How does HPV spread?

Original Xu Chao, I’m Chaoski.

After talking about "cauliflower" for so long, the old readers who pay attention to me can be said to be very familiar with it. However, there are still many hin people coming to ask questions about sharp tips every day.

Today, I will tell you enough about condyloma acuminatum once.

Now, if you see friends here, please sit up straight and put down your legs. Let’s begin our little class.

What is condyloma acuminatum?

Condyloma acuminatum, also known as "anal genital warts", usually manifests as soft papules or patches on the external genitalia, perianal skin, perineum or groin.

HPV is a kind of naked double-stranded DNA virus without envelope, belonging to the family Papillomavirus.

At present, among more than 200 subtypes of HPV that have been identified, more than 40 subtypes can spread through sexual contact and infect the anal genital area.

According to the carcinogenicity, HPV is divided into high-risk type and low-risk type. 90%-95% of condyloma acuminatum cases are caused by low-risk HPV types 6 and 11 [1,2].

How is condyloma acuminatum spread?

Human is the only natural reservoir of HPV, and the infected person is the source of HPV infection. There are many HPV in the genital skin mucosa, which is the repository of HPV and the source of virus transmission.

HPV spreads through contact with infected skin or mucosa, and the virus invades epidermal basal cells through tiny scratches. Verruca is not necessary for virus transmission, but it is highly contagious because of its high viral load.

Transmission route

1. Sexual transmission: it is the most important route of transmission, and skin-mucous contact in heterosexual or homosexual sex can cause infection [3].

2. Vertical transmission: It is common for mothers infected with HPV in reproductive tract to transmit it to newborns through placenta and yindao delivery. For example, recurrent papilloma in children’s respiratory tract may be caused by children infected with HPV6/11.

3. Indirect contact transmission: A small number of patients may get sick through non-sexual contact infection. According to some data, 10% of women were infected with HPV before they lived in apricot [4], suggesting that contact between mouth and hands and raw zhi devices can also infect HPV.

HPV infection can enter the incubation period without obvious symptoms and signs. The incubation period is usually 3 weeks to 8 months, with an average of 3 months. Studies have shown that in patients with condyloma acuminatum after new HPV infection, the median time from the detection of HPV6 or HPV11 to the discovery of condyloma acuminatum is 2.9 months [5].

What are the clinical manifestations and symptoms after being infected with condyloma acuminatum?

Appearance and texture: At the initial stage, the lesions of condyloma acuminatum showed local small papules, which gradually increased or increased from the needle to the millet size and spread to the surrounding area. The wart body can be single or multiple, and it can be papillary, cockscomb-shaped, cauliflower-shaped, flat, dome-shaped, filamentous, mushroom-shaped, pedicled, cerebral gyrus-shaped, plaque-like, smooth (especially on penis body) and so on. Condyloma acuminatum is soft to the touch, ranging from 1mm in diameter to several centimeters in size.

Color: Warts vary in color, ranging from pink to crimson (non-keratinizing lesions), gray (severe keratinizing lesions), brown-black (pigmented lesions) and violet.

Location: For boys, condyloma acuminatum mainly occurs in prepuce, Gui head, coronary sulcus, frenulum, Penis, urethral orifice, perianal region and scrotum. Girls are more likely to occur in Labia, urethral orifice, Vagina mouth, perineum, Vagina wall, cervix and perianal region. If anal sex occurs, warts may appear in the perianal region, anal canal and rectum for the recipient. In addition, if oral sex is performed, warts may also appear in the mouth.

Symptoms: There are generally no symptoms after being infected with condyloma acuminatum, which is one of the reasons why many people do not pay attention to or even delay treatment. A few people may have itching, foreign body sensation, pressure or burning sensation. Due to the increase of brittleness of skin lesions and friction, the skin is broken, soaked, eroded, bleeding or secondary infection, resulting in special odor. In addition, female patients may have increased vagina secretion.

Because condyloma acuminatum is easy to recur, or the warts affect daily life, patients often feel shame, social isolation, anxiety, depression, fear and guilt, and they are also worried that condyloma acuminatum will affect future fertility and increase cancer risk.

In addition, condyloma acuminatum also has a great influence on the feelings between sex partner, which may lead to family conflicts and even lead to the breakdown of relationships.

How to diagnose condyloma acuminatum?

Generally speaking, most patients infected with condyloma acuminatum may have contact history, such as multiple sexual partners, high-risk apricot behavior, or sexual partners with infection history, or close indirect contact history with patients with condyloma acuminatum, and so on. Through these medical histories, combined with the typical clinical manifestations of condyloma acuminatum, the diagnosis can be basically made through face-to-face diagnosis.

For those who cannot be clearly diagnosed by face-to-face examination, they can also be diagnosed by auxiliary examination [6].

1. Acetic acid white test: 3%-5% acetic acid solution is wet-applied or coated on the lesion to be examined and the surrounding skin mucosa. Within 3-5 minutes, if you see a uniform whitening area, it is a positive reaction.

2. Dermatoscope: Dermatoscope can non-invasively, quickly and clearly identify skin lesions, hyperplastic blood vessels and structures that cannot be recognized by naked eyes. Many literatures at home and abroad reported that the diagnostic rate of atypical condyloma acuminatum and tiny condyloma acuminatum by dermatoscope was over 90%.

3. Nucleic acid amplification test: HPV in skin lesions was detected by amplifying HPV-specific genes (L1, E6, E7 region genes), and nucleic acid detection methods included polymerase chain reaction (PCR), real-time fluorescence PCR, and in-situ hybridization test with nucleic acid probes.

4. Pathological examination: For typical skin lesions, histopathological biopsy is unnecessary. If there are some conditions such as uncertain diagnosis, pathological examination can be performed.

In addition, for condyloma acuminatum in anus, vagina and urethra, anoscope, colposcope and urethroscope may be needed for auxiliary examination.

How should condyloma acuminatum be treated?

If you are unfortunately infected with condyloma acuminatum, don’t panic, go to the dermatology department of public hospitals as soon as possible, and sometimes go to urology (boys)/gynecology (girls) for treatment.

The purpose of treating condyloma acuminatum is to remove the wart as soon as possible and eliminate the subclinical infection around the wart as much as possible to reduce or prevent recurrence.

