Han Songluo’s brand-new collection of short stories "Love Story in Late Spring" was published: becoming Han Songluo who wrote novels.

Reporter Qu Peng
Han Songluo’s brand-new collection of short stories in late spring, Love Story in Late Spring, was recently published by People’s Literature Publishing House. With the unique brushwork of the northwest land, it coldly observed and meticulously recorded its own stories of the times.
The six short stories in Love Story in Late Spring all revolve around "running away". Without exception, they all run away, looking for themselves or the future, or a running-away ceremony that has no purpose, no end and no answer, but must be completed.
In The Fish Tank and the Sunlight, the novel takes Li Zhiliang’s "running away" as the anchor point, and begins to exert its strength and spread outward: the low-frequency noise of the fish tank, the boredom of adolescence, and the conversation of psychologists … Finally, the ultimate fate of all people is running away, and the destination of running away is not going to prosperity or the city, but to the wilderness, madness and a long road with no return.
"Love Song for Remy Young" describes the musical memory of a generation in the 1990s. Teenagers who dream of Guangdong and small towns shrouded in prosperity, people who want to be famous and fearless. He focused on the fate of the little people. After several years, the music ensemble, can everything be the same?
In the Golden Age of Remy Young, the hero Remy Young is trapped in a dirty, chaotic and crowded family, and he is eager to break out of the shackles and build a beautiful new world. As a teacher, he entered the space of the other, which is also true and false, and also ushered in his golden age, because he investigated the students who impersonated the college entrance examination. However, after leaving the wilderness again and again, he was shocked that everyone was telling and confessing, spreading dark rumors to the world. Finally, with a sigh, return to his real world.
My Father’s House of Fantasies is a inner senses connected with the real world, which is constructed in fantastic imagination. The sudden disappearance of my father when I was young made the building he designed a fantastic space for me. With the mystery of my father’s disappearance, "I" kept searching until the appearance of "Xu Lihu", which made me find some clues …
The opening of Love Story in Late Spring is the return of Pu Yilin. Lin, who has been abducted for more than 20 years, "went home", and the joy he recovered, familiar and unfamiliar relatives and friends, guilt and hatred hung over the Pu family for an instant. After the ups and downs, mother Fengtai fell into endless assumptions: if he was shown the "White Pagoda" near his home, could he get it-his son never left home, so he didn’t have to accept everything in front of him in a hurry and panic?
"Lonely Hunter" is the twilight, when "she" dials the phone number randomly generated in her mind, her unstable mood and whispers with no fixed destination. Don’t cross the line, don’t trespass, just simply vent everything. When the "beep" sounds, I return to the scene and look around as if nothing had happened …
Han Songluo
Han Songluo was born in Xinjiang and lived in Gansu. His life for more than forty years has been based on the northwest land. He added new content to northwest writing by his own way of not sticking to traditional writing techniques and narrative skills. According to Zhang Yiwei, a writer, Han Songluo’s novels are "westerns" of China’s contemporary literature. Zhang Li, a professor at the College of Literature of Beijing Normal University, also said that Han Songluo’s writing is full of fantasy and deep sense of reality, with a distant, wild and chilly wind. He is an unforgettable writer who brings new temperament. Perhaps it is precisely because of his delicate and never lazy perception of the changes of the four seasons in the northwest and everything around him, spying, thinking and writing that his words and works were cast. "Not everyone has to sing the same song, he has his own movement", which is perhaps the best annotation for him. He lived and wrote as a shadow, dancing in the county town, Shan Ye and fantasy.
It has been nearly 20 years since Han Songluo began to write prose at the age of thirteen or fourteen and published his works in 1995. He is Han Songluo who writes columns, film reviews, music reviews and even lyrics, but he is always Han Songluo who writes prose. Han Songluo, who has written a column for eighteen years, returned to the road of novel creation after he had finished supporting his family, buying a house and obtaining financial resources. First came Night in Spring Mountain, then Love Story in Late Spring. He began to write for himself, not for anything else.
Writers Li Xiuwen and Han Songluo have been close friends for many years. He has been recommending Han Songluo’s novels to people. Those brilliant and gloomy, running away and returning, those "serial" traditions and wilderness characteristics, those mysterious pursuits and teachings under the stars have been constantly experimented and refined by Han Songluo, and finally formed a fascinating novel world. "Now, as a novelist, he has finally been seen by more people. As his friend and colleague, I am deeply proud.
Readers who are familiar with Han Songluo know that many of his works contain the word "spring". For him, "spring" is like a self-evident code word between him and words and readers. Han Songluo said that when he was young, it took great courage to say that he liked flowers. However, it is hard for people who have really lived in the northwest not to fall in love after truly feeling the spring. In the northwest, spring is the beginning of everything, and flowers are so important. Now he can finally speak out his longing for spring and his love for flowers, which is a great freedom and unspeakable happiness. Therefore, the main element of the cover design of Love Story in Late Spring is a hazy, gorgeous and blooming flower, which comes from the famous Spanish photographer Paula Codo?er.
Reporting/feedback

"Security is no small matter": What should I do when the game encounters security problems?

On March 5, 2024, Tropic Haze, the author of NS simulator "Yuzu", announced that it had reached a settlement with Nintendo, paid 2.4 million US dollars in compensation, stopped the subsequent simulator development and operation, and closed related websites.

Although many players complain that they wouldn’t use the simulator if it weren’t for the poor performance of NS machines. However, with the increasing awareness of copyright of players today, almost no one will refute the fact that "cracking games is illegal". "Game safety" is not only related to game manufacturers, but also closely related to players.

Some players are worried that they will be liquidated by Nintendo after using Yuzu simulator.

In fact, "game security" occupies a very important position in the game industry, and both players and practitioners have to deal with it almost every day. However, people usually don’t discuss it much, because "game security" has certain technical barriers.

