binary dead train
Chapter 252
Chapter 252
Turing once again manifested the small cage of the Geller Steen brand to lock the fly in, and carried the pink fly into a portal.
"The Crohn Technology Exhibition is a builder capital event held every six months. The initiator is the Crohn United Group, but it is jointly organized by multiple forces participating in the black market. In addition to the United Group, there are nine other And the people from the Crime Policy Bureau, as well as some other builder capital."
The flies that temporarily made a deal with Turing began to inform Turing about the Crohn Technology Exhibition.
"Science and technology exhibitions are used to discuss the latest technology, product releases of black market capital, technical exchanges and cooperation between different companies. Some conflicts are even specially selected on this day to resolve problems through negotiations."
The pink fly was succinct, and Turing soon had a rough outline in his mind:
It's like a commercial exhibition in the dark world, but it's not as simple as a commercial event.
Turing looked up and saw that one person and one fly had arrived at the center of this cyberspace—that super-large building.
The reason why he came here was a proposal from Turing after he reached a brief cooperation agreement with the fly.
"So, there will be a lot of cutting-edge technology and trial technology in the black market released at the Crohn's exhibition?"
"That's right." The fly's answer was crisp and short. The fly with this personality no longer had the slightly cute feeling before, nor did it show any reaction to Turing's "ignorance". It's not worth saying a few more words.
And it seems that because the fly promised something more important than the information of the Crohn Technology Exhibition in the cooperation, it has no intention of hiding it at all.
"Now we have reached the central building, what then?" Turing brought the topic back to the present.
"We can generate a BUG (vulnerability) troubleshooting program that will take us to find the loopholes in this cyberspace to enter the deep data, and then find the loopholes in the deep data, and control the entire security system by implanting background programs, so that we When you take the 'schoolbag' away, you won't be hunted down by the security system, and you can directly locate the hacker, but you need to let us out now."
"Let you out?" Turing smiled back.
It means don't even think about it.
"We have already fulfilled part of our promise, and it's time for you to show your sincerity. We will not leave, but will teach you the source code of the vulnerability troubleshooting program in accordance with the terms of the cooperation, as well as the method of implanting a Trojan horse."
"Letting you out now is not in the verbal terms of our cooperation. Since you are so powerful, why didn't you choose to escape into the deep data first when I unbind the program?" Turing lifted the cage to the level of his head position, tap lightly.
"Vulnerability investigation will take a certain amount of time, otherwise we would have escaped from the hands of the security guards. If you don't want to, then I won't say anything."
The fly's attitude was still tough, and Turing squinted his eyes to look at the guy, and put the cage down.
There is no basis for trust between the two parties, and it is difficult to cooperate, but fortunately, Turing has already obtained part of the information he wants.
Before Pink Fly proposed to him the plan to enter the deep network, he told him the basic structure of cyberspace.
Cyberspace is a virtual reality space created by the bismuth network as a programming language framework, and is divided into two levels: surface space and deep network.
The surface space is where Turing is now, and the deep network, in the words of the flies, is more like Turing's feeling after using the molecular deciphering line to enter the data. Looking directly at the data itself, it is also the underlying code that builds the entire network space. , in other words highly encrypted system files. The "small school bag" was also stolen from it by flies.
To enter the cyberspace, the fly mentioned a brain connection technology called "brain-computer interface plug".In the mouth of the fly, this technology is standard for every hacker, and it seems that it acquiesced that Turing used this technology to enter cyberspace, and did not say anything more about it.
But Turing himself knew very well that he entered the cyberspace using the [brain wave hacking synapse] climbed from the [molecular deciphering line].Compared with the flies that can only fly in the air and spray tears to attack, and the little young ghosts who hacked in with various concrete programs, Turing is very clear that [brainwave hacking into synapses] has the significance in this space. unique ability.
At least it is much more powerful than the software programs of these two guys.
Turing ignored the flies, but explored the bismuth network data, trying to open a portal directly to deep space, but failed.
"The only way to enter the deep space is to use the software brought in to find loopholes, and then use the software to check and exploit the loopholes." The voice of the fly came from the cage, and there was a hint of sarcasm in Gujing Wubo's tone.
But Turing ignored it, closed his eyes and sensed his real body, trying to further stimulate brainwaves to hack into the synapses.
When Turing opened his eyes again, the scene in front of him suddenly collapsed and turned into pure green binary data arranged in front of him.
