CFD is a decentralizing process
1、 The layout design of manuscripts:
1. Main components of manuscripts:
1. Main Title: the name of manuscripts, such as healthy tomorrow
(2) header: a picture closely following the main title is organically combined with the main title③ article: it is the main part of the hand copied newspaper
④ Title: it refers to the title of each article
⑤ tail flower (or flower arrangement), which is generally used at the end or in the middle of the article
(6) lace decoration: used in the blank space between articles (7) shading decoration: shading decoration for articles or topics2. How to typeset:
1. Leave four sides free and draw lines gently with a pencil
(2) arrange the position of the topic, which can be represented by several boxes③ arrange the position of each article, which can be represented by a larger box, and draw lines gently with a pencil in the box, either horizontally or vertically
(4) draw the position of the title with small squares (5) the small box indicates the position of the tail flower (flower arrangement) The title should be decorated 2. Manuscripts are completed
1. Articles are transcribed
2. Title writing
The title should be eye-catching2. Write in art font
3. Decorate the title
(1) it can be decorated directly on the title② it can also be decorated beside the text
4. The header should be eye-catching and not dazzling
5. The drawing of tail flower should be small and exquisite, and the starting point should not be eye-catching
6. Decoration of shading
(1) it can be done well in typesetting, or it can be decorated in writing② light color can be used to brush the bottom or sketch the scenery
Finally, wipe the newspaper surface clean
extension materials:
the decoration and beautification of hand copied newspaper: mainly using color, drawing and other artistic means to make up for the monotony of the text and give people vivid, beautiful and harmonious beauty and enlightenment. The contents include newspaper header, flower inscription, illustration, lace, tail flower and color application
1. Header: it is the sign of hand copied newspaper, which is composed of pattern or picture and journal name. The text is composed of header name, date, etc
2. Flower inscription: it is the decoration of the title or switch of an article. The common ones are shading and suggestive pictures or patterns
Illustration: according to the content of the article, you can draw a picture that can explain a plot, which is closely related to the content of the article; You can also use patterns that have nothing to do with the content of the article, such as flowers and birds, landscapes, etc., which are purely for beautification Lace: generally, it should not be too much, too big or too thick, otherwise, it will make a fuss. Lace can beautify the layout, can separate the article, easy to read Tail flower is a picture or pattern decorated at the back of the article. For example, after ing an article, there is still a blank. You can draw a flower, which can not only enrich the layout, but also increase the aesthetic feeling6, color: generally concise, bright, elegant, not too much rendering, messy. Generally speaking, the tone of the text should be simple and steady; Title and lace, illustrations, etc., can be used more bright colors. Only in this way can the shade be appropriate and the effect be enhanced
