Introduction - If you have any usage issues, please Google them yourself
1. Address shortened, encryption (better access to data between databases) 2. Photo upload function, the use of confidentiality upload directory functions, even upload Trojans were not aware that the actual path, the Trojans would be ineffective, there is the use of Member Upload integral upload 3. 4.(Penny applications and affixed to report it, as long as a Member of the information submitted, the system will automatically remind mail to administrators, the functions can be achieved in the background closed or open to use the normal functions of the server components must be installed jmail) 5. Watermark increase picture upload function (which features) 6.