Position: Home page » Computing » CFD is a decentralizing process

CFD is a decentralizing process

Publish: 2021-04-19 01:27:00
1.

1、 The layout design of manuscripts:

1. Main components of manuscripts:

1. Main Title: the name of manuscripts, such as healthy tomorrow

(2) header: a picture closely following the main title is organically combined with the main title

③ article: it is the main part of the hand copied newspaper

④ Title: it refers to the title of each article

⑤ tail flower (or flower arrangement), which is generally used at the end or in the middle of the article

(6) lace decoration: used in the blank space between articles

(7) shading decoration: shading decoration for articles or topics
2. How to typeset:

1. Leave four sides free and draw lines gently with a pencil

(2) arrange the position of the topic, which can be represented by several boxes

③ arrange the position of each article, which can be represented by a larger box, and draw lines gently with a pencil in the box, either horizontally or vertically

(4) draw the position of the title with small squares

(5) the small box indicates the position of the tail flower (flower arrangement)

The title should be decorated

2. Manuscripts are completed
1. Articles are transcribed

(1) the font should be neat and beautiful, and there should be no typos

If more than two people together, the font should be unified

(3) the beginning and end of the word should be neat

2. Title writing

The title should be eye-catching

2. Write in art font

3. Decorate the title

(1) it can be decorated directly on the title

② it can also be decorated beside the text

4. The header should be eye-catching and not dazzling

5. The drawing of tail flower should be small and exquisite, and the starting point should not be eye-catching

6. Decoration of shading

(1) it can be done well in typesetting, or it can be decorated in writing

② light color can be used to brush the bottom or sketch the scenery

Finally, wipe the newspaper surface clean

extension materials:

the decoration and beautification of hand copied newspaper: mainly using color, drawing and other artistic means to make up for the monotony of the text and give people vivid, beautiful and harmonious beauty and enlightenment. The contents include newspaper header, flower inscription, illustration, lace, tail flower and color application

1. Header: it is the sign of hand copied newspaper, which is composed of pattern or picture and journal name. The text is composed of header name, date, etc

2. Flower inscription: it is the decoration of the title or switch of an article. The common ones are shading and suggestive pictures or patterns

Illustration: according to the content of the article, you can draw a picture that can explain a plot, which is closely related to the content of the article; You can also use patterns that have nothing to do with the content of the article, such as flowers and birds, landscapes, etc., which are purely for beautification

Lace: generally, it should not be too much, too big or too thick, otherwise, it will make a fuss. Lace can beautify the layout, can separate the article, easy to read

Tail flower is a picture or pattern decorated at the back of the article. For example, after ing an article, there is still a blank. You can draw a flower, which can not only enrich the layout, but also increase the aesthetic feeling

6, color: generally concise, bright, elegant, not too much rendering, messy. Generally speaking, the tone of the text should be simple and steady; Title and lace, illustrations, etc., can be used more bright colors. Only in this way can the shade be appropriate and the effect be enhanced

2. Unknown_Error
3. Picture and text course: http://www.koudai8.com/index/Article/yxmj/200702/427.html
golden finger:
unlimited steps 0203990e: 0258
unlimited elf ball 0203990c: 001E

golden finger of "space conversion"
Island 8 02031cf0: 0002
Island 9 02031cf0: 3a02
chaomengdong 02031cf0: 4a01
boat 02031cf0: 1f00
direct play On the fourth day, King 02031cf0:4e01
go home 02031cf0:7e02
gate of King 02031cf0:2a03 (you can play big 4 without badge)
the place where master ball is 02031cf0:3a00
the place where Flamingo is caught 02031cf0:6a00
no man's cave 02031cf0:7a01
No 8 guild hall 02031cf0:0105
no road cave on the sixth island 02031cf0:3a03
grass guild hall 02031cf0:3a04
hunting 02031cf0:3a05
spirit center of poison guild 02031cf0:3a06
research Museum of Honglian island 02031cf0:3a07
Super City 02031cf0:3a08
corridor of Changqing forest 02031cf0:3a09

