The world's richest man started by developing gutter oil
Chapter 135 Chapter 132: Super Body
Chapter 135 Chapter 132: Super Body
In a blink of an eye, it’s twelve o’clock noon.
A financial company called CDB in Beijing.
It was already lunch time. Financial company employee Tan Dehan ordered a takeaway and sat in front of the computer to browse PConline.
Because he planned to go to Zhongguancun to assemble a computer on the weekend, he first checked the relevant information online. When he logged in to the website, he saw a pinned news item.
[The most powerful security software in history]
The content of the article is as follows: The editor received a push advertisement while browsing the website today.This advertisement is an advertisement for Deep Blue Security Software. Then the editor went to the official website of Deep Blue Security Software to check the relevant information.
Unexpectedly, this Deep Blue security software is actually a software company under the Deep Blue Group.
I don’t know if you still remember the incident of WeChat selecting a hacker circle. So far, WeChat servers have not been breached by hackers. It can be imagined that WeChat’s security technology is world-class.
The company to which WeChat belongs is Deep Blue Network, but behind it is Deep Blue Group.
The editor called the customer service number of Deep Blue Network, and the customer service gave a clear answer. Deep Blue Security Software is indeed a subsidiary of Deep Blue Group, and the developers of Deep Blue Security Software are the developers of Deep Blue Network. However, Deep Blue Network has separated the security department. come out.
How can the security software developed by Deep Blue Network with such powerful security technology be so bad?
This soft article is a thousand words long and Tan Dehan patiently read it through.
After reading the introduction of Deep Blue Security Software, Tan Dehan found that this software is so awesome. Let’s not talk about whether this software is the most powerful in the world, but its functions are the most powerful.
The functions of Deep Blue Security Software can be said to be the most powerful security software currently on the market.
Tan Dehan immediately downloaded a Deep Blue security software based on the link provided by Taiping.com.
Just after the software was installed, he discovered that there were several Trojans on his computer. Deep Blue Security Software marked the functions of these software. Although these software will not cause any damage to the computer, these software will steal their Penguin passwords. Have a game account password.
[Delete these passwords? 】
【Yes or No】
Tan Dehan clicked [Yes] without thinking. Although he doesn't play online games very much, he is worried that the Penguin will be stolen.
Tan Dehan then used Deep Blue security software to clean up the C drive and use the security software to optimize the system speed. After restarting, he found that the computer speed doubled and the C drive returned from full to a healthy state.
What is a healthy state?
The capacity of the computer's C drive is 40GB. After cleaning, the capacity reaches 38GB. After cleaning, it becomes 27GB.
Although it could not be restored to the 10GB when the system was first installed, the performance was restored to its original state. Tan Dehan immediately shared this software.
Jingcheng 360 Company.
After Zhou Hongwei learned that DeepBlue Security Software was on the market, he immediately downloaded DeepBlue Security Software and tested it.
The test results of Deep Blue security software were dozens of times better than he imagined.
First of all, Deep Blue security software on the market can detect and kill viruses. Deep Blue can also detect and kill some viruses that Deep Blue cannot detect and kill. Then there are the additional functions of Deep Blue security software. The additional functions can also kill them instantly.
Then when it comes to memory usage, 360 needs to occupy 76BM of memory, while Deep Blue only needs 68MB.
Then when it comes to CPU usage, Deep Blue only takes up less than 1% of the usage, but their 360 actually uses 3% of the usage.
Of course, this was tested on his computer. His computer uses a Core I7 920. The performance of 3% is already very powerful. If you switch to other CPUs, you will need at least about 8% usage.
At this time, Zhou Hongwei's first thought was that 360 was half as good.
Why is it said to be half cool instead of completely cool?
Because most users have no idea about the performance of anti-virus software, it is impossible for ordinary users to compare them. Of course, if users look carefully, they can still see the difference between them.
The only thing Zhou Hongwei can do now is pray.
I pray that no more severe viruses will appear in the near future. If some more severe viruses appear in the near future, then 360 will really be doomed.
Zhou Hongwei has no confidence at all in terms of technology. Just from the perspective of security software, Deep Blue's technology is at least several generations ahead of them. If a new virus appears, they will not be able to solve it in the short term.
Then they will be demoted from China's first-class security software to second-class because of this virus.
Zhou Hongwei immediately sent a message to the work group, asking everyone to download the Deep Blue security software, asking everyone to analyze the software, find the differences between them, and then fill in the differences.
