登陆注册
2833500000006

第6章 Security of E-commerce电子商务安全

Crazy Viruses疯狂病毒

infect 感染

Your computer is inclined to be infected by viruses.Have you got the virus killing software?

你的电脑可能染上病毒了,有杀毒软件吗?

A file virus infects program files.

文件病毒感染程序文件。

A macro virus infects individual document.

宏病毒感染单个文件。

It infects files created in programs that use macro programming language,such as Microsoft Office s Word and Excel programs.

它感染那些使用宏程序语言的程序(如微软的Word和Excel程序)创建的文档。

Identifying the different types of viruses,and knowing how they spread from one computer to another will help you keep your PC away from infecting.

识别不同类型的电脑病毒,并弄清它们如何从一台电脑传入另一台电脑,这会帮助你保持个人电脑不受感染。

Boot and partition sector viruses infect the system software;that is,the special parts of the hard disk that enable your computer to start,or“boot”up.

引导和分区病毒感染系统软件,也就是硬盘中使你的电脑得以启动或引导的特殊部分。

They infect the system software and remove the starting up instructions.

这些病毒感染了系统软件,撤换了你的电脑启动指令。

It s unfortunate that your computer is infected by boot and partition sector viruses.It is very troublesome.

你的电脑不幸染上了引导和分区病毒,这非常麻烦。

“Rom”stands for “read only memory”,which means it will not be infected or,indeed,it never receives any other kind of information.

Rom代表只读存储器,这意味着它不会感染病毒,因为事实上,它从不接受任何信息。

Regular viruses can be transmitted to other PCs via an infected file.

常规情况下,病毒通过受感染的文件从一台电脑传播到另一台电脑。

My computer was infected with viruses.

我的电脑被感染了。

pass on... 传播/传入

Once the concept virus infects your computer,it clings to the“save”operation,passing on the infection to each and every document you save.

一旦概念病毒侵入你的电脑,将粘附到“存贮”操作上,把病毒传入你所存贮的每一份文件。

Worm(like the Love Bug)are viruses that make use of a local area network or the Internet,such as e-mail to replicate and pass themselves to new users.

蠕虫(如“爱虫”)是利用局域网或者是因特网,如利用电子邮件复制并且将病毒传播给新的因特网用户的一种病毒。

Most people are aware that computer viruses may be passed on by e-mail and that,if an unsuspecting user opens that virus,the virus may infect and wreak havoc on the user s computer system.

大多数的人都知道电脑病毒可以通过电子邮件传播,如果一个毫无警惕的用户打开了病毒,用户的电脑系统就会受到病毒的严重破坏。

antivirus 杀毒的

Your antivirus software should be updated.

你的杀毒软件该升级了。

But the viruses update itself faster than the antivirus software.How can we know when we should upgrade it?

但病毒要比杀毒软件升级得快。我们怎么会知道什么时候该升级软件呢?

In the face of the antivirus softwares which are emerging one after another,even the veterans are at a loss to know how to conduct themselves.

面对层出不穷的杀毒软件,即使老手们也无所适从。

MCAfee is the first one among the world s antivirus software.

MCAfee是世界第一品牌的杀毒软件。

You d better know something about antivirus.

你应该了解一些杀毒的知识。

It isn t enough.No antivirus software can kill all of the viruses.

这还不够,没有一种杀毒软件会杀死所有病毒。

It means that I can t sit back and relax even I have installed antivirus software.

这就意味着即使我安装了杀毒软件,也不能高枕无忧了。

upgrade/update 升级

Why not upgrade it?

你怎么不升级呢?

I m not sure what exactly I would need for upgrade.

我不知道升级都需要什么?

Is it complex to maintain them after the upgrade?

升级后的维护是不是很复杂?

Have you considered upgrading your system?

你考虑过给你的系统升级吗?

You should upgrade it now.

你现在应该对它进行优化升级了。

Your anti virus software should be updated.

你的杀毒软件该升级了。

The new way to fight PC viruses is software that automatically updates itself.

一种可以自动升级的软件是对付电脑病毒的新方法。

We want to have our network system upgraded.