They vary in size and flow densely.Some rushed wildly like a waterfall, while others fluctuated slightly like a pool of stagnant water.
Turing looked at the fly on the side. Unlike other data around him, the data that made up the fly was densely packed and flowing quickly. It seemed to stand out from the crowd in a world of binary data.
"I'm curious, since you've got the 'school bag' before, why didn't you write down the contents and evacuate directly?" Looking at the dense green data in front of him, Turing expressed his doubts to the fly.
"Except for the highest user group, deep-level data cannot be directly read by users, and it needs to be taken out of the cyberspace for data deciphering. This is common sense." The fly glanced at Turing, and a flash of light seemed to flash in its big black compound eyes. despise.
The fly was right.
Even Turing's current state can't directly recognize the meaning of these data in his own terminal. According to the basic structure of cyberspace disclosed by the pink fly before, hackers are equal to hackers. When entering space, they will forge a fake user group for themselves. Although it will still trigger the alarm of the network ice wall, it will not cause the internal system to directly locate them unless they encounter security guards (antivirus software).
But here comes the problem again, Turing didn't do this, he came in directly through the crack in the ghost's ice wall.
And compared to these hackers who play with software, Turing relies on hardware (brainwave hacking into synapses).
In Turing's eyes, although these data are still unreadable, changes in these data can be clearly observed.
And where there is an exception, that is where the data conflicts, and the system loopholes.
Holding the fly in his hand, Turing opened the portal and walked into the building. In the eyes of the fly, the two of them came to the inside of the building, but in Turing's eyes, he stood directly at a location with abnormal data, and then Stretched his hand directly in, creating a new portal.
Under the astonished eyes of the flies, the two fell into a completely dark space, which was composed of a large number of crawling bottom-level data.In its big compound eyes looking at Turing, it is full of disbelief:
"You... how did you do it?"
It seems that Turing's approach is too shocking. In this state, the originally emotionless tone of the fly fluctuates with an unusually obvious trill.
"I observed the leak, and I got in, simple as that."
"This is impossible! You don't have any deciphering software on you!!"
But I have "plugin" hardware.
Turing replied to the fly in his mind.
"So, how to take over the safety protection system?" Turing raised the small cage, but the flies fell silent again.
Turing chuckled and began to find a way by himself.
The brainwave hacking synapse comes from the central "cylinder brain" device of the carbon-based destroyer, which is a hardware device used to connect the human brain inside the cylinder brain to the entire mechanical body.
After being used by Turing for hacking purposes, he believed that there were still many functions of this thing that he had not developed, and Turing trusted his technology tree more than the "technical support" of the fly.When it comes to playing with data, Turing believes that this fly hacker must be more skilled than himself, and he will be tricked if he is not careful.
And if I spend all this time here, the fly won't just sit around and die if it can't find its "little schoolbag".But for me, all of this is just an unexpected gain in the process of testing new technology.
It will compromise.
After entering the deep network, Turing quickly found the location of the data anomaly, and then heard the vicious and soft voice of the fly coming from the cage:
"I'll teach you how to write background software, and the cooperation will continue."
The point of hacking into a system is to find vulnerabilities, not create them.
In its view, this fat guy with top-notch bug-finding ability will soon find the loopholes in the deep data. Even if he doesn't use the background program and casually destroys inside, the security guards outside will be wiped out sooner or later. An action that does not provide value must end badly.
The flies can only compromise.
……
On the street constructed by cyberspace, the ghost is trying to open the small pink schoolbag in his hand while running away rapidly.
"...This thing is indeed directly stolen from the deep data, and it must be decoded and deciphered after returning to reality. It seems that the fly is not a hacker to mess with... I have to go back and enter this area Run out of the port position of the space."
Whispering to himself, Ghost hung the small pink schoolbag on his shoulder, and traced the program path he had come through through the goggles on his head that looked like night vision goggles.
At this moment, a security guard rushed out from the alley in front of him, raised the muzzle of the gun in his hand, and the ghost trembled, but his feet did not stop at all.With a flash of noise, the old-fashioned small pistol appeared in his hand.
But the moment he raised his pistol and pointed it at the security guard, the security guard trembled, dense blue arcs flashed all over his body, and the red light on his entire face suddenly turned yellow.
Then, the security guards put away their guns, entered a vigilant posture and swayed around the ghost, not intending to attack him at all.
"Something went wrong?"
Ghosting said subconsciously, then shook his head violently.
The robots here are all the realization of the security system, how could there be individual failures.
