<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0"><id>tag:blogger.com,1999:blog-8380499217784119522</id><updated>2026-04-08T03:42:45.926-07:00</updated><category term="Hacking News"/><category term="heacker bank"/><category term="Website Hacking"/><category term="Computer Hacking"/><category term="Criminal news"/><category term="hack facebook"/><category term="cracker"/><category term="php"/><category term="Bisnis Online"/><category term="Otomotif"/><category term="hacker names"/><category term="Hacker Pay Pal"/><category term="Economy"/><category term="Hack Email"/><category term="Hack Wifi"/><category term="hack skype"/><title type="text">News About Indonesia</title><subtitle type="html">Otomotif</subtitle><link href="http://heackerbank.blogspot.com/feeds/posts/default" rel="http://schemas.google.com/g/2005#feed" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default?redirect=false" rel="self" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/" rel="alternate" type="text/html"/><link href="http://pubsubhubbub.appspot.com/" rel="hub"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default?start-index=26&amp;max-results=25&amp;redirect=false" rel="next" type="application/atom+xml"/><author><name>POLDA METRO JAYA</name><uri>http://www.blogger.com/profile/12624712255672394889</uri><email>noreply@blogger.com</email><gd:image height="32" rel="http://schemas.google.com/g/2005#thumbnail" src="http://1.bp.blogspot.com/_iT-Q6WxNLRc/SvUNbcysImI/AAAAAAAAAFc/zUtZen-WXo0/S220/manager+1.jpg" width="22"/></author><generator uri="http://www.blogger.com" version="7.00">Blogger</generator><openSearch:totalResults>210</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-8380499217784119522.post-6764669392828846416</id><published>2016-03-12T14:16:00.000-08:00</published><updated>2016-03-12T14:16:51.568-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cracker"/><category scheme="http://www.blogger.com/atom/ns#" term="heacker bank"/><title type="text">Bank Account Hacking Software</title><content type="html">&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves/&gt;
  &lt;w:TrackFormatting/&gt;
  &lt;w:PunctuationKerning/&gt;
  &lt;w:ValidateAgainstSchemas/&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF/&gt;
  &lt;w:LidThemeOther&gt;EN-US&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables/&gt;
   &lt;w:SnapToGridInCell/&gt;
   &lt;w:WrapTextWithPunct/&gt;
   &lt;w:UseAsianBreakRules/&gt;
   &lt;w:DontGrowAutofit/&gt;
   &lt;w:SplitPgBreakAndParaMark/&gt;
   &lt;w:DontVertAlignCellWithSp/&gt;
   &lt;w:DontBreakConstrainedForcedTables/&gt;
   &lt;w:DontVertAlignInTxbx/&gt;
   &lt;w:Word11KerningPairs/&gt;
   &lt;w:CachedColBalance/&gt;
  &lt;/w:Compatibility&gt;
  &lt;w:BrowserLevel&gt;MicrosoftInternetExplorer4&lt;/w:BrowserLevel&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val="Cambria Math"/&gt;
   &lt;m:brkBin m:val="before"/&gt;
   &lt;m:brkBinSub m:val="--"/&gt;
   &lt;m:smallFrac m:val="off"/&gt;
   &lt;m:dispDef/&gt;
   &lt;m:lMargin m:val="0"/&gt;
   &lt;m:rMargin m:val="0"/&gt;
   &lt;m:defJc m:val="centerGroup"/&gt;
   &lt;m:wrapIndent m:val="1440"/&gt;
   &lt;m:intLim m:val="subSup"/&gt;
   &lt;m:naryLim m:val="undOvr"/&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;br /&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
  DefSemiHidden="true" DefQFormat="false" DefPriority="99"
  LatentStyleCount="267"&gt;
  &lt;w:LsdException Locked="false" Priority="0" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Normal"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="heading 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 7"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 8"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 9"/&gt;
  &lt;w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/&gt;
  &lt;w:LsdException Locked="false" Priority="10" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Title"/&gt;
  &lt;w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/&gt;
  &lt;w:LsdException Locked="false" Priority="11" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/&gt;
  &lt;w:LsdException Locked="false" Priority="22" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Strong"/&gt;
  &lt;w:LsdException Locked="false" Priority="20" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="59" SemiHidden="false"
   UnhideWhenUsed="false" Name="Table Grid"/&gt;
  &lt;w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/&gt;
  &lt;w:LsdException Locked="false" Priority="1" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/&gt;
  &lt;w:LsdException Locked="false" Priority="34" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/&gt;
  &lt;w:LsdException Locked="false" Priority="29" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Quote"/&gt;
  &lt;w:LsdException Locked="false" Priority="30" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="19" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="21" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="31" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/&gt;
  &lt;w:LsdException Locked="false" Priority="32" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/&gt;
  &lt;w:LsdException Locked="false" Priority="33" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Book Title"/&gt;
  &lt;w:LsdException Locked="false" Priority="37" Name="Bibliography"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
 {mso-style-name:"Table Normal";
 mso-tstyle-rowband-size:0;
 mso-tstyle-colband-size:0;
 mso-style-noshow:yes;
 mso-style-priority:99;
 mso-style-qformat:yes;
 mso-style-parent:"";
 mso-padding-alt:0in 5.4pt 0in 5.4pt;
 mso-para-margin-top:0in;
 mso-para-margin-right:0in;
 mso-para-margin-bottom:10.0pt;
 mso-para-margin-left:0in;
 line-height:115%;
 mso-pagination:widow-orphan;
 font-size:11.0pt;
 font-family:"Calibri","sans-serif";
 mso-ascii-font-family:Calibri;
 mso-ascii-theme-font:minor-latin;
 mso-hansi-font-family:Calibri;
 mso-hansi-theme-font:minor-latin;}
&lt;/style&gt;
&lt;![endif]--&gt;

&lt;br /&gt;
&lt;div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span style="font-size: 12pt;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span style="font-size: 12pt;"&gt;So there’s a lot of tutorial and
tips out there on how to hack a bank account and the bank hacking software.
Some hackers claim they have the original bank hacking software and they can do
bank transfers to any account in the world. Sometimes they make this software
free to download and they promise you it works with windows and other operating
system. Don’t be deceived, you might end up downloading a trojan, zeus bot or
malware.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;

&lt;/span&gt;&lt;div align="center" class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; mso-outline-level: 2; text-align: center;"&gt;
&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;b&gt;&lt;span style="font-size: 18pt;"&gt;Do Bank Hacking Software Exist?&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div align="center" class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; mso-outline-level: 2; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;