我们想我们的网络系统升级。

You can log in the Web site of Ruixing Company,which offers the upgrade service.

你可以上网登录到瑞星公司的网站,他们提供升级服务。

You might also want to upgrade your hardware because it is pretty outdated now.

你那些老掉牙的硬件也该升升级了。

A:Do you have any thoughts about the psychology of people who create viruses?What are they hoping to achieve?

你知不知道那些制造病毒的人是什么心理?他们到底想达到什么目的?

B:The first thing to realize is that most computer systems are vulnerable.Some attackers desire to point out those vulnerabilities in a dramatic way.Others might wish to do some damage.There are no universals.

我们首先必须意识到大部分计算机系统都有缺陷,容易受到攻击。有些袭击者想用极具戏剧性的形式指出这些缺陷。还有些人可能是想搞破坏。这并没有什么定论。

A:How can people detect viruses when they have so many variants and are spreading so fast?

病毒有那么多变种,而且又传播得那么快,我们怎么能识破它们呢?

B:To some extent,people s increased awareness may make it easier to detect the variants.But sophisticated variants are likely to emerge and they are more difficult to detect.

在一定程度上,人们对此的逐渐认识会使问题变得容易一些。但是,很可能会出现更高级、更厉害的病毒,要发现它们就更不容易了。

A:Some experts say that the viruses to date are just the tip of the iceberg,and it is just as easy to create much more destructive ones.Is that so?

有些专家说,迄今为止出现的病毒不过是冰山一角,要设计出更多更具破坏性的病毒简直是易如反掌。是这样吗?

B:Yes.So we urgently need to ratchet up the security,reliability,and robustness of the computer systems and networking software.

是。所以我们急需逐步提高计算机系统和网络软件的安全性、可靠性和稳定性。

A:Do you think that Microsoft bears some responsibility for releasing insecure software that is vulnerable to such attacks?

微软发行了许多安全性能较差、容易受到袭击的软件,那么你认为微软是否应该对此负责任呢?

B:Yes,but others do as well.Security is always a tradeoff against usability,and currently security is often the poor cousin in this.

对,微软和其他的软件公司都有责任。软件的安全性和可用性是一对冤家,而安全性又是两者之中受冷落的一方。

A:Besides viruses,can you tell us a bit about the other kinds of risks in using e-mail and the Web in a business setting?

A:你能否告诉我们,除了病毒,在生意上使用电子邮件和因特网还会有哪些危险?

B:Privacy is a serious problem.Any company that believes its e-mail is secure is in for a surprise.

隐私权是个很严重的问题。任何一个认为电子邮件能确保安全的公司到头来都会大跌眼镜。

A:So are we getting smarter about dealing with the risks involved in Internet use,or are we getting worse?

那么我们在应付因特网的安全问题方面是变得越来越聪明了呢,还是越来越糟糕?

B:As huge numbers of new users are added to the Internet community,their lack of awareness complicates the problems.In many environments,a single lazy or unaware user may be compromising everyone else.

每天都有大批新用户加入因特网大军,他们对安全问题缺乏应有的认识,因而使得问题变得更加复杂。在很多情况下,极个别用户的疏忽懒惰或无知就可能殃及我们每个人。

Tactics of Hacker

黑客攻略

hacking/hack 入侵

In that environment,hacking was part of the fun.

在那样的环境里,黑客入侵只是为了取乐。

It started with hacking telephone systems.

真正的黑客行为是从入侵电话系统开始的。

Once computer systems were connected by networks,remote hacking was an attractive challenge.

一旦计算机系统被广泛联网,远程入侵就成了吸引人的挑战。

His father,a famous programmer and security expert,was one of the generation that had hacked for fun.

他的父亲,著名的程序设计师和网络安全专家就是以侵入别人的计算机为乐的一代人中的一员。

attack/get flamed 攻击

Because of this,American officials have called on companies to try their best to arm themselves against web attack for several times.

正是因为如此,美国官方已经多次呼吁公司企业努力加强自我防备,防止网络攻击。

You know,web site like CNN.com was brought down by the denial of service attacks last year.