It can only be that the safety system has failed.
The fly was trapped by the security system, and the fat man who made trouble before was hit by his own attack program. Even if he didn't become cerebral palsy, the plug should have burned out.
So the only conclusion is that either the fly has escaped or there are other hackers here.
As for the abnormality of the security program involving deep data, based on Ghost Shadow's hacking experience, it will take a long time to complete the hacking of deep data, so the conclusion must be the latter.
"Although I don't know what the name of this cyber black market is, someone actually entered the deep network to hack the entire security system..."
Ghosting ignored the malfunctioning anti-virus program before, and also found that the anti-virus program that was chasing him before had entered a state of alert that would not trigger alarms and chases, which further confirmed his guess.
All the security guards were down, and his escape route was completely unobstructed.
"Hackers who can hack the security system have appeared... Although I can do it in a few months, this place is really not easy. The data I have in my hand must be hiding something very interesting !"
The unimpeded ghost figure soon came to an empty street.
He threw away the pistol casually, pulled out a hand drill amidst a burst of noise and flickering, pointed at the space in front of him, and "squeaked" the spiral. Soon, a large piece of debris fell into the air, revealing the white blank cyberspace behind. .
The ghost jumped out, and immediately rolled down into the cyberspace outside. As soon as a tumble stood up halfway, he saw a familiar pistol pressed against his forehead.
He froze on the spot.
Not only because of this sudden incident, but also because of the familiar fat man and the gun in his hand.
Ghost Ying opened his mouth, but before he could say anything, he heard a gunshot, a bullet hole appeared in his forehead, and his figure fell heavily to the ground.
Watching the ghost of the body gradually dissipate, Turing imitated the other party's previous appearance in the ghost's remaining sight, blew at the small broken gun of the embodied program, and threw it away in a illusory variegation, and then He picked up the small pink schoolbag on the ground.
"You should let me out." The fly stared at Turing.
"But there's only one copy of this thing."
"Don't make excuses, copy and paste."
"That's right." Turing nodded, turning the small schoolbag in his hand into two copies, thinking about the remaining value of the fly beside him in his mind, and then finally lifted the blockade on the fly.
There's no need to kill them, and it's not necessary to make a big hatred. The cooperation is worthwhile. The other party is a hacker. This is an area Turing is not good at at present, and there are more values that can be tapped, provided the contact information is obtained.
The fly rushed out, picked up the small schoolbag at an extremely fast speed, and the whole body flickered with colorful noises.
After breaking away from the inside of the ice wall, it seemed to directly choose to go offline with the data, and didn't want to stay with Turing for a moment.
"Why are you in such a hurry? Why don't you leave a contact information, and we will have the opportunity to work together in the future."
The figure of the fly disappeared instantly.
Turing shrugged, looking at the small schoolbag in his hand with some pity in his heart, and prepared to return to the terminal space.But at this moment, the figure of the pink fly reappeared, and after throwing something that looked like a glass plate at Turing's feet, it disappeared again.
This scene made Turing a little dazed, and picked up the glass plate on the ground.
A string of numbers starting with "NED" floated on it, and I don't know what kind of software it is for.Turing narrowed his eyes and returned to the supervisor terminal.
Quickly unpacking the small schoolbag in his hand, and turning it into a book in the shape of Geller Steen's animal skin notes according to Turing's preference, Turing quickly took the text inside his eyes.
But what he didn't notice was that at the bottom of the animal skin notebook, there was a small light spot, which was flashing a light red light.
……
……
……
Ye State University.
A young man from Makukura, who seemed to have just experienced an electric explosion, was staring at the screen with his eyes straight.
"Damn guy... dare to use my gun to kill me... Fortunately, I left a reptile virus... huh? I made a copy? It seems that the fly and the fat man conspired against me... Let me see this The true location of the two guys..."
The young man touched the burnt tip of the brain-computer interface on the back of his head, and took a sip of the Fat House Happy Water on the table rather unhappily.
This one is not divided into chapters.Please remind me in time if there is a text problem
(End of this chapter)
Turing once again manifested the small cage of the Geller Steen brand to lock the fly in, and carried the pink fly into a portal.
"The Crohn Technology Exhibition is a builder capital event held every six months. The initiator is the Crohn United Group, but it is jointly organized by multiple forces participating in the black market. In addition to the United Group, there are nine other And the people from the Crime Policy Bureau, as well as some other builder capital."
The flies that temporarily made a deal with Turing began to inform Turing about the Crohn Technology Exhibition.