golden finger:
unlimited steps 0203990e: 0258
unlimited elf ball 0203990c: 001E
golden finger of "space conversion"
Island 8 02031cf0: 0002
Island 9 02031cf0: 3a02
chaomengdong 02031cf0: 4a01
boat 02031cf0: 1f00
direct play On the fourth day, King 02031cf0:4e01
go home 02031cf0:7e02
gate of King 02031cf0:2a03 (you can play big 4 without badge)
the place where master ball is 02031cf0:3a00
the place where Flamingo is caught 02031cf0:6a00
no man's cave 02031cf0:7a01
No 8 guild hall 02031cf0:0105
no road cave on the sixth island 02031cf0:3a03
grass guild hall 02031cf0:3a04
hunting 02031cf0:3a05
spirit center of poison guild 02031cf0:3a06
research Museum of Honglian island 02031cf0:3a07
Super City 02031cf0:3a08
corridor of Changqing forest 02031cf0:3a09
0300510a: XX
XX list
0001 master ball
0013 recovery medicine (full recovery of physical strength and all States)
0019 spirit grass (death full recovery of physical strength)
0025 Ppmax (1 monster's all skill points are fully recovered)
003fmaximum increase (physical strength base value is increased)
0040 praise (attack base value is increased)
0041 lokhave (defense base value is increased)
0042 indsey (agility base value is increased)
0043 limasen (special attack base value is increased)
0044 strange sweets (monster is upgraded by 1 level)
0046 Ji mountain fruit (virtue base value increased)
0047 maximum value (skill value increased to the maximum)
0067 small tree fruit (ordinary tree fruit is easy to mature)
0068 large tree fruit (precious tree fruit is difficult to mature)
005d sun stone (let the unique monster evolve)
005E moon stone (let the unique monster evolve)
005F flame stone (let the unique monster evolve
0060 Thunder Stone (let the unique monster evolve)
0061 water stone (let the unique monster evolve)
0062 coral stone (let the unique monster evolve)
all move machines
move machine 01:0121
move machine 02:0122
move machine 03:0123
move machine 04:0124
move machine 05:0125
move machine 06:0126
move machine Move machine 07:0127
move machine 08:0128
move machine 09:0129
move machine 10:012a
move machine 11:012b
move machine 12:012c
move machine 13:012d
move machine 14:012e
move machine 15:012f
move machine 16:0130
move machine 17:0131
move machine 18:0132
move machine 19:0133
move machine 20 : 0134
move machine 21:0135
move machine 22:0136
move machine 23:0137
move machine 24:0138
move machine 25:0139
move machine 26:013a
move machine 27:013b
move machine 28:013c
move machine 29:013d
move machine 30:013e
move machine 31:013f
move machine 32:0140
move machine 33:0141
move machine/ >Move machine 34:0142
move machine 35:0143
move machine 36:0144
move machine 37:0145
move machine 38:0146
move machine 39:0147
move machine 40:0148
move machine 41:0149
move machine 42:014a
move machine 43:014b
move machine 44:014c
move machine 45:014d
move machine 46:014e
move machine Device 47:014f
move machine 48:0150
move machine 49:0151
move machine 50:0152
0153 secret machine 01
0154 secret machine 02
0155 secret machine 03
0156 secret machine 04
0157 secret machine 05
0158 secret machine 06
0159 secret machine 07
015a secret machine 08
the elf level golden finger 02023fe0: XX
open code appears 8ED19163 3579E69D
1 - Bulbasaur
AD86124F 2823D8DA
2 - Ivysaur
AB84463B B2609644
3 - Venusaur
3542F0A7 7D2E171F
4 - Charmander
