,----..                    
					    ,---,       /   /   \             .---. 
					  .'  .' `\    /   .     :           /. ./| 
					,---.'     \  .   /   ;.  \      .--'.  ' ; 
					|   |  .`\  |.   ;   /  ` ;     /__./ \ : | 
					:   : |  '  |;   |  ; \ ; | .--'.  '   \' . 
					|   ' '  ;  :|   :  | ; | '/___/ \ |    ' ' 
					'   | ;  .  |.   |  ' ' ' :;   \  \;      : 
					|   | :  |  ''   ;  \; /  | \   ;  `      | 
					'   : | /  ;  \   \  ',  /   .   \    .\  ; 
					|   | '` ,/__  ;   :    /___  \   \   ' \ | 
					;   :  .'/  .\  \   \ .'/  .\  :   '  |--"  
					|   ,.'  \  ; |  `---`  \  ; |  \   \ ;     
					'---'     `--"           `--"    '---"      

ATTENTION!

This site and it’s owner is in NO WAY, SHAPE, OR FORM affiliated with the United States “Department of War”. This is a Information Security Blog ran by an undergrad. For more information, please head over to “About-Me”. Thanks!