&lt;/span&gt;&lt;div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span style="font-size: 12pt;"&gt;I was going through a forum and came
across someone selling a pdf tutorial on how to hack bank server and database using
the full version of the software he has. I paused for a while and laughed
because this dude knows nothing about bank hacking and money transfer. The
truth is that there’s no software anywhere in the world that automatically
hacks bank account number or routing number. There are sophisticated and
malicious hacking tools but this one don’t exist.The dude was actually selling
the uplink game. Lol.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;

&lt;/span&gt;&lt;div align="center" class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; mso-outline-level: 3; text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;b&gt;&lt;span style="font-size: 13.5pt;"&gt;Do Banks Get Hacked?&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div align="center" class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; mso-outline-level: 3; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;

&lt;/span&gt;&lt;div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span style="font-size: 12pt;"&gt;Since there’s no software for
hacking bank accounts, do people still hack the bank ?.&amp;nbsp; Yes, you can
actually hack a bank but not automatically with a software. It requires a whole
lot of process and certain information which I won’t discuss here but basically
bank hacking can be achieved online through phishing and infected bank mails.
You can gain access to the admin portal and bank database just by sending an
infected mail to the bank staff and once he clicks, it’s done.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;

&lt;/span&gt;&lt;div align="center" class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; mso-outline-level: 4; text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;b&gt;&lt;span style="font-size: 12pt;"&gt;Our Services&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div align="center" class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; mso-outline-level: 4; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEji9gLnm89BaFYqDryCaotSpPnDIdyw82ohEQAvQNrvl_R93_FW5sHgNeLgt_hKxBFl6hUwBjX1RBzJk4vK56O3l3xBuHPOxFsuPt_C9zvTXqGE6UbIjEtp33Av4OiKo3HZrlq29_9mOJU/s1600/hacker+shop.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="250" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEji9gLnm89BaFYqDryCaotSpPnDIdyw82ohEQAvQNrvl_R93_FW5sHgNeLgt_hKxBFl6hUwBjX1RBzJk4vK56O3l3xBuHPOxFsuPt_C9zvTXqGE6UbIjEtp33Av4OiKo3HZrlq29_9mOJU/s400/hacker+shop.png" width="400" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div align="center" class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; mso-outline-level: 4; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div align="center" class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; mso-outline-level: 4; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div align="center" class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; mso-outline-level: 4; text-align: center;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;b&gt;&lt;span style="font-size: 12pt;"&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves/&gt;
  &lt;w:TrackFormatting/&gt;
  &lt;w:PunctuationKerning/&gt;
  &lt;w:ValidateAgainstSchemas/&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF/&gt;
  &lt;w:LidThemeOther&gt;EN-US&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables/&gt;
   &lt;w:SnapToGridInCell/&gt;
   &lt;w:WrapTextWithPunct/&gt;
   &lt;w:UseAsianBreakRules/&gt;
   &lt;w:DontGrowAutofit/&gt;
   &lt;w:SplitPgBreakAndParaMark/&gt;
   &lt;w:DontVertAlignCellWithSp/&gt;
   &lt;w:DontBreakConstrainedForcedTables/&gt;
   &lt;w:DontVertAlignInTxbx/&gt;
   &lt;w:Word11KerningPairs/&gt;
   &lt;w:CachedColBalance/&gt;
  &lt;/w:Compatibility&gt;
  &lt;w:BrowserLevel&gt;MicrosoftInternetExplorer4&lt;/w:BrowserLevel&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val="Cambria Math"/&gt;
   &lt;m:brkBin m:val="before"/&gt;
   &lt;m:brkBinSub m:val="--"/&gt;
   &lt;m:smallFrac m:val="off"/&gt;
   &lt;m:dispDef/&gt;
   &lt;m:lMargin m:val="0"/&gt;
   &lt;m:rMargin m:val="0"/&gt;
   &lt;m:defJc m:val="centerGroup"/&gt;
   &lt;m:wrapIndent m:val="1440"/&gt;
   &lt;m:intLim m:val="subSup"/&gt;
   &lt;m:naryLim m:val="undOvr"/&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
  DefSemiHidden="true" DefQFormat="false" DefPriority="99"
  LatentStyleCount="267"&gt;
  &lt;w:LsdException Locked="false" Priority="0" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Normal"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="heading 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 7"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 8"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 9"/&gt;
  &lt;w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/&gt;
  &lt;w:LsdException Locked="false" Priority="10" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Title"/&gt;
  &lt;w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/&gt;
  &lt;w:LsdException Locked="false" Priority="11" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/&gt;
  &lt;w:LsdException Locked="false" Priority="22" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Strong"/&gt;
  &lt;w:LsdException Locked="false" Priority="20" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="59" SemiHidden="false"
   UnhideWhenUsed="false" Name="Table Grid"/&gt;
  &lt;w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/&gt;
  &lt;w:LsdException Locked="false" Priority="1" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/&gt;
  &lt;w:LsdException Locked="false" Priority="34" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/&gt;
  &lt;w:LsdException Locked="false" Priority="29" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Quote"/&gt;
  &lt;w:LsdException Locked="false" Priority="30" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="19" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="21" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="31" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/&gt;
  &lt;w:LsdException Locked="false" Priority="32" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/&gt;
  &lt;w:LsdException Locked="false" Priority="33" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Book Title"/&gt;
  &lt;w:LsdException Locked="false" Priority="37" Name="Bibliography"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
 {mso-style-name:"Table Normal";
 mso-tstyle-rowband-size:0;
 mso-tstyle-colband-size:0;
 mso-style-noshow:yes;
 mso-style-priority:99;
 mso-style-qformat:yes;
 mso-style-parent:"";
 mso-padding-alt:0in 5.4pt 0in 5.4pt;
 mso-para-margin-top:0in;
 mso-para-margin-right:0in;
 mso-para-margin-bottom:10.0pt;
 mso-para-margin-left:0in;
 line-height:115%;
 mso-pagination:widow-orphan;
 font-size:11.0pt;
 font-family:"Calibri","sans-serif";
 mso-ascii-font-family:Calibri;
 mso-ascii-theme-font:minor-latin;
 mso-hansi-font-family:Calibri;
 mso-hansi-theme-font:minor-latin;}
&lt;/style&gt;
&lt;![endif]--&gt;

