Dilraba "Angel Squat" rushed to the hot search, many people are learning! Doctor’s reminder

Recently, the famous actress Dilraba.

A set of angelic photos for the magazine.

Beautiful out of the circle

Source: WeChat official account "Fashion LOFFICIEL"

Many netizens

While lamenting the beauty of Reba

Also noticed.

Her photo pose

Then began to compete to imitate.

"gather together a lively.

Let’s have one too.

Dilraba Angel Squat "

"Hot this action is very difficult.

Can’t learn. "

Source: Little Red Book

soon

# Angel Squat in Dilraba

Why advise you not to learn #

Boarded a hot search

This movement has a similar pose in primary yoga, called the tiptoe squat. For people with healthy feet and knees, this is a pose to prevent human aging. In such a squat, qi and blood move back and forth, which improves the function of blood vessels, accelerates blood circulation and metabolism in the body, activates the immune system, and enables harmful and toxic metabolites to be eliminated quickly.

However, if there is pain in the ankle and you can’t stand on tiptoe, you can practice the simple squat first. If the center of gravity is unstable, or the knee hurts, you can practice against the wall first. Keep the sense of extension of the spine, don’t shrug your shoulders, and don’t buckle and evert your knees to avoid pressure and injury.

Source: Xiaohongshu @ Ouyang Chunxiao Aurora video screenshot

do what one is capable of

Someone has been injured because of this.

Previously, there had been a painful experience of women imitating the red squatting posture of the star network and causing injuries.

In 2021, Ms. Zhang (a pseudonym), who lives in Yuhua District, Changsha, accidentally saw a photo of online celebrity with a high degree of difficulty "asian squat" in her spare time on weekends. On a whim, she stood on a dining chair and imitated it. Unexpectedly, after she crouched down completely, her right knee joint, which bears the center of gravity, was not well balanced and twisted, and she fell off the stool directly.

At that time, her right knee became swollen and painful, and she could not move. She was diagnosed as "meniscus injury of right knee joint".

The doctor reminded:

This action is not as simple as it seems.

Yu Min, deputy director of the Department of Sports Medicine, Joint and Osteopathy of Changsha Central Hospital (affiliated to Nanhua University), reminded that the action of "asian squat" seems simple, but it needs the close cooperation of the four joints of waist, hip, knee and ankle, and the cooperation of many muscles of the body, especially the good core strength, the control of legs and the balance of the body, plus the flexibility of the body to make such a difficult action.

If people who have never exercised at ordinary times blindly follow the trend to do these "online celebrity moves", it will easily lead to hip joint injury, meniscus and ligament injury of knee joint, ankle sprain and so on.

What do you think of this?

The "Liuzhou No.1" video number is concerned today.

Grandpa is professional!

Reading recommendation

● Don’t be careless! A 30-year-old woman in Zhejiang was diagnosed with "beauty disease", which can seriously cause paralysis! Men will also get ● It is related to medical care, and the "Guangxi Program" starts the pilot! Liuzhou is involved in → Source/City Express, xiaoxiang morning herald, Morning News, comments from netizens, etc.

Review/Editor by Liang Jianfeng/Proofread by Jiang Bingxin/Wei Daning

Copyright belongs to the original author. If there is any infringement, please contact to delete it.

News breaking phone number: 18977221234; Contact information for promotion and cooperation: 13877213344 (WeChat with the same number)

Keep sliding to see the next one.

Dilraba "Angel Squat" rushed to the hot search, many people are learning! The doctor reminded Liuzhou Evening News to read the original text lightly.

Liuzhou Evening News likes sharing, reading and writing messages, sliding up to see the next one.

Original title: "Dilraba" Angel Squat "rushed to the hot search, many people are learning! Doctor’s reminder

Read the original text

Counting the top 15 movies in the global box office in 2018, two domestic films are on the list!

  2018 is about to pass. Who will be the best box office in the world among the films released this year? Suddenly, I found that two domestic movies have been in the top ten list for a long time. Today, Xiaobian brings you the top 15 movies at the global box office in 2018. Have you seen them all?

Fifteenth place: Solo: A Star Wars Story)— — $392 million

Ranger network

  "Ranger Solo: The Legend of Star Wars" has a domestic box office of 213 million US dollars and an international box office of 179 million US dollars, of which the domestic contribution is 15 million US dollars. It is really surprising that this movie can appear on this list, because of the polarized evaluation after the film was released. However, the loyal fans of Star Wars series still supported most of the box office of this movie, enough to appreciate the influence of Star Wars series in Europe and America.

Ranger network

  However, the performance of this film is far worse than that of the previous Star Wars series: the opening box office is lower than expected, and the box office expectation is also seriously reduced after two weeks of release. Coupled with the budget surge caused by the replacement of directors, "Ranger Solo: The Legend of Star Wars" has done its best to ensure that it will not lose money. After all, this $392 million was the box office before the split.

Ranger network

China’s research team first unveiled the mystery of Zika virus replication in the world.

CCTV News:At present, Zika virus is still spreading in parts of South America and Latin America, and there is no effective drug to inhibit the infection of this virus. Recently, the research team of Tianjin University published a paper in the international authoritative academic journal protein and Cell, saying that the mystery of Zika virus replication was uncovered for the first time, which will provide an important basis for developing anti-Zika virus drugs.

According to experts, the scientific community has not found the means to inhibit Zika virus so far, and the important reason is that it is impossible to understand the replication process and mechanism of this virus. Since February this year, the research team of Tianjin University has started a research project on Zika virus, and has achieved important research results recently.

According to Tian Hongliang, School of Life Sciences, Tianjin University:In the process of virus replication, almost all viruses need a protein called helicase. Our research team’s main work is to analyze the three-dimensional spatial structure of Zika virus helicase and the three-dimensional spatial structure of Zika virus helicase recognizing its genome.

Helicase protein

Helicase protein

This protein, called helicase, plays an important role in the first step of Zika virus replication. Because the Zika virus genome exists in a double-stranded state, it is impossible to replicate the gene in this state, so it must be split into two, and the helicase is equivalent to a pair of scissors, which can cut the genome into two pieces and achieve replication, but this pair of scissors has never been exposed before, so the mechanism of virus replication is unknown. The research results of Tianjin University’s research team reveal the three-dimensional image of a single molecule of gyrase, and thus unlock the secret of how Zika virus replicates.

Janet, a professor at the School of Life Sciences, University of Michigan, USA, who has been working on Zika virus research, said that this is crucial to stop the spread of Zika virus from the root and develop drugs against Zika virus.

【 Hazards of Zika virus 】

In 2013 and 2015, during the outbreak of Seca in French Polynesia and Brazil, it was reported that Zika virus disease might cause neurological and autoimmune complications. In the outbreak of Zika in Brazil in 2015, many newborns with microcephaly were found (the ratio of head circumference of newborns to matched children of the same sex and gestational age was lower than the average by more than two standard deviations). From May 2015 to January 2016, it was reported that 4000 pregnant women infected with Zika virus gave birth to microcephaly, which was 20 times higher than that in previous years.

[The Rio Olympics has not been affected by Zika virus so far]

Brazilian Health Minister Castro met with the ambassadors of EU member states here on February 16th, and assured them on behalf of the government that the current outbreak of Zika disease would not affect the Rio Olympic Games this year.

Part of the text comes from: Xinhua News Agency

Chen Miner emphasized in-depth implementation of the strategic plan of accelerating the construction of a strong agricultural country and solidly implementing the comprehensive promotion of rural revi

  (Reporter Yu Chunfeng, Mi Zhe, Liu Guodong) On February 20th, the rural work conference of the Municipal Party Committee and the deployment meeting of the comprehensive promotion of rural revitalization were held. Chen Miner, secretary of the Municipal Party Committee, attended the meeting and delivered a speech. He stressed that it is necessary to fully implement the spirit of the 20th Party Congress, thoroughly implement the important exposition of the Supreme Leader General Secretary on the work concerning agriculture, rural areas and farmers, conscientiously implement the arrangements of the Central Economic Work Conference and the Central Rural Work Conference, solidly implement the all-round promotion of rural revitalization, earnestly strengthen the Party’s overall leadership over the work concerning agriculture, rural areas and farmers, be confident, work hard, not miss the farming season, and not give up work, comprehensively promote rural revitalization and accelerate the pace of agricultural and rural modernization, so as to speed up the pace.