In China, game security is almost directly linked to big factories. Because of the high cost of the security team, only big factories have enough financial resources. Large factories can make adequate plans before safety accidents happen, but on the other hand, small and medium-sized factories and independent developers, which also occupy most positions in the industry, often find it difficult to make appropriate responses when faced with various safety problems.

To this end, we found a high-tech security service provider FairGuard, which focuses on game reinforcement and anti-plug-in, and jointly found some game security cases that are close to gamers and practitioners and exposed to the public, and analyzed them from a professional perspective. We hope to let the public fully understand the specific operation, function and significance of game security.

In the field of game security, the worst professional but most common case type is DDoS attack (distributed denial of service attack). Because of its characteristics, small and medium-sized manufacturers and independent developers are more vulnerable to such attacks.

For example, the mobile game "Lesonas" launched on February 29th this year was attacked by DDoS organized by ACCN. The game had to be delayed for 1 hour, and many players reported that the game was stuck on the first day. Every time they read a line, it took more than 10 seconds to get to the next sentence. The main means of ACCN is to ask the project team to pay the "protection fee", otherwise it will keep attacking. Coincidentally, a mobile game with 7 digits for users is also attacked by DDoS at the service node. If it is not solved in time, the losses caused are incalculable.

Whether there are too many players or they are attacked can be intuitively observed from the background data.

The basic principle of DDoS attack is that the attacker uses a large number of "broilers" (computers remotely controlled by hackers) to occupy the bandwidth or CPU of the game server. If the game server is compared to a hotel, it is like the hotel just opened, and suddenly a group of people came to the door of the hotel to block the door, so that normal diners could not squeeze in, or this group of people entered the hotel and occupied most of the tables, and kept asking the waiter to order, but the waiter could not drive them away, and other diners were also affected.

In order to improve the efficiency of making money, it is often the studio with clear division of labor (such as ACCN organization) that uses DDoS attacks for extortion. Some people will "find" the games to be launched, and record the volume, type and online time of the games. Others will launch attacks according to these records, and there may be a special group of people who will be responsible for contacting various game project teams to confirm the payment.

A "special person" responsible for collecting money

Of course, these behaviors are illegal, but it is difficult for the project team to trace the source and pursue the responsibility. First, the members of such organizations may not be in China, and the server IP address has been transferred several times; Second, attackers generally use virtual currency transactions such as Bitcoin.

Every year, there are a large number of announcements about developers being blackmailed by ACCN organizations on game platforms such as TapTap. Although some platforms and publishers will provide protection services, for developers, "I am not afraid of thieves stealing, but I am afraid of thieves remembering". Attacks that come from the dark and I don’t know when will always be a hidden danger.

From the perspective of technical protection, DDoS attacks are only a matter of money. The volume of the game is different, and the traffic of the attack will be different. After all, the attack also needs to cost. If this degree is not balanced, it is likely to be a loss-making business.

The cost of "broiler" is low, but the cost of preventing "broiler" is high. For example, if an attacker uses "broilers" to attack the game server with 200G of traffic, then the game project team may have to buy 200G of public cloud (such as Tencent Cloud and Alibaba Cloud) resources for protection. The former may cost only a few hundred yuan, while the latter needs tens of thousands of yuan.

Protection products on Tencent Cloud

Attackers often take the lower value of the two as the "protection fee", but the project team can’t guarantee that the other party is honest. If the attacker "steals well" and only collects the protection fee once, the project team can barely accept it; But if the other party thinks you are a "fat sheep", they will blackmail you again and again. Many times, the project team dare not gamble, but they have no money to buy special protection services, so they can only pay the money.

In this regard, the relatively professional advice is to enhance safety awareness. Some developers don’t have the concept of prevention, and they often make up for it after the incident. However, the profit lost after the first DDoS attack is more than the money spent on early protection, which is not worth the candle.

According to the experience summarized by professional security service providers, the low-cost method is that as long as the project team buys public cloud resources or corresponding protection services in the first month of online, there will be basically no more studios to launch DDoS attacks. Small games can directly solve the problems that may cause great losses by spending less money.

Compared with DDoS, most people may know more about plug-ins and pay more attention to the impact of plug-ins on their own game experience.

Some plug-ins can monitor or directly modify game files, which will cause serious damage to the game ecology. FPS games have always been the hardest hit area for black-and-gray attacks because of their high category popularity, high cheating income and data storage in the client.

For example, in the "fake match" incident of the professional team "Crossing the Firewire" last year, the team invited the anchor team to play against the professional players in an open environment, and speculated through subsequent offline battles and whitewashing. Players find that the plug-in used by the anchor team is extremely concealed. If it is not because of the complete victory over the professional players, it is difficult for people to think of using the plug-in. In related reports, this kind of hanging is also called "anchor customized hanging".

There are two characteristics of "anchor custom hanging", one is just the right function castration, and the other is the anti-detection means with external intervention. The former is to make the anchor "icing on the cake" in technology and provide good enough "effect" in the game. For example, the "lock" function can only be triggered when the enemy appears and the sight is close to the enemy’s body. It is difficult for the naked eye to tell whether this tiny moving trace is from the plug-in. As for the latter-teams that do "anchor customization" services often sell special equipment together with plug-ins and put them in the equipment, which makes the official detection methods fail to some extent.

From the point of view of protection, game manufacturers often get plug-in samples first, and use the similar identification code in the plug-in samples to carry out preventive testing in the player’s game. If an official identification code appears in the background data of a player, then the official has the right to take measures, and generally it will not be blocked by mistake. However, the identification code of the anchor custom hanging is separate, and this process naturally doesn’t work.

However, even if the player’s behavior is not detected by the conventional process, the official can make manual judgment, which is based on the background environment and some behavior data of the player-reporting is meaningful at this moment.

If a player receives a large number of reports from other players, the official will check his background environment and behavior data, and give him a risk rating according to the results of the inspection. There are many dimensions of rating, generally to see whether the memory has been modified or whether it is in an unconventional environment (such as a virtual machine).