&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span style="font-size: 12pt;"&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;"&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;b&gt;&lt;span style="font-size: 12pt;"&gt;BANK TRANSFER SERVICES&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;b&gt;

&lt;/b&gt;&lt;span style="font-size: 12pt;"&gt;&lt;div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;"&gt;
&lt;span style="font-size: 12pt;"&gt;Now, you’ve known how this things
work so it’s time for business.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;"&gt;
&lt;span style="font-size: 12pt;"&gt;We are a professional
Russian hacking group and we have come with wonderful bank transfer services.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;"&gt;
&lt;span style="font-size: 12pt;"&gt;We combine a lot of tools coupled with over 15 years of experience in this
field to present you with this services. We make use of powerful zeus botnets
and advanced phishing and bulk mailing platform to gain access to bank login
and database.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;"&gt;
&lt;span style="font-size: 12pt;"&gt;Bank transfers are now available to
the following countries :&lt;/span&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span style="font-size: 12pt;"&gt;

&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;&lt;ul type="disc"&gt;
&lt;li class="MsoNormal" style="line-height: normal; text-align: left;"&gt;&lt;span style="font-size: 12pt;"&gt;USA&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal" style="line-height: normal; text-align: left;"&gt;&lt;span style="font-size: 12pt;"&gt;UK&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal" style="line-height: normal; text-align: left;"&gt;&lt;span style="font-size: 12pt;"&gt;EU&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal" style="line-height: normal; text-align: left;"&gt;&lt;span style="font-size: 12pt;"&gt;Canada&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal" style="line-height: normal; text-align: left;"&gt;&lt;span style="font-size: 12pt;"&gt;Australia&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal" style="line-height: normal; text-align: left;"&gt;&lt;span style="font-size: 12pt;"&gt;Russia&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal" style="line-height: normal; text-align: left;"&gt;&lt;span style="font-size: 12pt;"&gt;Netherlands&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal" style="line-height: normal; text-align: left;"&gt;&lt;span style="font-size: 12pt;"&gt;China&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal" style="line-height: normal; text-align: left;"&gt;&lt;span style="font-size: 12pt;"&gt;Malaysia&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;b&gt;&lt;span style="font-size: 12pt;"&gt;

&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span style="font-size: 12pt;"&gt;&lt;div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;"&gt;
&lt;b&gt;&lt;span style="font-size: 12pt;"&gt;&amp;nbsp; Value of Transfers :&lt;/span&gt;&lt;/b&gt;&lt;span style="font-size: 12pt;"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span style="font-size: 12pt;"&gt;&lt;div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;"&gt;
&lt;span style="font-size: 12pt;"&gt;We transfer $2,000 – $10,000 per
transfer to Personal accounts (Checking accounts, Savings accounts, Current
accounts, Standard accounts). Transfers over $10,000 are available to Business
or Corporate accounts only. If you require transfers over $10,000 you should
contact us, the fee is not stated here but it’s negotiable.&lt;/span&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;b&gt;&lt;span style="font-size: 12pt;"&gt;&lt;span style="font-weight: normal;"&gt;

&lt;/span&gt;&lt;div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;"&gt;
&lt;span style="font-weight: normal;"&gt;&lt;span style="font-size: 12pt;"&gt;Transfer Clearing time :&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-weight: normal;"&gt;

&lt;/span&gt;&lt;div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;"&gt;
&lt;span style="font-weight: normal;"&gt;&lt;span style="font-size: 12pt;"&gt;Same day service to
UK/USA/EU/Canada/Australia – 1 to 2 business days service to
Russia/Dubai/Singapore.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-weight: normal;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;b&gt;&lt;span style="font-size: 12pt;"&gt;&lt;div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;"&gt;
&lt;span style="font-weight: normal;"&gt;&lt;span style="font-size: 12pt;"&gt;Fee :&lt;/span&gt;&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;b&gt;&lt;span style="font-size: 12pt;"&gt;&lt;span style="font-weight: normal;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span style="font-size: 12pt;"&gt;&lt;span style="font-weight: normal;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span style="font-size: 12pt;"&gt;&lt;span style="font-weight: normal;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span style="font-size: 12pt;"&gt;&lt;span style="font-weight: normal;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span style="font-size: 12pt;"&gt;

&lt;/span&gt;&lt;/b&gt;&lt;span style="font-size: 12pt;"&gt;&lt;ul type="disc"&gt;
&lt;li class="MsoNormal" style="line-height: normal; text-align: left;"&gt;&lt;span style="font-size: 12pt;"&gt;$2000 – $4000: $450&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal" style="line-height: normal; text-align: left;"&gt;&lt;span style="font-size: 12pt;"&gt;$5000 – $7000: $750&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal" style="line-height: normal; text-align: left;"&gt;&lt;span style="font-size: 12pt;"&gt;$8000 – $10000: $1050&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;b&gt;&lt;span style="font-size: 12pt;"&gt;