  Zhang Gong, Deputy Secretary of the Municipal Party Committee and Mayor, presided over and made work arrangements. Yu Yunlin, director of the Standing Committee of the Municipal People’s Congress, and Wang Changsong, chairman of the CPPCC attended. Relevant city leaders attended.

  In his speech, Chen Miner pointed out that the important speech of General Secretary of the Supreme Leader at the Central Rural Work Conference profoundly expounded a series of major theoretical and practical problems in comprehensively promoting rural revitalization, vigorously promoting agricultural and rural modernization and accelerating the construction of an agricultural power from the strategic overall height of building a socialist modernization power in an all-round way, and made clear the objectives, tasks, strategic priorities and main directions of the work concerning agriculture, rural areas and farmers at present and in the future, which is a scientific guide and action program for doing well the work concerning agriculture, rural areas and farmers. It is necessary to further unify thoughts and actions with the important speech of the Supreme Leader General Secretary and the spirit of the Central Rural Work Conference, deeply understand and grasp the great significance, principle requirements and strategic tasks of accelerating the construction of an agricultural power, and fully understand the important position and special significance of doing a good job in the work of agriculture, rural areas and farmers, comprehensively promoting rural revitalization and promoting agricultural and rural modernization in building a socialist modern metropolis in an all-round way. We will implement the decision-making and deployment of the CPC Central Committee in all aspects of the whole process of implementing the comprehensive promotion of rural revitalization, give full play to the distinctive advantages, fill the shortcomings of development, and ensure that the strategic deployment of accelerating the construction of an agricultural power is implemented in Tianjin and Tianjin, and it is effective.

  Chen Miner stressed that it is necessary to vigorously implement the comprehensive promotion of rural revitalization, and make overall arrangements and coordinate the promotion of rural industries, talents, culture, ecology and organization. It is necessary to highlight food security, which is the "biggest country", and make contributions to ensuring the stable and safe supply of food and important agricultural products. Do everything possible to stabilize the sown area of grain, improve the grain production capacity, strictly strengthen the protection of cultivated land, improve the income guarantee mechanism of grain farmers, enhance the circulation capacity of grain reserves, pay attention to food conservation and impairment, and strive to build a diversified food supply system. It is necessary to highlight the key task of high quality and high efficiency of agriculture and promote the upgrading of the whole chain of rural industries. Firmly grasp the development direction of modern urban agriculture, do a good job in the article of "local products", insist on winning with modernization concept, urban characteristics, quality, scientific and technological innovation, new formats, comprehensive benefits, new systems, strengthening the leading role, supplementing the chain, promoting the format and building the brand, and rely on the dual-wheel drive of science and technology and reform to promote the "one after another" of agriculture and the integrated development of rural primary, secondary and tertiary industries. It is necessary to highlight the important goal that rural areas are livable and suitable for business, and strive to build beautiful villages. Do a good job of "Yi" articles, focus on improving the completeness of rural infrastructure, the convenience of public services, and the comfort of human settlements, and create a high-quality living space that is livable and suitable for business. Do a good job of "harmony",Improve the rural governance system that combines autonomy, rule of law and rule of virtue under the leadership of party organizations, and promote family harmony, interpersonal harmony and social harmony. Do a good job of "beauty", not only shape but also cast soul, create a comfortable and pleasant rural environment, carry forward and practice the socialist core values, inherit the excellent farming culture, and shape the beauty from the outside to the inside, both in form and spirit. It is necessary to highlight the fundamental purpose of farmers’ prosperity, do everything possible to broaden the channels for farmers to increase their income, accurately support economically weak villages, carefully create demonstration villages for rural revitalization, further improve the cooperation and support between the east and the west, and promote substantial progress in common prosperity.

  Chen Miner emphasized that it is necessary to strengthen the overall leadership of the Party to carry out the comprehensive promotion of rural revitalization and do a good job in the work concerning agriculture, rural areas and farmers. It is necessary to implement the working mechanism of the "five-level secretary" to revitalize the countryside, shoulder political responsibilities, and promote the implementation of work and policies with the implementation of responsibilities. Strengthen the mass viewpoint, implement the mass line, strengthen the system concept and improve the working skills. It is necessary to build rural grassroots party organizations, enhance their political and organizational functions, continuously reduce the burden on rural grassroots cadres, and persistently rectify formalism and bureaucracy. It is necessary to strengthen investment guarantee, accelerate the formation of a diversified investment pattern with financial priority guarantee, tilted financial focus and active social participation, and truly make good use of funds and use benefits. It is necessary to strengthen the rural revitalization talent team, cultivate and make good use of local talents, and orderly guide college graduates to their hometowns, capable people to return home, migrant workers to their hometowns, and entrepreneurs to their hometowns, so that they can stay and start businesses.

  Zhang Gong stressed that it is necessary to thoroughly study and implement the important exposition of the Supreme Leader General Secretary on the work concerning agriculture, rural areas and farmers, continuously enhance the understanding and grasp of the work concerning agriculture, rural areas and farmers under the background of modernization, high-quality development and urbanization, effectively unify ideological understanding and actions with the spirit of the central government and the requirements of the municipal party committee, vigorously implement the all-round promotion of rural revitalization, and make contributions to building an agricultural power in Tianjin. We must do a good job in grain production, strengthen key core technology research, encourage agricultural business entities to accelerate development, and ensure the stable and safe supply of grain and important agricultural products. It is necessary to vigorously develop rural industries, create more brands of "Jin Nong Boutique", enlarge and strengthen the processing and circulation industry, modern service industry and rural tourism, and promote agriculture by production, agriculture by production and agriculture by production. It is necessary to strengthen rural infrastructure construction, promote environmental improvement, improve basic public service capabilities, and create livable and suitable businesses and beautiful villages. It is necessary to give full play to the leading role of party building, strengthen the construction of grass-roots party organizations, strengthen the construction of spiritual civilization, improve the governance system and enhance governance efficiency. It is necessary to strengthen the support, guarantee, supervision and assessment of the work concerning agriculture, rural areas and farmers, and promote the implementation of various tasks.

  The meeting was held in the form of video and telephone conference, and each agriculture-related area set up sub-meeting places. Responsible comrades of relevant municipal departments and departments, and responsible comrades in charge of agriculture-related areas attended the meeting at the main venue.

Capacity//CCA//Price Investigation of New Car Battery on the Market (5)

  [car home in-depth investigation] It has been a long time since the last battery investigation, and now we have picked up this topic again. The models surveyed in this issue are still several popular models listed recently, including compact cars, medium-sized cars and SUVs. Next, let’s take a look at the battery performance of these popular models!

Home of the car

Previous battery investigation articles Investigation on battery capacity of mainstream models on the market (1) See who is more practical! Investigation on batteries of mainstream models in the market (2) Investigation on batteries of mainstream cars in autonomous compact cars (3) Investigation on batteries of mainstream models of joint venture compact cars (Ⅳ)

Automobile batteries are divided into ordinary lead-acid (non-maintenance-free) batteries and maintenance-free batteries.

Home of the car

  Batteries in vehicles are divided into ordinary lead-acid (non-maintenance-free) batteries and maintenance-free batteries. Ordinary lead-acid batteries have low cost, so distilled water needs to be added regularly to supplement electrolyte for maintenance to ensure normal use. The other is a maintenance-free battery, which consumes very little electrolyte and basically does not need to be supplemented with distilled water during its service life, making it more convenient to use. The service life of general maintenance-free batteries is about 4-5 years, and the price is higher than that of ordinary lead-acid batteries. However, with the development of science and technology, some brands of lead-acid batteries have made great progress than before, and their service life is not lower than that of maintenance-free batteries, and there is no need to replenish electrolyte regularly under normal use.

How to distinguish between ordinary lead-acid and maintenance-free batteries

Nissan Dongfeng Nissan Tiida 2011 1.6L CVT Luxury Model

  Ordinary lead-acid batteries need to replenish electrolyte regularly, so there is a unscrewing liquid replenishment port at the top of the battery. On the contrary, the maintenance-free battery does not, so the surface is flat. In addition, the batteries of many vehicles in the market are placed in dust-proof boxes, and the batteries can only be seen after opening the dust-proof boxes.

Several important data of battery:

Rated voltage:In general, the voltage of household car batteries is 12V.

Capacity:It represents the amount of electricity discharged by the battery under certain conditions (discharge rate, temperature, termination voltage, etc.). Generally, the capacity unit of an automobile battery is Ah. For example, a battery with a capacity of 45Ah can continuously discharge for 45 hours if the continuous discharge current is 1A. The higher the capacity of the battery, the better, otherwise it will affect the use of automotive electrical equipment. Of course, the higher the capacity of the battery, the higher the price.