"Science and technology exhibitions are used to discuss the latest technology, product releases of black market capital, technical exchanges and cooperation between different companies. Some conflicts are even specially selected on this day to resolve problems through negotiations."
The pink fly was succinct, and Turing soon had a rough outline in his mind:
It's like a commercial exhibition in the dark world, but it's not as simple as a commercial event.
Turing looked up and saw that one person and one fly had arrived at the center of this cyberspace—that super-large building.
The reason why he came here was a proposal from Turing after he reached a brief cooperation agreement with the fly.
"So, there will be a lot of cutting-edge technology and trial technology in the black market released at the Crohn's exhibition?"
"That's right." The fly's answer was crisp and short. The fly with this personality no longer had the slightly cute feeling before, nor did it show any reaction to Turing's "ignorance". It's not worth saying a few more words.
And it seems that because the fly promised something more important than the information of the Crohn Technology Exhibition in the cooperation, it has no intention of hiding it at all.
"Now we have reached the central building, what then?" Turing brought the topic back to the present.
"We can generate a BUG (vulnerability) troubleshooting program that will take us to find the loopholes in this cyberspace to enter the deep data, and then find the loopholes in the deep data, and control the entire security system by implanting background programs, so that we When you take the 'schoolbag' away, you won't be hunted down by the security system, and you can directly locate the hacker, but you need to let us out now."
"Let you out?" Turing smiled back.
It means don't even think about it.
"We have already fulfilled part of our promise, and it's time for you to show your sincerity. We will not leave, but will teach you the source code of the vulnerability troubleshooting program in accordance with the terms of the cooperation, as well as the method of implanting a Trojan horse."
"Letting you out now is not in the verbal terms of our cooperation. Since you are so powerful, why didn't you choose to escape into the deep data first when I unbind the program?" Turing lifted the cage to the level of his head position, tap lightly.
"Vulnerability investigation will take a certain amount of time, otherwise we would have escaped from the hands of the security guards. If you don't want to, then I won't say anything."
The fly's attitude was still tough, and Turing squinted his eyes to look at the guy, and put the cage down.
There is no basis for trust between the two parties, and it is difficult to cooperate, but fortunately, Turing has already obtained part of the information he wants.
Before Pink Fly proposed to him the plan to enter the deep network, he told him the basic structure of cyberspace.
Cyberspace is a virtual reality space created by the bismuth network as a programming language framework, and is divided into two levels: surface space and deep network.
The surface space is where Turing is now, and the deep network, in the words of the flies, is more like Turing's feeling after using the molecular deciphering line to enter the data. Looking directly at the data itself, it is also the underlying code that builds the entire network space. , in other words highly encrypted system files. The "small school bag" was also stolen from it by flies.
To enter the cyberspace, the fly mentioned a brain connection technology called "brain-computer interface plug".In the mouth of the fly, this technology is standard for every hacker, and it seems that it acquiesced that Turing used this technology to enter cyberspace, and did not say anything more about it.
But Turing himself knew very well that he entered the cyberspace using the [brain wave hacking synapse] climbed from the [molecular deciphering line].Compared with the flies that can only fly in the air and spray tears to attack, and the little young ghosts who hacked in with various concrete programs, Turing is very clear that [brainwave hacking into synapses] has the significance in this space. unique ability.
At least it is much more powerful than the software programs of these two guys.
Turing ignored the flies, but explored the bismuth network data, trying to open a portal directly to deep space, but failed.
"The only way to enter the deep space is to use the software brought in to find loopholes, and then use the software to check and exploit the loopholes." The voice of the fly came from the cage, and there was a hint of sarcasm in Gujing Wubo's tone.
But Turing ignored it, closed his eyes and sensed his real body, trying to further stimulate brainwaves to hack into the synapses.
When Turing opened his eyes again, the scene in front of him suddenly collapsed and turned into pure green binary data arranged in front of him.
They vary in size and flow densely.Some rushed wildly like a waterfall, while others fluctuated slightly like a pool of stagnant water.
Turing looked at the fly on the side. Unlike other data around him, the data that made up the fly was densely packed and flowing quickly. It seemed to stand out from the crowd in a world of binary data.
"I'm curious, since you've got the 'school bag' before, why didn't you write down the contents and evacuate directly?" Looking at the dense green data in front of him, Turing expressed his doubts to the fly.