&lt;div align="center" class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; text-align: center;"&gt;
&lt;b&gt;&lt;span style="font-size: 12pt;"&gt;How
to Order This Services&lt;/span&gt;&lt;/b&gt;&lt;span style="font-size: 12pt;"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;span style="font-size: 12pt;"&gt;&lt;div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;"&gt;
&lt;span style="font-size: 12pt;"&gt;To order for our bank transfer
services, you can contact us here : cleantransfers@gmail.com, we
transfer to all US banks and virtually all banks in the world expect few.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;"&gt;
&lt;span style="font-size: 12pt;"&gt;NOTE: We don’t give test transfers
and we don’t work on percentage with first time customers, only our regular
customers get transfer on percentage basis. Don’t contact us begging for test
or percentage, our customer service guy won’t respond to you.&lt;/span&gt;&lt;span style="font-size: 12pt;"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;"&gt;
&lt;span style="font-size: 12pt;"&gt;Here are some news watch about our
recent activities. Check the links:&lt;/span&gt;&lt;/div&gt;
&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;div align="center" class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; mso-outline-level: 4; text-align: center;"&gt;
&lt;b&gt;&lt;span style="font-size: 12pt;"&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves/&gt;
  &lt;w:TrackFormatting/&gt;
  &lt;w:PunctuationKerning/&gt;
  &lt;w:ValidateAgainstSchemas/&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF/&gt;
  &lt;w:LidThemeOther&gt;EN-US&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables/&gt;
   &lt;w:SnapToGridInCell/&gt;
   &lt;w:WrapTextWithPunct/&gt;
   &lt;w:UseAsianBreakRules/&gt;
   &lt;w:DontGrowAutofit/&gt;
   &lt;w:SplitPgBreakAndParaMark/&gt;
   &lt;w:DontVertAlignCellWithSp/&gt;
   &lt;w:DontBreakConstrainedForcedTables/&gt;
   &lt;w:DontVertAlignInTxbx/&gt;
   &lt;w:Word11KerningPairs/&gt;
   &lt;w:CachedColBalance/&gt;
  &lt;/w:Compatibility&gt;
  &lt;w:BrowserLevel&gt;MicrosoftInternetExplorer4&lt;/w:BrowserLevel&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val="Cambria Math"/&gt;
   &lt;m:brkBin m:val="before"/&gt;
   &lt;m:brkBinSub m:val="--"/&gt;
   &lt;m:smallFrac m:val="off"/&gt;
   &lt;m:dispDef/&gt;
   &lt;m:lMargin m:val="0"/&gt;
   &lt;m:rMargin m:val="0"/&gt;
   &lt;m:defJc m:val="centerGroup"/&gt;
   &lt;m:wrapIndent m:val="1440"/&gt;
   &lt;m:intLim m:val="subSup"/&gt;
   &lt;m:naryLim m:val="undOvr"/&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
  DefSemiHidden="true" DefQFormat="false" DefPriority="99"
  LatentStyleCount="267"&gt;
  &lt;w:LsdException Locked="false" Priority="0" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Normal"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="heading 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 7"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 8"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="toc 9"/&gt;
  &lt;w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/&gt;
  &lt;w:LsdException Locked="false" Priority="10" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Title"/&gt;
  &lt;w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/&gt;
  &lt;w:LsdException Locked="false" Priority="11" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/&gt;
  &lt;w:LsdException Locked="false" Priority="22" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Strong"/&gt;
  &lt;w:LsdException Locked="false" Priority="20" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="59" SemiHidden="false"
   UnhideWhenUsed="false" Name="Table Grid"/&gt;
  &lt;w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/&gt;
  &lt;w:LsdException Locked="false" Priority="1" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/&gt;
  &lt;w:LsdException Locked="false" Priority="34" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/&gt;
  &lt;w:LsdException Locked="false" Priority="29" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Quote"/&gt;
  &lt;w:LsdException Locked="false" Priority="30" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Shading Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" SemiHidden="false"
   UnhideWhenUsed="false" Name="Light Grid Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" SemiHidden="false"
   UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" SemiHidden="false"
   UnhideWhenUsed="false" Name="Dark List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" SemiHidden="false"
   UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="19" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="21" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="31" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/&gt;
  &lt;w:LsdException Locked="false" Priority="32" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/&gt;
  &lt;w:LsdException Locked="false" Priority="33" SemiHidden="false"
   UnhideWhenUsed="false" QFormat="true" Name="Book Title"/&gt;
  &lt;w:LsdException Locked="false" Priority="37" Name="Bibliography"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
 {mso-style-name:"Table Normal";
 mso-tstyle-rowband-size:0;
 mso-tstyle-colband-size:0;
 mso-style-noshow:yes;
 mso-style-priority:99;
 mso-style-qformat:yes;
 mso-style-parent:"";
 mso-padding-alt:0in 5.4pt 0in 5.4pt;
 mso-para-margin-top:0in;
 mso-para-margin-right:0in;
 mso-para-margin-bottom:10.0pt;
 mso-para-margin-left:0in;
 line-height:115%;
 mso-pagination:widow-orphan;
 font-size:11.0pt;
 font-family:"Calibri","sans-serif";
 mso-ascii-font-family:Calibri;
 mso-ascii-theme-font:minor-latin;
 mso-hansi-font-family:Calibri;
 mso-hansi-theme-font:minor-latin;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;span style="font-weight: normal;"&gt;

&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;"&gt;
&lt;b&gt;&lt;span style="font-size: 12pt;"&gt;&lt;span style="font-weight: normal;"&gt;In February 2015, we hacked up to $1
billion from more than 100 banks in 30 countries in what security experts
believe to be the biggest banking breach ever. &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;b&gt;

&lt;/b&gt;&lt;span style="font-size: 12pt;"&gt;&lt;div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;"&gt;
&lt;span style="font-size: 12pt;"&gt;&lt;a href="http://www.bbc.com/news/technology-31487258" target="_blank"&gt;&lt;span style="color: blue;"&gt;http://www.bbc.com/news/technology-31487258&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;"&gt;
&lt;span style="font-size: 12pt;"&gt;In August 2014, We hacked 1.2
billion usernames and passwords belonging to more than 500 million email
addresses, and also got access to industries database across the Globe.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;"&gt;
&lt;span style="font-size: 12pt;"&gt;&lt;a href="http://www.bbc.com/news/technology-28654613" target="_blank"&gt;&lt;span style="color: blue;"&gt;http://www.bbc.com/news/technology-28654613&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;b&gt;&lt;span style="font-size: 12pt;"&gt;

&lt;/span&gt;&lt;/b&gt;&lt;span style="font-size: 12pt;"&gt;&lt;div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;"&gt;
&lt;span style="font-size: 12pt;"&gt;In January 2014, we hit up to 110
million customers and 70 million customers information such as their name,
address, phone number and e-mail address hacked in the breach&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;"&gt;
&lt;span style="font-size: 12pt;"&gt;&lt;a href="http://www.bbc.com/news/technology-25681013" target="_blank"&gt;&lt;span style="color: blue;"&gt;http://www.bbc.com/news/technology-25681013 &lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style="font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;"&gt;

&amp;nbsp;&lt;/span&gt;&lt;/b&gt;