Some people found out that the other person had warts after apricot behavior, and asked if they could use blocking drugs. Unfortunately, there are no blocking drugs for HPV (HIV has related blocking drugs).

Not only are there no blocking drugs, but there are no effective antiviral drugs against HPV at present, so it is impossible to eradicate HPV infection by systematic application of antiviral drugs [7].

If you find yourself growing warts, you can use drugs, physics, surgery, chemistry and other methods to remove them. However, at present, there is no definite evidence to show which treatment scheme is superior to other schemes, and no treatment scheme is suitable for all patients and all warts. All treatment methods have a certain recurrence rate.

According to the suggestion of Clinical Diagnosis and Treatment Guidelines for Condyloma Acuminatum in China (2021 Complete Edition), "The treatment of condyloma Acuminatum can be based on the size, number, location and shape of wart, the patient’s wishes, economic conditions and adverse reactions, and fully consider the individual differences of patients’ age, immune status and compliance, etc." [6].

Drug treatment includes: 0.5% podophyllotoxin tincture, 5% imiquimod cream, 80%-90% trichloroacetic acid solution and so on.

Physical therapy includes: cryotherapy, laser therapy, ionization and high frequency electrotome therapy, etc.

If the number of warts is small, pedicled or large, shearing and excision can be used under local anesthesia, supplemented by electrocautery to destroy the residual warts and control bleeding, without suture.

Photodynamic therapy is suitable for removing small warts and basal therapy after physical therapy to remove large warts. It can be used for the treatment in the cavity such as anal canal, urethral orifice, urethra and cervical canal.

Recurrence and cure

After treatment, condyloma acuminatum is cured by the disappearance of wart body.

However, the recurrence rate of condyloma acuminatum is very high, and the recurrence rate reported by different documents varies greatly, ranging from 10% to 70%. The recurrence rate is the highest within 3 months, and it gradually decreases with time.

At present, most scholars believe that if condyloma acuminatum does not recur after 6-9 months of treatment, the chance of recurrence will be reduced.

Although the recurrence rate of condyloma acuminatum is high, don’t think that you have a "terminal disease" after infection, but have confidence in the treatment.

How to prevent condyloma acuminatum?

Want to prevent condyloma acuminatum, in fact, it is not difficult, four words: "totally".

For people who have no apricot life, there is basically no need to worry about whether they will be infected with condyloma acuminatum. You know, avoiding apricot life is the most reliable way to prevent genital HPV infection.

If you want to have apricot behaviors, don’t engage in unsafe and high-risk apricot behaviors, such as making fire contracts and commercial apricot behaviors. Limiting the number of sex partner can reduce the risk of condyloma acuminatum.

In addition, wearing condoms in apricot life can also prevent condyloma acuminatum to some extent. However, wearing a condom may not be able to protect you, because you may also be infected with HPV in places that are not covered by condoms [8]. Don’t think it’s really safe to wear a condom when unsafe apricot behavior occurs. The safest thing is to avoid high-risk apricot behavior.

Vaccination with HPV vaccine can also prevent HPV infection, and tetravalent or nonavalent HPV vaccine can prevent 90%-95% of condyloma acuminatum. However, if you have been infected with HPV or have grown condyloma acuminatum, it is useless to vaccinate.

I’ve talked so much, I don’t know if you can read it carefully. Mainly because I have received too many inquiries about condyloma acuminatum, I sincerely hope that everyone can protect themselves and others and be healthy.

It’s not easy to write. Don’t you give a "like" or "watching" when you pass by?

references

[1] GARLAND S M, STEBEN M, SINGS H L, et al. Natural history of genital warts: analysis of the placebo arm of 2 randomized phase III trials of a quadrivalent human papillomavirus (types 6, 11, 16, and 18) vaccine [J]. J Infect Dis, 2009, 199(6): 805-14.

[2] BALL S L, WINDER D M, VAUGHAN K, et al. Analyses of human papillomavirus genotypes and viral loads in anogenital warts [J]. J Med Virol, 2011, 83(8): 1345-50.

[3] WRIGHT T C, JR. Natural history of HPV infections [J]. J Fam Pract, 2009, 58(9 Suppl HPV): S3-7.

[4] TAY S K, HO T H, LIM-TAN S K. Is genital human papillomavirus infection always sexually transmitted? [J]. Aust N Z J Obstet Gynaecol, 1990, 30(3): 240-2.

[5] WINER R L, KIVIAT N B, HUGHES J P, et al. Development and duration of human papillomavirus lesions, after initial infection [J]. J Infect Dis, 2005, 191(5): 731-8.

Dermatology and Venereology Branch of Chinese Medical Association, Dermatologist Branch of Chinese Medical Association, Dermatology and Venereology Committee of Chinese Rehabilitation Medical Association. Clinical diagnosis and treatment guidelines for condyloma acuminatum in China (2021 full edition) [J]. chinese journal of dermatovenereology, 2021, 35(4): 359-74.

[7] WORKOWSKI K A, BOLAN G A, CENTERS FOR DISEASE C, et al. Sexually transmitted diseases treatment guidelines, 2015 [J]. MMWR Recomm Rep, 2015, 64(RR-03): 1-137.

[8] GILSON R, NUGENT D, WERNER R N, et al. 2019 IUSTI-Europe guideline for the management of anogenital warts [J]. J Eur Acad Dermatol Venereol, 2020, 34(8): 1644-53.

Disclaimer: Some pictures are from the Internet. If there is any infringement, please contact to delete them.

-End of this period-

Read the original text

Detailed operation tutorial of sogou input method for unloading.

Sogou Input Method is a good software, so I want to download and install one myself. Do you know how to uninstall the sogou input method? The following small series will bring you a detailed tutorial on uninstalling the sogou input method.
 

      Detailed operation tutorial of sogou input method for unloading.

      Method one

      If you have installed software such as 360 security guards or QQ computer housekeeper, you can use them to directly uninstall the sogou input method (take 360 security guards as an example);

      First, open the software housekeeper of 360 security guards, and find the sogou input method in the "uninstall" of the software housekeeper to uninstall it;

      If there is residual software, then open the folder and delete it manually. If it can’t be deleted, it means that something else is using it. We just need to restart the computer and delete it.

      Method 2

      First, right-click the voice bar in the lower right corner of the computer, and click the "Settings" option in the pop-up options;

      Find "Sogou Pinyin Input Method" in the pop-up setting interface, select it and click the delete button on the right to uninstall it.