Of course, this matter cannot be completed in the short term. This process will take at least two to three months to complete.
In a blink of an eye, it was 02:30 in the afternoon.
Sun Jianming looked at the data in the background with a delighted smile on his face. In two hours, the number of installed machines reached 300 million. This is definitely the fastest growing security software in history. What makes him even more delighted is that the number of paying users has reached more than 8000.
This is definitely a good start for Deep Blue Security Software.
Some people may say that the payment platform has not been established yet, so how do users pay for Deep Blue security software.
Of course, you have to use a certain treasure to pay. If you don’t have it, just use someone else’s. There is no other way.
Deep Blue Group President's Office.
Rong Zhengli came to Han Chen's office again. After acquiring Dolby's decoding technology, it only took them two hours to install the new decoder into the chip. After completing this task, Han Chen again Call him.
This time Han Chen called him here to arrange a new task for him.
"Please take a look at these two documents first." Han Chen threw the documents in his hand in front of Rong Zhengli and said.
The first document is the technical description of 802.11ac. 802.11ac is the fifth generation of WIFI. Some people may ask why this thing exists. WIFI technology has always been backward compatible, although Han Chen purchased 802.11 in the mall. ax, but 802.11ax contains the technology of 802.11ac.
The other document is the technical document of Deep Blue Security Software. Han Chen wants to create his own security routing like 360.
Rong Zhengli couldn't believe his eyes when he saw the first document.
At present, the most advanced technology in the world is 802.11n. This technology was only launched this year, but Han Chen actually came up with a more advanced technology. This technology will definitely shock the world when it comes out.
It took Rong Zhengli half an hour to finally read the technical documents of 802.11ac.
This fifth generation WIFI technology is much stronger than the existing fourth generation WIFI technology.
WiFi 5 is faster than WiFi 4 and can provide data transfer speeds of up to 1.3Gbps.
WiFi 5 supports wider frequency bandwidth, up to 160MHz, while WiFi 4 only supports up to 40MHz. WiFi 5 uses MU-MIMO technology, which can send data packets to multiple devices at the same time, while WiFi 4 only supports single-user MIMO technology.
WiFi 5 has a wider signal coverage than WiFi 4, and the signal has a stronger ability to penetrate walls and obstacles.
Rong Zhengli took a deep breath and continued to check the next document. He also knew something about Deep Blue security software, but it was not as detailed as what was stated in the document.
After reading the two documents, he already understood what Han Chen meant. Han Chen wanted him to develop a WIFI6 chip.
"Mr. Han, using Cortex-A8 to develop a wireless routing chip is not a big problem, but we only know how to develop chips but not routing systems. If we really want to complete this task, we need DeepBlue Security Software to cooperate with us. It's all about development." Rong Zhengli said, putting down the document in his hand.
"I will ask the people from Deep Blue Network Security to cooperate with you. If you need anything, just report and apply. If you need to recruit talents, let Tong Jingjing recruit them. In addition, the personnel in your chip R&D department cannot be left behind.
Expand the chip R&D staff team to more than 500 people as soon as possible. "Han Chen said.
"Mr. Han, on the issue of expansion, I can only say try our best, because there are too few relevant talents in the country." Rong Zhengli sighed.
"I'll let the people over there contact you later, and you can think about how to get it out." Han Chen said.
Han Chen is also aware of this situation, so Han Chen will not force him. Why force him instead of Tong Jingjing?
Whether the people recruited by Tong Jingjing can be hired must go through a re-examination by Rong Zhengli. If they fail the re-examination, it will be useless no matter how many people Tong Jingjing recruits.
"Mr. Han, I'm going to get busy first," Rong Zhengli said.
"Yeah." Han Chen nodded.
After Rong Zhengli left, Han Chen opened the security software background to check the situation. The number of installed Deep Blue security software has reached 500 million, and the number of paying users has reached more than 12000. This number completely shocked Han Chen.
He never expected that the installed capacity of Deep Blue Security Software would be so terrifying.
The reason why Deep Blue Security Software is able to achieve this is because WeChat provokes the hacker circle.
This incident has made many Internet users have a certain understanding of Deep Blue's security technology. The good experience has made Deep Blue security software gain a good reputation from word of mouth. However, this number is just a younger brother compared to 360.
In 360, the installed base of 2008 exceeded 1 million.
360 is able to obtain such a large installed base thanks to pirated pre-installed systems. The pre-installed systems installed by computer companies for users come with 360 software. Deep Blue Technology does not cooperate with these third-party pre-installed systems.