&lt;div class="blogger-post-footer"&gt;hacker bank&lt;/div&gt;</content><link href="http://heackerbank.blogspot.com/feeds/6764669392828846416/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2016/03/bank-account-hacking-software.html#comment-form" rel="replies" title="97 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/6764669392828846416" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/6764669392828846416" rel="self" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2016/03/bank-account-hacking-software.html" rel="alternate" title="Bank Account Hacking Software" type="text/html"/><author><name>POLDA METRO JAYA</name><uri>http://www.blogger.com/profile/12624712255672394889</uri><email>noreply@blogger.com</email><gd:image height="32" rel="http://schemas.google.com/g/2005#thumbnail" src="http://1.bp.blogspot.com/_iT-Q6WxNLRc/SvUNbcysImI/AAAAAAAAAFc/zUtZen-WXo0/S220/manager+1.jpg" width="22"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEji9gLnm89BaFYqDryCaotSpPnDIdyw82ohEQAvQNrvl_R93_FW5sHgNeLgt_hKxBFl6hUwBjX1RBzJk4vK56O3l3xBuHPOxFsuPt_C9zvTXqGE6UbIjEtp33Av4OiKo3HZrlq29_9mOJU/s72-c/hacker+shop.png" width="72"/><thr:total>97</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8380499217784119522.post-6309092916249509621</id><published>2015-10-26T23:34:00.003-07:00</published><updated>2015-10-26T23:34:33.643-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hack Wifi"/><title type="text">Wifi Hacker Ultimate</title><content type="html">&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9GNwm9Iv-7P9apX8RtSGrIK4ts6zaT_LX_t-pWuismb0q8INQqGxav31nDbqBnPVIBso8O6XO_dBr-cCUq-H_XXR3xyYhAj_W3NF6_nVihQMGfKGYk4ttyBBjDxAYJMnODcss-9Ha29RP/s1600/wifi-hacker-ultimate.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9GNwm9Iv-7P9apX8RtSGrIK4ts6zaT_LX_t-pWuismb0q8INQqGxav31nDbqBnPVIBso8O6XO_dBr-cCUq-H_XXR3xyYhAj_W3NF6_nVihQMGfKGYk4ttyBBjDxAYJMnODcss-9Ha29RP/s320/wifi-hacker-ultimate.jpg" width="190" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Wifi Hacker ULTIMATE sold Wifi is an application which aims to test the wifi network security or to restore the keywords in a matter of seconds. This is difficult to say, to be used on your own network, because other people are pirating wifi bad deeds.&lt;br /&gt;
&lt;br /&gt;
To use this application, you just have to start it and wait until these devices find all available networks in your area, even though sometimes - sometimes it can take a very long time depending on the number of transmitter network near you.&lt;br /&gt;
&lt;br /&gt;
Once the process is complete, you can choose your network (it is important to not try this device outside of your network, as this is a violation of the law), and check the security. If you can see a keyword, it is a good idea to change it means that any consumer can enter your network.&lt;br /&gt;
&lt;br /&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEGAsbZppzjNo1PXiSy4osg8dol3uhdzHNo7qp9jEtFCuSBvWxOw626yCMcTDgTlBIwNEtIIliTrg4F1lrSYiwKcCsio6QQG2GHZz3K3DFAVFFr_s8Gx1ksW3W45cGc9HhP2eP5yCD_8D2/s1600/wifi-hacker-ultimate-002.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEGAsbZppzjNo1PXiSy4osg8dol3uhdzHNo7qp9jEtFCuSBvWxOw626yCMcTDgTlBIwNEtIIliTrg4F1lrSYiwKcCsio6QQG2GHZz3K3DFAVFFr_s8Gx1ksW3W45cGc9HhP2eP5yCD_8D2/s320/wifi-hacker-ultimate-002.jpg" width="190" /&gt;&lt;/a&gt;Wifi Hacker ULTIMATE Wifi is a tool that should not be used without specific knowledge of the network, because although it is easy to use and can help you to secure your connection itself, the consequences of improper use can be very detrimental. So as they say, Responsibility own risk of use.&lt;br /&gt;
&lt;br /&gt;
Clik&amp;nbsp;&lt;a href="http://wifi-hacker-ultimate.id.uptodown.com/android/download" target="_blank"&gt;Download&amp;nbsp;&lt;/a&gt;&lt;div class="blogger-post-footer"&gt;hacker bank&lt;/div&gt;</content><link href="http://heackerbank.blogspot.com/feeds/6309092916249509621/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2015/10/wifi-hacker-ultimate.html#comment-form" rel="replies" title="4 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/6309092916249509621" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/6309092916249509621" rel="self" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2015/10/wifi-hacker-ultimate.html" rel="alternate" title="Wifi Hacker Ultimate" type="text/html"/><author><name>ization shop</name><uri>http://www.blogger.com/profile/18226043919918653581</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9GNwm9Iv-7P9apX8RtSGrIK4ts6zaT_LX_t-pWuismb0q8INQqGxav31nDbqBnPVIBso8O6XO_dBr-cCUq-H_XXR3xyYhAj_W3NF6_nVihQMGfKGYk4ttyBBjDxAYJMnODcss-9Ha29RP/s72-c/wifi-hacker-ultimate.jpg" width="72"/><thr:total>4</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8380499217784119522.post-1331239579108371516</id><published>2015-04-25T08:53:00.001-07:00</published><updated>2015-04-25T08:55:27.725-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="php"/><title type="text">Bad Meets evil - PHP meets Regular Expressions </title><content type="html">&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVpstTKYkxFIX__d8FMbYmW8fFnnZ3xhkf6UkEFML6SLDKI7ggvRf2CsBNcRa_YLDsQOPdOAW22eDZR_AQJ2WUWo9tGUJCwEGY3t_tOyBo7zBZ7HXOZWEubF5DRbO1p0yuU6SdwK9XGTk/s1600/haccked+ization.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVpstTKYkxFIX__d8FMbYmW8fFnnZ3xhkf6UkEFML6SLDKI7ggvRf2CsBNcRa_YLDsQOPdOAW22eDZR_AQJ2WUWo9tGUJCwEGY3t_tOyBo7zBZ7HXOZWEubF5DRbO1p0yuU6SdwK9XGTk/s1600/haccked+ization.jpg" height="400" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;o:OfficeDocumentSettings&gt;
  &lt;o:AllowPNG/&gt;
 &lt;/o:OfficeDocumentSettings&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;br /&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves/&gt;
  &lt;w:TrackFormatting/&gt;
  &lt;w:PunctuationKerning/&gt;
  &lt;w:ValidateAgainstSchemas/&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF/&gt;
  &lt;w:LidThemeOther&gt;EN-US&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables/&gt;
   &lt;w:SnapToGridInCell/&gt;
   &lt;w:WrapTextWithPunct/&gt;
   &lt;w:UseAsianBreakRules/&gt;
   &lt;w:DontGrowAutofit/&gt;
   &lt;w:SplitPgBreakAndParaMark/&gt;
   &lt;w:EnableOpenTypeKerning/&gt;
   &lt;w:DontFlipMirrorIndents/&gt;
   &lt;w:OverrideTableStyleHps/&gt;
  &lt;/w:Compatibility&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val="Cambria Math"/&gt;
   &lt;m:brkBin m:val="before"/&gt;
   &lt;m:brkBinSub m:val="--"/&gt;
   &lt;m:smallFrac m:val="off"/&gt;
   &lt;m:dispDef/&gt;
   &lt;m:lMargin m:val="0"/&gt;
   &lt;m:rMargin m:val="0"/&gt;
   &lt;m:defJc m:val="centerGroup"/&gt;
   &lt;m:wrapIndent m:val="1440"/&gt;
   &lt;m:intLim m:val="subSup"/&gt;
   &lt;m:naryLim m:val="undOvr"/&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
  DefSemiHidden="false" DefQFormat="false" DefPriority="99"
  LatentStyleCount="371"&gt;
  &lt;w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 7"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 8"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 9"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 9"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 7"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 8"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 9"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="header"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footer"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index heading"/&gt;
  &lt;w:LsdException Locked="false" Priority="35" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="caption"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of figures"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope address"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope return"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="line number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="page number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of authorities"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="macro"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="toa heading"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Closing"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Signature"/&gt;
  &lt;w:LsdException Locked="false" Priority="1" SemiHidden="true"
   UnhideWhenUsed="true" Name="Default Paragraph Font"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Message Header"/&gt;
  &lt;w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Salutation"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Date"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Note Heading"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Block Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Hyperlink"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="FollowedHyperlink"/&gt;
  &lt;w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/&gt;
  &lt;w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Document Map"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Plain Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="E-mail Signature"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Top of Form"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Bottom of Form"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal (Web)"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Acronym"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Address"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Cite"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Code"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Definition"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Keyboard"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Preformatted"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Sample"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Typewriter"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Variable"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Table"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation subject"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="No List"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Contemporary"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Elegant"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Professional"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Balloon Text"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="Table Grid"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Theme"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"/&gt;
  &lt;w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Revision"/&gt;
  &lt;w:LsdException Locked="false" Priority="34" QFormat="true"
   Name="List Paragraph"/&gt;
  &lt;w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"/&gt;
  &lt;w:LsdException Locked="false" Priority="30" QFormat="true"
   Name="Intense Quote"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="19" QFormat="true"
   Name="Subtle Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="21" QFormat="true"
   Name="Intense Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="31" QFormat="true"
   Name="Subtle Reference"/&gt;
  &lt;w:LsdException Locked="false" Priority="32" QFormat="true"
   Name="Intense Reference"/&gt;
  &lt;w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"/&gt;
  &lt;w:LsdException Locked="false" Priority="37" SemiHidden="true"
   UnhideWhenUsed="true" Name="Bibliography"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"/&gt;
  &lt;w:LsdException Locked="false" Priority="41" Name="Plain Table 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="42" Name="Plain Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="45" Name="Plain Table 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="40" Name="Grid Table Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"/&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"/&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 6"/&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
 {mso-style-name:"Table Normal";
 mso-tstyle-rowband-size:0;
 mso-tstyle-colband-size:0;
 mso-style-noshow:yes;
 mso-style-priority:99;
 mso-style-parent:"";
 mso-padding-alt:0in 5.4pt 0in 5.4pt;
 mso-para-margin-top:0in;
 mso-para-margin-right:0in;
 mso-para-margin-bottom:8.0pt;
 mso-para-margin-left:0in;
 line-height:107%;
 mso-pagination:widow-orphan;
 font-size:11.0pt;
 font-family:"Calibri","sans-serif";
 mso-ascii-font-family:Calibri;
 mso-ascii-theme-font:minor-latin;
 mso-hansi-font-family:Calibri;
 mso-hansi-theme-font:minor-latin;}
&lt;/style&gt;
&lt;![endif]--&gt;

