chapter 243
Chapter 242
Chapter 241
Chapter 240
Chapter 239
Chapter 238
Chapter 237
Chapter 236
Chapter 235
Chapter 234
Chapter 233
Chapter 232
Chapter 231
Chapter 230
Chapter 229
Chapter 228
Chapter 227
Chapter 226
Chapter 225
Chapter 224
Chapter 223
Chapter 222
Chapter 221
Chapter 220
Chapter 219
Chapter 217
Chapter 214
Chapter 213
Chapter 212
Chapter 211
Chapter 210
Chapter 209
Chapter 208
Chapter 207
Chapter 206
Chapter 205
Chapter 204
Chapter 201
Chapter 200
Chapter 199
Chapter 198
Chapter 197
Chapter 196
Chapter 195
Chapter 194
Chapter 193
Chapter 192
Chapter 191
Chapter 190
Chapter 189
Chapter 188
Chapter 187
Chapter 186
Chapter 185
Chapter 184
Chapter 183
Chapter 182
Chapter 181
Chapter 180
Chapter 179
Chapter 178
Chapter 177
Chapter 176
Chapter 175
Chapter 174
Chapter 173
Chapter 172
Chapter 171
Chapter 169
Chapter 168
Chapter 167
Chapter 166
Chapter 165
Chapter 164
Chapter 163
Chapter 162
Chapter 161
Chapter 160
Chapter 159
Chapter 158
Chapter 157
Chapter 156
Chapter 155
Chapter 154
Chapter 153
Chapter 152
Chapter 151
Chapter 150
Chapter 149
Chapter 148
Chapter 147
Chapter 146
Chapter 145
Chapter 144
Chapter 143
Chapter 142
Chapter 141
Chapter 140
Chapter 139
Chapter 138
Chapter 137
Chapter 136
Chapter 135
Chapter 134
Chapter 133
Chapter 132
Chapter 131
Chapter 130
Chapter 129
Chapter 128
Chapter 126
Chapter 125
Chapter 124
Chapter 123
Chapter 122
Chapter 121
Chapter 120
Chapter 119
Chapter 118
Chapter 117
Chapter 116
Chapter 115
Chapter 114
Chapter 113
Chapter 112
Chapter 111
Chapter 110
Chapter 109
Chapter 108
Chapter 107
Chapter 106
Chapter 105
Chapter 104
Chapter 103
Chapter 102
Chapter 101
Chapter 100
Chapter 99
Chapter 98
Chapter 97
Chapter 96
Chapter 95
Chapter 94
Chapter 93
Chapter 92
Chapter 91
Chapter 90
Chapter 89
Chapter 88
Chapter 87
Chapter 86
Chapter 85
Chapter 84
Chapter 81
Chapter 80
Chapter 79
Chapter 78
Chapter 77
Chapter 76
Chapter 75
Chapter 74
Chapter 73
Chapter 72
Chapter 71
Chapter 70
Chapter 69
Chapter 68
Chapter 67
Chapter 66
Chapter 65
Chapter 64
Chapter 63
Chapter 62
Chapter 61
Chapter 60
Chapter 59
Chapter 58
Chapter 57
Chapter 54
Chapter 53
Chapter 52
Chapter 51
Chapter 50
Chapter 49
Chapter 48
Chapter 47
Chapter 46
Chapter 45
Chapter 44
Chapter 43
Chapter 42
Chapter 41
Chapter 40
Chapter 39
Chapter 38
Chapter 37
Chapter 36
Chapter 35
Chapter 34
Chapter 33
Chapter 32
Chapter 31
Chapter 30
Chapter 29
Chapter 28
Chapter 27
Chapter 26
Chapter 25
Chapter 24
Chapter 23
Chapter 21
Chapter 20
Chapter 19
Chapter 18
Chapter 16
Chapter 15
Chapter 14
Chapter 13
Chapter 12
Chapter 11
Chapter 10
Chapter 9
Chapter 8
Chapter 7
Chapter 6
Chapter 5
Chapter 4
Chapter 3
Chapter 2
Chapter 1
~
~
~
~
~
~
~
~
~
~
~
~
~
~
~
~
~
~
~
~
~
~
~
~
~
~
~
~
~
~
Setting
Font
Arial
Georgia
Comic Sans MS
Font size
14
Background
Report
Donate
Oh o, this user has not set a donation button.
English
Español
lingua italiana
Русский язык
Portugués
Deutsch
Success Warn New Timeout NO YES Summary More details Please rate this book Please write down your comment Reply Follow Followed This is the last chapter. Are you sure to delete? Account We've sent email to you successfully. You can check your email and reset password. You've reset your password successfully. We're going to the login page. Read Your cover's min size should be 160*160px Your cover's type should be .jpg/.jpeg/.png This book hasn't have any chapter yet. This is the first chapter This is the last chapter We're going to home page. * Book name can't be empty. * Book name has existed. At least one picture Book cover is required Please enter chapter name Create Successfully Modify successfully Fail to modify Fail Error Code Edit Delete Just Are you sure to delete? This volume still has chapters Create Chapter Fold Delete successfully Please enter the chapter name~ Then click 'choose pictures' button Are you sure to cancel publishing it? Picture can't be smaller than 300*300 Failed Name can't be empty Email's format is wrong Password can't be empty Must be 6 to 14 characters Please verify your password again