The security team will send the high-risk player ID to the project team, and the project team will decide the specific measures to be taken later. Some players may be "big R", charging a lot of money, and the direct title may cause legal disputes. If the manufacturer fails to produce enough "objective evidence", there will be a greater probability of losing the lawsuit. Therefore, some manufacturers will turn a blind eye to "big R", and for players below "small R", they would rather kill by mistake than let go.

Compared with anchor customization, "script" is less harmful, but it also has a direct impact on the balance and life cycle of the game. Scripts often appear in role-playing, card and strategy games. From the perspective of protection, scripts are directly linked to the studio, and MMORPG with economic system is the hardest hit area of the studio.

The role of scripts is to efficiently collect in-game resources and realize the obtained resources. In the long run, when the resources in the game are collected too much, the resources will become cheap, and players will tend to find a studio to buy resources instead of "earning" resources through their own game labor. In order to reduce costs, scripts often run on virtual machines or in the cloud. A studio with more than a dozen people may open thousands of scripts at the same time. In other words, in fact, the script is "endless".

Another phenomenon derived from scripts and studios is the "initial number". Chen Shiliu, the technical director of FairGuard, talked to me about this: nowadays, the second tour often requires players to exchange growth resources or roles through repeated work in the game. However, after the game has been in operation for one or two years, it is difficult for newcomers with self-built numbers to catch up with the progress of the game, and it is a common choice to buy "initial numbers" from the studio.

For example, on August 30, 2022, Nexon, the international service operator of Blue Archives, permanently banned 280,000 initial numbers, including not only those in the studio, but also many that have already flowed into the hands of players. This has caused "inflammation" among the players-players have taken lessons in the game and continued to play for a while, but after the manufacturer banned it, they did not provide compensation measures. Players will naturally question: Why didn’t the manufacturer deal with this violation immediately, but it took some time to deal with it?

Nexon has issued a ban announcement.

Chen Shiliu told me that this is because the script does not modify the game memory data, but is just a fixed "simulated click", brushing the trumpet and licking the wool. Therefore, the security team needs to proceed from the risk situation of the equipment and combine the behavior judgment of the player after boarding the number. For example, players need to touch several fixed positions on the screen when doing daily work in a mobile game, but the time and operation logic of manual operation and script opening are different. In the case of background protection, the background will immediately detect the abnormal behavior of players and prompt that there is script risk. However, unlike FPS’s "anchor customization", the connection of the second tour is often "weak connection", and this behavior of hanging scripts and brushing resources cannot be reported. Game manufacturers can only observe it for a long time and regularly "one pot".

"One pot" means lag, so it is difficult to consider whether there are players in the account playing normally and whether there is recharge behavior. It is worth noting that while the players are "on fire", there are also many examples of the game rising due to the reduction of studios.

In Japan, the origin of the "initial number", many manufacturers have acquiesced in the existence of the initial number and formed a "symbiotic" relationship with the studio during their long "Yan Shang" career. Some games may be small in size and lack of newcomers, and the initial number even plays a role in saving some channels and announcing costs for developers. As long as it doesn’t directly affect the experience of other players, some developers will tolerate some behaviors that slightly modify the game memory, such as "variable speed hanging".

Other manufacturers adopt the attitude of "people don’t lift, officials don’t investigate". For example, the "ACT" plug-in of MMORPG Final Fantasy 14, if the player only uses its "damage monitoring" and "mechanism broadcasting" functions, the official will not take the initiative to intervene. After all, this plug-in has really improved the player’s game experience. But in principle, the game is not allowed to use plug-ins. If you take the corresponding test data to "police" other players, it will be officially banned.

"Police" Plug-in in Final Fantasy 14

Generally speaking, whether it is a plug-in or not, it is necessary to analyze the specific situation. For players, as long as the game is played according to the normal process, it will definitely not be banned. In this process, manufacturers need to reflect on whether their game design and version planning are unreasonable, and whether players must rely on some kind of soft plug-in (script) to get a good experience? If this is the case, it is not surprising that after the manufacturers take measures to crack down, they are "burned".

Strictly speaking, modifying the plug-in of game memory is also a part of cracking, but there are many more serious cases of cracking, and in the field of game security, anti-cracking is also the most important part.

In cracking, the most typical case is Legend. In the early years, "Legend" was cracked, and the source code was leaked. Some people deleted the source code with ulterior motives and added their own servers, which became a private server. In the field of black ash production, when a game is cracked, the cracked results will inevitably spread like a virus. When private servers can generate huge benefits, many people will ignore the law and start taking risks.

Under normal circumstances, game developers need to find the copyright party to request authorization to make genuine products. Private servers are like "tax evasion", which saves the step of paying money to the copyright party. There are many benefits in private servers, so there are fewer players playing genuine ones and the losses caused are incalculable.

Li Lei, marketing director of FairGuard, said that there are at least 20 billion industrial chains in the "Legend" mobile games, which are being attacked every year, but they just can’t be beaten.

A small game cracking platform

Of course, "Legend" is because the code leaked and cracked too early, and there will be a situation of private servers. A more common "crack" is to make paid games available for free. This has also brought a series of chain problems: after some small games with in-house purchases are cracked, they will be sold online at low prices, causing losses to developers and operators; Embedding some programs in the installation package, collecting personal information of players during installation, and then selling the information for profit; Implanting illegal advertisements in the original internal purchase part to achieve the effect of imitating genuine products and making money; What’s more, it will adopt a "subscription system" to make profits systematically, far exceeding the bottom line that game security can tolerate.

However, there are fewer cases of cracking the whole game, while there are more cases of cracking encrypted resources. For example, the pictures, audio, text and other contents in the game are all "game resources". Before the game goes online, these resources need to be packaged and encrypted. Generally, the encryption methods of game manufacturers are relatively low, so they have to entrust a third party to further encrypt.