      Method 2

      You can also delete it in the control panel. First, open the control panel, and then find "Uninstall Program" in the control panel and click Open.

      Right-click "sogou Input Method" in the uninstall interface to uninstall;

      Dear friends, after reading the wonderful content above, you are clear about the detailed operation content of sogou input method for unloading!

Arcade video game hall v2.0

Arcade video game hall v2.0 is a high-end chess game hall that is very concerned and loved by players. High-end chess games full of Chinese elements, hundreds of thousands of real users play cards with you here every day. Unique game screen, exquisite and concise, makes people feel comfortable and carefree, and can reduce the feeling of fatigue when playing cards. There are more interesting ways to play. Come and experience this fishing game with me in 18183!

Game features of arcade video game hall v2.0

1, fast-paced games are more refreshing to play;

2, you can join the game anytime and anywhere, which is very fun;

3. A relaxed and pleasant game atmosphere makes it easier to make friends.

Arcade video game hall v2.0 game highlights

1. The visual effect brought by the very high-definition game screen to the player is also very comfortable. You can enjoy the comfortable chess and card game environment and experience other chess and cards more easily.

2, the game occupies a small memory of the mobile phone. Of course, the operation of the game is still very smooth, which does not affect the player’s online experience, is not stuck and has less traffic, and various models can adapt.

3. You don’t need to wait for an easy start. You can play games here as long as you want, and the friend room also allows you to have exclusive rights and customize the rules of the game.

4, a variety of gameplay is believed to bring you different joys, and it can also ensure that the players are real players, and play chess online with you in real time.

Advantages of arcade video game hall v2.0 game

1. Healthy game color matching can effectively relieve players’ eye fatigue and make players participate in the game more safely;

2, this is a board game, which can make all players feel very interesting and have a good time;

3. Needless to say, visual experience, high-definition pictures and gorgeous 3D game scenes can bring great shock, and rich game experiences are waiting for you to feel;

4, the interface is clear, the picture is delicate, and the experience cycle gives you the most straightforward card feeling.

Game update log:

The anniversary notice is online, and the sign-in reward is doubled.

Wave-chasing sweetheart, the god of war is online.

Chang ‘e BOSS is online.

Libra saint returns.

Song Joong Ki’s happy family with a second child has added new members.

Song Joong Ki has a second child.

There is good news from the Korean entertainment industry that the family of famous actor Song Joong Ki is about to welcome a new member. On the 8th, media reports confirmed that Song Joong Ki’s wife, Katie, was pregnant with her second child, and was immersed in the happy preparation for prenatal education, expecting a new life. This news quickly became a hot topic among fans and entertainment circles. Last June, the couple welcomed their first child, a lively little boy. Their happy family life envied many people. After a lapse of only one year, the two men once again sent out good news, which surprised the outside world at its speed and also yielded full blessings. Song Joong Ki and Katie’s naughty son will soon become a brother, and the sweet daily life of the family will usher in a new change. Song Joong Ki is happy to have a second child!

It is understood that the couple had a romantic pregnancy in Italy, where they welcomed their first child. After that, they returned to Korea to enjoy the joy and challenge of being new parents. Katie’s pregnancy makes people wonder whether this upcoming baby will be born in Korea or start his/her journey elsewhere. Song Joong Ki couldn’t hide his excitement of becoming a father again at Cannes Film Festival, saying that he was more concerned about the new life to be added at home after work. While he continued to make breakthroughs in his career, he also showed his gentle side as a husband and father in private. During his visit, he expressed his hope to spend more time with his wife and cherish the world of two people before the birth of the child. This affection moved fans.

This good news also made Song Joong Ki’s wife Katie get more attention. Despite many curiosities and even criticisms from the outside world, Song Joong Ki has always firmly supported Katie and proved the strong emotional bond between them with practical actions. He once clarified the false information about Katie in public, guarded the family’s peace, and showed maturity and responsibility.

The news that Song Joong Ki is about to become a father for the second time adds a sweetness to the entertainment circle. Fans warmly congratulate and expect that the addition of new life will bring more joy to this family. At the same time, some netizens expressed concern about Song Joong Ki’s ex-wife Song Hye Kyo, who is still single.

At this moment of being surrounded by love, the happy growth of Song Joong Ki’s family adds a touch of warmth to the entertainment circle. We all hope that with the birth of a new life, the Song Joong Ki family can continue to weave their beautiful family stories.

Since the beginning of this year, the province has detected 15,500 cases of electric fraud and related crimes, avoiding losses of 2.88 billion yuan.

  On the morning of December 13, the Information Office of the provincial government held a press conference, inviting responsible comrades of the Political and Legal Committee of the provincial party committee to introduce the situation of preventing and cracking down on new illegal crimes in telecommunications networks and protecting the legitimate rights and interests of the people in Shandong. Liu Qichao, deputy secretary of the Political and Legal Committee of the Provincial Party Committee, said that since the beginning of this year, the province has detected 15,500 cases of electric fraud and related crimes, arrested 30,800 criminal suspects, and avoided the loss of 2.88 billion yuan. The number of cases and losses in the province has doubled, resolutely curbing the high incidence of telecommunication network fraud crimes.

Since the beginning of this year, the province has detected 15,500 cases of electric fraud and related crimes, avoiding losses of 2.88 billion yuan.

Since the beginning of this year, the province has detected 15,500 cases of electric fraud and related crimes, avoiding losses of 2.88 billion yuan.

  Highlight the responsibility of compaction: improve the mechanism of cracking down on illegal crimes of electric fraud

  The provincial government deployed a three-year campaign to crack down on telecommunication network fraud and illegal crimes in Shandong Province, and issued the "Three-year Action Implementation Plan for Combating Telecommunication Network Fraud and Illegal Crimes in Shandong Province (2024— 2026). The provincial public security department will include anti-fraud work in the "Ten Key Tasks" in 2024, study and formulate countermeasures, and promote the in-depth development of anti-fraud in the province. We will improve the working rules of the joint meeting, establish a regular debriefing notification system for member units, and a warning, interview prompt and listing rectification system for key regions and industries. Since the beginning of this year, we have issued a "risk warning letter" five times. Strengthen and make good use of investigation centers, build investigation centers at provincial, city and county levels, pool resources in full, set up professional teams, establish new policing models, and promote quality and efficiency.

