电影施工中百度云,,,百度云

 上传我的文档
 下载
 收藏
该文档贡献者很忙,什么也没留下。
 下载此文档
正在努力加载中...
百度云计算中心项目施工安全保证措施
下载积分:800
内容提示:百度云计算中心项目施工安全保证措施
文档格式:DOC|
浏览次数:13|
上传日期: 12:56:00|
文档星级:
该用户还上传了这些文档
百度云计算中心项目施工安全保证措施
官方公共微信怎么用百度云网盘下载磁力链接的资源?
怎么用百度云网盘下载磁力链接的资源?
  网盘市场的竞争一直很激烈。目前对于百度云网盘也就是百度网盘来说,对于不同资源的下载已经越做越好。下面小编将给大家详细介绍怎么用百度云网盘下载磁力链接的资源。
  百度云网盘下载磁力链接图文教程:
  1.下载插件,下载地址:;uk=
  2.打开谷歌浏览器:工具--扩展程序,如下图所示:
  3.缩小谷歌浏览器,拖拽该插件进入扩展程序,自动安装:
  4.打开百度网盘,你会发现此时多了一个“磁力链接”按钮
  5.教程介绍,经我本人测试成功,大家也赶紧试试吧
&&&主编推荐
H3C认证Java认证Oracle认证
基础英语软考英语项目管理英语职场英语
.NETPowerBuilderWeb开发游戏开发Perl
二级模拟试题一级模拟试题一级考试经验四级考试资料
港口与航道工程建设工程法规及相关知识建设工程经济考试大纲矿业工程市政公用工程通信与广电工程
操作系统汇编语言计算机系统结构人工智能数据库系统微机与接口
软件测试软件外包系统分析与建模敏捷开发
法律法规历年试题软考英语网络管理员系统架构设计师信息系统监理师
高级通信工程师考试大纲设备环境综合能力
路由技术网络存储无线网络网络设备
CPMP考试prince2认证项目范围管理项目配置管理项目管理案例项目经理项目干系人管理
Powerpoint教程WPS教程
电子政务客户关系管理首席信息官办公自动化大数据
职称考试题目
就业指导签约违约职业测评
招生信息考研政治
网络安全安全设置工具使用手机安全
3DMax教程Flash教程CorelDraw教程Director教程
Dreamwaver教程HTML教程网站策划网站运营Frontpage教程
生物识别传感器物联网传输层物联网前沿技术物联网案例分析
互联网电信IT业界IT生活
Java核心技术J2ME教程
Linux系统管理Linux编程Linux安全AIX教程
Windows系统管理Windows教程Windows网络管理Windows故障
组织运营财务资本
视频播放文件压缩杀毒软件输入法微博
数据库开发Sybase数据库Informix数据库
&&&&&&&&&&&&&&&
希赛网 版权所有 & &&现在位置:
总共412篇文章
公告! 1.全网站全部为百度云迅雷资源免费下载。资源失效为屏蔽非本人所为!
请完成下面2和3.再留言要资料加百度云账号:设计小鱼
2.如果你喜欢本站,请帮忙分享,文章分享按钮文章下方右侧,网站分享按钮在网站左侧。文章图片都带有文章分享功能。
3.设计札记微信公众号:shejizhaji欢迎关注并分享!
分类目录分类目录
选择分类目录
2D软件&&(39)
&&&CAD教程&&(17)
&&&ps教程&&(8)
&&&ps源文件&&(14)
3D模型&&(87)
&&&c4d源文件&&(16)
&&&proe源文件&&(61)
&&&solidworks模型&&(8)
&&&ug模型&&(1)
3D软件&&(9)
&&&Imageware&&(2)
&&&keyshot&&(1)
&&&solidworks&&(2)
&&&UG教程&&(4)
&&&c4d影视特效&&(1)
&&&c4d教程&&(1)
&&&c4d渲染教程&&(11)
&&&creo实例教程&&(2)
&&&creo工程图教程&&(1)
&&&creo曲面教程&&(1)
&&&creo钣金教程&&(1)
Pro/Engineer&&(38)
&&&proe实例教程&&(6)
&&&proe技巧与方法&&(7)
&&&proe曲面教程&&(5)
&&&proe视频教程&&(17)
&&&运动仿真有限元&&(3)
产品结构设计&&(140)
&&&产品材料&&(12)
&&&产品结构&&(39)
&&&其他相关&&(34)
&&&安规要求&&(17)
&&&工作经验&&(19)
&&&工艺相关&&(4)
&&&模具相关&&(21)
&&&表面处理&&(5)
原创proe5.0教程&&(11)
&&&基础命令教程&&(1)
&&&实例教程&&(7)
&&&工程图教程&&(3)
生活随笔&&(23)
设计杂文&&(28)
软件安装&&(33)只需一步,快速开始
逆向工程中英文教程23:01 什么是逆向工程(原创翻译技术系列)
查看: 840|回复: 8
主题好友积分
阅读权限130
在线时间35 小时
本帖最后由 GlobeMaster 于
12:40 编辑
本人原创翻译技术系列:逆向工具中英文教程:01之23:
What is reverse engineering?