0300510a: XX
XX list
0001 master ball
0013 recovery medicine (full recovery of physical strength and all States)
0019 spirit grass (death full recovery of physical strength)
0025 Ppmax (1 monster's all skill points are fully recovered)
003fmaximum increase (physical strength base value is increased)
0040 praise (attack base value is increased)
0041 lokhave (defense base value is increased)
0042 indsey (agility base value is increased)
0043 limasen (special attack base value is increased)
0044 strange sweets (monster is upgraded by 1 level)
0046 Ji mountain fruit (virtue base value increased)
0047 maximum value (skill value increased to the maximum)
0067 small tree fruit (ordinary tree fruit is easy to mature)
0068 large tree fruit (precious tree fruit is difficult to mature)
005d sun stone (let the unique monster evolve)
005E moon stone (let the unique monster evolve)
005F flame stone (let the unique monster evolve
0060 Thunder Stone (let the unique monster evolve)
0061 water stone (let the unique monster evolve)
0062 coral stone (let the unique monster evolve)

all move machines
move machine 01:0121
move machine 02:0122
move machine 03:0123
move machine 04:0124
move machine 05:0125
move machine 06:0126
move machine Move machine 07:0127
move machine 08:0128
move machine 09:0129
move machine 10:012a
move machine 11:012b
move machine 12:012c
move machine 13:012d
move machine 14:012e
move machine 15:012f
move machine 16:0130
move machine 17:0131
move machine 18:0132
move machine 19:0133
move machine 20 : 0134
move machine 21:0135
move machine 22:0136
move machine 23:0137
move machine 24:0138
move machine 25:0139
move machine 26:013a
move machine 27:013b
move machine 28:013c
move machine 29:013d
move machine 30:013e
move machine 31:013f
move machine 32:0140
move machine 33:0141
move machine/ >Move machine 34:0142
move machine 35:0143
move machine 36:0144
move machine 37:0145
move machine 38:0146
move machine 39:0147
move machine 40:0148
move machine 41:0149
move machine 42:014a
move machine 43:014b
move machine 44:014c
move machine 45:014d
move machine 46:014e
move machine Device 47:014f
move machine 48:0150
move machine 49:0151
move machine 50:0152
0153 secret machine 01
0154 secret machine 02
0155 secret machine 03
0156 secret machine 04
0157 secret machine 05
0158 secret machine 06
0159 secret machine 07
015a secret machine 08

