就是这么回事
所有跟帖:
•
I tried to use richard feynman method to explain the theory. :)
-goingunder-
♀
(0 bytes)
()
06/20/2019 postreply
18:27:04
•
often time outside company can remote into my computer at work a
-MoonRiverMe-
♂
(0 bytes)
()
06/20/2019 postreply
18:41:59
•
as long as I provide them my IP
-MoonRiverMe-
♂
(0 bytes)
()
06/20/2019 postreply
18:43:17