逆向工程是什么?
Reverse engineering is the process of taking a compiled binary and attempting to recreate (or simply understand) the original way the program works. A programmer initially writes a program, usually in a high-level language such as
or Visual Basic (or God forbid, Delphi). Because the computer does not inherently speak these languages, the code that the programmer wrote is assembled into a more machine specific format, one to which a computer does speak. This code is called, originally enough, machine language. This code is not very human friendly, and often times requires a great deal of brain power to figure out exactly what the programmer had in mind.
逆向工程是一个过程,将编译后的二进制文件,试图重现(或简单地理解)原程序的工作方式。最初一个程序员写一个程序,通常用高级语言(如c++或Visual Basic(或上帝保佑的Delphi语言)。因为电脑实质上不理解这些语言,程序员写的代码汇编成机器理解的语言格式。这段代码称为机器语言。这类代码人不是很好理解,程序员经常需要大量的时间和脑力来构思出什么程序员所想要的。
What is reverse engineering used for?
逆向工程是用来做什么的?
Reverse engineering can be applied to many areas of computer science, but here are a couple o
逆向工程可以应用于计算机科学的许多领域,但是这里有一些常用的分类;
Making it possible to interface to legacy code (where you do not have the original code source).
从而能够与遗留代码相衔接(当你没有原始代码时)。
Breaking copy protection (ie. Impress your friends and save some $$).
破解程序(即给你的朋友留下深刻印象并省钱不用购买程序了)。
Studying virii and malware.
研究病毒和恶意软件。
Evaluating software quality and robustness.
评估软件质量和健壮性。
Adding functionality to existing software.
将功能添加到现有的软件。
The first category is reverse engineering code to interface with existing binaries when the source code is not available. I will not be discussing this much, as it is boring.
第一类是当源代码不可用时,用逆向工程代码与现有的二进制文件相链接。我不会讨论这个,因为它是无聊的。
The second category (and the biggest) is breaking copy protection. This means disabling time trials, defeating registration, and basically everything else to get commercial software for free. This we will be discussing at great length.
第二类(最大的)是的保护。这意味着禁用软件试用,停用软件注册机制,基本上说就是让一切商业软件变为免费的。我们将详细地讨论这个。
The third category is studying virus and malware code. Reverse engineering is required because not a lot of virus coders out there don’t send instructions on how they wrote the code, what it is supposed to accomplish, and how it will accomplish this (unless they are really dumb). This is a pretty exciting field, but requires a great deal of knowledge. We will not discuss this much until later on.
第三类是研究病毒和恶意软件的代码。逆向工程是必需的,因为没有太多的病毒编码者不要发送说明他们写的代码,它应该完成什么,以及它将如何做到这一点(除非他们真的很笨)。这是一个非常令人兴奋的领域,但需要大量的知识。我们将不讨论这么多,直到后来。
The fourth category is evaluating software security and vulnerabilities. When creating large (think Windows Operating Systems), reverse engineering is used to make sure that the system does not contain any major vulnerabilities, security flaws, and frankly, to make it as hard as possible to allow crackers to crack the software.
第四类是软件安全漏洞评估。在创建大型系统(比如Windows操作系统)时,逆向工程是用来确保系统不包含任何重大漏洞,安全漏洞,坦率地说,让它尽可能让破解者破解不了该系统或软件。
The final category is adding functionality to existing software. Personally, I think this is one of the most fun. Don’t like the graphics used in your web design software? Change them. Want to add a menu item to encrypt your documents in your favorite word processor? Add it. Want to annoy your co-workers to no end by adding derogatory message boxes to Windows calculator? Let’s do it. This we will be getting into later in the series.