the elf level golden finger 02023fe0: XX

open code appears 8ED19163 3579E69D
1 - Bulbasaur
AD86124F 2823D8DA

2 - Ivysaur
AB84463B B2609644

3 - Venusaur
3542F0A7 7D2E171F

4 - Charmander
DB8C60CD 81FD6AA7

5 - Charmeleon
08506D61 55CBD9A8

6 - Charizard
A56395D2 8AF46857

7 - Squirtle
BCDCB406 2F2FD763

8 - Wartortle
268349C8 63FF53CE

9 - Blastoise
5FD24ABC 1FE3296A

10 - Caterpie
358CC2BF 9BFA3518

11 - Metapod
DC725D4E 3A20792F

12 - Butterfree
33EFFB7C E1794F5B

13 - Weedle
9A86D92A 635F8DBC

14 - Kakuna
CCEC9F6E 5A2A0F12

15 - Bee drill
F3D99280 49F4EEDC

16 - Pidgey
139BBA32 2DC356C8

17 - Pidgeotto
2F7B0F2F 257173EA

18 - Pidgeot
13659B39 95BD80E5

19 - Rattata
E5C49E22 47B157F2

20 - Raticate
60C9DC15 1AD9B226

21 - Spearow
2F5D7856 A5F7B4AE

22 - Fearow
23689847 DA918B8D

23 - Ekans
A5BA4CFA CA5D771C

24 - Arbok
B75D69F0 7C3B3103

25 - Pikachu
9D4A1BFF 05120D39

26 - Raichu
CE7B779B AE493550

27 - Sandshrew
7DFC4CBD 20BB83B6

28 - Sandslash
CFC711B9 0585971F

29 - NidoranF
B6450111 C65005BC

30 - Nidorina
0BA329E0 CEB39484

31 - Nidoqueen
C3B010F5 6DB0ED0E

32 - NidoranM
A38262A2 825F8CF0

33 - Nidorino
33D5E08A 037AB9C4

34 - Nidoking
82E3DD4B EBFEF864

35 - Clefairy
E8EAB84F 26C8AB6B

36 - Clefable
D15755D8 AF5BE6F1

37 - Vulpix
276AF592 A3A635CC

38 - Ninetales
27B815E0 B8CCC2DA

39 - Jigglypuff
B18AC7E0 E667A184

40 - Wigglytuff
7CEDC4CF F95C5521

41 - Zubat
47596727 51BB292A

42 - Golbat
FF3A0DD1 DF54EB13

43 - Oddish
EF723724 F31E5F64

44 - Gloom
A386B043 9DEB5064

45 - Vileplume
4A2748A4 F888F1C9

46 - Paras
EAD30258 3988D84F

47 - Parasect
74CFC9E9 82CD278E

48 - Venonat
0CC56D24 C9F5A33A

49 - Venomoth
DFDFFF0A 8919BB28

50 - Diglett
BA7199EC 664F9418

51 - Dugtrio
BCC0FB44 1A047D3C< br />
52 - Meowth
5F38FD3F 5D7412A3

53 - Persian
0BEC25D3 787468AE

54 - Psyck
70CEC019 12F0A7B0

55 - Golck
32E8BC37 7712CF08

56 - Mankey
DAAB0C35 55611812

57 - Primeape
B82FBCB6 C954F4ED

58 - Growlithe
CD7047AB 42D861F2

59 - Arcanin e
3099D33C 49E66A04

60 - Poliwag
AF0908F3 650FE1BD

61 - Poliwhirl
C29C3277 063E67E9

62 - Poliwrath
8DC834CF BFECCA56

63 - Abra
5738CFE5 515C61CF

64 - Kadabra
67CA1286 0E3A5D83

65 - Alakazam
C91954D9 68AAD246

66 - Machop
8AD2C8BB EB3 D7A39

67 - Machoke
95EFD5EA DD857E98

68 - Machamp
3BF5B7C4 061AAA45

69 - Bellsprout
CF2E3B09 3B30426E

70 - Weepinbell
0030C455 4F43BB12

71 - Victreebel
1DF3B8CA DC70EC58

72 - Tentacool
65C4E9C5 24CA1894

73 - Tentacruel
51DDE51A 00DE2CE3< br />
74 - Geode
399F7170 D519951E

75 - Graveler
DDF655E3 9BDEE49C

76 - Golem
103F567C 2F1A9043

77 - Ponyta
877A6953 8F6209F2

78 - Rapidash
195BAD3F C840CA28

79 - Slowpoke
4CEC5478 ACBC593C

80 - Slowbro
FE7C44DB 7672B1D8

81 - Magnem ite
3C17AEA9 5DC9D705

82 - Magneton
B8BD13C5 E3E7D9B3

83 - Farfetch' d
9121060C 74B908E0

84 - Doo
920BE3C7 3E00359C

85 - Dodrio
02258041 19ABFE29

86 - Seel
8EC19A12 FD47B55F

87 - Dewgong
E18D1069 1053E30C

88 - Grimer
EB7F9C3F DB3192F5

89 - Muk
729160A9 F8F73577

90 - Shellder
92A2030E 24F19E86
91 - Cloyster
FB078533 1A99C72A

92 - Gastly
99B8A848 91759EFF

93 - Haunter
7F14537B 6C00E975

94 - Gengar
BA9A9758 4221EBF4

95 - Onix
54D9A0DB 68FC768F

96 - Drowzee
C5C4BBBB 55B1B77F

97 - Hypno
F4BB6321 8E9265DB

98 - Krabby
D83FA CC2 7D31E557

99 - Kingler
FF0F431F 400EF220

100 - Voltorb
ABD2C0C0 FBC68A93

101 - Electrode
0C2333CD 141730A7

102 - Exeggcute
8D2F9E72 8719250B

103 - Exeggutor
744AF614 12D8281B

104 - Cubone
D9E3884F 37500E3F

105 - Marowak
CB4A8BD1 1D028 DA2

106 - Hitmonlee
