Consider using a computer to update lists and sort people by address, priority, and interests.
考虑用电脑来更新这个名单,并依据地址,优点和兴趣来归类。
2
Similar authentication techniques use the MAC address of the remote host's network card, or any sort of unique ID associated with that machine (such as a Pentium III processor ID, if available).