Low temperature starting current (CCA):In addition to the above two data, there is also a mark "CCA" on the battery, which indicates the starting current that the battery can provide to the engine at low temperature. That is, the value is the current discharged by the battery before the limit feed voltage when the battery is discharged at -17.8℃ for 30 seconds. For example, a 12V battery case is marked with CCA value of 450, which means that at -17.8℃, before the voltage drops to 7.2V, it can provide 450A current for 30 seconds.

At present, common standards for naming commonly used battery models:

First, based on the national GB standard, taking the battery of model 6-QAW-54a as an example, the explanation is as follows:

6: It is composed of six single-cell batteries, and the voltage of each single-cell battery is 2V, that is, the rated voltage is 12V;;
Q: indicates the purpose of the battery, Q is the battery for automobile starting, M is the battery for motorcycle, JC is the battery for ship, HK is the battery for aviation, D is the battery for electric vehicle, and F is the battery for valve control;
A and W: indicate the type of battery, A indicates dry-load battery, W indicates maintenance-free battery, and if it is not marked, it indicates ordinary battery;
54: indicates that the rated capacity of the battery is 54Ah;
Corner A means the first improvement of the original product, and corner B means the second improvement after the name, and so on. (Note: adding D after the model indicates good low-temperature starting performance, such as 6-QA-110D).

Second, based on Japanese JIS standard.For example, the meaning of battery parameters with model "38B20L" is analyzed as follows:

38: Indicates the performance parameters of the battery. The larger the number, the more power the battery can store. (Note: the numerical value has nothing to do with the capacity)
B: code indicating the width and height of the battery. The combination of the width and height of the battery is represented by one of eight letters (A to H). The closer the letter is to H, the greater the width and height of the battery.
20: indicates that the length of the battery is about 20cm.
L: indicates the position of the positive terminal. Seen from the battery pole, the positive terminal is marked R at the right end and L at the left end.

Third, based on the German DIN standardFor example, the meaning of each parameter of the battery with model "CCA 660" is analyzed as follows:

CCA: indicates low-temperature starting current.
660: indicates that the low-temperature starting current value is 660 amps.


2013 Buick Excelle

Buick GM Buick Excelle 2013 1.5L automatic exclusive type

Buick GM Buick Excelle 2013 1.5L Manual Classic

  Excelle is a veteran of the compact car market. In 2013, the manufacturer made a small change to it. Although the appearance changed little, it replaced a brand-new power system, which greatly improved its fuel economy. However, the manufacturer did not replace the battery of Excelle because of changing the power system, but still purchased the maintenance-free battery of the well-known brand ACDelco, with a capacity of 55Ah and a low-temperature starting current of 610A, which is enough for a 1.5-liter model. However, the price of this battery in Buick 4S store is not cheap, and 650 yuan is still much more expensive than the market price. In addition, the working hours in 50 yuan mean that if you choose to replace the battery for Excelle in 4S store, it will cost 700 yuan in total.

2013 Buick Angola ENCORE

Buick GM Buick Angola ENCORE2013 1.4T manual two-wheel drive enterprising

  Angola ENCORE is a small SUV launched by Buick in October 2012. Its appearance broke the market structure and further lowered the threshold of SUV, so that consumers with a budget of only 100,000 yuan can also buy a stylish, well-equipped, powerful and joint-venture SUV with a four-wheel drive system.

Buick GM Buick Angola ENCORE2013 1.4T automatic four-wheel drive flagship model

  Buick Angola ENCORE uses a power combination of 1.4T+6AT, which has good acceleration performance and smoothness. The battery it uses is also from ACDelco (the specific model is unknown), but the capacity and low-temperature starting current are different from those of Excelle. It has a capacity of 60Ah, a low-temperature starting current of 438A, a 4S shop price of 605 yuan, and a working hour fee of 665 yuan in 60 yuan, which is cheaper than Excelle.

2013 Shanghai Volkswagen New Santana

Volkswagen Shanghai Volkswagen New Santana 2013 1.6L Automatic Deluxe Edition

  Santana is a famous name for Chinese people. However, the new Santana launched in 2012 has nothing to do with the "previous generation" models in essence. It is a product from PQ25 platform, and should belong to the same level as POLO. However, due to its long body size and wheelbase, we will classify it as a compact car for the time being. It has been proved that its interior space is not less than that of most compact cars.

Volkswagen Shanghai Volkswagen New Santana 2013 1.6L Automatic Deluxe Edition

  The new Santana has two power options: 1.4-liter and 1.6-liter, and the 6AT gearbox is one of its highlights. The new Santana adopts valta 5KD 915 105C battery, which is consistent with models such as POLO and Skoda Jingrui. The capacity of this battery is 51Ah, the low-temperature starting current is 480A, the price of 4S is 622 yuan, the working time is 70 yuan, and the total cost of replacing the battery is 692 yuan. In addition, because there is a circuit board on the battery surface of Volkswagen series models, it is a little troublesome to disassemble and replace it.

2012 Speed Sharp 1.5T Model

BYD BYD Surui 2012 1.5TID automatic luxury model

  BYD is the first manufacturer in its own brand to adopt turbocharged engine and dual-clutch gearbox technology, and its brand influence has been greatly improved. Speed sharp has won the attention of the media and the public with its unprecedented remote control technology. Although there is still a lot of room for improvement in the ride comfort of the fast-sharp dual-clutch gearbox, the power of the 1.5T turbocharged engine is excellent. Coupled with its rich configuration performance, BYD Speed Sharp’s comprehensive strength is quite strong.

BYD BYD Surui 2012 1.5TID automatic luxury model

  Because of its high configuration, remote control technology and remote engine starting technology, it has higher requirements for batteries. The original factory of Surui is equipped with valta 80D26L battery, with a capacity of 70Ah and a low-temperature starting current of 600A. These parameters are completely comparable to those of medium-sized cars. However, its battery price is relatively expensive. The price quoted by the 4S shop is 654 yuan, and the total cost of replacing 30 yuan is 684 yuan.

2013 Dongfeng Citroen C4L

Citroen Dongfeng Citroen C4L2013 1.8L automatic gallop version

  Although C4L has not been listed for a long time, it has left a deep impression on people with its powerful power of 1.6T and spacious and comfortable ride. C4L is a rising star in the compact car market. Its biggest highlight is the 1.6T engine jointly developed by PSA and BMW. This engine was also awarded the title of "Top Ten International Engines in 2013" some time ago.

Citroen Dongfeng Citroen C4L2013 1.6THP Auto Smart Edition

  The battery of C4L is almost covered by a whole circuit board, so it is difficult to see the brand and parameters of the battery from the outside. Through our contact with the 4S store, we know that the battery used in C4L is no different from the previous Sega, both of which are Bosch L2-400 maintenance-free batteries, with a capacity of 60Ah and a low-temperature starting current of 640A. The price of accessories is 490 yuan and the working hours are 96 yuan, and the total price is a little more expensive than Sega.

2013 Dongfeng peugeot 3008

Peugeot Dongfeng Peugeot Peugeot Peugeot 30082013 1.6THP roland garros Edition

  3008 is the first SUV launched by Dongfeng Peugeot. From the current attention and sales volume, it should be regarded as a successful model. I think its success is first attributed to the correct positioning of the 3008 by the manufacturer. Although it is derived from the compact car platform, the space and workmanship are not worse than those of mainstream SUVs such as CR-V and Tiguan, and the price is lower than them, so it is not surprising that the 3008 sells well.

Peugeot Dongfeng Peugeot Peugeot Peugeot 30082013 1.6THP automatic version

  3008 and C4L use the same power system, so their batteries are basically the same, which has been verified in the previous Sega and 308. Under normal circumstances, Citroen or Peugeot will have two battery suppliers, Bosch and Camel. The C4L introduced above uses Bosch’s battery, and the 3008 we investigated this time just uses the camel battery of the same L2-400 model, with the same capacity and low-temperature starting current as C4L, which are 60Ah and 640A respectively. However, the price of batteries in Peugeot 4S shop is relatively cheaper, with the price of accessories in 480 yuan and the working hours in 100 yuan, totaling 580 yuan.

