Violence must be met by violence? Fist decides? What is benevolence? What is evil? This is a world with the rule of survival of the fittest! ★ Severe Wound ★ A 2012 great work by China Wireless Arts! Here No romance! No ...Read more
Violence must be met by violence? Fist decides? What is benevolence? What is evil? This is a world with the rule of survival of the fittest! ★ Severe Wound ★ A 2012 great work by China Wireless Arts! Here No romance! No brotherhood! No mercy! No gentleman!
When the world is confused by facts, And constrained by laws, Only what you see by your eyes is real and only your fist speaks for your justice in this world, the mighty power is the only rule of survival and conquering is the unlimited evil. ★★★★★★★★★★★★★★★★★★★★★★★★ Compared with traditional action game, this game adopts auto-attack. The operation is simple and convenient for you to experience the fierce battles in a relaxed mood. You will enjoy abundant choices of weapons and stunning Kung Fu Combos. What are you waiting for ?! This world is waiting for your conquering!!!! ★★★★★★★★★★★★★★★★★★★★★★★★
Game Features: — Explosive and shocking views with the cartoon style — Gorgeous scenes and plentiful maps — Dazzling weapons with various action effects and kill moves — Stunning skills and cool combos; Abundant combinations of different weapons — Gangs from all over the world; A large number of armed enemies; Mighty bosses — Designed for Touch-action games; perfect simple operations
Allows an application to view the state of all networks.
view Wi-Fi state
Allows an application to view the information about the state of Wi-Fi.
read phone state and identity
Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to, ect.
read system log files
Allows an application to read from the systemʼs various log files. This allows it to discover general information about what you are doing with the phone, but should not contain any personal or private information.
modify/delete SD card contents
Allows an application to write to the SD card.
coarse (network-based) location
Access coarse location sources such as the cellular network database to determine an approximate phone location, where available. Malicious applications can use this to determine approximately where you are.
discover known accounts
Allows an application to get the list of accounts known by the phone.