&lt;br /&gt;
&lt;div class="MsoNormal"&gt;
This article would briefly discuss the reason why Regular
Expressions might not be suitable for filtersand how things could turn
miserably bad when PHP comes is used with Regular Expressions. The post would
then continue with the write-up of a relevant scenario based challenge, and
finally will conclude with the author’s opinion on the topic.&amp;nbsp;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;blockquote class="tr_bq"&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;&amp;nbsp;Common pitfalls of regular exoressions &lt;/b&gt;&lt;/div&gt;
&lt;/blockquote&gt;
&lt;br /&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;o:OfficeDocumentSettings&gt;
  &lt;o:AllowPNG/&gt;
 &lt;/o:OfficeDocumentSettings&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;br /&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves/&gt;
  &lt;w:TrackFormatting/&gt;
  &lt;w:PunctuationKerning/&gt;
  &lt;w:ValidateAgainstSchemas/&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF/&gt;
  &lt;w:LidThemeOther&gt;EN-US&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables/&gt;
   &lt;w:SnapToGridInCell/&gt;
   &lt;w:WrapTextWithPunct/&gt;
   &lt;w:UseAsianBreakRules/&gt;
   &lt;w:DontGrowAutofit/&gt;
   &lt;w:SplitPgBreakAndParaMark/&gt;
   &lt;w:EnableOpenTypeKerning/&gt;
   &lt;w:DontFlipMirrorIndents/&gt;
   &lt;w:OverrideTableStyleHps/&gt;
  &lt;/w:Compatibility&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val="Cambria Math"/&gt;
   &lt;m:brkBin m:val="before"/&gt;
   &lt;m:brkBinSub m:val="--"/&gt;
   &lt;m:smallFrac m:val="off"/&gt;
   &lt;m:dispDef/&gt;
   &lt;m:lMargin m:val="0"/&gt;
   &lt;m:rMargin m:val="0"/&gt;
   &lt;m:defJc m:val="centerGroup"/&gt;
   &lt;m:wrapIndent m:val="1440"/&gt;
   &lt;m:intLim m:val="subSup"/&gt;
   &lt;m:naryLim m:val="undOvr"/&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
  DefSemiHidden="false" DefQFormat="false" DefPriority="99"
  LatentStyleCount="371"&gt;
  &lt;w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 7"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 8"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 9"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 9"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 7"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 8"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 9"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="header"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footer"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index heading"/&gt;
  &lt;w:LsdException Locked="false" Priority="35" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="caption"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of figures"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope address"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope return"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="line number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="page number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of authorities"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="macro"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="toa heading"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Closing"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Signature"/&gt;
  &lt;w:LsdException Locked="false" Priority="1" SemiHidden="true"
   UnhideWhenUsed="true" Name="Default Paragraph Font"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Message Header"/&gt;
  &lt;w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Salutation"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Date"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Note Heading"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Block Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Hyperlink"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="FollowedHyperlink"/&gt;
  &lt;w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/&gt;
  &lt;w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Document Map"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Plain Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="E-mail Signature"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Top of Form"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Bottom of Form"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal (Web)"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Acronym"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Address"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Cite"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Code"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Definition"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Keyboard"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Preformatted"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Sample"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Typewriter"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Variable"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Table"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation subject"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="No List"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Contemporary"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Elegant"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Professional"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Balloon Text"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="Table Grid"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Theme"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"/&gt;
  &lt;w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Revision"/&gt;
  &lt;w:LsdException Locked="false" Priority="34" QFormat="true"
   Name="List Paragraph"/&gt;
  &lt;w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"/&gt;
  &lt;w:LsdException Locked="false" Priority="30" QFormat="true"
   Name="Intense Quote"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="19" QFormat="true"
   Name="Subtle Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="21" QFormat="true"
   Name="Intense Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="31" QFormat="true"
   Name="Subtle Reference"/&gt;
  &lt;w:LsdException Locked="false" Priority="32" QFormat="true"
   Name="Intense Reference"/&gt;
  &lt;w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"/&gt;
  &lt;w:LsdException Locked="false" Priority="37" SemiHidden="true"
   UnhideWhenUsed="true" Name="Bibliography"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"/&gt;
  &lt;w:LsdException Locked="false" Priority="41" Name="Plain Table 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="42" Name="Plain Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="45" Name="Plain Table 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="40" Name="Grid Table Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"/&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"/&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 6"/&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
 {mso-style-name:"Table Normal";
 mso-tstyle-rowband-size:0;
 mso-tstyle-colband-size:0;
 mso-style-noshow:yes;
 mso-style-priority:99;
 mso-style-parent:"";
 mso-padding-alt:0in 5.4pt 0in 5.4pt;
 mso-para-margin-top:0in;
 mso-para-margin-right:0in;
 mso-para-margin-bottom:8.0pt;
 mso-para-margin-left:0in;
 line-height:107%;
 mso-pagination:widow-orphan;
 font-size:11.0pt;
 font-family:"Calibri","sans-serif";
 mso-ascii-font-family:Calibri;
 mso-ascii-theme-font:minor-latin;
 mso-hansi-font-family:Calibri;
 mso-hansi-theme-font:minor-latin;}
&lt;/style&gt;
&lt;![endif]--&gt;