最后一种是将功能添加到现有的软件。就我个人而言,我认为这是最有趣的。不喜欢你在网页设计中使用的图形软件吗?改变他们。想要在你最喜欢的字处理器添加菜单项来加密文档吗?添加它。想要通过添加负面信息文本框到Windows计算器来无休止地激怒你的同事?让我们做它。我们将在本系列的后面涉及到此内容。
What knowledge is required?
学习逆向工程需要什么基础知识?
As you can probably guess, a great deal of knowledge is necessary to be an effective reverse engineer. Fortunately, a great deal of knowledge is not necessary to ‘begin’ reverse engineering, and that’s where I hope to come in. That being said, to have fun with reversing and to get something out of these tutorials you should at least have a basic understanding of how program flow works (for example, you should know what a basic if…then statement does, what an array is, and have at least seen a hello world program). Secondly, becoming familiar with Assembly Language You can get thru the tutorials without it, but at some point you will want to become a guru at ASM to really know what you are doing. In addition, a lot of your time will be devoted to learning how to use tools. These tools are invaluable to a reverse engineer, but also require learning each tool’s shortcuts, flaws and idiosyncrasies. Finally, reverse engineering requires a significant amoun playing with different packers/protectors/encryption schemes, learning about programs originally written in different programming languages (even Delphi), deciphering anti-reverse engineering tricks…the list goes on and on. At the end of this tutorial I have added a ‘further reading’ section with some suggested sources. If you really want to get good at reversing, I highly suggest you do some further reading.
你大概可以猜到,大量的相关专业知识是成为一个专家级的逆向工程师所必须的。幸运的是,想“开始”做逆向工程并不是需要大量的知识的,这也是我希望本文能帮到初学者的。这么说,玩逆向工程并从本系列教程中获得知识,那么你至少应该初步了解程序流程是如何工作的(例如,您应该知道if…then等程序控制语句做了些什么,什么是一个数组,并且至少读过一个hello world程序)。其次,本人非常建议您熟悉汇编语言,虽然你可以不学汇编就看完我的教程,但在某种程度上如果你想成为一个ASM单片机专家而且真的知道自己在做什么,你最好还是要掌握汇编语言。此外,你将会用大量的时间学习如何使用工具。这些工具对逆向工程是必不可缺的,而且还需要学习每个工具的快捷键、缺陷和特质。最后,逆向工程需要大量的实验;玩不同的加壳器/保护锁/加密方案,学习用不同的语言(甚至Delphi)编写的程序,破译防逆向工程技巧…等等。本教程的最后我通过引用一些建议的来源添加了一个“进一步阅读”部分。如果你真的想要擅长逆向工程,我强烈建议你做一些进一步阅读。
What kinds of tools are used?
使用什么样的工具?
There are many different kinds of tools used in reversing. Many are specific to the types of protection that must be overcome to reverse a binary. There are also several that just make the reverser’s life easier. And then some are what I consider the ‘staple’ items - the ones you use regularly. For the most part, the tools fit into a couple categories:
有许多不同种类的工具可用于逆向工程。许多工具是针对于特定于类型的保护,必须破解这些种保护,这段二进制代码程序才能被逆向。还有几个是辅助工具,只是使逆向工程师的工作更轻松。在这里我只介绍“主要”工具 —— 你经常使用的。对大多逆向者而言,这些工具分类以下几类:
1. Disassemblers
1、反汇编器
Disassemblers attempt to take the machine language codes in the binary and display them in a friendlier format. They also extrapolate data such as function calls, passed variables and text strings. This makes the executable look more like human-readable code as opposed to a bunch of numbers strung together. There are many disassemblers out there, some of them specializing in certain things (such as binaries written in Delphi). Mostly it comes down to the one your most comfortable with. I invariably find myself working with IDA (there is a free version available ), as well as a couple of lesser known ones that help in specific cases.
反汇编器尝试把二进制机器语言代码转换成二进制字节文件,并以友好的格式显示它们。他们还推算数据,比如函数调用、传递的变量和文本字符串。这使得可执行文件看起来更像人类可读的代码而不是一堆串在一起的数字。有很多反汇编器,其中一些专门用来辅助做某些事情(如用Delphi编写的二进制文件)。你可以用一个你最满意的反汇编器。我总是觉得自己使用IDA最方便(有一个免费版本能从下载),以及一些在特定情况下对我用帮助的不太知名的反汇编器。
2. Debuggers
Debuggers are the bread and butter for reverse engineers. They first analyze the binary, much like a disassembler Debuggers then allow the reverser to step through the code, running one line at a time and investigating the results. This is invaluable to discover how a program works. Finally, some debuggers allow certain instructions in the code to be changed and then run again with these changes in place. Examples of debuggers are Windbg and Ollydbg. I almost solely use Ollydbg (), unless debugging kernel mode binaries, but we’ll get to that later.