9EDB950D 454533E5

107 - Hitmonchan
3535FA3A EBECD355

108 - Lickitung
F582757C 16122B78

109 - Koffing
BF93F87F BC1AB791

110 - Weezing
D966DA15 88BBB73A

111 - Rhyhorn
7DA9C8C7 8549C3D4

112 - Rhydon
9071D41E 55259C19

113 - Chansey
AD38C4DB B5EBB8A7

114 - Tangela
100D1518 466A2D06

115 - Kangaskhan
8F4BE409 7110788B

116 - Horsea
02401CFF F2742052

117 - Seadra
B0160E28 ED6B68EC

118 - Goldeen
29061002 69BB68FF

119 - Seaking
676505B9 904C9DE3

120 - Staryu
D7D9A00C 7BFB7AAC

121 - Starmie
0E2752FA 51091446

122 - Mr.Mime
0922D9A2 C1E680BA

123 - Scyther
28BEFBB3 68DE4569

124 - Jynx
FB0FC84E D45216CF

125 - Electabuzz
1E6DE7CB DDDBAD78

126 - Magmar
C644F8D1 4159A2D6

127 - Pinsir
A EFBB853 03F4B721

128 - Tauros
1D5557F2 FACC2BA7

129 - Magikarp
04658924 E67574E2

130 - Gyarados
56156F0A D2F071F2

131 - Lapras
483AC796 E3850B8F

132 - Ditto
3613AA25 2CC1B172

133 - Eevee
4B78A144 F02E1187

134 - Vaporeon
D82AEDF5 F23B27A4

135 - Jolteon
1850F0B1 AAFB142F

136 - Flareon
AB622741 B3F84F8B

137 - Porygon
6EE60CB5 746DFF03

138 - Omanyte
1DBD6215 4FD65295

139 - Omastar
23F20EC6 1368F543

140 - Kabuto
32A2B3E0 40DB80D9

141 - Kabutops
2058318E 392B7EE5

1 42 - Aerodactyl
C44B6463 DB3237C3
<
4. Where can I download the firmware of retrogame1.0s motherboard? Just download it from the Pacific Software Center.
5. CIH virus is a kind of malignant virus which can destroy the hardware of computer system. The virus was proced in Taiwan by Chen Yinghao, chief engineer of mobile phone R & D center of Jijia communication company (a subsidiary of Jijia), while he was studying in Taiwan's Datong Institute of technology[ 1] The first pirated discs sold by the two major international piracy groups were widely spread in Europe and the United States, and then further spread to all corners of the world through the Internet< In September 1998, Yamaha company provided a firmware update for cd-r400 drivers infected with the virus. In October 1998, a demo version of sin, a game of Activision company, spread by users, was infected by contacting infected files on a user's machine. The company's source of infection came from a group of Aptiva brand personal computers sold by IBM in March 1999, which were infected with CIH virus. On April 26, 1999, when the public began to pay attention to the first attack of CIH, these computers had been running for a month. This is a great disaster. Countless computer hard disks around the world are covered by junk data, and even the BIOS is damaged, unable to start. As of April 26, 2000, several cases of damage were reported in Asia, but the virus did not spread. Anjulie worm was found in March 2001. It implanted CIH v1.2 into the infected system< The resurgence of this virus occurred in 2001. A variant of the love bug virus in a VBScript document disguised as a nude photo of Jennifer Lopez contains a hook routine of the CIH virus, which makes the virus spread on the Internet
a modified version of cih.1106 was found in December 2002, but it was not seriously destructive
CIH can only be regarded as a threat if it infects the programs used by a large number of computer worms (such as cover letter virus) that send letters, or if Anjulie worm is involved. But CIH virus only attacks on Windows 95, 98 and windows me system, and its influence is limited. Now, because people have recognized its threat, and it can only run on the old Windows 9x operating system, CIH is no longer as widely spread as it was when it first appeared<

virus damage:

of course, the damage of CIH to BIOS is not as terrible as expected. Now PC basically uses two kinds of ROM to store BIOS data, one is the traditional ROM or EPROM, the other is E2PROM. The manufacturer "burned" BIOS into these memories by special means in advance, and then installed them in the PC. When we turn on the computer power, the program and data in the bios are executed and loaded first, so that our system can correctly identify all kinds of hardware installed in the machine and call the corresponding driver, and then the hard disk starts to boot the operating system. The data solidified in ROM or EPROM can be cleared only when special voltage is applied or ultraviolet light is used. This is why when we open some computer cases, we may see a small piece of silver or black paper pasted on a chip to prevent the ultraviolet wire from clearing BIOS data. To clear the data stored in this kind of ROM, it is not enough to calculate the internal voltage of the system. Therefore, users who only use this read-only memory to store BIOS data need not worry that CIH virus will destroy BIOS. But the latest computers, especially those above Pentium, basically use E2PROM to store part of BIOS. E2PROM is also called "electrically rewritable read only memory". In general, the data in this kind of memory will not be rewritten easily by users, but as long as special logic and voltage are applied, it is possible to rewrite the data in E2PROM. Using the CPU logic of PC and the internal voltage of computer, we can easily rewrite E2PROM. This is the principle of upgrading BIOS through software and the basic method of destroying BIOS by CIH. Rewriting the data in E2PROM requires certain logic conditions. Different PC systems may have different requirements for this condition. Therefore, CIH will not destroy all motherboards that use E2PROM to store BIOS. At present, only several 5V motherboards such as Gigabyte and MSI are reported. This does not mean that the quality of these motherboards is poor, but the E2PROM logic is just consistent with CIH, Or the compilers of CIH may purposely destroy the motherboards of some brands. Therefore, to determine whether CIH is harmful to your motherboard, we should first determine whether your BIOS is only burned in ROM / EPROM, or some use E2PROM. It should be noted that although CIH will not destroy all BIOS, the destruction of all data on the hard disk by CIH on the "black" 26th is far more serious than the destruction of BIOS, which is inevitable for every user infected with CIH virus<
virus version:
CIH virus is a file type virus with strong lethality. Its aliases are win95.cih, spacefiller, win32.cih and PE_ CIH, its main
CIH virus
to infect Windows 95 / 98 under the executable file (PE format, portable executable format), the current version does not infect dos and win 3. X (NE format, windows and OS / 2 windows 3.1 execution file format) under the executable file, and invalid in win NT. Its development process has gone through five versions: v1.0, v1.1, v1.2, v1.3 and v1.4. At present, the most popular version is v1.2. During this period, according to some reports, no less than ten variants have been proced at the same time. However, there seems to be no sign of popularity. I have not actually come into contact with these so-called CIH variants< Different versions of CIH virus have been improved over time. The basic development process is as follows:
v1.0 version
the original version of v1.0 only has 656 bytes, its rudiment is relatively simple, and there is not much improvement in structure compared with ordinary types of virus. Its biggest "selling point" is that it is one of the few viruses at that time It is one of the viruses that can infect the executable files of Microsoft Windows PE class. The length of the program files infected by it increases. This version of CIH is not destructive<

CIH virus v1.1 version
when it develops to v1.1 version, the length of the virus is 796 bytes. This version of CIH virus has the function of judging WinNT software. Once it is judged that the user is running WinNT, it does not work and hides itself to avoid error messages. At the same time, it uses more optimized code to rece its length. Another outstanding point of this version of CIH is that it can use the "gap" in the winpe class executable file to split itself into several parts according to the needs and insert them into the PE class executable file respectively. The advantage of this is that when most winpe class files are infected, the file length will not increase<

v1.2 version
when it develops to v1.2 version, in addition to correcting some defects of v1.1 version, the code that destroys the user's hard disk and BIOS program of the user's host is added. This improvement makes it into the ranks of malignant viruses. The length of CIH virus body of this version is 1003 bytes<

the biggest defect of CIH virus in v1.3
v1.2 is that when it infects the zip self extractors file, it will cause the zip self extractor header corrupt.
possible cause: disk or file transfer error.
. The CIH virus of v1.3 version appears to be in a hurry, and its improvement point is aimed at the above defects. Its improvement method is: once it is judged that the opened file is a self extracting program of winzip class, it will not be infected. At the same time, this version of CIH virus modified the attack time. The length of CIH virus in v1.3 is 1010 bytes<

v1.4 version
This version of CIH virus improves the defects in previous versions, does not infect the zip self extracting package file, and modifies the attack date and the right information in the virus (version information is changed to "CIH v1.4 Tatung", and the relevant information in previous versions is "CIH v1. X ttit"). The length of this version is 1019 bytes. From the above description, we can see that in fact, among the relevant versions of CIH, only v1.2, v1.3 and v1.4 are actually destructive. The attack date of v1.2 CIH virus is April 26 every year, which is the most popular virus version in 2002. The attack date of v1.3 CIH virus is June 26 every year, However, the attack date of CIH v1.4 is changed to the 26th day of each month, which greatly shortens the attack ration and increases its destructiveness<

special attack:

CIH is a malignant virus. When the attack conditions are mature, it will destroy the hard disk data, and may destroy the BIOS program at the same time. The attack characteristics of
CIH virus
are as follows:
1. Starting from the main boot area of the hard disk, write garbage data to the hard disk in turn until the hard disk data is completely destroyed. In the worst case, all the data of the hard disk (including all the data of the logical disk) are destroyed. If the important information is not backed up, it will only cry
2. BIOS information in flash ROM on some motherboards will be cleared
3. V1.4 version attacks on the 26th of every month, v1.3 version attacks on the 26th of June every year, and the following versions attack on the 26th of April<

memorabilia:
(1998-2004)
June 2, 1998: the first CIH virus report from Taiwan
June 6, 1998: CIH v1.2 version
June 12, 1998: CIH v1.3 version
June 26, 1998: CIH v1.3 version caused a certain degree of damage
June 30, 1998: CIH v1.4 version
July 1998: CIH v1.3 version was found in the Internet environment This is a case of distributed infection based on Win98 system
July 26, 1998: CIH virus began to spread in large areas in the United States
August 1998: demo was found to be infected on Wing Commander game site
August 1998: two European PC game magazine CDs were found to be infected with CIH
August 26, 1998: CIH version 1.4 broke out, First global spread
August 31, 1998: Ministry of Public Security issued an emergency notice, Xinhua news agency CCTV news broadcast full text
September 1998: Yamaha's software for a certain type of CD-R driver was infected with CIH
October 1998: a demo version of sin released around the world was found to be infected with CIH
March 1999: CIH version 1.2 was found to be pre installed in IBM's Aptiva machine
April 26, 1999: CIH version 1.2 broke out for the first time in the world for more than 6000 years On April 26, 2000, the second large-scale outbreak of CIH version 1.2 resulted in a global loss of more than one billion US dollars
on April 26, 2001, the third large-scale outbreak of CIH. More than 6000 computers were damaged by CIH in Beijing alone
April 26, 2002: CIH virus broke out again, thousands of computers were damaged
April 26, 2003: there are still more than 100 victims of CIH virus

infection characteristics:
because the information of the identification version number of the popular CIH virus is in plaintext, Therefore, you can identify whether you are infected with CIH virus by searching the string in the executable file. The search feature string is "CIH V" or "CIH v1." if you want to search more complete feature string, you can try "CIH v1.2 ttit", "CIH v1.3 ttit" and "CIH v1.4 Tatung", instead of searching "CIH" feature string directly, Because this feature string also exists in many normal programs, for example, the following code line exists in the program: Inc BX Dec CX Dec ax, then their feature code is positive
6. This is a very common error! Some can be solved by reloading the system, some are caused by memory compatibility! General no matter he can also normal use!
7. If you have any problem, you can say it. It's also an opportunity for everyone to learn and communicate. Everyone will help.

1. You use proxy IP for your QQ. Tencent service center is to provide security services for your QQ. You are forbidden to log in. (or you frequently change the IP to log in. Or the proxy server of * * IP fails). This situation is no problem. Just keep logging in with fixed IP frequently

2 Check with QQ doctor.

3. Your QQ is blocked because it violates the usage rules (such as intrusion or cracking).

4. Or someone logs in with your QQ.

I think it's the first or second reason. The proxy server fails. Try again. Sometimes it's OK.

I don't know if the answer will help you. I wish you success Thanks<

= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =

supplementary answer:
1. Enter the QQ folder and delete the file with your number
that is, delete the file with your QQ number as the file name
and then log on your number again! Try it

2. Check the system time. If it's not correct, please correct it. Then log in again.

3. Log in with a different QQ number.

if it's normal, your QQ number has the above problems.

if you can't log in, you need to check whether your QQ program or the whole machine is poisoned
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750