2013 GAC Toyota Camry

Toyota GAC Toyota Camry 2012 2.5V Extreme Navigation Edition

  The seventh generation Camry used tougher lines, which made it look younger and more athletic. However, its appearance doesn’t seem to get much recognition, so that its sales volume is not as good as before. In fact, if you carefully observe this generation of Camry, you will find that it has made great progress in appearance and interior texture. More importantly, the 6-speed automatic manual transmission has finally become the standard configuration of the 2.5-liter model (except the hybrid version). On the whole, its overall strength has been significantly improved compared with the previous generation.

Toyota GAC Toyota Camry 2012 Junrui 2.5S Atom Edition

  Japanese cars have always used local brand parts, and almost all batteries are maintenance-free. For example, Camry uses Hitachi brand non-maintenance-free batteries, with a capacity of 65Ah and a low-temperature starting current of 630A A. From the parameter point of view, this battery is not bad. In fact, 4S stores call this battery "maintenance-free and refillable", and its service life is about 4-5 years, which is equivalent to maintenance-free batteries. According to the 4S shop, this battery does not need to be added with electrolyte during its service life under normal use. However, if it is not used properly, such as when the vehicle is parked for a long time, or listening to music when the engine is turned off, this battery may lose power and need to be supplemented with electrolyte when necessary. The quotation of this battery 4S shop is 695 yuan, and the replacement time is 80 yuan, with a total cost of 775 yuan.

2013 Dongfeng Nissan Teana

Nissan Dongfeng Nissan Teana 2013 2.5L XL-NAVI Deluxe Edition

  As another best-selling Japanese car in the medium-sized car market, Teana has also undergone a generation change in the previous period. In addition to the new design of the exterior and interior, the biggest change of the new generation Teana is to replace the previous 2.5-liter V6 engine with a 2.5-liter L4 engine. Although two cylinders were reduced, the new L4 engine did not lose to the previous V6 engine in terms of parameters, and the fuel economy was improved.

Nissan Dongfeng Nissan Teana 2013 2.5L XL-NAVI Tech Smart Edition

  The new Teana adopts the non-maintenance-free battery of GS (Uni-President) brand, its capacity is 62Ah, and the low-temperature starting current is 582A. Compared with the Camry just introduced, Teana is slightly worse in battery parameters, but it will not affect the daily car. In addition, the price of battery replacement in Nissan 4S shop is slightly lower than that of Camry, in which the price of accessories is 590 yuan and the working hours are only 48 yuan.

2013 Chevrolet Mai Rui Bao

Chevrolet GM Chevrolet Mai Rui Bao 2013 2.0 Classic Edition

  Although Chevrolet Mai Rui Bao has a history of many years in the United States, it is still a young model that just debuted in China. However, in the highly competitive medium-sized car market, Mai Rui Bao has gradually gained a foothold with its balanced strength and high cost performance. It is indeed a model worthy of recommendation, because its price is comparable to that of compact cars such as sagitar, but it is an out-and-out medium-sized car.

Chevrolet GM Chevrolet Mai Rui Bao 2013 2.0 Comfort Edition

  Mai Rui Bao uses a sail brand maintenance-free battery with a capacity of 60Ah and a low-temperature starting current of 525A. This battery is priced at 452 yuan in the 4S shop, and the working hours are paid in 90 yuan, so the overall cost is not expensive.

Summary:

List of battery parameters and prices of popular models car make and model Maintenance-free? brand model Capacity (Ah) Low temperature starting current 4S shop parts price man hour fee total EXCELLE be ACDelco 86-610 55 610A 650 yuan 50 yuan 700 yuan Angola ENCORE be ACDelco -  60 438A 605 yuan 60 yuan 665 yuan New Santana be Valta 5KD 915 105C 51 480A 622 yuan 70 yuan 692 yuan Surui be Valta 80D26L 70 600A 654 yuan 30 yuan 684 yuan C4L be Bosch L2-400 60 640A 490 yuan 96 yuan 586 yuan Peugeot 3008 be camel L2-400 60 640A 480 yuan 100 yuan 580 yuan sounds of nature no Unified GS 80D23L 62 582A 590 yuan 48 yuan 638 yuan Camry no Hitachi 80D26L 65 630A 695 yuan 80 yuan 775 yuan Mairuibao be sail 13500476 60 525A 452 yuan 90 yuan 542 yuan

  At present, most family cars on the market use maintenance-free batteries, while only some Japanese manufacturers insist on using non-maintenance-free batteries. However, even today’s non-maintenance-free batteries, in fact, under normal use, there is no need for users to regularly replenish electrolyte, which is as convenient to use as maintenance-free batteries, and their service lives are similar. Judging from the models we investigated in this issue, the batteries they use can reassure consumers in terms of brand and parameters. Only with the increase of purchasing cost, the quotation of 4S stores for batteries is generally high, which is about 200 yuan on average. Therefore, we suggest that if your vehicle has exceeded the warranty period, it is more cost-effective to replace the battery in some regular auto repair shops, provided, of course, that the replaced battery must match the vehicle. (Text/Figure car home Zhang Ziyi)

Home of the car

> > Choosing a car is no longer a hassle. Click to enter the vehicle evaluation team < <

Can pre-opened coconut water be drunk? The reporter visited many supermarkets and found that …

  Recently, coconut water frequently boarded hot searches, and topics such as # Drinking pre-opened coconut into the emergency room # caused heated discussion among netizens. Some netizens reported that after drinking the pre-opened coconut water, they felt sick, vomited and had a high fever.

  Many people say that this symptom is not unique: "My friend vomited after drinking the spoiled coconut water", "After drinking it, his head was particularly painful and his stomach turned upside down" and "the shelf life of coconut is very short, and the pre-opening is very unsanitary".

  Coconut water is undoubtedly a cool and thirst-quenching product in summer. Then, can you buy pre-opened coconuts? The reporter conducted an investigation.

  Why is pre-opened coconut water "poisonous"?

  Pre-opened coconut refers to coconut that has been cut or drilled to facilitate drinking coconut juice. Because of its convenience, pre-opened coconut water is very popular with consumers, but coconut is easily contaminated by bacteria after pre-opening.

  First of all, coconut may be polluted by unclean equipment or tools during cutting and processing;

  Secondly, if the coconut is not sealed and refrigerated in time after opening, and the summer weather is hot, it is likely to lead to bacterial growth;

  Thirdly, due to improper handling during transportation or storage, if the whole cold chain is not maintained or the storage time is too long, bacteria may multiply and lead to food poisoning.

  A large number of staphylococcus aureus will make coconut deteriorate, which will lead to nausea, vomiting, abdominal pain, diarrhea and other symptoms after eating it by mistake; Pseudomonas cocoanum is more deadly, and spoiled coconuts stored for a long time may breed Pseudomonas cocoanum and produce a special toxin &mdash; &mdash; Rice yeast acid is harmful to important organs such as liver, kidney and heart. Horribly, even if heated to 100℃, it can’t destroy its toxicity. At present, there is no specific medicine in clinic, and the mortality rate of poisoning cases is as high as 50%. If you have suspicious symptoms, you should see a doctor immediately.

  There is chaos in the pre-opening coconut market.

  The reporter visited and found that at present, the pre-opened coconuts on the market have branded packaging products, and some supermarkets open their own packaging, which are sold in major supermarkets and fruit shops. But without exception, its packaging only marked the date of listing and packaging, but did not mark the shelf life.

  At present, most of the pre-opened coconuts on the market only indicate the market date and packaging date, but not the shelf life.

  The reporter asked how long is the shelf life of the pre-opened coconut? How to judge whether the pre-opened coconut has expired?

  Many supermarket clerks used excuses such as "it doesn’t expire as long as it’s on sale" and "if it’s not fresh, we’ll take it off the shelf", but they couldn’t answer the reporter’s question directly.

  Some shop assistants recommended a higher-priced "coconut egg" to the reporter, that is, a coconut with half its skin peeled. The shop assistant said that the "coconut egg" had no opening, and it was more hygienic to poke the coconut meat with a straw. The reporter saw that some "coconut eggs" were indeed marked with the date of production and shelf life (3 days), which looked more formal than pre-opened coconuts, but lacked the date of listing. The clerk couldn’t answer the question "Why are the labels of pre-packaged coconut products different?".

  Some "coconut eggs" products are marked with the date of production and shelf life, but the date of listing is missing.

  Fresh coconuts can be drunk directly after opening, but consumers should pay attention to pre-opened coconuts. It is recommended to choose a reliable merchant when buying pre-opened coconuts, check whether the appearance of coconuts is intact, and check the freshness of coconuts. It is best to pour coconut water out before drinking to distinguish whether it has deteriorated.