  Focus on solving crimes: more than 25,200 suspects were prosecuted, 5,243 people were sentenced, and 598 criminal dens were destroyed.

  Insist on strengthening the integrated operations of provinces, cities and counties, dig gold owners, shovel dens, fight back and eliminate black production, and continue to launch a fierce offensive against electric fraud crimes and black ash industries. Further improve the supervision mechanism for listing major cases, promote breakthroughs in cases with a million yuan or more, and arrest 2,447 criminal suspects. Organized and carried out special actions such as "Yun Jian", "Cut off the card", "Cut off the flow", "Pull out the nail" and "Summer Action", cracked a large number of important cases, prosecuted more than 25,200 suspects and sentenced 5,243 people. A dynamic identification model of fraud-related information was established, and a centralized battle against telecommunication network fraud was launched. 598 criminal dens were destroyed, 6,935 suspects were arrested, and 5.452 million yuan was seized and frozen.

  Highlight counter-measures: 1.479 million times of door-to-door dissuasion, and the quality and effectiveness of dissuasion rank among the top in the country.

  Adhere to the construction of "beforehand — After the event, the "closed-loop prevention and control system" strengthened the ability to find, dispose and intercept capital flow, communication flow and network flow, promoted the financial and communication departments to continuously optimize technical countermeasures, improved the emergency disposal mechanism of funds involved, intercepted 20.947 million fraudulent calls and 21.561 million fraudulent text messages, and blocked 14.2213 million fraudulent apps and websites, so as to prevent the occurrence of cases to the maximum extent and reduce the losses of the masses. The early warning targets were dissuaded and reminded by classification, of which 1.479 million were dissuaded in depth, and the success rate of dissuasion reached 99.8%, ranking first in the country in terms of dissuasion quality and effectiveness. We launched the centralized publicity of "Anti-fraud of the whole people is in action", started the "Bright Screen Project", organized the anti-fraud propaganda "Six Enters" campaign, held a series of live broadcast activities of "Youth has my anti-fraud peers", sent more than 900 million public service messages, and set off a new round of anti-fraud propaganda. The cases of students, the elderly and financial personnel being cheated in the province decreased by 17.7%, 13.3% and 26% respectively.

  Highlight comprehensive management: fundamentally squeeze and eliminate the breeding space of electric fraud and illegal crimes

  Shandong continued to optimize the dynamic management and control mechanism of the "two cards" (telephone cards and bank cards) involved in the case, established low, medium and high risk assessment grades, and carried out disposal work by classification. The "two cards" involved in the case decreased by 15.9% year-on-year, which was 7.2 percentage points higher than the national average. It is the first in the country to share the characteristic data of black and gray terminal equipment, base stations and traffic behaviors involved in the case, carry out dynamic identification around the whole life cycle of fraudulent phone cards, and automatically screen and shut down more than 2.579 million fraudulent phone cards. Strictly implement the real-name registration system of network users, establish the monitoring and early warning mechanism of network accounts, implement the authentication of real identity information according to law, shut down 67,000 QQ and micro-signals involved in fraud, and fully reduce the space of cybercrime. The procuratorial organs focused on the loopholes and shortcomings of social governance reflected behind the case, issued 24 procuratorial suggestions on social governance, and cooperated with relevant departments to strengthen governance. The Provincial Department of Justice will publicize and implement the "Anti-Telecommunication Network Fraud Law" into the "Eighth Five-Year Plan" and the annual law popularization points, guide and urge all levels and departments to strictly implement the law popularization responsibility system, and form a joint force for anti-fraud law popularization.

  Liu Qichao said that in the next step, the province’s political and legal departments will accurately grasp the current new situation of telecommunication network fraud crimes, and with stronger political responsibility, mission responsibility and responsibility, make overall plans to promote the work of prevention, control and construction, and resolutely protect the lives and property of the people.

Shaoxing Audi A6 (imported) price cuts hit at the end of the year! The latest offer is 430,800 yuan, and the quantity is limited.

[car home Shaoxing Preferential Promotion Channel] Recently, Shaoxing has ushered in unprecedented preferential activities. At present, the maximum preferential range can reach 76,000 yuan, which makes the starting price of this luxury model as low as 430,800 yuan. If you are interested in this model, you may wish to click "Check the car price" in the quotation form to get a higher discount.

绍兴奥迪A6(进口)年末降价来袭!最新报价43.08万,数量有限

The front face design of Audi A6 (imported) adopts a family-owned hexagonal air intake grille, which is large in size and decorated with chrome, making it look very atmospheric and full of scientific sense. The headlights on both sides are sharp in shape, and LED daytime running lights and matrix LED headlights are integrated inside. The overall style is simple and modern, showing the elegance and luxury of Audi brand. The body lines are smooth, and the through taillight design further enhances the recognition and fashion sense of the vehicle.

绍兴奥迪A6(进口)年末降价来袭!最新报价43.08万,数量有限

Audi A6 (imported) has a length, width and height of 4951mm, 1886mm and 1473mm, respectively, and a wheelbase of 2928mm. The side lines of the car body are smooth, showing an elegant and dynamic design style. Tyre size are all 245/45 R19, and the wheels equipped have fashionable style, which enhances the sense of movement of the whole vehicle.

绍兴奥迪A6(进口)年末降价来袭!最新报价43.08万,数量有限

The interior design of Audi A6 (imported) focuses on luxury and technology, and the overall style is elegant without losing the modern sense. The steering wheel is made of leather, which feels comfortable and rich in texture. It supports manual up and down+front and rear adjustment and electric up and down+front and rear adjustment to meet the individual needs of different drivers. The central control screen size is 10.1 inches, the interface is clear, and the operation is smooth. The built-in multimedia system, navigation, telephone and air conditioning functions can be easily operated through the voice recognition control system. In addition, the car is equipped with SD and Type-C interfaces, which are convenient for connecting various external devices. The front and rear rows are equipped with USB/Type-C interfaces, which is convenient for passengers to charge mobile phones and other devices. The front row is also equipped with wireless charging function, which is convenient and fast. The seat is made of leather and leather /Alcantara. The main and auxiliary seats support front and rear, backrest, height adjustment (4-way) and lumbar support (4-way), and have heating function. The driver’s seat is also equipped with electric seat memory function, which improves the driver’s comfort. The rear seats support proportional tilting, which increases the flexibility and practicability of the interior space.

