j
k
j a
j l
He'd need to demonstrate that whatever he developed, the reason for what his code does can be tracked to available documentation, not the leaked source code.
Attachments:
Back to the thread
Back to the list