&lt;br /&gt;
&lt;div class="MsoNormal"&gt;
RegEx (Regular expressions) are commonly used for pattern
matching, searching and replacing purposes; which are handy for string
manipulation in different supported back-end programming languages. In reality,
there are ton of filters [1] which heavily rely upon RegEx to filter out
malicious inputs.&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
We have already witnessed [2] why RegEx might not be
considered as a good idea. However, one might argue that it is the programmers'
fault (or rather choice of options) - they do not consider all the possible
test cases for an attack surface scenario. I simply couldn't disagree with this
statement. In fact, the Microsoft's current XSS filter [3] is a good example of
it. Following are some of the problems:&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
Problem#1: Under the hood for the first problem, the filter
currently employs a very long RegEx, to which surprisingly, has no public
bypasses available. But one should not forget it actually evolves from the
previous vulnerable versions, and one really must have the patience to write
such a tedious RegEx.&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
Problem#2: The second problem is that even with a functional
RegEx, this entirely could lead to different vulnerabilities. Yes; I'm talking
about ReDoS(Regular Expression Denial of Service), an attack which happens to
be surfaced in bad constructed Regex wherein attackers could compromise the
availability of the application with a specially crafted input.&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
In a long run, with the programmer’s perspective, it might
be a bit tedious for developers to handle both functionality and security at
one hand. Therefore, we conclude that RegEx (Regular Expressions) should be
considered evil when being heavily used in filters.&lt;/div&gt;
&lt;br /&gt;
&lt;blockquote class="tr_bq"&gt;
&lt;b&gt;PHP + RegEX ..!!&lt;/b&gt;&lt;/blockquote&gt;
&lt;br /&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;o:OfficeDocumentSettings&gt;
  &lt;o:AllowPNG/&gt;
 &lt;/o:OfficeDocumentSettings&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;br /&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves/&gt;
  &lt;w:TrackFormatting/&gt;
  &lt;w:PunctuationKerning/&gt;
  &lt;w:ValidateAgainstSchemas/&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF/&gt;
  &lt;w:LidThemeOther&gt;EN-US&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables/&gt;
   &lt;w:SnapToGridInCell/&gt;
   &lt;w:WrapTextWithPunct/&gt;
   &lt;w:UseAsianBreakRules/&gt;
   &lt;w:DontGrowAutofit/&gt;
   &lt;w:SplitPgBreakAndParaMark/&gt;
   &lt;w:EnableOpenTypeKerning/&gt;
   &lt;w:DontFlipMirrorIndents/&gt;
   &lt;w:OverrideTableStyleHps/&gt;
  &lt;/w:Compatibility&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val="Cambria Math"/&gt;
   &lt;m:brkBin m:val="before"/&gt;
   &lt;m:brkBinSub m:val="--"/&gt;
   &lt;m:smallFrac m:val="off"/&gt;
   &lt;m:dispDef/&gt;
   &lt;m:lMargin m:val="0"/&gt;
   &lt;m:rMargin m:val="0"/&gt;
   &lt;m:defJc m:val="centerGroup"/&gt;
   &lt;m:wrapIndent m:val="1440"/&gt;
   &lt;m:intLim m:val="subSup"/&gt;
   &lt;m:naryLim m:val="undOvr"/&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
  DefSemiHidden="false" DefQFormat="false" DefPriority="99"
  LatentStyleCount="371"&gt;
  &lt;w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 7"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 8"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 9"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 9"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 7"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 8"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 9"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="header"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footer"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index heading"/&gt;
  &lt;w:LsdException Locked="false" Priority="35" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="caption"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of figures"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope address"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope return"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="line number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="page number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of authorities"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="macro"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="toa heading"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Closing"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Signature"/&gt;
  &lt;w:LsdException Locked="false" Priority="1" SemiHidden="true"
   UnhideWhenUsed="true" Name="Default Paragraph Font"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Message Header"/&gt;
  &lt;w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Salutation"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Date"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Note Heading"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Block Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Hyperlink"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="FollowedHyperlink"/&gt;
  &lt;w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/&gt;
  &lt;w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Document Map"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Plain Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="E-mail Signature"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Top of Form"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Bottom of Form"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal (Web)"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Acronym"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Address"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Cite"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Code"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Definition"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Keyboard"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Preformatted"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Sample"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Typewriter"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Variable"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Table"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation subject"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="No List"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Contemporary"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Elegant"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Professional"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Balloon Text"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="Table Grid"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Theme"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"/&gt;
  &lt;w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Revision"/&gt;
  &lt;w:LsdException Locked="false" Priority="34" QFormat="true"
   Name="List Paragraph"/&gt;
  &lt;w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"/&gt;
  &lt;w:LsdException Locked="false" Priority="30" QFormat="true"
   Name="Intense Quote"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="19" QFormat="true"
   Name="Subtle Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="21" QFormat="true"
   Name="Intense Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="31" QFormat="true"
   Name="Subtle Reference"/&gt;
  &lt;w:LsdException Locked="false" Priority="32" QFormat="true"
   Name="Intense Reference"/&gt;
  &lt;w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"/&gt;
  &lt;w:LsdException Locked="false" Priority="37" SemiHidden="true"
   UnhideWhenUsed="true" Name="Bibliography"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"/&gt;
  &lt;w:LsdException Locked="false" Priority="41" Name="Plain Table 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="42" Name="Plain Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="45" Name="Plain Table 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="40" Name="Grid Table Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"/&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"/&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 6"/&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
 {mso-style-name:"Table Normal";
 mso-tstyle-rowband-size:0;
 mso-tstyle-colband-size:0;
 mso-style-noshow:yes;
 mso-style-priority:99;
 mso-style-parent:"";
 mso-padding-alt:0in 5.4pt 0in 5.4pt;
 mso-para-margin-top:0in;
 mso-para-margin-right:0in;
 mso-para-margin-bottom:8.0pt;
 mso-para-margin-left:0in;
 line-height:107%;
 mso-pagination:widow-orphan;
 font-size:11.0pt;
 font-family:"Calibri","sans-serif";
 mso-ascii-font-family:Calibri;
 mso-ascii-theme-font:minor-latin;
 mso-hansi-font-family:Calibri;
 mso-hansi-theme-font:minor-latin;}
&lt;/style&gt;
&lt;![endif]--&gt;