For Han Chen, individual users are not his target. Han Chen's real target is the entire Huaxia system. They are the largest paying users of China's anti-virus software.
Of course, getting these orders doesn’t mean sitting at home and waiting for them to be delivered to your door.
If you want to get these orders, you have to either use relationships or find a salesperson to run the business. Han Chen prefers to use relationships rather than running the business.
Han Chen sent a message to Zhang Jianxin as soon as DeepBlue security software was launched.
Tell him that Deep Blue Security Network has developed a security software and hope that he can recommend this software, especially the encryption tool of Deep Blue Security Software. This tool is an artifact for units with medium confidentiality levels.
Zhang Jianxin readily agreed to the request after learning the news.
Of course, in addition to running business through relationships, you still have to run it. After all, companies other than the Huaxia system can also use it.
"Boom~boom~boom"
Just then there was a knock on the office door.
"Come in." Han Chen called out when he heard the knock on the door.
The office was a bit big and it seemed that the door was not heard. Han Chen could only increase the volume and shout again. Han Chen suddenly felt that shouting like this was a bit draining, so he turned around and asked Chang Huazhang to install an electronic doorbell and a warning light.
After someone outside rings the doorbell, he can press the light inside to let the other person in.
It was said that Cao Cao had arrived, and the person who came was none other than Chang Huazhang.
"Mr. Han, this is last month's financial statement." Chang Huazhang put the statement on the table and said.
In fact, the reports of each branch have been completed before the 10th, but Zhang Guilan's side needs a little time to complete the summary. Unless any branch suffers serious losses, Zhang Guilan does not need to report to South Korea as soon as possible. Chen reported.
"You go back and ask someone to install a remote control light and doorbell at the door. The office is a bit big and you can't hear me even if I shout. Press the doorbell before you come in next time, and then I can press the remote control light. You can watch from the door. You can come in when the lights come on," Han Chen said.
"Okay, Mr. Han." Chang Huazhang nodded.
5st Floor, Building 1, Nantian Pioneer Park.
Since Han Chen bought Nantian Pioneer Park, he moved Deep Blue Medical Equipment to Building 5.
Building 7 only houses the headquarters personnel and the computer room. The first and second floors of Building 7 are computer rooms.
Kong Huimin is checking the sales data of a certain treasure. The sales volume of Super Body 001 reached more than 7 boxes within 80 days of its launch. The price of 29 yuan per box does not include free shipping. As time goes by, the sales volume will definitely increase, because many people Will definitely repurchase after using it.
The more than 80 yuan is just the sales volume on a certain treasure. Anlan Technology took away 200 million boxes. It is not known how the sales were.
Kong Huimin is most concerned about the Wal-Mart line. She sent a hundred boxes of samples to the other party, but the other party has not yet responded to him.
"Boom~boom~boom"
"Come in." Kong Huimin called.
At this time, a girl in her 20s walked in. The girl was dressed very conservatively. To use a simple word to describe it, she was old-fashioned. However, despite the fact that this girl was dressed very old-fashioned, she was an outstanding student at Shenzhen University. .
The girl's name is Zhou Shuyan, and she is Kong Huimin's personal secretary.
"Mr. Kong, Mr. Sai Aidi from Reckitt Benckiser would like to make an appointment with you. I wonder if you want to meet him?" Zhou Shuyan asked.
Perhaps many people don’t know what kind of company Reckitt Benckiser is, and they are also curious about why people from this company want to meet Kong Huimin.
Reckitt Benckiser Group is a British FMCG giant and the parent company of the well-known condom avoidance brand Durex. It also owns cleansing and care brands such as Dettol, Veet, and Dishes.
Sai Aidi is the general manager of Reckitt Benckiser's China region.
"You tell the other person that there is no need to meet. The super body will not be sold to anyone." Kong Huimin said.
The other party wants to see him because he wants to acquire Deep Blue Medical Machinery. Even if the other party is not for Deep Blue Medical Machinery, the other party still wants to obtain the technology of Super Body 001.
(End of this chapter)
In a blink of an eye, it’s twelve o’clock noon.
A financial company called CDB in Beijing.
It was already lunch time. Financial company employee Tan Dehan ordered a takeaway and sat in front of the computer to browse PConline.
Because he planned to go to Zhongguancun to assemble a computer on the weekend, he first checked the relevant information online. When he logged in to the website, he saw a pinned news item.