绍兴奥迪A6(进口)年末降价来袭!最新报价43.08万,数量有限

Audi A6 (imported) is equipped with a 2.0T 265 horsepower L4 engine with a maximum power of 195kW and a maximum torque of 370 N m.. Matching with 7-speed wet dual-clutch gearbox, it provides drivers with strong and smooth power output.

The owner of car home shared his driving experience. He thought that the throttle response of Audi A6 was very linear, and the power performance of 3.0 liters was very strong, which fully met the daily needs. Compared with the 2.0-liter Q5 he drove before, this kind of power feels more abundant. However, he also mentioned the problem of wind noise at high speed, which may be caused by the luggage rack.

SAIC Volkswagen Passat Pro: Intelligent Innovation, Youth Transformation of Classic Models

In the long river of automobile development, SAIC Volkswagen has always occupied an important position. Nowadays, the advent of Passat Pro, like a new melody in a classic movement, plays a strong voice of intelligence and youthfulness.

?

When entering the cockpit of Passat Pro, the first thing that catches your eye is the 15-inch intelligent super-large central control panel, and its brand-new smart car coupling system is eye-catching. Wake up "Hello, Volkswagen" by voice, and the VMate intelligent assistant responds immediately. Whether it is navigation guidance, music playing or vehicle control, it can be easily completed, and its dialect recognition ability adds a lot of color to the interactive experience, realizing the barrier-free communication between drivers and vehicles.

?

After starting the vehicle, the IQ.Pilot intelligent assisted driving system immediately enters the working state. When the button on the left side of the steering wheel is pressed, the L2++ driver assistance function is started quickly. The system can automatically and accurately adjust the following distance in urban traffic jams, and can also adaptively adjust the speed when driving in corners, thus greatly reducing the driver’s burden. In addition, with the addition of the lane-changing function of the intelligent shift lever, the lane-changing operation is as simple as turning on the turn signal, and the vehicle can automatically complete lane-changing under the premise of ensuring safety.

?

The AR real-life navigation equipped with Passat Pro is a highlight, which perfectly integrates real road images with navigation information, and provides clear and clear guidance for drivers at key nodes such as turning and fork in the road. Lane-level intelligent navigation promotes navigation accuracy to a new level, and accurate lane guidance makes the driving process no longer confused.

?

During the driving process, the intelligent car coupling system shows infinite charm. Tencent’s car WeChat can receive messages, and Tencent’s accompanying applet can control the car conveniently. The existence of the vehicle-mounted "intelligent voice GPT" is like an omniscient encyclopedia teacher, who can quickly give accurate answers to both vehicle-related questions and trivial matters in daily life.

?

To sum up, Passat Pro’s intelligent interconnection and intelligent driving function complement each other, which not only brings drivers a more relaxed, safe and comfortable driving experience, but also revives this classic model, successfully caters to the needs of the younger generation of consumers and shows its unique competitiveness in the automobile market.

Prospect of the extended range version of Star Era ET: or sell for 209,800 yuan with a wheelbase of 3,000 mm.

The plug-in hybrid market is very hot, which is a recent feature of the domestic market. Because the overall share has improved significantly, there are more and more car companies making efforts in this market, which directly leads to the market becoming more and more "rolled". From the consumer’s point of view, if you are a friend with only one car at home, Kitten suggests starting with hybrid and plug-in hybrid models. If you are mainly traveling in cities for short distances and occasionally running at high speed, extended-range electric is also a good choice. Judging from the current market situation, the popularity of domestic extended-range electric vehicles is not low. Ideal L7, Wenjie M7, etc. are all products of this type.

In the 380th batch of Announcement of Road Motor Vehicle Manufacturers and Products issued by the Ministry of Industry and Information Technology, Chery’s Xingtu brand declared an extended-range electric vehicle, Xingtu ET extended-range version. Prior to this, its pure electric version has been declared, which means that Starway ET will provide two different power models in the future.

According to the group’s plan, Chery will fully launch the new energy market in 2024. Before that, Xingtu brand has launched pure electric and plug-in hybrid models. Although from the technical difficulty and performance, extended-range electric is not as good as plug-in hybrid, but its advantages are simple structure and low cost. Under the condition of fixed cost, the money saved from the power system can be used for interior configuration, which is valued by many new energy vehicle consumers.

From the body size, the extended range version of Star Way ET is close to the level of medium and large SUV, with the length, width and height of 4955mm, 1975mm and 1698mm respectively and the wheelbase of 3000mm;; Compared with the main competitors’ ideal L7 of 5050mm, 1995mm, 1750mm and 3005mm, although slightly inferior, the gap is not very big. In terms of seat layout, it also adopts a five-seat design, and the performance of the rear space can be satisfactory.

As for the power system, the extended range version of Star Era ET uses SQRH4J15B 1.5T four-cylinder engine as the range extender, with the maximum power of 115kw. The data of the motor has not been published yet, but according to the configuration of Star Era ET pure electric version, it should provide two models: single motor and double motor. The power battery is lithium iron phosphate battery, and the manufacturer is Contemporary Amperex Technology Co., Limited. In terms of configuration, although there is not much news released at present, in terms of product positioning, it should not be lower than Xingyue ES.

In terms of price, the extended edition of Star Era ET can use Star Era ES as a pricing reference. Star Era ET is a medium and large SUV, and its price is higher than that of Star Era ES, which is positioned by medium and large cars. The starting price of the latter pure electric version is 198,800 yuan, and Star Era ET may be higher than it. At the same time, the price of the extended-range version will be lower than that of the pure electric version because of its small battery capacity. Therefore, based on various factors, the kitten expects the starting price of the extended-range version of Star Era ET to be 209,800 yuan, but its configuration level will be higher than that of Star Era ES.

Cat heart blue view

In terms of sales performance, although Chery has launched a number of plug-in hybrid models before, their sales performance is average, especially for Star Road brand models. According to the terminal sales data, the total sales volume of the Star Road Chasing Wind Plug-in Hybrid Model in 2023 was only 1,214 vehicles, which was not even as good as the weekly sales volume of many hot-selling cars. Faced with the sales dilemma, Chery’s new energy vehicles are also adjusting their prices, trying to impress consumers with low prices.