DB8C60CD 81FD6AA7
5 - Charmeleon
08506D61 55CBD9A8
6 - Charizard
A56395D2 8AF46857
7 - Squirtle
BCDCB406 2F2FD763
8 - Wartortle
268349C8 63FF53CE
9 - Blastoise
5FD24ABC 1FE3296A
10 - Caterpie
358CC2BF 9BFA3518
11 - Metapod
DC725D4E 3A20792F
12 - Butterfree
33EFFB7C E1794F5B
13 - Weedle
9A86D92A 635F8DBC
14 - Kakuna
CCEC9F6E 5A2A0F12
15 - Bee drill
F3D99280 49F4EEDC
16 - Pidgey
139BBA32 2DC356C8
17 - Pidgeotto
2F7B0F2F 257173EA
18 - Pidgeot
13659B39 95BD80E5
19 - Rattata
E5C49E22 47B157F2
20 - Raticate
60C9DC15 1AD9B226
21 - Spearow
2F5D7856 A5F7B4AE
22 - Fearow
23689847 DA918B8D
23 - Ekans
A5BA4CFA CA5D771C
24 - Arbok
B75D69F0 7C3B3103
25 - Pikachu
9D4A1BFF 05120D39
26 - Raichu
CE7B779B AE493550
27 - Sandshrew
7DFC4CBD 20BB83B6
28 - Sandslash
CFC711B9 0585971F
29 - NidoranF
B6450111 C65005BC
30 - Nidorina
0BA329E0 CEB39484
31 - Nidoqueen
C3B010F5 6DB0ED0E
32 - NidoranM
A38262A2 825F8CF0
33 - Nidorino
33D5E08A 037AB9C4
34 - Nidoking
82E3DD4B EBFEF864
35 - Clefairy
E8EAB84F 26C8AB6B
36 - Clefable
D15755D8 AF5BE6F1
37 - Vulpix
276AF592 A3A635CC
38 - Ninetales
27B815E0 B8CCC2DA
39 - Jigglypuff
B18AC7E0 E667A184
40 - Wigglytuff
7CEDC4CF F95C5521
41 - Zubat
47596727 51BB292A
42 - Golbat
FF3A0DD1 DF54EB13
43 - Oddish
EF723724 F31E5F64
44 - Gloom
A386B043 9DEB5064
45 - Vileplume
4A2748A4 F888F1C9
46 - Paras
EAD30258 3988D84F
47 - Parasect
74CFC9E9 82CD278E
48 - Venonat
0CC56D24 C9F5A33A
49 - Venomoth
DFDFFF0A 8919BB28
50 - Diglett
BA7199EC 664F9418
51 - Dugtrio
BCC0FB44 1A047D3C< br />
52 - Meowth
5F38FD3F 5D7412A3
53 - Persian
0BEC25D3 787468AE
54 - Psyck
70CEC019 12F0A7B0
55 - Golck
32E8BC37 7712CF08
56 - Mankey
DAAB0C35 55611812
57 - Primeape
B82FBCB6 C954F4ED
58 - Growlithe
CD7047AB 42D861F2
59 - Arcanin e
3099D33C 49E66A04
60 - Poliwag
AF0908F3 650FE1BD
61 - Poliwhirl
C29C3277 063E67E9
62 - Poliwrath
8DC834CF BFECCA56
63 - Abra
5738CFE5 515C61CF
64 - Kadabra
67CA1286 0E3A5D83
65 - Alakazam
C91954D9 68AAD246
66 - Machop
8AD2C8BB EB3 D7A39
67 - Machoke
95EFD5EA DD857E98
68 - Machamp
3BF5B7C4 061AAA45
69 - Bellsprout
CF2E3B09 3B30426E
70 - Weepinbell
0030C455 4F43BB12
71 - Victreebel
1DF3B8CA DC70EC58
72 - Tentacool
65C4E9C5 24CA1894
73 - Tentacruel
51DDE51A 00DE2CE3< br />
74 - Geode
399F7170 D519951E
75 - Graveler
DDF655E3 9BDEE49C
76 - Golem
103F567C 2F1A9043
77 - Ponyta
877A6953 8F6209F2
78 - Rapidash
195BAD3F C840CA28
79 - Slowpoke
4CEC5478 ACBC593C
80 - Slowbro
FE7C44DB 7672B1D8
81 - Magnem ite
3C17AEA9 5DC9D705
82 - Magneton
B8BD13C5 E3E7D9B3
83 - Farfetch' d
9121060C 74B908E0
84 - Doo
920BE3C7 3E00359C
85 - Dodrio
02258041 19ABFE29
86 - Seel
8EC19A12 FD47B55F
87 - Dewgong
E18D1069 1053E30C
88 - Grimer
EB7F9C3F DB3192F5
89 - Muk
729160A9 F8F73577
90 - Shellder
92A2030E 24F19E86
91 - Cloyster
FB078533 1A99C72A
92 - Gastly
99B8A848 91759EFF
93 - Haunter
7F14537B 6C00E975
94 - Gengar
BA9A9758 4221EBF4
95 - Onix
54D9A0DB 68FC768F
96 - Drowzee
C5C4BBBB 55B1B77F
97 - Hypno
F4BB6321 8E9265DB
98 - Krabby
D83FA CC2 7D31E557
99 - Kingler
FF0F431F 400EF220
100 - Voltorb
ABD2C0C0 FBC68A93
101 - Electrode
0C2333CD 141730A7
102 - Exeggcute
8D2F9E72 8719250B
103 - Exeggutor
744AF614 12D8281B
104 - Cubone
D9E3884F 37500E3F
105 - Marowak
CB4A8BD1 1D028 DA2
106 - Hitmonlee
9EDB950D 454533E5
107 - Hitmonchan
3535FA3A EBECD355
108 - Lickitung
F582757C 16122B78
109 - Koffing
BF93F87F BC1AB791
110 - Weezing