[The most powerful security software in history]
The content of the article is as follows: The editor received a push advertisement while browsing the website today.This advertisement is an advertisement for Deep Blue Security Software. Then the editor went to the official website of Deep Blue Security Software to check the relevant information.
Unexpectedly, this Deep Blue security software is actually a software company under the Deep Blue Group.
I don’t know if you still remember the incident of WeChat selecting a hacker circle. So far, WeChat servers have not been breached by hackers. It can be imagined that WeChat’s security technology is world-class.
The company to which WeChat belongs is Deep Blue Network, but behind it is Deep Blue Group.
The editor called the customer service number of Deep Blue Network, and the customer service gave a clear answer. Deep Blue Security Software is indeed a subsidiary of Deep Blue Group, and the developers of Deep Blue Security Software are the developers of Deep Blue Network. However, Deep Blue Network has separated the security department. come out.
How can the security software developed by Deep Blue Network with such powerful security technology be so bad?
This soft article is a thousand words long and Tan Dehan patiently read it through.
After reading the introduction of Deep Blue Security Software, Tan Dehan found that this software is so awesome. Let’s not talk about whether this software is the most powerful in the world, but its functions are the most powerful.
The functions of Deep Blue Security Software can be said to be the most powerful security software currently on the market.
Tan Dehan immediately downloaded a Deep Blue security software based on the link provided by Taiping.com.
Just after the software was installed, he discovered that there were several Trojans on his computer. Deep Blue Security Software marked the functions of these software. Although these software will not cause any damage to the computer, these software will steal their Penguin passwords. Have a game account password.
[Delete these passwords? 】
【Yes or No】
Tan Dehan clicked [Yes] without thinking. Although he doesn't play online games very much, he is worried that the Penguin will be stolen.
Tan Dehan then used Deep Blue security software to clean up the C drive and use the security software to optimize the system speed. After restarting, he found that the computer speed doubled and the C drive returned from full to a healthy state.
What is a healthy state?
The capacity of the computer's C drive is 40GB. After cleaning, the capacity reaches 38GB. After cleaning, it becomes 27GB.
Although it could not be restored to the 10GB when the system was first installed, the performance was restored to its original state. Tan Dehan immediately shared this software.
Jingcheng 360 Company.
After Zhou Hongwei learned that DeepBlue Security Software was on the market, he immediately downloaded DeepBlue Security Software and tested it.
The test results of Deep Blue security software were dozens of times better than he imagined.
First of all, Deep Blue security software on the market can detect and kill viruses. Deep Blue can also detect and kill some viruses that Deep Blue cannot detect and kill. Then there are the additional functions of Deep Blue security software. The additional functions can also kill them instantly.
Then when it comes to memory usage, 360 needs to occupy 76BM of memory, while Deep Blue only needs 68MB.
Then when it comes to CPU usage, Deep Blue only takes up less than 1% of the usage, but their 360 actually uses 3% of the usage.
Of course, this was tested on his computer. His computer uses a Core I7 920. The performance of 3% is already very powerful. If you switch to other CPUs, you will need at least about 8% usage.
At this time, Zhou Hongwei's first thought was that 360 was half as good.
Why is it said to be half cool instead of completely cool?
Because most users have no idea about the performance of anti-virus software, it is impossible for ordinary users to compare them. Of course, if users look carefully, they can still see the difference between them.
The only thing Zhou Hongwei can do now is pray.
I pray that no more severe viruses will appear in the near future. If some more severe viruses appear in the near future, then 360 will really be doomed.
Zhou Hongwei has no confidence at all in terms of technology. Just from the perspective of security software, Deep Blue's technology is at least several generations ahead of them. If a new virus appears, they will not be able to solve it in the short term.
Then they will be demoted from China's first-class security software to second-class because of this virus.
Zhou Hongwei immediately sent a message to the work group, asking everyone to download the Deep Blue security software, asking everyone to analyze the software, find the differences between them, and then fill in the differences.
Of course, this matter cannot be completed in the short term. This process will take at least two to three months to complete.
In a blink of an eye, it was 02:30 in the afternoon.
Sun Jianming looked at the data in the background with a delighted smile on his face. In two hours, the number of installed machines reached 300 million. This is definitely the fastest growing security software in history. What makes him even more delighted is that the number of paying users has reached more than 8000.
This is definitely a good start for Deep Blue Security Software.
Some people may say that the payment platform has not been established yet, so how do users pay for Deep Blue security software.
Of course, you have to use a certain treasure to pay. If you don’t have it, just use someone else’s. There is no other way.