调试器是逆向工程师的必需品。它们首先分析二进制程序,就像一个反汇编程器,调试器允许逆向工程师单步调试代码,一次运行一行并观察结果。这对发现一个程序是如何工作的是非常必不可少的。最后,一些调试器允许在调试运行中改变某些指令代码,然后在执行这些变化之后再继续运行程序。逆向工程师主要用到的调试器是Windbg和Ollydbg的。我几乎只使用Ollydbg (),除非调试内核模式的二进制文件,我们稍后再详述后者。
3. Hex editors
3、十六进制编辑器
Hex editors allow you to view the actual bytes in a binary, and change them. They also provide searching for specific bytes, saving sections of a binary to disk, and much more. There are many free hex editors out there, and most of them are fine. We won’t be using them a great deal in these tutorials, but sometimes they are invaluable.
十六进制编辑器允许您查看一个二进制程序的实际字节,并改变它们。他们还提供搜索特定字节,将部分二进制程序保存到磁盘,等等。有很多免费的十六进制编辑器,他们中的大多数都很好。我们不会在这些教程使用它们,但有时他们是无价的。
4. PE and resource viewers/editors
4、 可移植可执行文件和资源浏览器/编辑器
Every binary designed to run on a windows machine (and Linux for that matter) has a very specific section of data at the beginning of it that tells the operating system how to set up and initialize the program. It tells the OS how much memory it will require, what support DLLs the program needs to borrow code from, information about dialog boxes and such. This is called the Portable Executable, and all programs designed to run on windows needs to have one.
每一个运行在windows机器上(和Linux)的二进制程序有一个非常特定的数据段,一般是在它的开始处,它初告诉操作系统如何设置和初始化程序。它告诉操作系统它需要多少内存,需要从哪些支持DLL类库借用代码,还有对话框等的信息。这就是所谓的可移植可执行文件,且所有在windows上设计运行的程序需都要有它。
In the world of reverse engineering, this structure of bytes becomes very important, as it gives the reverser needed information about the binary. Eventually, you will want to (or need to) change this information, either to make the program do something different than what it was initially for, or to change the program BACK into something it originally was (like before a protector made the code really hard to understand). There are a plethora of PE viewers and editors out there. I use CFF Explorer () and LordPE (), but you can feel free to use whichever you’re comfortable with.
在逆向工程的世界中,这种字节结构变得非常重要,因为它给了逆向者必需的二进制信息。最终,你会想要(或需要)改变这种信息,要么使程序与它最初的做些不同的事情,要么改变程序回到它最初(像之前保护器的作用使代码难以理解)。有大量的PE查看器和编辑器。我使用CFF Explorer()和LordPE(),但是您可以随意使用任何一种你熟悉的PE查看/编辑器。
Most files also have resource sections. These include graphics, dialog items, menu items, icons and text strings. Sometimes you can have fun just by looking at () ) the resource sections. I will show you an example at the end of this tutorial.
大多数文件也有资源部分。这些包括图形、对话框项、菜单项、图标和文本字符串。有时通过观察或修改资源你就会玩得很开心,我将在本教程末尾向您展示一个它的例子。
5. System Monitoring tools
5、系统监测工具
When reversing programs, it is sometimes important (and when studying virii and malware, of the utmost importance) to see what changes an application are there registry keys created or queried? are there . ini files created? are separate processes created, perhaps to thwart reverse engineering of the application? Examples of system monitoring tools are procmon regshot , and process hacker. We will discuss these later in the tutorial.
对程序进行逆向时,有一些事是很重要的(当研究病毒和恶意软件时,这是至关重要的):看看应用程序对系统执行了什么改变;有无注册表键被创建或查询?有ini文件被创建了吗?有独立的进程被创建了吗,有无可能阻止逆向工程的应用程序?常用的系统监测工具有procmon, regshot和process hacker。稍后的教程我们将讨论这些。
6. Miscellaneous tools and information
6、其他综合工具和信息
There are tools we will pick up along the way, such as scripts, unpackers, packer identifiers etc. Also in this category is some sort of reference to the Windows API. This API is huge, and at times, complicated. It is extremely helpful in reverse engineering to know exactly what called functions are doing.
