Skip to main content

中央2014扫黄第一号专案:“少妇白洁”作者被抓获


发信人: yamazaki (月は私の心を代表している), 信区: WaterWorld
标  题: 中央2014扫黄第一号专案:“少妇白洁”作者被抓获
发信站: BBS 未名空间站 (Mon Jun  2 23:33:38 2014, 美东)

环球时报 2014年6月2日 记者:张洪涛

        2014年6月2日,公安部,文化部,以及中共中央扫黄打非工作小组办公室在北
京市公安局召开新闻发布会,宣布历时八年之久的中央扫黄第一大案告破,臭名昭著的
黄色淫秽小说【少妇白洁】的作者,已经被抓获。
        公安部副部长傅政华表示,中央一直关注扫黄打非工作,尤其是淫秽小说在互
联网时期的扩散,对全国的青少年成长造成了极大的困扰,很多家长甚至给中央的老领
导都在反映这个问题。尤其是【少妇白洁】这个淫秽小说,社会影响尤其恶劣,社会危
害及其严重,甚至有些退休的老同志,表示自己的小孙子都被这部小说毒害了。
        习近平同志在去年做出来批示,表示一定要把原作者深挖细查,办成铁案,而
且这部小说,开创了网络黄色小说反党的先例,遗毒非常深远。公安部按照领导的指示
,结合以前的办案经验和教训,结果长时间的侦查,终于在今年5月抓获了【少妇白洁
】的原作者。经查,北京市一所全国著名的文科大学的中文系的年轻副教授,就是这部
黄色小说的原作者,目前他已经被扣押在北京市公安局,等待他的是严厉的法律制裁。
        傅政华表示,“少妇白洁”专案组的成功侦破,沉重打击了非法黄色淫秽小说
创作者的嚣张气焰,彰显社会主义精神文明建设的优越性和中央领导的高瞻远瞩,是新
时期社会主义精神文明建设的重要成果。

环球网 环球时报独家报道

http://gengwg.blogspot.com/

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...