你知道,像CNN.com这样的网站去年因受到“谢绝服务”的攻击而瘫痪了。

Do you mean the web attacks by flooding a site with so much traffic that legitimate customers can t get through?

你所说的网络攻击是指一个网站有太多的访问者而使合法的访问者无法进入网站吗?

If you want to earn money from the Internet,you must fight bravely to prevent cyber attacks.

如果你想从网上赚钱,你必须为防止网络攻击而勇敢战斗。

To prevent further attacks,we must patch the holes and vulnerabilities in our systems.

为了防止进一步受到攻击,我们必须在系统里查漏补缺。

To completely prevent attacks sounds just like walking on water.

但是想完全阻止黑客的攻击是不可能的。

Although no one can stop you from posting messages,if your posting is deemed as inappropriate you may get flamed by some readers.

虽然没人阻止你发信息,但是如果你的信息被认为是不适宜的,你可能会收到读者攻击你的邮件。

If you are playing by the rules and you get flamed,don t let it concern you.

如果你循规做事,即使收到攻击邮件也不必挂怀。

firewall 防火墙

The firewall actually defines the difference between Internet and intranet.

防火墙事实上定义了互联网和内部网的不同。

Firewalls are very important.

防火墙很重要。

Firewalls are imperfect.

防火墙并不是完美的。

Firewall don t really provide complete protection.

防火墙并不能提供完全的保护。

They are still important because they allow us to exercise some control.

但是防火墙还是很重要的,因为它们使我们可以去实施一些控制。

Now let s talk about firewalls in details.

现在,让我们详细地说一说防火墙。

Another kind of firewall is called“proxy application gateway”.

另一种防火墙被称为“代理应用网关”。

The users must be very clear about that no firewall are absolutely safe.

用户们必须清楚一点,没有任何防火墙是绝对安全的。

If you have a high speed connection that s always on,install so called firewall software.

如果你经常高速连接,就应该安装所谓的“防火墙”软件。

We must use a comprehensive security system that include firewalls,hardened operating systems,security assessment and intrusion detection technologies.

我们必须使用一个全面的安全防御系统,包括防火墙、强化的操作系统、安全检查和入侵监测技术。

encryption 加密

Encryption provides secrecy for data.

加密用于数据保密。

Encryption can be used to achieve integrity,since data that cannot be read generally also cannot be changed.

加密的数据一般不能读出,也不能更改,因而能保证数据的完整。

Encryption is important in protocols.

加密中的协议是很重要的。

Encryption is at the heart of methods for ensuring all three goals of computer security.

加密是保证计算机安全的三个目标所使用的各种方法的核心。

Encryption is an important tool in computer security.

加密是计算机安全的重要工具。

Users must understand that encryption does not solve all computer security problems.

用户应该知道加密不能解决计算机所有的安全问题。

If encryption is not used properly,it can have no effect on security or can,in fact,degrade the performance of the entire system.

如果加密使用不当,不但对安全没有作用,还会降低整个系统的性能。

A:Jean,do you know how fragile the Internet is?Today it wouldn t be too difficult for an angry teenager to create unlimited pain for anyone on the Internet.If he s a genius,he could even probably break down the entire Internet.

琼,你知道因特网有多脆弱吗?如今,一个十几岁的愤怒少年不用花太多力气,就能给一个上网的人带来数不清的麻烦。如果他是个天才的话,他甚至能将整个因特网弄瘫痪。

B:Is the Internet as vulnerable as that?Or are you just trying to scare the masses?

因特网真的像你描述的那么脆弱吗?你是不是在吓人呀?

A:Not at all. There re altogether 13master directory computers,known as root servers in the world. Ten of them are in the United States,and the rest are distributed abroad.

一点都没有。全球总共有13台目录服务主机,又叫做根服务器。其中的10台在美国,其余的几台分布在国外。

B:Are they special?

有什么特殊的地方吗?

A:Yes,rather. I would say they are the most important computers on earth. Without them,the Internet could not be structured.

是的,相当特殊。我敢说这13台服务器是世界上最重要的计算机。没有它们,因特网就构造不起来了。

B:Oh,dear!But why?