Looking forward to the future sales trend of Xingtu ET Extended Range Edition, its main competitors are naturally Ideal L7 and Wenjie M7. The former has a higher price threshold of 319,800 yuan, and the latter also costs 249,800 yuan. Compared with these two models, the core advantage of Xingtu ET Extended Range Edition is that the price threshold is lower, and Chery has accumulated a certain reputation in the market. In the early days of 200,000 yuan, you can buy a big five-seat extended-range electric SUV produced by Chery, which is actually attractive.

Northwestern Polytechnical University was attacked by American NSA network: the United States gradually infiltrated and stole secrets for a long time.

  Cctv newsOn September 27th, the National Computer Virus Emergency Response Center issued a document "Investigation Report on Northwestern Polytechnical University Attacked by NSA Network (Part II)".  

  On June 22, 2022, Northwestern Polytechnical University issued a "Public Statement" saying that the school was attacked by overseas cyber attacks. The Beilin Branch of the Public Security Bureau of Xi ‘an, Shaanxi Province immediately issued the "Alert Bulletin", which confirmed that a number of trojans and malicious programs originated from abroad were found in the information network of Northwestern Polytechnical University, and the Xi ‘an police have officially filed an investigation.

  China National Computer Virus Emergency Response Center and 360 Company participated in the technical analysis of this case. The technical team has successively extracted Trojan samples from many information systems and Internet terminals of Northwestern Polytechnical University, comprehensively used existing domestic data resources and analysis methods, and got the full support of partners in some countries in Europe and Southeast Asia, which completely restored the overall overview, technical characteristics, attack weapons, attack paths and attack sources of related attacks. It is preliminarily determined that the related attack activities originated from the "Office of Specific Invasion Operations" of the National Security Agency (NSA) (namely, the Office of Tailored Access Operation, hereinafter referred to as "TAO").

  This series of research reports will publish the important details of some specific attacks in thousands of cyber attacks launched by TAO against Northwestern Polytechnical University, and provide useful cases for countries around the world to effectively discover and prevent TAO’s subsequent cyber attacks.

  First, the process of TAO attack infiltrating Northwestern Polytechnical University

  TAO’s cyber attacks launched by other countries are highly targeted, adopting semi-automatic attack flow, single-point breakthrough, gradual infiltration and long-term stealing.

  (A) a single breakthrough, cascading infiltration, control of the network of Northwestern Polytechnical University

  After long-term careful preparation, TAO used the "acid fox" platform to carry out man-in-the-middle hijacking attacks on the internal hosts and servers of Northwestern Polytechnical University, deployed "anger jet" remote control weapons, and controlled several key servers. By using the way of Trojan horse cascade control penetration, it deeply penetrated into the internal network of Northwestern Polytechnical University, successively controlled the core network equipment, servers and terminals of the operation and maintenance network and office network, and obtained the control rights of some important network node equipment such as routers and switches in Northwestern Polytechnical University, stole the authentication data, and further implemented penetration expansion, and finally achieved the hidden control of the internal network of Northwestern Polytechnical University.

  (2) Concealed residence, "legal" monitoring and stealing core operation and maintenance data.

  TAO uses the cover weapon "Precision Surgeon" and the remote control Trojan NOPEN to realize the overall "invisibility" of the process, files and operation behavior, and secretly control the operation and maintenance management server of Northwestern Polytechnical University for a long time. At the same time, it adopts the way of replacing three original system files and three types of system logs to eliminate the trace and avoid the traceability. TAO has stolen several network device configuration files from the server. Using the stolen configuration files, TAO remotely "legally" monitored a number of network devices and Internet users, providing data support for the subsequent expansion and penetration of these targets.

  (3) Collecting authentication data, building channels and infiltrating infrastructure.

  By stealing key sensitive data such as account passwords, operation records and system logs of remote business management of operation and maintenance technicians in Northwestern Polytechnical University, TAO has mastered a number of account passwords of network boundary devices, access rights of business devices, configuration information of routers and other devices, and information of FTP server documents. According to the characteristics of TAO attack link, penetration mode and Trojan horse samples, it is found that TAO illegally attacked infrastructure operators in China, and a "legal" channel for remote access to the core data network of infrastructure operators was constructed, which realized the penetration control of infrastructure in China.

  (four) control of important business systems, the implementation of user data theft

  TAO entered the China infrastructure operator’s network as a "legitimate" by mastering the account passwords of Cisco PIX firewall, Tianrongxin firewall and other equipment, and then implemented intranet penetration and expansion, respectively controlled the service quality monitoring system and SMS gateway server of the relevant operators, and used the weapon tools specifically aimed at the operator’s equipment such as "Magic School" to query a group of sensitive identity personnel in China, and packaged and encrypted the user information and sent it back to the headquarters of the National Security Agency.

  Second, stealing sensitive information from Northwestern Polytechnical University and China operators.

  (1) Stealing key sensitive data such as passwords and operation records of remote business management accounts of Northwestern Polytechnical University.

  TAO secretly sniffed and stole the remote maintenance management information of the operation and maintenance management personnel of Northwestern Polytechnical University for a long time by installing the sniffing tool "drinking tea" in the operation and maintenance management server of Northwestern Polytechnical University, including the account password of network boundary equipment, access rights of business equipment, router and other equipment configuration information.

  The types of network devices that are sniffed include fixed Internet access network devices (routers, authentication servers, etc.), core network devices (core routers, switches, firewalls, etc.), and also important devices of communication infrastructure operators (data service platforms, etc.), including account numbers, passwords, device configurations, network configurations and other information.

  1. Steal the account password and configuration information of the core network equipment of Xigong University.

  At 6: 52 on December 11th, 20××× Beijing time, TAO used the proxy server (IP: 130.54 .××××××) located in Kyoto University of Japan as an attack springboard, illegally invaded the "telnet" management server of the operation and maintenance network of Northwestern Polytechnical University, uploaded and installed the NOPEN Trojan, and then controlled its intranet monitoring and management server in cascade. Both of the above servers had been installed with "tea drinking" sniffing in advance. TAO remotely controls the Trojan to retrieve and download the compressed and encrypted monitoring record file, and then clears the trace and exits. Stealing data includes the management account number, password, device configuration, network configuration and other information of routers and core network devices (core routers, switches, firewalls).