"Except for the highest user group, deep-level data cannot be directly read by users, and it needs to be taken out of the cyberspace for data deciphering. This is common sense." The fly glanced at Turing, and a flash of light seemed to flash in its big black compound eyes. despise.
The fly was right.
Even Turing's current state can't directly recognize the meaning of these data in his own terminal. According to the basic structure of cyberspace disclosed by the pink fly before, hackers are equal to hackers. When entering space, they will forge a fake user group for themselves. Although it will still trigger the alarm of the network ice wall, it will not cause the internal system to directly locate them unless they encounter security guards (antivirus software).
But here comes the problem again, Turing didn't do this, he came in directly through the crack in the ghost's ice wall.
And compared to these hackers who play with software, Turing relies on hardware (brainwave hacking into synapses).
In Turing's eyes, although these data are still unreadable, changes in these data can be clearly observed.
And where there is an exception, that is where the data conflicts, and the system loopholes.
Holding the fly in his hand, Turing opened the portal and walked into the building. In the eyes of the fly, the two of them came to the inside of the building, but in Turing's eyes, he stood directly at a location with abnormal data, and then Stretched his hand directly in, creating a new portal.
Under the astonished eyes of the flies, the two fell into a completely dark space, which was composed of a large number of crawling bottom-level data.In its big compound eyes looking at Turing, it is full of disbelief:
"You... how did you do it?"
It seems that Turing's approach is too shocking. In this state, the originally emotionless tone of the fly fluctuates with an unusually obvious trill.
"I observed the leak, and I got in, simple as that."
"This is impossible! You don't have any deciphering software on you!!"
But I have "plugin" hardware.
Turing replied to the fly in his mind.
"So, how to take over the safety protection system?" Turing raised the small cage, but the flies fell silent again.
Turing chuckled and began to find a way by himself.
The brainwave hacking synapse comes from the central "cylinder brain" device of the carbon-based destroyer, which is a hardware device used to connect the human brain inside the cylinder brain to the entire mechanical body.
After being used by Turing for hacking purposes, he believed that there were still many functions of this thing that he had not developed, and Turing trusted his technology tree more than the "technical support" of the fly.When it comes to playing with data, Turing believes that this fly hacker must be more skilled than himself, and he will be tricked if he is not careful.
And if I spend all this time here, the fly won't just sit around and die if it can't find its "little schoolbag".But for me, all of this is just an unexpected gain in the process of testing new technology.
It will compromise.
After entering the deep network, Turing quickly found the location of the data anomaly, and then heard the vicious and soft voice of the fly coming from the cage:
"I'll teach you how to write background software, and the cooperation will continue."
The point of hacking into a system is to find vulnerabilities, not create them.
In its view, this fat guy with top-notch bug-finding ability will soon find the loopholes in the deep data. Even if he doesn't use the background program and casually destroys inside, the security guards outside will be wiped out sooner or later. An action that does not provide value must end badly.
The flies can only compromise.
……
On the street constructed by cyberspace, the ghost is trying to open the small pink schoolbag in his hand while running away rapidly.
"...This thing is indeed directly stolen from the deep data, and it must be decoded and deciphered after returning to reality. It seems that the fly is not a hacker to mess with... I have to go back and enter this area Run out of the port position of the space."
Whispering to himself, Ghost hung the small pink schoolbag on his shoulder, and traced the program path he had come through through the goggles on his head that looked like night vision goggles.
At this moment, a security guard rushed out from the alley in front of him, raised the muzzle of the gun in his hand, and the ghost trembled, but his feet did not stop at all.With a flash of noise, the old-fashioned small pistol appeared in his hand.
But the moment he raised his pistol and pointed it at the security guard, the security guard trembled, dense blue arcs flashed all over his body, and the red light on his entire face suddenly turned yellow.
Then, the security guards put away their guns, entered a vigilant posture and swayed around the ghost, not intending to attack him at all.
"Something went wrong?"
Ghosting said subconsciously, then shook his head violently.
The robots here are all the realization of the security system, how could there be individual failures.
It can only be that the safety system has failed.
The fly was trapped by the security system, and the fat man who made trouble before was hit by his own attack program. Even if he didn't become cerebral palsy, the plug should have burned out.
So the only conclusion is that either the fly has escaped or there are other hackers here.
As for the abnormality of the security program involving deep data, based on Ghost Shadow's hacking experience, it will take a long time to complete the hacking of deep data, so the conclusion must be the latter.
"Although I don't know what the name of this cyber black market is, someone actually entered the deep network to hack the entire security system..."