D966DA15 88BBB73A
111 - Rhyhorn
7DA9C8C7 8549C3D4
112 - Rhydon
9071D41E 55259C19
113 - Chansey
AD38C4DB B5EBB8A7
114 - Tangela
100D1518 466A2D06
115 - Kangaskhan
8F4BE409 7110788B
116 - Horsea
02401CFF F2742052
117 - Seadra
B0160E28 ED6B68EC
118 - Goldeen
29061002 69BB68FF
119 - Seaking
676505B9 904C9DE3
120 - Staryu
D7D9A00C 7BFB7AAC
121 - Starmie
0E2752FA 51091446
122 - Mr.Mime
0922D9A2 C1E680BA
123 - Scyther
28BEFBB3 68DE4569
124 - Jynx
FB0FC84E D45216CF
125 - Electabuzz
1E6DE7CB DDDBAD78
126 - Magmar
C644F8D1 4159A2D6
127 - Pinsir
A EFBB853 03F4B721
128 - Tauros
1D5557F2 FACC2BA7
129 - Magikarp
04658924 E67574E2
130 - Gyarados
56156F0A D2F071F2
131 - Lapras
483AC796 E3850B8F
132 - Ditto
3613AA25 2CC1B172
133 - Eevee
4B78A144 F02E1187
134 - Vaporeon
D82AEDF5 F23B27A4
135 - Jolteon
1850F0B1 AAFB142F
136 - Flareon
AB622741 B3F84F8B
137 - Porygon
6EE60CB5 746DFF03
138 - Omanyte
1DBD6215 4FD65295
139 - Omastar
23F20EC6 1368F543
140 - Kabuto
32A2B3E0 40DB80D9
141 - Kabutops
2058318E 392B7EE5
1 42 - Aerodactyl
C44B6463 DB3237C3
<
a modified version of cih.1106 was found in December 2002, but it was not seriously destructive
CIH can only be regarded as a threat if it infects the programs used by a large number of computer worms (such as cover letter virus) that send letters, or if Anjulie worm is involved. But CIH virus only attacks on Windows 95, 98 and windows me system, and its influence is limited. Now, because people have recognized its threat, and it can only run on the old Windows 9x operating system, CIH is no longer as widely spread as it was when it first appeared<
virus damage:
of course, the damage of CIH to BIOS is not as terrible as expected. Now PC basically uses two kinds of ROM to store BIOS data, one is the traditional ROM or EPROM, the other is E2PROM. The manufacturer "burned" BIOS into these memories by special means in advance, and then installed them in the PC. When we turn on the computer power, the program and data in the bios are executed and loaded first, so that our system can correctly identify all kinds of hardware installed in the machine and call the corresponding driver, and then the hard disk starts to boot the operating system. The data solidified in ROM or EPROM can be cleared only when special voltage is applied or ultraviolet light is used. This is why when we open some computer cases, we may see a small piece of silver or black paper pasted on a chip to prevent the ultraviolet wire from clearing BIOS data. To clear the data stored in this kind of ROM, it is not enough to calculate the internal voltage of the system. Therefore, users who only use this read-only memory to store BIOS data need not worry that CIH virus will destroy BIOS. But the latest computers, especially those above Pentium, basically use E2PROM to store part of BIOS. E2PROM is also called "electrically rewritable read only memory". In general, the data in this kind of memory will not be rewritten easily by users, but as long as special logic and voltage are applied, it is possible to rewrite the data in E2PROM. Using the CPU logic of PC and the internal voltage of computer, we can easily rewrite E2PROM. This is the principle of upgrading BIOS through software and the basic method of destroying BIOS by CIH. Rewriting the data in E2PROM requires certain logic conditions. Different PC systems