  Supervision is still in a gray area.

  Call for corresponding measures as soon as possible.

  How to buy a safe pre-opened coconut? Is there anyone to supervise?

  Li Shuguang, a professor at Fudan University School of Public Health, said that the pre-opened coconut does not belong to prepackaged foods yet, so there is no mandatory implementation of complete information labeling; However, because of the pre-opening treatment, it is not entirely within the scope of agricultural products. Prepackaged foods is managed by the State Administration of Market Supervision, while agricultural products are managed by the Ministry of Agriculture and Rural Affairs. However, due to the difficulty in defining its commodity attributes and supervision, the supervision of pre-opened coconuts is still in a gray area. It is precisely because there is no unified management that all kinds of packaging that consumers see in the market are determined by the merchants themselves, and there are indeed some security risks.

  Li Shuguang called on operators to be self-disciplined and earnestly safeguard the health of consumers and the reputation of brands; Consumers should enhance their risk awareness and discrimination, and buy food in formal channels; Regulators should speed up the characterization of this kind of new formats and new foods, introduce corresponding regulatory measures as soon as possible, strengthen supervision and increase the cost of violation.

  In addition, some people are worried about whether the pre-opened coconut will be added with additives. There is no ingredient list on the package, so consumers can’t check it.

  Li Shuguang believes that if only a small mouth is opened on the coconut, it is difficult for merchants to add additives from it, so consumers don’t have to worry too much; If coconut water is poured out to make coconut milk, coconut jelly and other products, food additives may be added, but there are standards for the addition of additives. As long as the products meet national standards, consumers don’t have to worry about the health hazards caused by food additives.

Beijing Municipal Education Commission Office of Network Security and Informatization Committee of Beijing Municipal Committee of the Communist Party of China Notice of Beijing Communications Administ

Jing jiao Xin [2022] No.5

District Education Committees, Yanshan Education Committee, Social Affairs Bureau of Economic Development Zone, network offices of district committees, municipal universities, directly affiliated units, mobile application distribution platforms and educational mobile Internet application providers:

  In order to conscientiously implement the relevant requirements of reducing the workload of students in compulsory education and the burden of off-campus training (hereinafter referred to as "double reduction") and promote the orderly and healthy development of educational mobile Internet applications (educational APP, hereinafter referred to as "educational mobile applications"), on the basis of the Notice of Beijing Municipal Education Commission and other eight departments on Forwarding the Opinions of the Ministry of Education and other eight departments on Guiding and Regulating the Orderly and Healthy Development of Educational Mobile Internet Applications, Further improve the working mechanism of Beijing’s educational mobile application audit and daily management, and promote the institutionalization and standardization of educational mobile application governance. After research, relevant matters are hereby notified as follows.

  I. General requirements

  In order to implement the Opinions on Further Reducing the Students’ Homework Burden and Off-campus Training Burden in Compulsory Education, the Regulations on the Management of Mobile Internet Application Information Services, the Notice of the General Office of the Ministry of Education and other six departments on changing the existing online discipline training institutions from filing to examination and approval, the Opinions of the Ministry of Education and other eight departments on guiding and standardizing the orderly and healthy development of mobile Internet applications in education, and the General Office of the Ministry of Education on promoting the management of educational mobile Internet applications Document requirements such as the Notice of Linking up with the "Double Reduction" Policy, further standardize the management of educational mobile applications, strengthen the post-event supervision of educational mobile applications in accordance with the Administrative Measures for the Filing of Educational Mobile Internet Applications, improve the service quality and guarantee level of educational mobile applications, and create a healthy, orderly and safe cyberspace and learning environment for teachers and students.

  Second, the scope of filing

  (A) the definition of educational mobile applications

  According to the requirements of the Notice of the General Office of the Ministry of Education on Printing and Distributing the Administrative Measures for Filing Educational Mobile Internet Applications, the scope of filing educational mobile applications is: "Internet mobile applications with faculty, students and parents as the main users and education and learning as the main application scenarios, serving school education, teaching and management, students’ study and life, and home-school interaction". General-purpose tool-based mobile applications that are not developed for the education system and whose main users are not for faculty and students, and that are not for the application of the education system are not included in the filing scope.

  (B) the types of educational mobile applications

  In order to implement the "double reduction" work requirements, educational mobile applications are divided into two types: discipline training (primary and secondary schools) and non-discipline training (non-primary and secondary schools).

  1. Discipline training. According to the notice of the General Office of the Ministry of Education on Further Defining the Scope of Off-campus Training in Compulsory Education (Letter No.3 from the Office of Education Supervision [2021]), the mobile application of education contains disciplines such as morality and rule of law, Chinese, history, geography, mathematics, foreign languages (English, Japanese, Russian), physics, chemistry and biology. The education mobile application that provides the above-mentioned discipline training services for compulsory education and senior high school students through the education mobile application is collectively referred to as "discipline training education mobile application for primary and secondary schools" (referred to as "discipline training").

  2. Non-disciplinary training. Mobile education applications do not contain the training contents of the above disciplines, but mainly provide sports (or sports and health), art (or music and fine arts), comprehensive practical activities (including information technology education, labor and technical education), education and teaching management, home-school communication and other contents for primary and secondary school students, and provide educational services for non-primary and secondary school students. They are collectively referred to as "mobile education applications for non-primary and secondary school discipline training" (referred to as "non-discipline training").

  (three) providers and users for the record

  Providers who belong to the above educational mobile applications shall, in accordance with the principle of "everything should be prepared", timely record the providers on the National Education Mobile Internet Application Record Management Platform (https://app.eduyun.cn/) and implement relevant requirements; As users of educational mobile applications, municipal and district education administrative departments and their subordinate units and schools at all levels should establish a selection system for educational mobile applications, select educational mobile applications that have been filed by providers, and record users in time. Education administrative departments and schools are not allowed to choose unregistered educational mobile applications, and students and parents are not allowed to charge any fees for unified selection.

  Third, the filing conditions

  Providers of educational mobile applications and their products should strictly abide by national laws and regulations, adhere to the party’s educational policy, implement the fundamental requirements of Lide Shuren, conform to the policy of "double reduction" and reflect the orientation of quality education. The content provided must not contain negative information, bad information, game links and advertisements. Establish a data guarantee mechanism covering the collection, storage, transmission and use of personal information. The collection and use of minor information shall obtain the consent and authorization of the guardian, and personal information shall not be disclosed, sold or provided to others, so as to earnestly fulfill the legal responsibility of protecting personal information and ensure the information safety of students and parents.

  (1) According to the requirements of the central "double reduction" document, those who engage in online discipline training in primary and secondary schools need to obtain online discipline training licenses for primary and secondary schools. The provider of mobile application for discipline training education must be a non-profit legal person who has obtained the school license of the provincial education administrative department, registered by the civil affairs department and established according to law, and engaged in discipline training in the online compulsory education stage.

  (2) The educational mobile application shall not provide a platform (or function) for unauthorized institutions (or individuals) to carry out discipline training.

  (3) The educational mobile application shall not provide and spread the functions such as "taking photos and searching questions" which can slow down the thinking ability of primary and secondary school students, affect students’ independent thinking and violate the laws of education and teaching.

  (4) The education mobile application provider submits the filing application through the national education mobile Internet application filing management platform as required, and the Municipal Education Commission shall review it in accordance with the Measures for the Administration of Education Mobile Internet Application Filing of the Ministry of Education and report it to the Ministry of Education for review and filing.

  (five) no longer accept pre-school online training and education mobile application for the record, has been filed to be revoked.

  (six) education mobile application providers should establish and improve the information content audit management mechanism, establish and improve account management, emergency disposal and other management measures, equipped with professionals to adapt to the scale of services, to provide business services and technical support; Formulate and publicize management rules and platform conventions, and sign service agreements with registered users; Consciously accept social supervision, set up eye-catching and convenient consultation and complaint entrances, improve the mechanisms of acceptance, disposal and feedback, and handle user demands in a timely manner.

  Fourth, strengthen collaborative supervision

  (1) The Municipal Education Commission takes the lead in reviewing the filing of educational mobile applications, is responsible for overall coordination, guiding and supervising the school to implement the main responsibility, is responsible for reviewing the content of educational mobile applications for filing, and accepts relevant social complaints and reports (see the "Notice for Complaints" on the filing management platform of educational mobile Internet applications for specific complaints and reports). For those who violate laws, regulations and policies, they will jointly carry out joint governance with relevant departments.