哦,天哪!不过,为什么?

A:The 13root computers direct computers to web addresses or domain names.Thus,if enough root servers fail,millions of Internet users could find Web sites and their e-mail inaccessible because computers wouldn t know what to do with domain names they come across.

这13台“根”计算机为计算机查询网络地址或域名牵线搭桥。所以,如果相当数量的根服务器坏掉了,计算机将无法进行域名解析,无数的因特网用户也就无法访问网站,使用他们的电子信箱了。

B:Now I get your mind. Do you mean that if all or most of the 13root servers were damaged for whatever reason,the entire Internet couldn t work properly.

现在我明白了。你的意思是,不管出于何种原因,如果这13台服务器全部或其中大部分遭到破坏,那么整个因特网将不能正常工作了。

A:Exactly.

千真万确!

B:Then there must be some highlevel precautionary measures to protect them.Like,putting the computers in safe and reliable places,and assigning special persons to take care of them.

那样的话,一定有一些高级的预防措施来保护这些电脑。比如,把这些计算机放置在安全、可靠的地方,并派专人看管。

A:Yes,you re right. The physical safety of those servers is one sue.But of equal concern is the software running on them,and the possibility that someone would launch DoS attacks against those serves.If that happened,the consequence would be a nightmare.

你说得很对。保证这些服务器的物理安全是一方面,但同样值得注意的是,我们要看看这些服务器里装有什么软件,以及服务器遭受DoS攻击的可能性。如果它们遭到此类攻击的话,其结果只能用噩梦来形容。

B:Sorry to interrupt you,but what is the meaning of DoS attack?

对不起,打断一下,DoS攻击是什么意思?

A:DoS is the acronym of Denial of Service.To mount a so called denial of service attack,a malicious hacker would break into numerous PCs or web servers and instruct them to send a tremendous amount of traffic to the 13root servers.As a result,the servers would be flooded with so many meaningless requests that they would become overloaded and stop working eventually.

DoS是“Denial of Service”(拒绝服务)的首字母缩写词。为了发动拒绝服务式攻击,一个恶意的黑客会入侵到众多的个人计算机或网络服务器里,然后通过它们向这13台根服务器发送大量的信息。其结果是,这些服务器将因接收过多的无意义请求而过载,最终停止工作。

B:That s horrible!

太可怕了!

A:Fortunately,such attacks are attempted all the time but usually to single webs and not against the Internet s core directory computers.

值得庆幸的是,拒绝服务式攻击虽然一直存在,但它们通常只攻击单个的网站,而没有针对核心目录服务主机。

B:But is it possible that one day the 13root servers be targeted by malicious hackers?

但是,这13台服务器是否有一天也可能成为恶意的黑客们攻击的目标呢?

A:Very likely.If those computers were hacked and brought to a halt,you wouldn t be able to surf the Internet at all.That s why I said in the beginning that the Internet is very fragile.

很有可能。如果那些计算机被黑客给黑掉了,并因此而停止了工作,你将不能再在网上冲浪了。这也是为什么我一开始就提到因特网实在是太脆弱了。

B:I hope that day won t come.

我希望那一天不会到来。

Secure Electronic Transaction

安全电子交易

digital certificate 数字证书

Digital certificate is an electronic identification.

数字证书是一种电子认证。

Digital certificate contains information about the user.

数字证书包含了用户的有关信息。

digital signature 数字签名

Digital signature is a code that guarantees a sender s identity.

数字签名是一种代码,它能确保消息发送者的身份。

If an unauthorized person decrypts it,the digital signature will be altered and the recipient will know of the trap.

如果未经授权的人破译了这个代码,数字签名就会被改变,而且消息的接受者就会知道这是一个陷阱。

digital wallet 数字钱包

Digital wallet is a file or set of records for a user.

数字钱包是用户的一种文件或一组记录。

Digital wallet contains all account information.

数字钱包包含了用户的所有账目信息。

electronic cash 电子现金

Electronic cash is a form of money encoded on a credit card or in a digital wallet.

电子现金是被加密在信用卡上或数字钱包中的一种货币形式。

Like cash,if electronic cash s lost or stolen,it can t be replaced.