may have different requirements for this condition. Therefore, CIH will not destroy all motherboards that use E2PROM to store BIOS. At present, only several 5V motherboards such as Gigabyte and MSI are reported. This does not mean that the quality of these motherboards is poor, but the E2PROM logic is just consistent with CIH, Or the compilers of CIH may purposely destroy the motherboards of some brands. Therefore, to determine whether CIH is harmful to your motherboard, we should first determine whether your BIOS is only burned in ROM / EPROM, or some use E2PROM. It should be noted that although CIH will not destroy all BIOS, the destruction of all data on the hard disk by CIH on the "black" 26th is far more serious than the destruction of BIOS, which is inevitable for every user infected with CIH virus<
virus version:
CIH virus is a file type virus with strong lethality. Its aliases are win95.cih, spacefiller, win32.cih and PE_ CIH, its main
CIH virus
to infect Windows 95 / 98 under the executable file (PE format, portable executable format), the current version does not infect dos and win 3. X (NE format, windows and OS / 2 windows 3.1 execution file format) under the executable file, and invalid in win NT. Its development process has gone through five versions: v1.0, v1.1, v1.2, v1.3 and v1.4. At present, the most popular version is v1.2. During this period, according to some reports, no less than ten variants have been proced at the same time. However, there seems to be no sign of popularity. I have not actually come into contact with these so-called CIH variants< Different versions of CIH virus have been improved over time. The basic development process is as follows:
v1.0 version
the original version of v1.0 only has 656 bytes, its rudiment is relatively simple, and there is not much improvement in structure compared with ordinary types of virus. Its biggest "selling point" is that it is one of the few viruses at that time It is one of the viruses that can infect the executable files of Microsoft Windows PE class. The length of the program files infected by it increases. This version of CIH is not destructive<
CIH virus v1.1 version
when it develops to v1.1 version, the length of the virus is 796 bytes. This version of CIH virus has the function of judging WinNT software. Once it is judged that the user is running WinNT, it does not work and hides itself to avoid error messages. At the same time, it uses more optimized code to rece its length. Another outstanding point of this version of CIH is that it can use the "gap" in the winpe class executable file to split itself into several parts according to the needs and insert them into the PE class executable file respectively. The advantage of this is that when most winpe class files are infected, the file length will not increase<
v1.2 version
when it develops to v1.2 version, in addition to correcting some defects of v1.1 version, the code that destroys the user's hard disk and BIOS program of the user's host is added. This improvement makes it into the ranks of malignant viruses. The length of CIH virus body of this version is 1003 bytes<
the biggest defect of CIH virus in v1.3
v1.2 is that when it infects the zip self extractors file, it will cause the zip self extractor header corrupt.
possible cause: disk or file transfer error.