Deep Blue Group President's Office.
Rong Zhengli came to Han Chen's office again. After acquiring Dolby's decoding technology, it only took them two hours to install the new decoder into the chip. After completing this task, Han Chen again Call him.
This time Han Chen called him here to arrange a new task for him.
"Please take a look at these two documents first." Han Chen threw the documents in his hand in front of Rong Zhengli and said.
The first document is the technical description of 802.11ac. 802.11ac is the fifth generation of WIFI. Some people may ask why this thing exists. WIFI technology has always been backward compatible, although Han Chen purchased 802.11 in the mall. ax, but 802.11ax contains the technology of 802.11ac.
The other document is the technical document of Deep Blue Security Software. Han Chen wants to create his own security routing like 360.
Rong Zhengli couldn't believe his eyes when he saw the first document.
At present, the most advanced technology in the world is 802.11n. This technology was only launched this year, but Han Chen actually came up with a more advanced technology. This technology will definitely shock the world when it comes out.
It took Rong Zhengli half an hour to finally read the technical documents of 802.11ac.
This fifth generation WIFI technology is much stronger than the existing fourth generation WIFI technology.
WiFi 5 is faster than WiFi 4 and can provide data transfer speeds of up to 1.3Gbps.
WiFi 5 supports wider frequency bandwidth, up to 160MHz, while WiFi 4 only supports up to 40MHz. WiFi 5 uses MU-MIMO technology, which can send data packets to multiple devices at the same time, while WiFi 4 only supports single-user MIMO technology.
WiFi 5 has a wider signal coverage than WiFi 4, and the signal has a stronger ability to penetrate walls and obstacles.
Rong Zhengli took a deep breath and continued to check the next document. He also knew something about Deep Blue security software, but it was not as detailed as what was stated in the document.
After reading the two documents, he already understood what Han Chen meant. Han Chen wanted him to develop a WIFI6 chip.
"Mr. Han, using Cortex-A8 to develop a wireless routing chip is not a big problem, but we only know how to develop chips but not routing systems. If we really want to complete this task, we need DeepBlue Security Software to cooperate with us. It's all about development." Rong Zhengli said, putting down the document in his hand.
"I will ask the people from Deep Blue Network Security to cooperate with you. If you need anything, just report and apply. If you need to recruit talents, let Tong Jingjing recruit them. In addition, the personnel in your chip R&D department cannot be left behind.
Expand the chip R&D staff team to more than 500 people as soon as possible. "Han Chen said.
"Mr. Han, on the issue of expansion, I can only say try our best, because there are too few relevant talents in the country." Rong Zhengli sighed.
"I'll let the people over there contact you later, and you can think about how to get it out." Han Chen said.
Han Chen is also aware of this situation, so Han Chen will not force him. Why force him instead of Tong Jingjing?
Whether the people recruited by Tong Jingjing can be hired must go through a re-examination by Rong Zhengli. If they fail the re-examination, it will be useless no matter how many people Tong Jingjing recruits.
"Mr. Han, I'm going to get busy first," Rong Zhengli said.
"Yeah." Han Chen nodded.
After Rong Zhengli left, Han Chen opened the security software background to check the situation. The number of installed Deep Blue security software has reached 500 million, and the number of paying users has reached more than 12000. This number completely shocked Han Chen.
He never expected that the installed capacity of Deep Blue Security Software would be so terrifying.
The reason why Deep Blue Security Software is able to achieve this is because WeChat provokes the hacker circle.
This incident has made many Internet users have a certain understanding of Deep Blue's security technology. The good experience has made Deep Blue security software gain a good reputation from word of mouth. However, this number is just a younger brother compared to 360.
In 360, the installed base of 2008 exceeded 1 million.
360 is able to obtain such a large installed base thanks to pirated pre-installed systems. The pre-installed systems installed by computer companies for users come with 360 software. Deep Blue Technology does not cooperate with these third-party pre-installed systems.
For Han Chen, individual users are not his target. Han Chen's real target is the entire Huaxia system. They are the largest paying users of China's anti-virus software.
Of course, getting these orders doesn’t mean sitting at home and waiting for them to be delivered to your door.
If you want to get these orders, you have to either use relationships or find a salesperson to run the business. Han Chen prefers to use relationships rather than running the business.
Han Chen sent a message to Zhang Jianxin as soon as DeepBlue security software was launched.