如果电子现金丢失或被偷窃,就同现金一样,是不能被赔还的。

Electronic cash lets you make anonymous transactions.

电子现金允许你进行匿名交易。

smart card 智能卡

Smart card is a credit card embedded with a chip containing a digital wallet and information about the cardholder.

智能卡是在信用卡中植入一个包含了数字钱包和有关持卡人信息的芯片。

Secure Socket Layer(SSL) 安全套接字层

SSL is the current standard for electronic transactions.

安全套接字层是目前用于电子交易的一个标准。

SSL s a simpler standard than SET,but it s less secure.

安全套接字层比SET协议简单,但安全性要差点。

Because of SSL s simplicity,analysts expect it to be used as the interface between the online buyer and the merchant.

由于安全套接字层简单明了,系统分析员们期望它能成为在线买家和商家之间的一个界面。

trusted authority 值得信任机构

Trusted authority is an organization that generates and validates secure keys.

值得信任的机构是一个能生成安全合法的密钥的组织。

Trusted authority is separate from an organization that performs the monetary transactions.

值得信任的机构同那个执行货币交易的组织是相互独立的。 encryption 加密

Four parts of cryptography:plaintext,ciphertext,encryption and key.

加密过程的四个方面:明文、密文、加密算法和密钥。

Data Encryption Standard.

数据加密标准。

There is the encryption technology,which is the principal secure measure that the E commerce is taking.

有加密技术,它是电子商务采取的主要安全措施。

egovernment 电子政务

Another critical success factor in achieving the right environment for e government is to have an appropriate regulatory and legislative framework in place.

要成功建立电子政务良好的外界环境,另一个要点就是要有一个恰当的立法和法律构架。

As we move into this era of e government there are a host of online infrastructure issues.

当我们进入电子政务时代时,所有的部门都会有许多在线基础设施方面的问题。

Egovernment efforts can benefit private start ups.

电子政务对私人创业非常有帮助。

E government benefits private Internet ventures by increasing the number of World Wide Web savvy locals.

由于电子政务使本地擅长于使用国际网络的人口增加,私人的网络创业也因而备受其利。

secure transaction 安全交易

How to solve the secure transaction problem?

怎样解决安全交易问题呢?

It s often reported that hackers attack the web,and this makes me worry about the security of the online transaction.

经常听到有黑客冲击网络的报道,我对网上交易的安全性有点担心。

password 口令

Never tell anyone else what password is being used.

决不告诉任何人你在使用的口令。

Choose a new password every month,more often it is a privileged account.

每个月选择一个新口令,如果是特权账户,更改口令应更勤一些。

Use different passwords for different systems.

不同的系统用不同的口令。

Be alert to programs that steal or trap passwords.

对那些窃取或捕捉口令的程序要警惕。

An effective password policy takes into consideration the limitations of a system s users as well as the overall information security policy of the organization.

一项有效的口令政策要考虑系统用户的局限性以及机构总的信息安全政策。

A:It s often reported that hackers attack the web,and this makes me worry about the security of the online transaction.

经常听到有黑客冲击网络的报道,我对网上交易的安全性有点担心。

B:This is true and also a problem that the Business Trading Center should settle.

这是一个事实,也是商务交易中心必须解决的一个问题。

A:How to solve the security problem?

用什么办法解决这个安全问题?

B:They solve the problem by authentication,access control,security and auditing.

一般用认证、访问控制、保密、审计等方法进行解决。

A:But what if the information wants modifying?

可是信息需要修改怎么办?

B:There is the encryption technology,which is the principal secure measure that the E commerce is taking.

有加密技术,它是电子商务采取的主要安全措施。

A:The fire wall can be installed in the PC.Can it be installed in the network?

PC机上可以有防火墙,网络上也可以吗?

B:Of course it can,for the fire wall is originally a thing of the network.

当然,防火墙本来就是网络上的东西。

A:Oh,I see.

原来是这样。

The Internet is a worldwide network that provides electronic connection between computers and enabling them to communicate with each other via one of several software devices such as FTP,Telnet,Gopher,WWW Browsers.The Internet is not a single network,but a collection of networks that are connected each other.