  2. Stealing the account password and configuration information of the access network authentication device for many times.

  (1) At 0: 28 on May 30th, 20××× Beijing time, TAO took the proxy server (IP: 210.135××××××) located in Japan as an attack springboard, illegally invaded the "telnet" management server of the operation and maintenance network of Northwestern Polytechnical University, uploaded and installed the NOPEN Trojan, and then controlled its intranet monitoring and management server in cascade. Both servers had been installed with "drinking tea" in advance. The stolen data includes the account number, password and configuration information of the access network authentication device.

  (2) At 1: 12 on July 4th, 20××× Beijing time, TAO used the proxy server (IP: 141.57 ××××××) located in Leipzig Institute of Technology, Economics and Culture as an attack springboard, illegally invaded the "telnet" management server of the operation and maintenance network of Northwestern Polytechnical University, uploaded and installed the NOPEN Trojan tool, and cascade controlled its internal network monitoring and management server and other three servers. These four servers were in advance.

  (3) At 10: 35 on October 11th, 20 ××× Beijing time, TAO used the proxy server (IP: 210.115 ×××××××) located at Gangwon National University in Seoul, South Korea as an attack springboard to illegally invade the monitoring and management server of the operation and maintenance network of Northwestern Polytechnical University, upload and install the NOPEN Trojan tool, and then cascade control its internal network backup server, authentication server and other four servers.

  (4) At 2: 46 on October 19th, 20××× Beijing time, TAO used the proxy server (IP: 143.248 .×××××××) of the Institute of Advanced Science and Technology in Daejeon, South Korea as an attack springboard, illegally invaded the "telnet" management server of the operation and maintenance network of Northwestern Polytechnical University, and controlled its intranet supervision server and other two servers in cascade. All three servers had been installed with "tea drinking" in advance.

  (2) Stealing configuration files and log files of network equipment operation and maintenance in Northwestern Polytechnical University.

  The National Security Agency’s "Specific Invasion Action Office" (TAO) has long attacked and invaded the network operation and maintenance management server of Northwestern Polytechnical University, secretly stealing the configuration files and log files of network equipment operation and maintenance.

  1. Steal the network operation log file of Northwestern Polytechnical University.

  At 3: 41 on March 2, 20×× Beijing time, TAO illegally invaded and controlled a network operation and maintenance management server of Northwestern Polytechnical University through a proxy server (IP: 210.135 ××××××) located in Japan. At 3: 49, TAO moved horizontally from the operation and maintenance management server to another operation and maintenance monitoring server, searched the log files with specific character strings as keywords and stole a batch of system operation log files and backup files of system daily self-inspection reports.

  2. Steal the regular task configuration script of Northwestern Polytechnical University server.

  At 10: 41 on October 11th, 20××× Beijing time, TAO invaded and controlled an intranet server of Northwestern Polytechnical University through a proxy server located in Korea (IP: 210.115 ××××××). At 10: 48, after two lateral moves, TAO invaded another intranet server, accessed the regular task configuration scripts in a specific directory, and retrieved 14 configuration files for regular tasks. Subsequently, these 14 files were stolen at one time, which can be used to perform regular cleaning, backup, power check and other operations.

  3. Steal the information file of the server system of Northwestern Polytechnical University.

  At 1: 27 on June 6, 20 ××× Beijing time, TAO invaded and controlled an intranet server of Northwestern Polytechnical University through a proxy server located in Korea (IP: 222.122 ××××××). At 2: 04, after two horizontal moves, TAO invaded another intranet server, accessed the system files under the directory /var/, and stole 60 commonly used system information files. The contents of the stolen system information files included system release version, user password hash, user rights, local domain name resolution configuration, etc.

  (C) Infiltration control of China infrastructure core equipment.

  The Office of Specific Invasion Operations (TAO) of the National Security Agency of the United States used the password of the stolen network equipment account to enter the service network of an infrastructure operator in China as a "legitimate" identity, control the related service quality monitoring system, and steal the user’s private data.

  1. Steal the privacy data of users in China.

  At 22: 53 Beijing time on March 7, 20 ×××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××

  At 15: 02 on the same day, TAO saved the queried user data in the directory of the attacked server/var/tmp/.2e434fd8aaee73e1/ERF/out/f/,and then packaged it and sent it back to the attack springboard. Subsequently, the attack traces such as infiltration tools and user data uploaded during the process of stealing secrets were quickly removed by special tools.

  The Office of Specific Invasion Operations (TAO) of the National Security Agency of the United States used the same method to attack and control another China infrastructure business server at 23: 22 on January 10th, 8: 41 on January 29th, 22: 00 on March 28th and 23: 58 on June 6th, respectively, and illegally queried, exported and stole the user information of many identity-sensitive personnel in batches.

  2. Infiltrate and control the global telecommunications infrastructure

  According to the analysis, the Office of Specific Invasion Operations (TAO) of the National Security Agency (NSA) used the same combination of weapons and tools to "legally" control the telecommunications infrastructure networks in no less than 80 countries around the world. The technical team cooperated with the partners in Europe and Southeast Asian countries, successfully extracted and fixed the samples of the above weapons and tools, and successfully completed the technical analysis, which is planned to be released to the public in due course to help the world jointly resist and prevent the network penetration attack of NSA.

  Third, TAO exposed his identity during the attack.

  In the process of cyber attack on Northwestern Polytechnical University, the Office of Specific Invasion Operations (TAO) of the National Security Agency exposed many technical loopholes and made many operational mistakes. Relevant evidence further proves that the behind-the-scenes action of cyber attack on Northwestern Polytechnical University is the NSA of the United States. Here are some examples:

  (1) The attack time completely conforms to the law of work and rest time in the United States.

  The National Security Agency’s Office of Specific Invasion Operations (TAO) must use manual operation when using the tipoff activation command and remotely controlling the NOPEN Trojan. From the attack time of these two tools, the actual working time of the network attacker can be analyzed.