  (2) The Municipal Communications Administration is responsible for the filing and review of the Internet information service (ICP) for educational mobile applications, taking the license of the online off-campus training institution of the education department as the precondition for the ICP filing of the mobile application providers of discipline training education, and cooperating with the education administrative department to jointly supervise the mobile application of discipline training education in advance; For illegal education mobile applications confirmed by relevant departments, they shall be ordered to make corrections within a time limit; Those who refuse to make corrections shall be ordered to close down and do a good job of supervision afterwards.

  (3) The Information Office of the Municipal Party Committee is responsible for urging service providers of distribution platforms such as local application stores to strengthen the verification of educational mobile applications, keep abreast of the updates of educational mobile applications, and take corresponding measures in time if violations are found.

  V. Publish the black-and-white list

  The Municipal Education Commission established a publicity column on the official website, dynamically published the black-and-white list of educational mobile applications, promptly publicized the educational mobile applications and their providers that have been audited and filed, rectified within a time limit for violations of laws and regulations, blacklisted those that failed to rectify or refused to rectify within the time limit, and jointly investigated and dealt with by the Municipal Party Committee Information Office and the Municipal Administration Bureau.

Beijing Municipal Commission of Education    

Office of Network Security and Informatization Committee of Beijing Municipal Committee of the Communist Party of China    

Beijing Communications Administration Bureau    

April 27, 2022  

At the funeral scene in Yong-ha Park, fans cried, and Ji-seob So was heartbroken with a photo.

  According to Korean media reports, Yong-ha Park’s funeral ceremony was held at the Notre Dame Hospital in Gangnam, Seoul at 6: 00 am on July 2, and more than 200 fans gathered at the scene, including many fans who came from Japan specially.

  The photo of the deceased that was made public that day attracted attention. The pressure brought by career and performing arts activities and his father suffering from advanced gastric cancer made Yong-ha Park’s heart miserable, but his smile in the photo made fans and friends even more heartbroken.

  The funeral ceremony originally scheduled for 8 o’clock was held early because the funeral route of the hearse was temporarily modified, and three locations, SBS, KBS and MBC, were added. The hearse carrying Yong-ha Park’s body will pass through three major Korean TV stations and Yong-ha Park’s home, and finally go to the crematorium in Gyeonggi Province.

  When Yong-ha Park’s close friend Ji-seob So appeared with the portrait of his deceased friend in his hand, the fans at the scene said, "He smiled so brilliantly &hellip; &hellip;” I began to sob and cry.

  It is reported that Yong-ha Park’s funeral will be carried out in the form of "three-day funeral" in Buddhism, and his body will be cremated in Gyeonggi Province at 10 am after the funeral ceremony, and the urn will be placed in the Memorial Park located in Pentang, Gyeonggi Province.

More live pictures on the next page!

Analysis Report on China’s Internet Network Security Monitoring Data in the First Half of 2020

In order to fully reflect the spread of malicious programs, vulnerability risks, DDoS attacks, website security and other aspects of China’s Internet in the first half of 2020, CNCERT combed the monitoring data in the first half of the year and formed the monitoring data analysis report as follows. To download the report, please click the attachment at the end of the article.

catalogue

First, malicious programs

(A) computer malicious program capture

(2) Infection of users of computer malicious programs

(3) Malicious mobile Internet programs

(4) Malicious programs for networked smart devices

Second, security vulnerabilities

Third, denial of service attacks

(A) the active situation of attack resources

(2) The situation of large-volume attacks in China

(3) The activity of mainstream attack platforms

Fourth, website security

(A) phishing

(2) The back door of the website

(C) Web tampering

V. Cloud platform security

Six, industrial control system safety

(A) exposure of industrial control system on the Internet side

(II) Threat monitoring on the Internet side of industrial control system

(3) Information on safety loopholes of industrial control products

First, malicious programs

(A) computer malicious program capture

In the first half of 2020, about 18.15 million samples of computer malicious programs were captured, with an average daily spread of more than 4.83 million times, involving about 11,000 families of computer malicious programs. According to the statistics of communication sources, overseas malicious programs mainly come from the United States, Seychelles and Canada, and the specific distribution abroad is shown in Figure 1. Malicious programs located in China mainly come from Zhejiang, Guangdong and Beijing. According to the target IP statistics, there are about 42.08 million IP addresses attacked by computer malicious programs in China, accounting for 12.4% of the total IP addresses in China. These attacked IP addresses are mainly concentrated in Shandong Province, Jiangsu Province, Guangdong Province, Zhejiang Province, etc. The distribution of IP addresses attacked by computer malicious programs in China is shown in Figure 2.

Figure 1 Distribution of computer malicious code propagation sources outside China

Fig. 2 IP distribution under computer malicious code attack in China

(2) Infection of users of computer malicious programs

The number of hosts infected with computer malicious programs in China is about 3.04 million, up 25.7% year-on-year. About 25,000 computer malicious program control servers located abroad control about 3.03 million hosts in China. In terms of the countries or regions where the control servers belong, the number of control servers located in the United States, China, Hong Kong and the Netherlands ranks in the top three, with about 8,216, 1,478 and 1,064 respectively, with specific distribution as shown in Figure 3; In terms of the number of hosts controlled in China, the control scales of control servers located in the United States, the Netherlands and Germany rank the top three, controlling about 2.52 million, 1.27 million and 1.17 million hosts in China respectively, as shown in Figure 4. In addition, according to the sampling monitoring data, it is found that attacks against IPv6 networks have also begun to appear, and computer malicious program control servers with about 1,200 IPv6 addresses abroad have controlled about 15,000 IPv6 address hosts in China.

Fig. 3 Distribution of control terminals of overseas Trojan botnets that control hosts in China.

Figure 4 Countries or regions that control the number of TOP10 hosts in China.

From the regional distribution of the number of hosts infected with computer malicious programs in China, they are mainly distributed in Jiangsu Province (accounting for 15.3% of the infected number in China), Zhejiang Province (accounting for 11.9%), Guangdong Province (accounting for 11.6%), etc. The specific distribution is shown in Figure 5. Among botnets infected with malicious computer programs, there are 4,696 botnets with a scale of more than 100 hosts and 16 botnets with a scale of more than 100,000, as shown in Figure 6. Relevant institutions have disposed of 45 botnets with large control scale, effectively controlling the harm caused by computer malicious programs infecting the host.

Figure 5 The number of hosts infected with Trojan bots in China is distributed by region.

Figure 6 Scale distribution of botnets

(3) Malicious mobile Internet programs

Through independent capture and vendor exchange, more than 1.63 million malicious mobile Internet programs were discovered, up 58.3% year-on-year. Through the statistics of malicious behavior of malicious programs, it is found that the top three are still hooliganism, tariff consumption and information theft, accounting for 36.5%, 29.2% and 15.1% respectively. In order to effectively prevent the harm of malicious programs on the mobile Internet and strictly control the spread of malicious programs on the mobile Internet, 812 malicious programs on 125 platforms providing mobile application download services in China have been removed, effectively preventing the harm of malicious programs on the mobile Internet and strictly controlling the spread of malicious programs on the mobile Internet.

In recent years, China has gradually increased the security management of App stores and Applications, requiring App stores to conduct real-name audits of developers who put apps on the shelves, and conduct security inspections and content copyright audits on apps, which makes it more difficult for Internet black-market app stores to spread malicious apps. At the same time, however, the "edge-ball" gray applications that can evade supervision and achieve bad purposes have increased. For example, counterfeit apps with fishing purposes and fraudulent behaviors have become an important tool for illegal production, which continues to pose a greater threat to users in important industries such as finance, transportation and telecommunications. In the first half of 2020, 180 new download links of counterfeit apps were discovered through independent monitoring and complaint reporting. These counterfeit apps have the characteristics of easy copying, frequent version updates, and rapid spread of hot spots. They are mainly concentrated in popular applications such as counterfeit public security law, banking, social software, payment software, and ticketing software. The counterfeiting methods are mainly counterfeit names, icons, pages, etc., which are very deceptive. At present, because developers need to submit proof materials such as software copyright before Applying for the Application in the app store, it is difficult for counterfeit apps to be put on the app store, and its circulation channels are mainly concentrated in other online communication channels such as network disk, cloud disk and advertising platform.