The Internet is often described as a network of networks because all the smaller networks of organizations are linked together into the one giant network called the Internet.All computers are pretty much equal once connected to the Internet,the only difference will be the speed of the connection which is dependent on your Internet Service Provider and your own modem.

互联网是一种全球性的互联网络,为计算机之间提供电子连接并使他们通过多种软件设备进行互相交流,例如:文件传送协议、远程登录协议、广域信息服务、万维网浏览器等。互联网不是一个单一的网络,而是一个互相连接的网络集合体。

互联网被誉为“万网之网”,这是因为所有的小型网络都相互连接形成了这个巨大的互联网。一旦接入了互联网,所有的电脑功能都几乎相同,唯一的区别就在于连接的速度不同,而这一点则取决于你的网络服务提供者和调制解调器。

Hardware

硬件

同类推荐
  • 艾米莉狄金森精选诗集

    艾米莉狄金森精选诗集

    艾米莉·狄金森是美国著名女诗人。她一生只活了56年,并且是一种离群索居的状态下过完一生的。她终身未嫁。朋友寥寥,只有几个还算是知心的朋友,但也只与其保持书信关系而已。她了大量的诗作,大约为1800首左右。生前发表过的诗作,都经过了编辑的加工,以适应当年人们对诗作的韵脚的审美规范。很多诗作描写的主题是死亡与不朽。她的名气越来越大,是因为其死后由其朋友整理并发表出了大量她生前的诗作使然。她的诗作对后来的美国诗坛有巨大的影响力,成为不能逾越的文化现象。艾米莉·狄金森是美国著名女诗人。她一生只活了56年,并且是一种离群索居的状态下过完一生的。她终身未嫁。朋友寥寥,只有几个还算是知心的朋友,但也只与其保持书信关系而已。她了大量的诗作,大约为1800首左右。生前发表过的诗作,都经过了编辑的加工,以适应当年人们对诗作的韵脚的审美规范。很多诗作描写的主题是死亡与不朽。她的名气越来越大,是因为其死后由其朋友整理并发表出了大量她生前的诗作使然。她的诗作对后来的美国诗坛有巨大的影响力,成为不能逾越的文化现象。
  • Lincoln's Personal Life

    Lincoln's Personal Life

    本书为公版书,为不受著作权法限制的作家、艺术家及其它人士发布的作品,供广大读者阅读交流。
  • 珍珠谜案

    珍珠谜案

    随着时间的推移,简姨妈的三位侄女——贝丝、帕齐和露易丝都在成长的道路上收获着属于各自的快乐与淡淡的烦恼。在这本书中,贝丝、帕齐和约翰叔叔共同来到了加利福尼亚的南部。年纪大的侄女露易丝和丈夫亚瑟?威尔登搬来与大家共同生活。在聚会上,亚瑟遇见了旧识蒙特罗斯太太和她的两个侄女——莫德? 斯坦顿和弗洛?斯坦顿。在圣塔莫尼卡海滩,勇敢的莫德救起了几乎被海浪吞噬的陌生男孩。从此,大家的生活就与这位名叫A?琼斯的年轻男孩产生了千丝万缕的联系,并卷入了一桩奇特的珍珠谜案之中。
  • Seven Lost Letters 寻找巴金的黛莉

    Seven Lost Letters 寻找巴金的黛莉

    《寻找巴金的黛莉》以寻找巴金的七封信为源,牵出一位现代女性传奇而坎坷的命运。作者精湛的语言文字能力和结构能力,标志着中国非虚构文学创作的文本价值,更体现了作家忠诚于土地的精神。
  • 没有女人的男人们(双语译林)

    没有女人的男人们(双语译林)