Ghosting ignored the malfunctioning anti-virus program before, and also found that the anti-virus program that was chasing him before had entered a state of alert that would not trigger alarms and chases, which further confirmed his guess.
All the security guards were down, and his escape route was completely unobstructed.
"Hackers who can hack the security system have appeared... Although I can do it in a few months, this place is really not easy. The data I have in my hand must be hiding something very interesting !"
The unimpeded ghost figure soon came to an empty street.
He threw away the pistol casually, pulled out a hand drill amidst a burst of noise and flickering, pointed at the space in front of him, and "squeaked" the spiral. Soon, a large piece of debris fell into the air, revealing the white blank cyberspace behind. .
The ghost jumped out, and immediately rolled down into the cyberspace outside. As soon as a tumble stood up halfway, he saw a familiar pistol pressed against his forehead.
He froze on the spot.
Not only because of this sudden incident, but also because of the familiar fat man and the gun in his hand.
Ghost Ying opened his mouth, but before he could say anything, he heard a gunshot, a bullet hole appeared in his forehead, and his figure fell heavily to the ground.
Watching the ghost of the body gradually dissipate, Turing imitated the other party's previous appearance in the ghost's remaining sight, blew at the small broken gun of the embodied program, and threw it away in a illusory variegation, and then He picked up the small pink schoolbag on the ground.
"You should let me out." The fly stared at Turing.
"But there's only one copy of this thing."
"Don't make excuses, copy and paste."
"That's right." Turing nodded, turning the small schoolbag in his hand into two copies, thinking about the remaining value of the fly beside him in his mind, and then finally lifted the blockade on the fly.
There's no need to kill them, and it's not necessary to make a big hatred. The cooperation is worthwhile. The other party is a hacker. This is an area Turing is not good at at present, and there are more values that can be tapped, provided the contact information is obtained.
The fly rushed out, picked up the small schoolbag at an extremely fast speed, and the whole body flickered with colorful noises.
After breaking away from the inside of the ice wall, it seemed to directly choose to go offline with the data, and didn't want to stay with Turing for a moment.
"Why are you in such a hurry? Why don't you leave a contact information, and we will have the opportunity to work together in the future."
The figure of the fly disappeared instantly.
Turing shrugged, looking at the small schoolbag in his hand with some pity in his heart, and prepared to return to the terminal space.But at this moment, the figure of the pink fly reappeared, and after throwing something that looked like a glass plate at Turing's feet, it disappeared again.
This scene made Turing a little dazed, and picked up the glass plate on the ground.
A string of numbers starting with "NED" floated on it, and I don't know what kind of software it is for.Turing narrowed his eyes and returned to the supervisor terminal.
Quickly unpacking the small schoolbag in his hand, and turning it into a book in the shape of Geller Steen's animal skin notes according to Turing's preference, Turing quickly took the text inside his eyes.
But what he didn't notice was that at the bottom of the animal skin notebook, there was a small light spot, which was flashing a light red light.
……
……
……
Ye State University.
A young man from Makukura, who seemed to have just experienced an electric explosion, was staring at the screen with his eyes straight.
"Damn guy... dare to use my gun to kill me... Fortunately, I left a reptile virus... huh? I made a copy? It seems that the fly and the fat man conspired against me... Let me see this The true location of the two guys..."
The young man touched the burnt tip of the brain-computer interface on the back of his head, and took a sip of the Fat House Happy Water on the table rather unhappily.
This one is not divided into chapters.Please remind me in time if there is a text problem
(End of this chapter)
You'll Also Like
-
Is your elf legal?
Chapter 483 5 hours ago -
Zombie Contract: Get zombie bloodline and Taoist body at the beginning
Chapter 667 5 hours ago -
I, a man, swapped bodies with a rich girl
Chapter 73 5 hours ago -
Go take care of your junior brother on the wedding day. Why are you crying when I leave?
Chapter 165 5 hours ago -
Collapse Iron, but the plug-in is to transform into the Collapse Valkyrie
Chapter 84 5 hours ago -
Starting to go to the sea: I really didn’t want to be a sea king
Chapter 328 5 hours ago -
One Piece: King of the Seven Seas
Chapter 86 5 hours ago -
Marvel: Joy I Am Joy
Chapter 144 5 hours ago -
Lord: I am in a world of pain, raising a girl
Chapter 507 5 hours ago -
True enlightenment against heaven: Starting from the proud smile
Chapter 280 5 hours ago