1. I've seen it! It should be "ex wife dares to marry someone else", male master situ Yu
2. The story of avatar American poster takes place in 2154. The story begins with the earth. Jack Sally is a former Marine with paralyzed legs. He feels that there is nothing worth fighting for, so he is happy to accept the work of the
mining company sent to Pandora. There is a mineral element "unobtanium" on this planet that is not found anywhere else. The reason why it can attract human beings to come here for pioneering is that "unobtanium" will completely change the energy instry of human beings. But the problem is that Pandora, which is rich in resources, is not suitable for human life. The air here is fatal to human beings, and the native animals and plants are fierce predators and extremely dangerous. The environment here has also created a different race from human beings: the 10 foot high blue humanoid "Na & # 39; "VI family". Na' VI people are dissatisfied with the arrival of human pioneers, and they don't like the scars left by human machines mining everywhere on the planet. Although the environment of Pandora is harsh, human beings can even work on Pandora with bare skin as long as they wear air filter masks. However, even if humans learned to speak Neville, they could not communicate directly with the neville people, so scientists turned to cloning technology: they combined human DNA with na & #; VI human DNA combined to create a clone na & # 39; VI human, this clone na & # 39; VI people can let human consciousness into it and become the "incarnation" of human free activities on this planet. However, not everyone can manipulate the clone na & # 39; Only those whose DNA matches the type of human DNA in him have such ability. Jack Sally's twin brother is the clone na & # 39; VI's human DNA donor, he can manipulate the clone na & # 39; VI, but he was killed, mining companies in order not to drop money in vain (clone na & # 39; We must find a replacement for him to manipulate and clone na & # 39; VI's person, the person's DNA must also match his type, so they naturally found Jack Sally, and Jack Sally was very happy about it, because it meant that he could walk again. A few years later, Jack Sally went to Pandora. He found that the beautiful scenery here is beyond description. The towering trees are 900 feet high, the mountains are scattered in the sky, the dense rain forest is colorful and full of strange plants, and all kinds of animals and plants emit light at night. It's like a fantasy garden in a dream. However, he soon experienced the danger here. A dead holy beast (a native creature on Pandora) came across him. Jack lost contact with his teammates in the process of escape. At night, he was attacked by a group of hyenas. Jack rose to fight. In the whole process of fighting, Jack was outnumbered and in danger. In the critical moment, an arrow shot the poisonous wolf, Jack is saved. It was na & # 39 who saved him; The VI princess, Jack learned about Pandora from her. Film "Avatar" stills (20) na & # 39; The VI people have been living a simple and natural life in harmony with other species on Pandora. Jack is with this na & # 39; In the process of getting along with VI girl, he graally changed his view of human mining here, and realized that he had found something worth fighting for. But if Jack Sally wants to join na & # 39; The war of VI people against human invaders has to pay a great price: he can't stay in the "Avatar" forever and be the "Avatar" - clone na & # 39; When a VI person sleeps, he will return to his hemiplegic human body, and only through a special connection device can he return to the "Avatar". Once he becomes the enemy of his own compatriots, he will lose the possibility of combining with the "Avatar", and can only be trapped in the disabled body, and lose the na & #, which he likes more and more; VI girl. Finally, driven by interests, mankind sent fighters to destroy na & # 39; Although Jack and others repeatedly strive for not to do that, the mining company is determined to destroy the homestead tree that the VI people live in. Jack negotiates with them and goes to talk with Na by himself; The VI people negotiated to let them leave the big tree, but when he explained everything, na & # 39; The VI people are very angry, especially the one Jack likes; The girl of VI nationality is also very angry; They tied Jack and a female professor together on the scaffold. The fighters sent by the mining company found that their negotiation had failed. So they ordered to open fire and destroyed the obstacle to their advance - na & # 39; The giant tree on which the VI people live, na & #39; The leader of the VI people was also killed by gunfire. There is no na & # 39 in the land of existence; The VI people were forced to live under the sacred tree. Jack and others were locked up because their just actions were against the interests of the mining company. Later, they take advantage of the opportunity to run away, Jack riding the "phantom" to na & # 39; Under the divine tree where the VI people live temporarily, they appeal to na & #39; The VI people resisted, and he finally got na & # 39; Trust of the people. At his call, they contacted people of other nationalities on Pandora and formed a resistance army of thousands of people, forming a defense line between land and air. The army of the mining company also found na & # 39; The VI people showed signs of resistance, they quickly loaded a large number of high explosive, ready to destroy na & # 39 in advance; The VI people. So, na & # 39; The VI people's Rebel Alliance and the army of the mining company fought a bloody battle. As a result, na & # 39; The VI resistance finally defeated the human, and the human army commander was also killed, na & # 39; With Jack's help, the VI will send all the mining companies out of Pandora. In na & # 39; Under the leadership of VI's spiritual leader, na & #39; With the help of the divine tree, the VI people transfer jack Sally's spirit (soul) to his avatar. Jack finally becomes the na & # 39 on the star; The leader of the VI people. That's the end of the story.