Li Lei mentioned that in recent years, the demand for content-based secondary games has suddenly increased. On the one hand, because the art cost of Second Tour is getting higher and higher, art resources have become one of the most important project assets, accounting for the bulk of the project cost. Once the art resources are cracked, it is very likely that there will be competing products with simpler playing framework but similar art content in the market soon-in the legal sense, the criteria for judging plagiarism and skinning of games are still strict, and developers may realize that competing products have cracked their own art resources, but it is difficult to find tangible evidence.

On the other hand, the cracking of resources means "spoiler", which will affect the ecology of the game community to a certain extent and may indirectly interfere with the version planning of the operators. For example, a second tour puts the character resources to be sold into the game in advance, which is cracked in advance and spread in relevant communities. This character will gradually lose its appeal to players in the information flow, resulting in a decrease in profit.

Li Lei highlighted the resource leakage incident of "Girl Frontline 2: Chasing and Releasing" last year, that is, the "Mrs. Raymond" incident. This resource leakage directly led to the subsequent public opinion outbreak, so that the developer scattered the network and lost the trust of the players. From the point of view of protection, it is inconceivable that with the size of "less than the top 2", there are security problems in game resources.

Last October, the unpacked content of Little Top 2 was everywhere on the Internet.

Li Lei said: "Generally, medium and large-scale games will contact professional companies to do encryption work six months before the start of testing. PvE or relatively’ stand-alone’ mobile games need to prevent situations like’ less top 2′, and PvP games should consider whether the cracked resources will be used to make plug-ins."

In fact, once the popular game resources are leaked, they will be spread quickly and widely. Although this behavior is illegal, it is difficult for game companies to hold the disseminators accountable. At this stage, what developers should do is to keep an eye on whether their project resources are used for sale or further malicious use to prevent the loss from expanding.

In the process of communication, we always mention a problem: some small manufacturers or independent developers easily ignore security issues, or have relevant knowledge, but lack experience in dealing with them. Although large and medium-sized factories have accumulated more or less relevant experience in the development process, they will sometimes "stumble" when faced with the rapid change and increasingly rampant black ash production.

In fact, whether it is reality or games, security has always been a big problem. As a developer, what you should do is to make a good plan in advance as far as possible to avoid problems and then find ways to solve them.

The so-called plan, buying "outsourcing services" from professional teams is an option, but not all. Developers should consider some design logic when making games: will it be used by criminals? Can you do some verification work from the server to improve the intrusion threshold of cracking and plug-in? In fact, these jobs don’t cost too much, but are more about ideas and "intentions". On this basis, if something goes wrong, we can avoid more losses to some extent by looking for a security team to deal with it.

For developers, such concepts and "intentions" are particularly important. If there is an excellent game, because the developer lacks security awareness, he doesn’t even know how to deal with the most basic DDoS attack problem when he goes online, which makes a team’s efforts for several years go up in smoke. This is not only the personal loss of the developer, but also the loss of the game industry.

At this moment, defending the WTCR championship.

Steam potential Auto-First| Bai Yifeng

Although the COVID-19 epidemic continues to ravage, the final race of WTCR RV World Cup, which was originally scheduled to be held in Italy, was chosen to be held on November 15th in Aragon, Spain, but it still does not prevent it from being a world-class automobile race. In the end, Cyan Racing Lynk & Co team won the championship and runner-up in the third race in one fell swoop, and defended the championship with 429 points.

So far, the team has won 6 drivers’ championships in the six races of the WTCR RV World Cup in 2020, and won the podium for 19 times. Jan Herashe also won the drivers’ championship, representing the first time to win the world’s top car championship at his 24-year-old age, and becoming the youngest champion driver in WTCR history.

During the race, Cyan Racing Lynk & Co did not have a smooth ride. In the first race, due to the wet road surface of Aragon track, all the racing tires lacked grip and rushed out of the track many times. The team adopted the tire strategy of dry before wet, so it took the lead in the initial stage.

However, due to the car accident in the second race, Jan Ahrasche’s biggest competitor retired. Therefore, after the second race, Cyan Racing Lynk & Co team defended the 2020 WTCR team championship ahead of schedule.

Ordinary spectators may be more interested in this racing car. In this race, the BOP counterweight of 03 TCR racing car is 60Kg, and the supplementary counterweight is 40Kg. The whole car reaches 1365Kg, making it the heaviest racing car in this race. To know that the 03+ car weight of four-wheel drive has exceeded 1610Kg, you can imagine how much effort TCR has made in weight reduction.

At the same time, the height of the chassis is kept at 80mm, which is undoubtedly more suitable for the track compared with the coupe model of 120 mm-130 mm. As for why it doesn’t look so low? In order to ensure the tire strength, TCR racing car did not use tires with lower flat ratio. Even in such a difficult situation, the four drivers of the team were not affected at all.

Such excellent performance on the field benefited from the world-leading CMA basic module architecture, and continued to build high-end products with "high value, high performance, high technology, high safety and high value" for the global market, forming a three-dimensional product layout. At the same time, the 03 TCR racing car based on the 03 prototype not only won the honor in WTCR RV World Cup, but also remained strong in TCR CHINA.

In October, the monthly sales volume of automobiles reached 21,868 vehicles, up about 55.78% year-on-year, achieving seven consecutive months of growth. Among them, the sales volume of Model 03 reached 7,167 vehicles in October, becoming its main force and the only self-owned brand vehicle that can stand on the A+ market. Its continuous creation of automobile sports culture ecology makes everyone feel the rise of independent brands.

Is the village superior to Russia superior? Guizhou Football United played against Dzenit on November 17th.

According to "Colorful Guizhou Network", "China Daily" and other media, Guizhou will form a Guizhou Football League to play a game with Russia and Dzenit. Tickets for the competition can be collected free of charge, and the audience is controlled at around 30,000 people.

This series of football activities includes Guizhou Football United Trial, International Football Carnival, Tianhetan Football Night and so on. In terms of football competition, Guizhou Football United will select the best professional players in Guizhou through trials to form Guizhou Football United, which will compete with UEFA Cup and Super Cup champion and Russian Dzenit Football Club in Guiyang Olympic Sports Center on November 17th.