Tell him that Deep Blue Security Network has developed a security software and hope that he can recommend this software, especially the encryption tool of Deep Blue Security Software. This tool is an artifact for units with medium confidentiality levels.
Zhang Jianxin readily agreed to the request after learning the news.
Of course, in addition to running business through relationships, you still have to run it. After all, companies other than the Huaxia system can also use it.
"Boom~boom~boom"
Just then there was a knock on the office door.
"Come in." Han Chen called out when he heard the knock on the door.
The office was a bit big and it seemed that the door was not heard. Han Chen could only increase the volume and shout again. Han Chen suddenly felt that shouting like this was a bit draining, so he turned around and asked Chang Huazhang to install an electronic doorbell and a warning light.
After someone outside rings the doorbell, he can press the light inside to let the other person in.
It was said that Cao Cao had arrived, and the person who came was none other than Chang Huazhang.
"Mr. Han, this is last month's financial statement." Chang Huazhang put the statement on the table and said.
In fact, the reports of each branch have been completed before the 10th, but Zhang Guilan's side needs a little time to complete the summary. Unless any branch suffers serious losses, Zhang Guilan does not need to report to South Korea as soon as possible. Chen reported.
"You go back and ask someone to install a remote control light and doorbell at the door. The office is a bit big and you can't hear me even if I shout. Press the doorbell before you come in next time, and then I can press the remote control light. You can watch from the door. You can come in when the lights come on," Han Chen said.
"Okay, Mr. Han." Chang Huazhang nodded.
5st Floor, Building 1, Nantian Pioneer Park.
Since Han Chen bought Nantian Pioneer Park, he moved Deep Blue Medical Equipment to Building 5.
Building 7 only houses the headquarters personnel and the computer room. The first and second floors of Building 7 are computer rooms.
Kong Huimin is checking the sales data of a certain treasure. The sales volume of Super Body 001 reached more than 7 boxes within 80 days of its launch. The price of 29 yuan per box does not include free shipping. As time goes by, the sales volume will definitely increase, because many people Will definitely repurchase after using it.
The more than 80 yuan is just the sales volume on a certain treasure. Anlan Technology took away 200 million boxes. It is not known how the sales were.
Kong Huimin is most concerned about the Wal-Mart line. She sent a hundred boxes of samples to the other party, but the other party has not yet responded to him.
"Boom~boom~boom"
"Come in." Kong Huimin called.
At this time, a girl in her 20s walked in. The girl was dressed very conservatively. To use a simple word to describe it, she was old-fashioned. However, despite the fact that this girl was dressed very old-fashioned, she was an outstanding student at Shenzhen University. .
The girl's name is Zhou Shuyan, and she is Kong Huimin's personal secretary.
"Mr. Kong, Mr. Sai Aidi from Reckitt Benckiser would like to make an appointment with you. I wonder if you want to meet him?" Zhou Shuyan asked.
Perhaps many people don’t know what kind of company Reckitt Benckiser is, and they are also curious about why people from this company want to meet Kong Huimin.
Reckitt Benckiser Group is a British FMCG giant and the parent company of the well-known condom avoidance brand Durex. It also owns cleansing and care brands such as Dettol, Veet, and Dishes.
Sai Aidi is the general manager of Reckitt Benckiser's China region.
"You tell the other person that there is no need to meet. The super body will not be sold to anyone." Kong Huimin said.
The other party wants to see him because he wants to acquire Deep Blue Medical Machinery. Even if the other party is not for Deep Blue Medical Machinery, the other party still wants to obtain the technology of Super Body 001.
(End of this chapter)
You'll Also Like
-
People in Zongman, double-wearing American comics to extract Superman entries
Chapter 306 46 days ago -
Yue Buqun: I'm already cultivating immortality, why do I still want to be the leader?
Chapter 517 46 days ago -
Elf: My Healing Farm
Chapter 144 46 days ago -
Zongman: Start with Sakurasou and pick up a female high school student
Chapter 354 46 days ago -
Football: Xiao Junguang template, Real Madrid begs me to let him go
Chapter 156 46 days ago -
Taking stock of the American comic universe, the black robe universe shocked the superheroes
Chapter 154 46 days ago -
Collapse: Beginning Production Game
Chapter 414 46 days ago -
Knight: Infinite Summoning, Support the Goddess of Creation
Chapter 330 46 days ago -
Universal copy: invincible from negative ninety-nine level
Chapter 152 46 days ago -
Original God: My previous life is revealed, I am the Archbishop of Destiny
Chapter 128 46 days ago