  First of all, according to the big data analysis of related cyber attacks, 98% of cyber attacks on Northwestern Polytechnical University are concentrated between 21: 00 and 4: 00 am Beijing time, which corresponds to 9: 00 to 16: 00 EST, and belongs to the domestic working time in the United States. Secondly, there was no cyber attack on Northwestern Polytechnical University on all Saturdays and Sundays in the United States. Thirdly, by analyzing the unique holidays in the United States, it is found that the "Memorial Day" in the United States has three days off, and the "Independence Day" in the United States has one day off. During these four days, the attacker did not carry out any attack and theft. Fourth, after a long period of close tracking of the attacks, it was found that all cyber attacks were silent during the Christmas period. Judging from the above working hours and holiday arrangements, those who attack and steal secrets against Northwestern Polytechnical University are unscrupulous and undisguised in their activities according to the schedule of working days in the United States.

  (B) Language behavior habits are closely related to the United States.

  During the long-term tracking and reverse osmosis of network attackers, the technical team found that the attackers have the following language characteristics: first, the attackers have the habit of using American English; Second, the internet devices associated with the attackers are all equipped with English operating systems and various English-language applications; Third, the attacker uses the American keyboard for input.

  (3) The working path of exposing the mistakes in weapon operation

  At 5: 36 (Beijing time) on May 16th, 20 ×××, the cyber attackers attacked Northwestern Polytechnical University again by using the springboard machine (IP:222.122.××.××) located in South Korea. When trying to invade and control a network device after the third-level infiltration of the intranet of Northwestern Polytechnical University, there was a human error when running the upload PY script tool, and the specified parameters were not modified. After the script is executed, an error message is returned, which reveals the working directory and corresponding file name of the attacker’s online terminal. From this, it can be known that the system environment of the Trojan control terminal is Linux system, and the corresponding directory name "/etc/autoutils" is the special name of TAO’s network attack weapon tool directory.

  The error message is as follows:

  Quantifier follows nothing in regex; marked by <– HERE in m/* <– HERE .log/ at https://news.cctv.com/2022/09/etc/autoutils line 4569

  (D) A large number of weapons are highly homologous to the exposed NSA weapons genes.

  Of the 41 different cyber attack weapons used in the attack on the secrets of Northwestern Polytechnical University, 16 tools are completely consistent with the TAO weapons exposed by the "shadow broker"; Although 23 tools are not exactly the same as those exposed by the "shadow broker", their genetic similarity is as high as 97%, and they belong to the same type of weapons, but their related configurations are different; The other two tools can’t correspond to the "Shadow Broker" exposure tool, but they need to be used together with other cyber attack weapons tools of TAO, so these weapons and tools obviously have homology and belong to TAO.

  (E) Some cyber attacks occurred before the exposure of "shadow brokers".

  The comprehensive analysis of the technical team found that in the tens of thousands of cyber attacks against targets in China, especially the thousands of cyber attacks launched against Northwestern Polytechnical University, some weapons used in the attack process were implanted with Trojan horses before the "shadow broker" exposed NSA weapons and equipment. According to NSA’s behavior habits, the above weapons and tools are likely to be used by TAO employees themselves.

  Fourth, TAO network attacks the IP list of weapon platform of Northwestern Polytechnical University

  During the technical analysis and traceability investigation, the technical team found a number of IP addresses of servers hosting related weapons and equipment used by TAO in the network invasion of Northwestern Polytechnical University. Examples are as follows:

  V. IP list of springboard used by TAO network to attack Northwestern Polytechnical University

  After continuous attack, the research team successfully locked the target node, multi-stage springboard, main control platform, encrypted tunnel, attack weapon and original terminal that launched the attack on Northwestern Polytechnical University, found the identity clues of the attacker, and successfully identified the true identities of 13 attackers.

Musk, who is about to be 53 years old, is said to be the father of 12 babies and still calls for "more children"

In a few days, Musk will celebrate his 53rd birthday, and there is evidence that he may be the father of 12 babies. Over the years, Musk has been contributing to the increase of the world’s population, and he has constantly called on human beings to have more children.

Bloomberg recently quoted people familiar with the matter as saying that earlier this year, the third child of American billionaire Musk and the female executive of the brain-computer interface technology company "Neural Connection" was born. According to media statistics, Musk has become the father of at least 12 children during his interaction with many women.

Neither Musk nor Chiris responded to this news.

Musk was born in South Africa on June 28th, 1971. According to media reports, the world’s richest man has been associated with at least four women.

Musk has had three marriages. In 2000, Musk got married for the first time. His wife, Justin Wilson, is a Canadian writer. Their marriage lasted eight years, during which they gave birth to six sons. Alexander, the first child, died unexpectedly at the age of 10 weeks, and then the couple gave birth to twins (Griffin Musk and Xavier Musk) and triplets (Kai, Saxon, Damia) in vitro, all boys.

In 2008, after the divorce, Musk shared the custody of the children with Justin Wilson.

Musk’s remaining two marriages are only related to one woman. In 2010, Musk married westworld actress talulah riley, and they divorced in 2012. In July 2013, the two remarried. In March 2016, the two divorced again.

There were no children in this marriage. Since then, Musk has never stepped into marriage, but the pace of having children has never stopped.

In May 2020, Musk gave birth to a son named X with Canadian singer Grimes. After they broke up, in 2022, Grimes gave birth to Musk’s daughter, nicknamed Y, through surrogacy.

During this period, Musk and Hivon Chiris also gave birth to two children. Chiris is a female executive of Musk’s "neural connection". A court document shows that Musk gave birth to twins with Chiris in November 2021. It is reported that the child was born in a test tube.

In 2023, walter isaacson, a biographer of Musk, confirmed that Musk and Grimes had a third child that had not been reported before. The child’s age has not been made public, and he is nicknamed Tau.

Earlier this year, Musk was exposed and quietly gave birth to a child with Chiris.

It is not clear how many children Musk has. According to public reports, there are 11 children who are still alive.

Musk had previously expressed concern about the decline in fertility rate around the world, especially in developed countries. In June this year, Musk said that the country was "going extinct" and called on everyone to have more children and avoid "population collapse". In addition, the Musk Foundation secretly subsidizes the American civil society organization "Encouraging Birth Movement", which is committed to encouraging birth at the economic and political levels.

Musk’s "population crisis theory" is not recognized by academic circles. According to the prediction of the United Nations, the world population will exceed the peak of 10 billion by 2100. It is generally believed in academic circles that after the world population reaches its peak, it will maintain a stable trend or decrease slowly, and there will be no so-called "population crisis" on the earth in the short term.

(Jimu News Comprehensive Global Times, The Paper)