The football carnival will be held on the evening of November 16th, and international trade fairs, roadside music festivals and interactive sports activities will be held outside the stadium. Citizens and friends will enjoy players competing on the same stage, Guizhou minority songs and dances, drone performances and fireworks shows; You can also taste Chinese and Russian specialties, products and experience sports parent-child interaction projects.

It is reported that this activity aims to strengthen cultural exchanges among BRICS countries, further enhance the external visibility and influence of colorful Guizhou and Shuang Shuang Guiyang, promote exchanges and cooperation between the two countries in sports, culture, economy and other fields, and enhance the friendship between the Chinese and Russian peoples.

The small plane was chased by the US military plane and eventually crashed. The information on the crew was revealed!

  BEIJING, June 5 (Xinhua)-According to foreign media reports, on the 4th local time, a light plane was suspected to have broken into the sky above Washington, USA, and was chased by American fighter planes at high speed. The light plane eventually crashed in Virginia, and the identity of the owner and crew of the plane attracted attention.

  According to The Washington Post and The New York Times, this plane is a private business plane registered with a company named Encore Motors of Melbourne in Florida, USA.

  Image source: The New York Times report screenshot

  American media contacted the company’s operator, 75-year-old John Roupell, by telephone. He revealed that his daughter, two-year-old granddaughter, nanny and pilot were all on the plane.

  John Roupell said he knew little about the crash. He said in a choked voice that if the plane loses pressure, "they will all fall asleep and never wake up again … … I don’t think they have found the wreckage yet. It drops at a speed of 20,000 feet per minute, and no one can survive in this situation. "

  The Daily Beast, an American news website, noted that Barbara Roupell, the wife of John Roupell, was registered as the president of Encore Motors of Melbourne, but she declined to comment.

  According to the records of the Federal Election Commission obtained by this website, Mr. and Mrs. John Roupell are both well-known business people in Florida. In the past few years, they have donated money to many Republican candidates running for federal office, including hundreds of thousands of dollars to former President Trump and his political organization.

  According to the report, public information shows that Barbara Roupell is also a long-term member of the National Rifle Association (NRA). Since 2002, she has been a member of the NRA Women’s Leadership Committee.

  On the 4th local time, a Cessna light plane was suspected to have broken into the sky above Washington, and the US F-16 jet fighter scrambled for high-speed pursuit, causing a sonic boom over the US capital. During this period, the US military tried to establish contact with the pilots on Cessna plane.

  According to the statement of the Federal Aviation Administration (FAA), the Cessna plane took off from Elizabethan, Tennessee on the 4th and was scheduled to fly to Long Island, new york. But inexplicably, the plane turned around over Long Island and plummeted over Washington, D.C.. The plane later crashed in the mountains of southwest Virginia.

  It is not clear why the Cessna plane did not respond to the control of the authorities, and it is not clear why it crashed.

How to grow cherries big and sweet? Here comes the exclusive secret of Liubu’s new "Cherry King"

Another year of cherry red. On May 19th, at the opening ceremony of the 15th China Jinan Nanshan Cherry Picking Festival, after comprehensive evaluation by five authoritative experts in the industry, Qin Fujun, a grower in Majiayu Village, Liubu Street, Jinan City, won the title of "Cherry King" in Liubu Street this year with three indicators of sugar content of 29%, fruit diameter of 3.6 cm and best taste. At the opening ceremony, the simple fruit grower generously shared his exclusive planting secrets with the surrounding growers from the four dimensions of management in spring, summer, autumn and winter.

Qin Fujun, a new cherry king in Liubu

In spring management, it is mainly pruning and fertilization. At this time, it is necessary to remove the branches of pests and diseases and cut the tree into "uniaxial extension". This tree-shaped nutrient is concentrated, ventilated and transparent, and almost every fruit can see the sun. In the management of fertilizer and water in spring, there is no need for nitrogen fertilizer, because the nitrogen fertilizer in everyone’s field is enough for big cherries to absorb. Qin Fujun suggested that the majority of fruit farmers should apply more organic fertilizer and potassium fertilizer. There is also a little trick about watering. Most people water after applying fertilizer, but Qin Fujun does the opposite, watering first and then fertilizing. He said that this method is not easy to dilute fertilizer. Because Liubu is sandy loam with strong air permeability, applying fertilizer and watering it will dilute, volatilize and dilute the fertilizer, which will cause waste and is not conducive to fruit absorption.

In summer management, it is mainly to control prosperity. Qin Fujun said: "Let’s remember that if the tree is too prosperous, it will not bear fruit. It will only blossom and bear no fruit. The core of controlling prosperity is: twisting the tip, picking the heart and pulling out the bud. "

In autumn management, be careful not to apply fertilizer after picking, because applying fertilizer after picking is a misunderstanding. According to Qin Fujun’s years of experience, the leaves of big cherry are thick and big, and the nutrients absorbed by photosynthesis alone are enough for flower bud differentiation. If chemical fertilizer is applied during this period, the cherry trees will grow in vain and cannot form flower buds smoothly, and the next year will almost blossom without fruit.

In winter management, Qin Fujun’s experience is "raising grass". His orchard is covered with grass. This grass has many advantages. It can cover the surface of soil in winter and achieve a certain degree of constant temperature. When the cold current comes, it can resist part of it. In other words, with grass, the orchard will not be out of production in extremely cold weather. In addition, the mixture of stone and sulfur should be applied once before winter and once in spring. It can kill insects and sterilize, keep warm, and reduce the harm caused by extreme weather.

After receiving this heavy medal, the new "Cherry King" has mixed feelings: "There are all kinds of flavors in it." Affected by the weather this year, cherry orchard of Qin Fujun’s family is also facing a reduction in production, but the overall situation is much better than that of local fruit farmers, thanks to his planting methods. Talking about why he was so generous in teaching his own planting experience, he smiled and said, "Common prosperity."