3. bitcoin virus prevention methods:
1. Install the latest security patch for the computer. Microsoft has released patch ms17-010 to fix the system vulnerability of "eternal blue" attack. Please install this security patch as soon as possible; For Windows XP, 2003 and other machines that Microsoft no longer provides security updates, we can use 360 "NSA Arsenal immunity tool" to detect whether there are vulnerabilities in the system, and close the ports affected by the vulnerabilities, so as to avoid being infringed by blackmail software and other viruses
2. Close ports 445, 135, 137, 138 and 139, and close network sharing
3. Strengthen the awareness of network security: don't click the unknown link, don't download the unknown file, don't open the unknown email...
4. Back up the important files in your computer to the mobile hard disk and U disk as soon as possible (regularly in the future), and save the disk offline after the backup
5. It is suggested that users who are still using Windows XP and windows 2003 should upgrade to Windows 7 / windows 10 or windows 2008 / 2012 / 2016 as soon as possible.
4. prevention:
at present, the main way of poisoning is through most of the attacks coming from phishing e-mail, or the website with malware visited by the victims
don't open the e-mail with unknown source, don't click the unsafe link, don't scan the QR code with unknown source, and don't give permission to the software with unknown source
Computer Xiao can pinch the Internet to avoid the limelight
{rrrrrrr}
treatment:
1. Firewall shielding port 445
2. System update with windows update
3. Turn off smbv1 service
3.1 is suitable for customers running Windows 8.1 or Windows Server 2012 R2 and later
for client operating system:
open control panel and click program, Then click turn windows features on or off
in the windows features window, clear the SMB 1.0/cifs file sharing support check box, and then click OK to close this window
restart the system
3.2 for server operating system:
open "server manager", click "management" menu, and then select "delete roles and functions"
in the features window, clear the SMB 1.0/cifs
file sharing support check box, and then click OK to close this window
restart the system
3.3 is suitable for running Windows 7, Windows Server 2008 R2, Windows Vista and Windows Server 2008. Modify the registry
registry path: HKEY_ LOCAL_ Machine system currentcontrolset services llanmanserver parameters
New Item: smb1, value 0 (DWORD)
restart the computer
1: open the blackmail software interface, Click. ( the hacker's bitcoin address)
2: paste it into btc.com (blockchain query)
3: find the transaction record of the hacker's collection address in the blockchain query, Then choose a txid (transaction hash value)
4: and paste the txid to the blackmail software interface button connect us.
5: after the hacker sees it, you can click check payment.
6: then click decrypt to decrypt the file
5. Give some suggestions]
1. It is necessary to install anti-virus software, update the virus library in time, install firewall (anti Trojan horse, hacker attack, etc.), kill virus regularly, and maintain the security of computer operation
it is recommended that the owner of the building can install Tencent computer manager, which is a free professional security software with two in one anti-virus Management (only need to download one ), small memory, good anti-virus, good protection, and no false alarm and killing. It has a world-class anti-virus software embedded anti-virus engine, such as cloud killing engine, anti-virus engine, Jinshan cloud killing engine, Avira killing engine, xiaohongsan and killing repair engine
software upgrade, vulnerability repair and garbage cleaning are automatically and regularly set, which is necessary for lazy people
2; Open Tencent computer manager toolbox vulnerability repair
3. Don't go to some unknown websites or download things casually
4. You should also be on guard against portable storage devices (such as USB flash disk, where viruses are rampant recently)
5. Don't go to unknown websites or receive strange e-mails. After downloading the compressed package file, scan the virus first
6. Close unnecessary ports
7. If you have time and energy, learn some common computer skills and knowledge
finally, I would like to say that if you are very careful but still poisoned, you can't help it It's a good choice to backup the system with ghost.)
6. Must be able to, but level 15 is too easy to be killed. If you have pocket money, buy a hat and hang it
7. First of all, because viruses enter the computer through system vulnerabilities and cause harm, it is necessary to use the vulnerability repair function of the computer housekeeper toolbox
after opening the toolbox, find the vulnerability repair function at the top
and then open this function, the computer Housekeeper will automatically detect the vulnerabilities in the computer
finally, It's OK to fix the detected vulnerability with one click
in addition, this vulnerability affects the computer through port 445, so you need to open the control panel, find the windows firewall, select advanced settings
and then create a new rule in the advanced settings, set port 445 to refuse access