(4) Malicious programs for networked smart devices

At present, there are more than 15 malicious programs active on smart devices, including Mirai, Gafgyt, Dofloo, Tsunami, Hajime, MrBlack, Mozi, PinkPot and so on. These malicious programs generally invade and control smart devices through vulnerabilities and violent cracking. After being controlled by intrusion, there are security threats and risks such as user information and device data being stolen, hardware devices being controlled and destroyed, devices being used as a springboard to attack other hosts in the intranet or launching DDoS attacks abroad. In the first half of the year, about 1.26 million malicious programs were found on smart devices, most of which belonged to Mirai family and Gafgyt family, accounting for more than 96.0%. There are more than 50,000 IP addresses in the server, and the number of IP addresses of suspected infected smart devices in China is about 920,000, which is basically the same as that in the first half of 2019, mainly located in Zhejiang, Jiangsu, Anhui, Shandong and Liaoning provinces. The accused networked smart devices launched DDoS attacks on more than 1,000 targets every day, which was basically the same as that in the first half of 2019.

Second, security vulnerabilities

The National Information Security Vulnerability Sharing Platform (CNVD) included 11,073 general security vulnerabilities, a substantial increase of 89.0% year-on-year. Among them, the number of high-risk vulnerabilities was 4,280 (accounting for 38.7%), up 108.3% year-on-year, and the number of "zero-day" vulnerabilities was 4,582 (accounting for 41.4%), up 80.7% year-on-year. Security vulnerabilities mainly cover vendors or platforms such as Google, WordPress and Oracle Bone Inscriptions. According to the statistics of the affected objects, the top three are application vulnerabilities (48.5%), Web application vulnerabilities (26.5%) and operating system vulnerabilities (10.0%), as shown in Figure 7. In the first half of 2020, CNVD handled nearly 15,000 incidents involving network security vulnerabilities such as government agencies and important information systems.

Figure 7CNVD includes statistics of security vulnerabilities classified by affected objects.

Third, denial of service attacks

Due to the characteristics of low attack cost and obvious attack effect, DDoS attack is still one of the most common and influential network security threats faced by Internet users. Sampling monitoring found that the number of high-traffic DDoS attacks with daily peak traffic exceeding 10Gbps in China was basically the same as that in 2019, with about 220 incidents.

(A) the active situation of attack resources

After continuous monitoring, analysis and disposal, the stability of available DDoS attack resources is reduced, and the number of available active resources is controlled at a low level. Cumulative monitoring found 2,379 active C&C control servers for launching DDoS attacks, of which 95.5% were located abroad, mainly from the United States, the Netherlands, Germany, etc. There are about 1.22 million active controlled hosts, of which 90.3% are from China, mainly from Jiangsu, Guangdong, Zhejiang, Shandong and Anhui provinces. There are about 8.01 million reflection attack servers, of which 67.4% are from China, mainly from Liaoning, Zhejiang, Guangdong, Jilin and Heilongjiang provinces.

(2) The situation of large-volume attacks in China

During the monitoring, it is found that the main attack methods are still TCP SYN Flood, NTP Amplification, SSDP Amplification, DNS Amplification and UDP Flood.The above five attacks accounted for 82.9%. In order to avoid traceability, attackers tend to use these attack methods which are easy to hide the attack source, and flexibly combine the attack traffic according to the protection of the attack target, and the proportion of mixed attack methods is 16.4%. In addition, with the rampant "DDoS as a service" black production mode in recent years, attackers tend to use high-traffic attacks to instantly paralyze the target network. The proportion of attacks with DDoS attack duration less than half an hour is 81.5%, and the targets are mainly located in Zhejiang, Jiangsu, Fujian, Shandong, Guangdong and Beijing, accounting for 81.1%.

(3) The activity of mainstream attack platforms

Through continuous monitoring and tracking of the activity of DDoS attack platforms, it is found that DDoS attack platforms on web pages and botnet families such as Gafgyt, Mirai, Xor, BillGates and Mayday are still active, and there are many DDoS attacks. As one of the black production modes of "DDoS as a service", the web page DDoS attack platform provides services directly to users, and users can launch attacks on their own as needed, which greatly reduces the difficulty of launching DDoS attacks and leads to further proliferation of DDoS attacks. The monitoring found that the number of DDoS attacks initiated by the web DDoS attack platform was the largest, increasing by 32.2% compared with the first half of 2019. At present, a large number of active Internet of Things devices lacking security protection on the Internet provide a large number of controlled resources for the rampant development of DDoS attack platforms, resulting in a high number of DDoS attacks. New variants of Gafgyt and Mirai malicious programs appear constantly, which keeps the number of botnet control terminals and attack events formed by them at a high level, while Xor malicious program family has obvious characteristics that it provides "DDoS as a service" black-market business, showing that it maintains a high attack frequency with a small number of control terminals.

Fourth, website security

(A) phishing

The monitoring found that there were about 19,000 counterfeit pages for websites in China. CNCERT mainly disposed of 6,226 counterfeit pages such as online business halls in the financial industry and telecommunications industry, with a year-on-year decrease of 48.1%. In the coordinated disposal of counterfeit pages, the IP address of the counterfeit page still ranks first in China and Hongkong, accounting for 74.0%. At the same time, the number of counterfeit pages on the "ETC online authentication" website on the internet has increased by spurt. After entering May, the number of phishing pages related to "ETC online authentication" accounted for as high as 61.2%, and the main IP addresses of such phishing websites are still located abroad. The forms of counterfeiting mainly include different page themes such as "ETC information authentication", "ETC online authentication" and "ETC online authentication center", and fraudsters trick users into submitting personal privacy information such as real name, bank card account number, ID number, bank reserved mobile phone number and withdrawal password.

(2) The back door of the website

About 18,000 IP addresses at home and abroad have implanted backdoors into about 35,900 websites in China, and the number of websites implanted with backdoors in China has increased by 36.9% compared with the first half of 2019. Among them, there are about 18,000 overseas IP addresses (accounting for 99.3% of all IP addresses) that have implanted backdoors into about 35,700 websites in China, with the most IP addresses located in the United States, accounting for 19.0% of the total overseas IP addresses, followed by IP addresses located in the Philippines and China, as shown in Figure 8. In terms of controlling the total number of websites in China, IP addresses located in the Philippines control the largest number of websites in China, about 13,600, followed by IP addresses located in China, Hongkong and the United States, which control 7,300 and 6,020 websites in China respectively. In addition, with the accelerated deployment of IPv6 in China, the scope of websites supporting IPv6 is expanding. In addition, there were 592 backdoor incidents of websites whose attack source and target were IPv6 addresses, involving a total of 35 attack source IPv6 addresses and 72 domain names of attacked IPv6 address resolution websites.

Figure 8 TOP10 of the country or region where the backdoor IP address is implanted into the website in China from overseas.

(C) Web tampering

There are about 74,000 websites that have been tampered with in China, including 318 government websites that have been tampered with. Judging from the distribution of top-level domain names of tampered web pages in China, ".com", ".net" and ".org" still rank in the top three, accounting for 74.1%, 5.1% and 1.7% of the total respectively, as shown in Figure 9.

Figure 9 Distribution of tampered websites in China by top-level domain name

V. Cloud platform security

The situation of network security threats on China’s cloud platforms is still grim. First of all, the proportion of all kinds of network security incidents that occurred on the mainstream cloud platforms in China is still high. Among them, the number of DDoS attacks on the cloud platform accounts for 76.1% of the attacks on domestic targets, the number of embedded backdoor links accounts for 90.3% of all embedded backdoor links in China, and the number of tampered pages accounts for 93.2% of the number of tampered pages in China. Secondly, attackers often use China’s cloud platform to launch cyber attacks. Among them, the number of DDoS attacks initiated by the cloud platform as the control terminal accounts for 79.0% of the number of DDoS attacks initiated by domestic control, the number of IP addresses of controlled terminals controlled by malicious programs such as Trojans and botnets accounts for 96.3% of all IP addresses of controlled terminals in China, and the number of malicious programs carried by them accounts for 79.0% of the number of malicious programs carried on the domestic Internet.