Liubu big cherry

Liubu Big Cherry Picking Festival has been held for 15 consecutive years. At the opening ceremony, Shandong Fruit Association, Vegetable Basket Production and Marketing Alliance and Shandong JD.COM Agricultural Trade Development Co., Ltd. signed strategic cooperation agreements with Liubu Sub-district Office respectively. On-site setting and evaluation of outstanding farmers in big cherry management, "Cherry King" evaluation, "Cherry" taste sweet food competition and on-site lottery interaction, etc., citizens and tourists have participated in it.

Cherry has been planted in Liubu street for hundreds of years. In the past, small cherries were mainly planted, which were small in size, poor in taste and not resistant to storage. Since 1995, Wangjiayu Village has taken the lead in clearing hills and preparing soil, returning farmland to fruits and renewing old varieties. It has used three years to develop a planting area of more than 2,000 mu of high-quality big cherries, including more than 20 varieties such as red light, Zaodaguo and Brooks. During this period, with Wangjiayu as the core radiation, the surrounding villages successively developed large cherry planting of 8,000 mu.

Liubu Sub-district Office is the main fruit production base in Jinan and the key ecological function protection zone.

This year, Liubu Street has introduced 11 high-quality new varieties, such as Samit, Luying -5, Santimei, Qizao, Santina, Cordia, LuoYaming and Luying No.3, which are characterized by large fruit, sweetness and storage resistance. Up to now, Liubu Street has more than 10,000 mu of large cherry industrial base, which has become the largest large cherry planting base in Jinan.

(Rural Popular Daily reporter Liu Zhenzhen)

Source: Rural Popular Daily

Reporting/feedback

Expert: High-potassium fruit is a "deadly poison" for patients with kidney disease.

  Wuhan Evening News (correspondent Liu Shan, reporter Yan Yan) The man ate five oranges in one breath, and soon fainted to the ground, and his heart might stop at any time? Don’t doubt, it seems incredible, but it has something to do with the common disease of hypertension.

  Mr. Jiang, a 44-year-old from Houhu, opened a small shop by himself. Because he kept the shop every day, he seldom had any activities. More than ten years ago, he was diagnosed with high blood pressure, but he felt that he was young and strong. He didn’t take medicine at all. He only took it once in a while when he felt unwell. When he was well, he stopped taking medicine and never went to the hospital for a physical examination.

  Some time ago, Mr. Jiang always felt bored, and sometimes his calves were swollen, but he didn’t care too much. Before lunch the day before yesterday, he ate oranges while looking at the shop and ate five at a time. Not long after, Mr. Jiang lost consciousness and fainted on the ground. His family quickly called 120 ambulances to take him to the nearby Houhu Campus in central hospital of wuhan.

  After examination, his creatinine was as high as 1700umol/L, and his blood potassium was as high as 7.2mmol/l, while the normal concentration of blood potassium was 3.5-5.5 mmol/L. The doctor diagnosed it as uremia and hyperkalemia!

  The situation is critical and cardiac arrest may occur at any time. The rescue was carried out against time. After emergency hemodialysis, hypokalemia and other symptomatic treatments, Mr. Jiang finally turned the corner. Xiao Wei, Deputy Chief Physician of Nephrology, inquired about the medical history and found that Mr. Jiang himself suffered from hypertension, but there was no standardized treatment, and the result was uremia. And oranges are the "fuse" of the disease: rich in potassium. For uremia patients, oranges are delicious but deadly poison. Normal people can excrete excess potassium in their bodies through urine, but patients with chronic renal insufficiency have reduced potassium excretion ability because of renal function decline. If you eat a lot of high-potassium food, it may lead to the accumulation of potassium in the body and hyperkalemia, which may lead to cardiac arrest and life-threatening.

  Chen Wenli, director of the Department of Nephrology, said that in recent years, the increasing of hypertension and diabetes is an important reason for the increase of uremia patients. Long-term poor control of hypertension and hyperglycemia will lead to serious damage to renal function and eventually lead to uremia. Therefore, it is suggested that people with high-risk factors should treat and control diseases in a standardized way. In addition to regular monitoring of blood pressure and blood sugar, urine routine and renal function should also be checked regularly.

  As the Spring Festival is approaching, people with renal insufficiency such as uremia must keep their mouths shut and eat less or no foods with high potassium content, such as grapes, bananas, oranges, oranges, pomegranates, kelp, leeks and spinach, so as not to cause hyperkalemia. Potassium intake can be reduced by blanching vegetables. In addition, low sodium salt also contains a large amount of potassium salt, which can not be used for patients with chronic renal insufficiency.

Is the 2024 Beijing China Millennium Monument open during the Spring Festival? Opening hours and explanation arrangements

  Is Lantern Festival a legal holiday?

  No.

  National statutory holidays include:New Year’s Day, Spring Festival, Tomb-Sweeping Day, Labor Day, Dragon Boat Festival, Mid-Autumn Festival and National Day, and other festivals can not be regarded as legal holidays for the time being.

  Lantern Festival mainly includes a series of traditional folk activities such as viewing lanterns, eating glutinous rice balls, solve riddles on the lanterns and setting off fireworks. In addition, traditional folk performances such as Youlong lanterns, lion dancing, walking on stilts, boating, yangko dancing and playing Taiping drums have been added to the Lantern Festival in many places. In June 2008, the Lantern Festival was selected as the second batch of national intangible cultural heritage.