在学习的过程中我们将使用许多工具,包括脚本、解壳器、壳识别器等等。在这一类中有一些对Windows API的引用。这个API是巨大的,有时,还是复杂的。在逆向工程中知道被调用的函数是做什么的对逆向者是极其有用的。
So Let’s Get On With It, Already!
准备好了,让我们继续!
Even though we are starting with very little knowledge, I did want to give you at least a little taste of reversing in this first tutorial. I have included a resource viewer/edit in this tutorial (see the Files folder) called XN Resource Editor.
即使我们刚开始用到很少的知识,我想在第一个教程里给你至少有点味道的逆向工程。本教程中包括资源浏览器/编辑(见“文件”文件夹),称为XN资源编辑器。
It is freeware. Basically, this program allows you to see the resource section in an exe file, as well as modify these resources. I have found that you can have an awful lot of fun with these - they allow you to change the menus, icons, graphics, dialogs, you name it, in programs. Let’s try one ourselves…
它是免费软件。基本上,这个程序允许您在一个exe文件中查看它的资源部分,以及修改这些资源。我发现从这些你可以得到很多的乐趣 —— 它们允许你改变菜单、图标、图形、对话框。你在程序中给它们命名。让我们自己尝试一下…
First, run XN. Click on the load icon on top, and click over to Windows\System32\ and load calc.exe (you’re default windows location may vary.) You should see a bunch of folders available:
首先,运行XN。单击在上面的“加载”图标,然后单击Windows \ System32 \并加载calc.exe(你默认窗口位置可能会有所不同。)您应当会看到一堆文件夹:
You can see that there are folders for Bitmaps (any graphics the program displays), Menu (the top menu items), Dialog (dialog boxes, along with text and buttons), String Table, IconGroup etc. You should feel free to mess around with these things. Just make sure to save it as a different file (you would hate to have to re-install windows just for the dumb calculator). In particular, try this:
您可以看到有许多放置位图的文件夹(任何图形程序显示),菜单(顶部菜单项),对话框(对话框、文本和按钮),字符串表,图标集等等。你可以在这些事情上花自由的时间消遣。一定要将其保存为一个不同的文件(你不会为了这个“愚蠢”的计算器而重新安装windows吧)。特别是,试试这个:
Click on the plus next to Menu. You will then see a folder with a number as a name. This is the ID that windows will use to access this resource in the program. Open this folder as well. You should now see an icon for “English (United States)” or something like this. If you click on this you will see a diagram of what the menu will look like (you can even click around - it works just like a real menu).
点击旁边的“加号”菜单。然后,您将看到一个以数字命名的文件夹。windows使用这个ID在计算机里访问这个资源。打开这个文件夹。您现在应该看到一个图标为“英语(美国)”之类。如果你点击这个按钮,你会看到一个图的菜单会是什么样子(你甚至可以在其周围点击,它的工作原理像一个真正的菜单)。
Now, click on the menu option “Scientific”. The Caption field should change to “&Scientific”. The ampersand is there to tell you what the ‘Hot-Key’ is, in this case ‘S’. If instead we wanted the ‘e’ to be the hot-key, it would look like this “Sci&entific”. So already, don’t like the built in hot-key’s for calc? Just change them!! But let’s do something different. In the Caption field, replace the &Scientific with “&Nerd”. This will now change the menu option to “Nerd” and use the hot-key ‘N’ (I looked through the other options in the menu to make user no other menu option used ‘N’ as a hot-key). You should do this for all of the menu entries. Now, go up to File (in XN Resource) and choose “Save As…” Save your new version of calc to a different name (and preferably a different location) and then run it.
现在,单击菜单选项“科学”。在标题字段应该改变“&Scientific”。“&”告诉你“热键”是什么,在这种情况下是“S”。如果我们想要“e”为热键,这菜单变变为“Sci&entific”。如果你不喜欢计算器内建缺省的热键,你可以改变他们! 但是让我们做些不同的事情。在标题字段中,将“&Scientific”替换为“&Nerd”。这将改变原菜单选项为“Nerd”,并使用热键“N”(我仔细检查了所有菜单的选项卡,确认没有其他菜单选项以“N”为热键)。你也应该像我一样检查所有的菜单项。现在,去“文件”(在XN资源),选择“另存为…”保存新版本“计算器”到一个不同的名称(最好是不同的位置),然后运行它。
Of course, you don’t have to stop there. In order to drive my coworkers nuts, I changed all of the numbers in their calcs.