Six, industrial control system safety

(A) exposure of industrial control system on the Internet side

Monitoring found that 4,630 industrial devices were exposed to the Internet, involving 47 types of devices, such as programmable logic controllers, intelligent buildings and data acquisition, from 35 domestic and foreign manufacturers. The specific types are shown in Figure 10. Among them, the equipment with high-risk vulnerabilities accounts for about 41%. The monitoring found 480 sets of networked monitoring and management systems exposed in key industries such as electric power, oil and gas, urban rail transit, etc., including 262 sets of electric power, 118 sets of oil and gas, and 100 sets of urban rail transit. The types involved include government supervision platform, remote monitoring, asset management, engineering safety, data detection system, pipe network dispatching system, OA system, cloud platform, etc. The specific platform types are shown in Figure 11. Among them, about 11.1% systems have high-risk vulnerabilities such as information leakage, cross-site request forgery and improper input verification. Once the industrial control system exposed to the Internet is attacked, it will seriously threaten the safety of the production system.

Fig. 10 Type statistics of networked industrial equipment discovered by monitoring.

Figure 11 Statistics on the types of networked monitoring management systems in key industries discovered by monitoring.

(II) Threat monitoring on the Internet side of industrial control system

The network assets of domestic industrial control systems continue to be scanned and sniffed from abroad, with an average of more than 20,000 times a day. Through analysis, the sniffing behavior originated from 90 countries such as the United States, Britain and Germany, and the target involved networked industrial control equipment and systems in key industries such as energy, manufacturing and communication. A large number of network assets information of key information infrastructure and its networked control system are sniffed abroad, which brings hidden dangers to cyberspace security in China. China’s large industrial cloud platforms, such as Genyun, Aerospace Cloud, OneNET, COSMOPlat, Aopu Cloud and Jizhiyun, continue to suffer from network attacks from abroad, with an average number of attacks of 114 times per day, up 27% year-on-year. The types of attacks are shown in Figure 12, involving remote code execution, denial of service, Web vulnerability exploitation, etc. Industrial cloud platforms carry a large number of access devices, business systems, as well as enterprise, personal information and important data.

Figure 12 Type distribution of attack events of industrial cloud platform

(3) Information on safety loopholes of industrial control products

The four vulnerability platforms of CNVD, CVE, NVD and CNNVD newly included 323 vulnerabilities of industrial control system products, of which high, medium and dangerous vulnerabilities accounted for 94.7%. As shown in Figure 13 and Figure 14, the products affected by the vulnerability are widely used in key information infrastructure industries such as manufacturing, energy, water treatment, information technology, chemical industry, transportation, commercial facilities, agriculture, water conservancy projects, government agencies, etc. The product suppliers involved in the vulnerability mainly include ABB, Wanke, Siemens, Advantech, Schneider, Mossa, Mitsubishi, Haiwei, Asia Control and Yonghong.

Figure 13 Industrial distribution of new industrial control product vulnerabilities TOP10 (Note: products affected by vulnerabilities can be applied to multiple industries)

Figure 14 Supplier Distribution of Newly Added Industrial Control Product Vulnerabilities TOP1

Attachment: Analysis Report on China’s Internet Network Security Monitoring Data in the First Half of 2020

Aauto Quicker’s 20,000-30,000 second-hand electric vehicles are on sale, and the "naked swimming" of electric vehicles behind the "cemetery" of new energy vehicles has begun.

According to Hualong. com, chefs don’t wear masks, and the kitchen is messy … In the future, in Jiangbei District, these "bad habits" of catering will be captured by AI and monitored in real time. On the 2nd, Hualong. com reporter learned from Jiangbei District Market Supervision Bureau that the big data smart supervision platform developed by the bureau for half a year was officially put into trial operation, which marked that the smart market supervision in Jiangbei District has entered a new level. The platform mainly covers three major areas: sunshine catering+intelligent supervision, unlicensed and lost enterprise management, and intelligent elevator management. It is the first platform in the city to capture 13 kinds of violations common in catering by artificial intelligence.

Dining enterprises in canteens are equipped with "clairvoyance" to guard the safety on the tip of the tongue.

The reporter saw at the scene that on the sunshine catering+smart supervision system, through remote inspections, the school’s back kitchen, rough machining room and cooking room; The production workshops, inspection rooms, etc. of food enterprises can be seen at a glance. Through the Sunshine Catering APP, the real-time situation of the kitchen, restaurant information and user satisfaction included in the monitoring restaurant can also be known in time. This means that in the operating rooms of catering enterprises, school canteens and food enterprises, once food is placed on the ground at will and chefs do not wear masks, it may be captured by artificial intelligence.

"This is equivalent to installing a’ clairvoyance’ for restaurant enterprises and canteens, which will better protect the safety on the tip of the tongue." According to the relevant person in charge of the Jiangbei District Market Supervision Bureau, at present, the number of catering units in Jiangbei District has increased to more than 6,500, but the number of supervisors has not increased. There are many regulatory targets and the regulatory pressure is greater, while the Sunshine Catering+Smart Supervision System has well alleviated this problem.

According to the person in charge, at present, 79 school canteens, 44 food production units, 12 old-age care institutions, and 73 catering business units in Jiangbei District Food Safety Demonstration Street (Jiujie) have installed intelligent monitoring, which is included in the Sunshine Catering+Smart Supervision System, which can automatically capture 13 common violations such as not wearing masks, messy kitchens and irregular food stacking.

"This not only provides reliable image information for our supervision and law enforcement, but also exposes some monitoring contents to the Internet, so that parents, family members and consumers can fully participate in supervision and form a good situation of food safety and social co-governance." According to the person in charge, for example, diners can directly report and reflect through the "Direct Person in Charge" column on the APP if they find that the restaurant company has violated the rules.

"Smart" Supervision and Construction of "1+2+3+N" Mode

In fact, the Sunshine Catering+Smart Supervision System is only the "tip of the iceberg" of the big data smart supervision platform in Jiangbei District. The platform also mainly covers the management of unlicensed and lost enterprises, intelligent elevator management and other fields. The overall concept of the platform construction is "intelligence, integration and judgment", and the overall framework is built with the mode of "1+2+3+N".

"1" means to build a big data command center with a giant LED screen of more than 200 inches, which can undertake many tasks such as data analysis, emergency command and conference reception; "2" refers to the construction of two comprehensive platforms: analysis and display and risk early warning; "3" refers to the establishment of three special supervision systems: unlicensed and lost enterprise management, sunshine catering+smart supervision and intelligent elevator management.

According to reports, the unlicensed and lost enterprise management system searches for the contact information of the lost enterprise and its senior management through data exchange and internal integration, so as to realize "one loss and multiple searches". The system realizes the whole-process electronic management of unlicensed business activities supervised by the system, and the whole-process electronic transfer of unlicensed business clues such as black hotels supervised by other departments. At present, the system has transferred more than 20 clues to public security and health departments.

The intelligent elevator supervision system can realize the functions of elevator fault statistical analysis, elevator rescue, appeasement and monitoring, and electronic elevator maintenance management. The relevant person in charge of the Jiangbei District Market Supervision Bureau said that at present, sensors and cameras are installed for 480 elevators in old communities with a service life of more than 15 years, which are included in the scope of system supervision. "If there are many trapped incidents and fault incidents in elevators, they will be closely monitored. At the same time, the behavior of’ falsification’ in elevator maintenance in the past will also be effectively suppressed. "

"N" refers to the integration of N data of various business systems in use. Make full use of information technologies such as cloud computing and data capture, and fully integrate 50 business systems in use, such as enterprise registration, food risk management and control, and medical device management, to break down data barriers and strengthen data integration and flow.

In March this year, it was put into use to bring more high-risk points into the platform supervision.

The person in charge said that the construction of this platform aims to realize the intelligent supervision of "more comprehensive market players, clearer risk awareness and more effective market supervision". Jiangbei District Market Supervision Bureau will steadily push forward the trial operation of the platform and put it into use in mid-March.

The person in charge said that in the next step, the Jiangbei District Market Supervision Bureau will intensify the platform upgrade, improve the scoring system and raise the self-discipline awareness of operators. On the basis of the existing platform construction, we will continuously expand the scope of platform supervision, include all kindergartens, major catering concentrated areas and high-risk points in the whole district, actively explore the smart supervision of farmers’ markets, and promote the new achievements in the supervision of big data smart markets in Jiangbei.

Hualong.com reporter Li Huaqiao

Original title: Chongqing’s first AI capture food and beverage violation system appeared in "Clairvoyance" to capture these food and beverage habits.

[Disclaimer] The texts, pictures, audio and video that are not marked with "Source: Upstream News-chongqing morning post" or "Upstream News LOGO" on the upstream news client are all reposted. If the reposted manuscript involves copyright issues, please contact the upstream news.