  Origin of Lantern Festival

  Lantern Festival is a traditional festival in China, and the formation of Lantern Festival custom has a long process, which is rooted in the folk custom of turning on lights to pray for blessings. Turning on the lights to pray usually begins on the 14th night of the first month, and on the 15th night, it is a "positive light", and the people point lanterns, also known as "sending lanterns", to carry out the activities of offering sacrifices to the gods and praying for blessings. The introduction of Buddhist culture in the Eastern Han Dynasty also played an important role in promoting the formation of the Lantern Festival custom. During the Yongping period of Emperor Han Ming, in order to promote Buddhism, Emperor Han Ming ordered "burning lanterns to show Buddha" in the palace and temples on the fifteenth night of the first month. Therefore, the custom of burning lanterns on the fifteenth night of the first month gradually spread in China with the expansion of the influence of Buddhist culture and the addition of Taoist culture. In the Northern and Southern Dynasties, lantern festival lights gradually became a trend. Liang Wudi believes in Buddhism, and the palace is full of lights on the 15th day of the first month. During the Tang Dynasty, cultural exchanges between China and foreign countries became closer, Buddhism flourished, and officials and ordinary people generally "burned lanterns to offer sacrifices to the Buddha" on the fifteenth day of the first month, so Buddhist lights spread all over the people. Since the Tang Dynasty, it has been legal to display lanterns on Lantern Festival. The fifteenth day of the first lunar month is the Lantern Festival, also known as Shangyuan Festival, Lantern Festival and Lantern Festival. The first month is the first month of the lunar calendar. The ancients called the night "Xiao", so they called the fifteenth day of the first month "Lantern Festival".

  ""Is the opening of the Beijing Lantern Festival attractions delayed in 2023? Summary of opening hours

  ""Where to play at the Lantern Festival in Beijing in 2023? Recommended lanterns and delayed opening attractions

  ""What are the Lantern Festival activities in Beijing’s municipal parks in 2023 (time+participation form) 

Tips: Search WeChat official account [Beijing local treasure] on WeChat, and reply to [Lantern Festival] in the chat dialog box after paying attention. You can get the recommendation of the ticket entrance of Beijing Lantern Festival activities, where to play (viewing lanterns+visiting temple fairs+solve riddles on the lanterns+enjoying flowers in the park) and other activities, self-driving/parent-child/Beijing outing and other theme routes.

This Spring Festival, gold has sold out again! Zodiac transit beads sell thousands of pieces a day. Netizen: Wait until the price is reduced before buying.

China Economic Weekly-Economic News The China Gold Association said on the 18th that during the Spring Festival, despite the high price of gold, China’s gold consumption is still hot, and gold jewelry and dragon year gold bars have become the most popular products.
According to CCTV’s financial report, a person in charge of a gold shop said that the zodiac transshipment beads will sell more than thousands of pieces every day. Judging from the sales situation in different regions, gold consumption has also entered second-and third-tier cities from first-tier cities.
Gold analysts said that not only the first-tier cities such as Beijing and Shanghai have strong sales demand, but also the demand for gold jewelry, including gold investment, has increased significantly in various provinces and cities across the country.
Some netizens said, "Even the gold jewelry in my hometown’s 18-line county during the Spring Festival is sold out!" "Zodiac transit beads have emotional value needs, and gold products also have the function of maintaining and appreciating investment, so the gold consumer market continues to prosper." "Wait for the price of gold to be reduced before buying, and regret that I didn’t start before." "Investment needs to be cautious!"
New Media Editor: Wang Xinjing
Reporting/feedback

The "answer sheet industry" behind the exam


Yang Daxin cartography


  Internet has become the main tool for cheating.


    With the approach of the entrance examination for postgraduate students in 2009, there are a lot of information on the Internet selling the answers to postgraduate entrance examinations. Enter any two of the keywords "postgraduate entrance examination, answer, postgraduate exam, and pass the exam" in the search engine, and you can easily see a large number of peddled posts.


    "It’s less than 40 days before the’ postgraduate exam’. There is no free lunch in the world. It’s very important to choose a good home. It’s not good to expect mixed answers! My price is slightly more expensive than that of my peers, but it is worth the money, and a penny is worth the money! "


    "Honesty and professionalism, caring service, and payment after the exam."


    "The latest equipment in 2009, anti-shielding, anti-‘electronic dog’, let you feel at ease."


    Among all the information, the author noticed three organizations selling answers —— "exam-aid alliance", "answer carrier" and "Zhongzheng Education and Training". The author wrote down their QQ and telephone numbers respectively, and talked with them as postgraduate students.


    As soon as I talked, the "answer carrier" urged the author to "speak quickly, the exam is coming soon, and I have been busy with a lot of business recently."


    "I’m preparing for the postgraduate entrance examination, but I’m not fully prepared. Can I get any help from you?" The author asked.


    "You can provide answers in English and politics, and both subjects can be guaranteed to be above 70 points."


    What is the concept of "over 70 points"?


    In the postgraduate examinations in recent years, the national re-examination scores for English are all around 45 points. Although some popular majors in famous universities have higher requirements for English, they are all far below 70 points.


    "English is guaranteed to be above 70 points", which is very attractive to most candidates.


    Postgraduate entrance examination, as an extremely important national unified examination, according to common sense, the management of examination papers should be very strict, so where do the answers provided by the agencies selling answers come from?


    In the conversation with Yonghui Education, the author asked: Can you provide the answers before the exam?


    The answer is: "it’s impossible. If anyone has the correct answer before the exam, I’ll chop off my head and give it to you as a stool."


    The "Test Aid Alliance" also said, "This is no better than CET-4 and CET-6, and it is very difficult to get the answers before the postgraduate exam."


    It is very unlikely to get the test paper and answer before the exam. So where did the answer come from?


    The "answer carrier" asked the author to log in to his QQ space, saying, "Take a good look and everything will be clear after reading it."


    In the personal space of "Answer Aircraft Carrier", the author found a picture uploaded at 11: 29: 31 am on November 30, 2008, which was taken at the examination site. The content of the test paper "Administrative Ability Test" for civil servants in 2009 is from questions 111 to 115. Enlarge this picture and watch it clearly.


    The time when the photo was sent-11: 29: 31 am on November 30, 2008 shows that the photo was sent during the exam.