当然,你不必就此止步。为了让我的同事绞尽脑汁思考,我改变了他们所有电脑上计算器的数字。
As you can see, the sky’s the limit.
正如您可以看到的,天空是你的极限。
Till next time…
直到下次…
ps. Thanks go out to Lena151, for showing me the way, A.S.L. , snaker, Qwerton and Jibz for showing me the secrets, and Olly , Yoda-mmi, uCF and Colin Wilson for giving me the tools.
附言. 谢谢Lena151,给我指明方向,A.S.L., snaker, Qwerton and Jibz为我揭示秘密,和Olly, Yoda-mmi, uCF and Colin为我提供工具。
Further Reading
进一步的阅读
1. Assembly Language. Assembly Language For Intel Based Computers
1、汇编语言。基于英特尔电脑的汇编语言
is the de-facto book on it. You can also check out some web sites that offer a tremendous amount of downloads, instruction, sample code, and help. Another good resource is “The Art of Assembly”. I will be including this in one of the next tutorials, but you can also download it here.
本文实际上是基于此书。你也可以看看一些网站提供大量的下载、教学指引、示例代码和帮助。另一个很好的资源是“汇编的艺术”。我将包括在接下来的教程提到它,但是你也可以在这里下载它。
2. The PE file structure. One of the best resources is from Microsoft themselves: “An in-depth look into the Win32 Portable Executable File Format. Another good document (with lots of pretty pictures) is “PE File Structure”. It is a downloadable PDF.
2、PE文件结构。最好的资源之一,来自微软自己:“深入剖析Win32可移植可执行文件格式”。这又是一个很好的文档(有很多漂亮的照片),写的是关于“PE文件结构”。这本书的PDF可以下载。
3. Windows Operating System Internals. The de-facto book is “Microsoft Windows Internals” by Mark Russinovich. It’s about as exciting as women’s baseball, but it is THE resource.
3、深入理解Windows操作系统内核。这本书实际上是“微软Windows内部机制详解”,作者是马克·若斯诺维奇”。它写得像女人的私处一样激动人心,但它是对的学习资源。
4. Cracking tutorials.
is the place to be.
4、破解教程。是你要去的地方。
原创翻译自:
您最近学习回来了吧!!!!!!!
主题好友积分
初学乍练, 积分 193, 距离下一级还需 7 积分
初学乍练, 积分 193, 距离下一级还需 7 积分
阅读权限10
在线时间0 小时
感谢楼主的无私分享!要想龙天论坛好 就靠你我他[STUDY]
主题好友积分
初学乍练, 积分 156, 距离下一级还需 44 积分
初学乍练, 积分 156, 距离下一级还需 44 积分
阅读权限10
在线时间3 小时
既然你诚信诚意的推荐了,那我就勉为其难的看看吧!龙天论坛不走平凡路。[STUDY]
主题好友积分
登堂入室, 积分 332, 距离下一级还需 68 积分
登堂入室, 积分 332, 距离下一级还需 68 积分
阅读权限20
在线时间3 小时
楼主,大恩不言谢了!龙天论坛是最棒的![STUDY]
主题好友积分
初学乍练, 积分 188, 距离下一级还需 12 积分
初学乍练, 积分 188, 距离下一级还需 12 积分
阅读权限10
在线时间0 小时
论坛不能没有像楼主这样的人才啊!我会一直支持龙天论坛。
主题好友积分
阅读权限130
在线时间882 小时
很不错的帖子,带英文给力。
主题好友积分
初学乍练, 积分 155, 距离下一级还需 45 积分
初学乍练, 积分 155, 距离下一级还需 45 积分
阅读权限10
在线时间0 小时
楼主,我太崇拜你了!我想我是一天也不能离开龙天论坛。[STUDY]
主题好友积分
初学乍练, 积分 1, 距离下一级还需 199 积分
初学乍练, 积分 1, 距离下一级还需 199 积分
阅读权限10
在线时间1 小时
你为什么不继续翻译了啊!!!!!!!!!!!!!!!!!!!!!!1
主题好友积分
阅读权限130
在线时间10 小时
楼主太棒了,感谢楼主楼主太棒了,感谢楼主楼主太棒了,感谢楼主楼主太棒了,感谢楼主楼主太棒了,感谢楼主}

我要回帖

更多关于 施工中 百度网盘 的文章

更多推荐

版权声明:文章内容来源于网络,版权归原作者所有,如有侵权请点击这里与我们联系,我们将及时删除。

点击添加站长微信