. The CIH virus of v1.3 version appears to be in a hurry, and its improvement point is aimed at the above defects. Its improvement method is: once it is judged that the opened file is a self extracting program of winzip class, it will not be infected. At the same time, this version of CIH virus modified the attack time. The length of CIH virus in v1.3 is 1010 bytes<
v1.4 version
This version of CIH virus improves the defects in previous versions, does not infect the zip self extracting package file, and modifies the attack date and the right information in the virus (version information is changed to "CIH v1.4 Tatung", and the relevant information in previous versions is "CIH v1. X ttit"). The length of this version is 1019 bytes. From the above description, we can see that in fact, among the relevant versions of CIH, only v1.2, v1.3 and v1.4 are actually destructive. The attack date of v1.2 CIH virus is April 26 every year, which is the most popular virus version in 2002. The attack date of v1.3 CIH virus is June 26 every year, However, the attack date of CIH v1.4 is changed to the 26th day of each month, which greatly shortens the attack ration and increases its destructiveness<
special attack:
CIH is a malignant virus. When the attack conditions are mature, it will destroy the hard disk data, and may destroy the BIOS program at the same time. The attack characteristics of
CIH virus
are as follows:
1. Starting from the main boot area of the hard disk, write garbage data to the hard disk in turn until the hard disk data is completely destroyed. In the worst case, all the data of the hard disk (including all the data of the logical disk) are destroyed. If the important information is not backed up, it will only cry
2. BIOS information in flash ROM on some motherboards will be cleared
3. V1.4 version attacks on the 26th of every month, v1.3 version attacks on the 26th of June every year, and the following versions attack on the 26th of April<
memorabilia:
(1998-2004)
June 2, 1998: the first CIH virus report from Taiwan
June 6, 1998: CIH v1.2 version
June 12, 1998: CIH v1.3 version
June 26, 1998: CIH v1.3 version caused a certain degree of damage
June 30, 1998: CIH v1.4 version
July 1998: CIH v1.3 version was found in the Internet environment This is a case of distributed infection based on Win98 system
July 26, 1998: CIH virus began to spread in large areas in the United States
August 1998: demo was found to be infected on Wing Commander game site
August 1998: two European PC game magazine CDs were found to be infected with CIH
August 26, 1998: CIH version 1.4 broke out, First global spread
August 31, 1998: Ministry of Public Security issued an emergency notice, Xinhua news agency CCTV news broadcast full text
September 1998: Yamaha's software for a certain type of CD-R driver was infected with CIH
October 1998: a demo version of sin released around the world was found to be infected with CIH
March 1999: CIH version 1.2 was found to be pre installed in IBM's Aptiva machine
April 26, 1999: CIH version 1.2 broke out for the first time in the world for more than 6000 years On April 26, 2000, the second large-scale outbreak of CIH version 1.2 resulted in a global loss of more than one billion US dollars
on April 26, 2001, the third large-scale outbreak of CIH. More than 6000 computers were damaged by CIH in Beijing alone
April 26, 2002: CIH virus broke out again, thousands of computers were damaged
April 26, 2003: there are still more than 100 victims of CIH virus
infection characteristics:
because the information of the identification version number of the popular CIH virus is in plaintext, Therefore, you can identify whether you are infected with CIH virus by searching the string in the executable file. The search feature string is "CIH V" or "CIH v1." if you want to search more complete feature string, you can try "CIH v1.2 ttit", "CIH v1.3 ttit" and "CIH v1.4 Tatung", instead of searching "CIH" feature string directly, Because this feature string also exists in many normal programs, for example, the following code line exists in the program: Inc BX Dec CX Dec ax, then their feature code is positive
1. You use proxy IP for your QQ. Tencent service center is to provide security services for your QQ. You are forbidden to log in. (or you frequently change the IP to log in. Or the proxy server of * * IP fails). This situation is no problem. Just keep logging in with fixed IP frequently
2 Check with QQ doctor.
3. Your QQ is blocked because it violates the usage rules (such as intrusion or cracking).
4. Or someone logs in with your QQ.
I think it's the first or second reason. The proxy server fails. Try again. Sometimes it's OK.
I don't know if the answer will help you. I wish you success Thanks<
= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =
supplementary answer:
1. Enter the QQ folder and delete the file with your number
that is, delete the file with your QQ number as the file name
and then log on your number again! Try it
2. Check the system time. If it's not correct, please correct it. Then log in again.
3. Log in with a different QQ number.
if it's normal, your QQ number has the above problems.
if you can't log in, you need to check whether your QQ program or the whole machine is poisoned