    Like the "answer carrier", many answer providers put some photos of the test papers on the website or QQ space to prove that they have the strength to get the test papers and provide effective answers. On the website of Zhongzheng Education and Training, the author saw six pictures of the operation of CET-4 and CET-6. In order to prove the shooting time, there was also a reference message on December 20 (the date of CET-4 and CET-6 in 2008). The middle position of the computer screen also showed that the shooting time was 10: 22: 44. At this time, the CET-4 in December 2008 was in progress.


    In the column of "Proof of Strength" of its website, the "Test Aid Alliance" posted photos of the test papers of more than 10 test items, such as "08 Notes, Justice, 08 Public English Level 3, College English Level 4, Professional Physician, PETS Public English, CPA Certified Public Accountant, local civil servant in the first half of 2008, and 08 Professional English Level 4".


  The website exposed the "answer in the exam" transmission.


    What kind of high technology does the seller of answers rely on to get the test paper out from under the eyes of the invigilator?


    According to the introduction of the "answer carrier" and a number of answer providers, the so-called "answer in the exam" mainly takes the following steps-


    First of all, people who are qualified to take the postgraduate exam are hired to take the exam. On the day of the exam, the employees bring miniature scanning instruments or pinhole cameras with wireless transmission function into the examination room, and after they get the test papers, they send them to the off-site through the above equipment. After the off-site people get the test papers, they immediately send them to the hired experts who do the questions, and the experts who do the questions send the answers to the transit people in the shortest time. The transit people then send the answers to the QQ group composed of candidates who buy the answers, and then wait on the computer.


    It can be seen that the internet plays an extremely important role in the process of cheating, whether it is pre-test propaganda or passing answers in the exam. Why do cheaters use the Internet to cheat so easily?


    The author interviewed internet society of china and 12321 Bad Information Reporting Center, but both units declined the interview. Mr. Zhong, who is in charge of publicity at the Internet Society, said, "The Society is only a non-governmental organization. I suggest you find other units." The 12321 Reporting Center said that "we only accept reports here, and nothing else will be accepted."


    Nowadays, you can still easily get a lot of information about selling answers through search engines, but the focus of selling has shifted from the postgraduate entrance examination to the upcoming local civil service examinations. For example, "Answer Aircraft Carrier" announced in its QQ space as early as a week before the postgraduate exam: the research exam is progressing smoothly and the Zhejiang civil service exam is being actively prepared.


  Cheating equipment is mostly produced by Shenzhen enterprises.


    Wireless cameras and pinhole cameras that send papers out of the examination room, wireless earphones that transmit answers, watches, pens, erasers that can display words, and professional transmitters … Where do these cheating tools with scientific and technological content come from?


    "The equipment I recommend to you is the new model in 2009. It is not an earphone or a pen, but a mechanical watch that can take pictures. On the surface, this kind of watch is no different from ordinary watches, and the information displayed on it can only be seen within half a meter from the watch screen. "Answer Aircraft Carrier" introduced the superior performance of this cheating watch to the author with great interest and sent a URL link through QQ.


    The introduction of all kinds of cheating devices on the webpage is extremely detailed, but there is no explanation for the company address, customer service phone number and email. The author entered the ICP number of this website into the website management system of the Ministry of Industry and Information Technology, and the query result was "No information found"-this website is illegal.


    According to the inquiry of the brand (SUNLIPS) of cheating watches provided by Answer Aircraft Carrier, we know that this mechanical information table is produced by Sanlipu (Hong Kong) Network Technology Co., Ltd., a network technology company registered in Hong Kong and produced in Shenzhen. The author called the marketing manager of the company, and when asked if he knew that the sales agents in various places sold the watch to the answer provider for cheating, the manager hastily hung up the phone without asking whether he could.


    In the follow-up unannounced visit to Yonghui Education, the author has continuous and in-depth contact with the answer buyer Mavericks (a pseudonym). The night before the postgraduate exam, Mavericks said that they had bought an information form for cheating at Yonghui Education. When I looked at the information table, I found a "instruction manual of SUNLIPS mechanical pointer information table". The calf said to the author, "This is the manual of the watch."


    In this year’s postgraduate examination, the "answer carrier" is not the only one who focuses on the mechanical information table. In contact with the "test-aid alliance", the "test-aid alliance" also believes that the safest equipment this year is the mechanical information table. "Many people tried it in the CET-4 and CET-6, and it generally reflected well."


    The mechanical information table recommended by the "Test Aid Alliance" is more advanced, and you need to wear special glasses to see the contents presented on the watch screen through infinite transmission. "The naked eye can only see the dial and the hands."


    After repeated inquiries by the author, the "Test Aid Alliance" revealed the brand of the mechanical information table-"Will Reiss". Upon inquiry, the "Welles" mechanical watch was produced by Shenzhen Welles Technology Development Co., Ltd. In the prominent position of the company’s website, there is a detailed introduction to the "photoelectric dense display pointer paging watch": "1. Anti-cheating gram, invisible earphone detector, electronic dog; 2, to prevent leaks, to prevent others from peeping, breaking the characteristics of traditional pagers that are not confidential enough. The first special glasses introduced from Germany Short photoelectric technology and matched with ordinary appearance in China can really be seen by me, even if others are around or facing the sun. Safety comes first in the information age; 3, the shield, this product adopts forward error correction, data interleaving access, adaptive equalization and other technologies, so that the shield has a very small impact on it … "


    Check out the display of products produced by Shenzhen Weireisi Technology Development Co., Ltd., including "photoelectric dense display pointer paging watch, transmitter antenna, 50W transmitter, glasses and ruler (when they are at a certain angle, you can observe infinitely transmitted words)". All the above products are cheating tools highly recommended by online vendors.


    Login to the "Enterprise Information Inquiry System" of Shenzhen Administration for Industry and Commerce failed to find the relevant information of Shenzhen Weireisi Technology Development Co., Ltd.. The person in charge of the company’s surname Liu said to the author on the phone: "You have no right to know whether the enterprise is registered in the Industrial and Commercial Bureau." And said angrily: "You and I have no grievances in the past and no enmity in recent days. I hope you don’t ask for trouble."

Editor: Li Xiuwei