    《没有女人的男人们》是海明威的第二部短篇小说集,收录了海明威最具代表性的《勇者不败》《似白象一般的山峦》《杀手》等十四个短篇小说。小说的主题涉及斗牛、出轨、离婚和死亡。这些故事集中展现了一个少有女性涉足的男性世界,它所刻画的男主人公如斗牛士曼纽尔、拳击手布伦南、追车手坎贝尔、被追杀的安德森等虽然在宿命的强大压力下都勇敢地选择杭争,具备勇敢顽强、临危不惧、与厄运斗争到底的强烈个性,他们能够凭着个人的坚忍勇气、生命的全部力量与命运抗争,在逆境中保持一种打不垮的男子气概。
热门推荐
  • 炎寒九幽

    炎寒九幽

    一个是名动天下的神医,天生寒体,身怀诅咒。一个是天赋异禀的太子,身中火毒,命不久矣。安倾玥她从未想过,自己会与任何人有什么交集。但自从莫知漓闯进了她的生活,一切都不一样了。她冷漠,他就用自己的热情来温暖她。她知恩图报,他就疯狂的让她欠人情。待到她真正反应过来的时候,她已经离不开他了。身怀诅咒又如何?我命由我不由天!#冷漠淡然x放荡不羁#1v1
  • 追妻无门:女boss不好惹

    追妻无门:女boss不好惹

    青涩蜕变,如今她是能独当一面的女boss,爱了冷泽聿七年,也同样花了七年时间去忘记他。以为是陌路,他突然向他表白,扬言要娶她,她只当他是脑子抽风,他的殷勤她也全都无视。他帮她查她父母的死因,赶走身边情敌,解释当初拒绝她的告别,和故意对她冷漠都是无奈之举。突然爆出她父母的死居然和冷家有丝毫联系,还莫名跳出个公爵未婚夫,扬言要与她履行婚约。峰回路转,破镜还能重圆吗? PS:我又开新文了,每逢假期必书荒,新文《有你的世界遇到爱》,喜欢我的文的朋友可以来看看,这是重生类现言,对这个题材感兴趣的一定要收藏起来。
  • 洛九天

    洛九天

    红南国一个不小心,逼死了苦苦等待三百年的朱雀女巫。洛九天子承母业,却跑出了红南国自己找朱雀七星去了。这结界外的妖魔鬼怪知道朱雀巫女跑了出来,个个流着口水等着她送上门呢。可怜那个青梅竹马的小情郎八字没一撇呢,心上人却跑了。洛九天却逍遥自在,骑着龙,背着破魔之弓,没事收服收服七星,杀杀妖。
  • 鬼医皇妃

    鬼医皇妃

    背叛、屠杀、复仇——地狱归来,重生复仇。
  • 明伦汇编宫闱典宫闱总部

    明伦汇编宫闱典宫闱总部

    本书为公版书,为不受著作权法限制的作家、艺术家及其它人士发布的作品,供广大读者阅读交流。汇聚授权电子版权。
  • 生天经颂解

    生天经颂解

    本书为公版书,为不受著作权法限制的作家、艺术家及其它人士发布的作品,供广大读者阅读交流。汇聚授权电子版权。
  • 追妻无门:女boss不好惹

    追妻无门:女boss不好惹

    青涩蜕变,如今她是能独当一面的女boss,爱了冷泽聿七年,也同样花了七年时间去忘记他。以为是陌路,他突然向他表白,扬言要娶她,她只当他是脑子抽风,他的殷勤她也全都无视。他帮她查她父母的死因,赶走身边情敌,解释当初拒绝她的告别,和故意对她冷漠都是无奈之举。突然爆出她父母的死居然和冷家有丝毫联系,还莫名跳出个公爵未婚夫,扬言要与她履行婚约。峰回路转,破镜还能重圆吗? PS:我又开新文了,每逢假期必书荒,新文《有你的世界遇到爱》,喜欢我的文的朋友可以来看看,这是重生类现言,对这个题材感兴趣的一定要收藏起来。
  • 我的路十二

    我的路十二

    我以为我活的很开心,直到有天你走了,我才知道,这开心全来自你。
  • 再见寂寞的天堂

    再见寂寞的天堂

    一个朋友真实的故事,关于青春,关于爱情与死亡.
  • 梁皇宝卷

    梁皇宝卷

    本书为公版书,为不受著作权法限制的作家、艺术家及其它人士发布的作品,供广大读者阅读交流。汇聚授权电子版权。