&lt;br /&gt;
&lt;div class="MsoNormal"&gt;
PHP itself is not bad, however when combined with regex becomes
bad. Regarding RegEx, Most of the used RegEx functions (i.e. preg_*) in PHP are
based upon the PCRE library. The engine itself is not only deficient in terms
of performance, but it also opens to have a potential gateway to REDOS
vulnerabilities.&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
As we can see from a REDOS issue in PHP's famous frame work
Code Igniter [4], a non-harmful RegEx (e.g. `/[a-z]+=/`) can cause a serious
performance damange. More importantly, there is a fatal design flaw. In order
to prevent resource exhaustion, PHP is so smart that it provides an option
called pcre.backtrack_limit. What it does is to limit the number of backtracks
(backtrack is a common cause of ReDoS). But what if the number of backtracks
reaches the limit? Well, it just doesn't care. In other words, it is possible
to evade specific protections when the conditions are met.&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;blockquote class="tr_bq"&gt;
&lt;div class="MsoNormal"&gt;
&lt;b&gt;The Write-up &lt;/b&gt;&lt;/div&gt;
&lt;/blockquote&gt;
&lt;br /&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves/&gt;
  &lt;w:TrackFormatting/&gt;
  &lt;w:PunctuationKerning/&gt;
  &lt;w:ValidateAgainstSchemas/&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF/&gt;
  &lt;w:LidThemeOther&gt;EN-US&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables/&gt;
   &lt;w:SnapToGridInCell/&gt;
   &lt;w:WrapTextWithPunct/&gt;
   &lt;w:UseAsianBreakRules/&gt;
   &lt;w:DontGrowAutofit/&gt;
   &lt;w:SplitPgBreakAndParaMark/&gt;
   &lt;w:EnableOpenTypeKerning/&gt;
   &lt;w:DontFlipMirrorIndents/&gt;
   &lt;w:OverrideTableStyleHps/&gt;
  &lt;/w:Compatibility&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val="Cambria Math"/&gt;
   &lt;m:brkBin m:val="before"/&gt;
   &lt;m:brkBinSub m:val="--"/&gt;
   &lt;m:smallFrac m:val="off"/&gt;
   &lt;m:dispDef/&gt;
   &lt;m:lMargin m:val="0"/&gt;
   &lt;m:rMargin m:val="0"/&gt;
   &lt;m:defJc m:val="centerGroup"/&gt;
   &lt;m:wrapIndent m:val="1440"/&gt;
   &lt;m:intLim m:val="subSup"/&gt;
   &lt;m:naryLim m:val="undOvr"/&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
  DefSemiHidden="false" DefQFormat="false" DefPriority="99"
  LatentStyleCount="371"&gt;
  &lt;w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 7"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 8"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 9"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 9"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 7"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 8"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 9"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="header"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footer"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index heading"/&gt;
  &lt;w:LsdException Locked="false" Priority="35" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="caption"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of figures"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope address"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope return"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="line number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="page number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of authorities"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="macro"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="toa heading"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Closing"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Signature"/&gt;
  &lt;w:LsdException Locked="false" Priority="1" SemiHidden="true"
   UnhideWhenUsed="true" Name="Default Paragraph Font"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Message Header"/&gt;
  &lt;w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Salutation"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Date"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Note Heading"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Block Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Hyperlink"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="FollowedHyperlink"/&gt;
  &lt;w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/&gt;
  &lt;w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Document Map"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Plain Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="E-mail Signature"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Top of Form"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Bottom of Form"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal (Web)"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Acronym"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Address"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Cite"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Code"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Definition"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Keyboard"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Preformatted"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Sample"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Typewriter"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Variable"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Table"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation subject"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="No List"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Contemporary"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Elegant"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Professional"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Balloon Text"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="Table Grid"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Theme"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"/&gt;
  &lt;w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Revision"/&gt;
  &lt;w:LsdException Locked="false" Priority="34" QFormat="true"
   Name="List Paragraph"/&gt;
  &lt;w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"/&gt;
  &lt;w:LsdException Locked="false" Priority="30" QFormat="true"
   Name="Intense Quote"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="19" QFormat="true"
   Name="Subtle Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="21" QFormat="true"
   Name="Intense Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="31" QFormat="true"
   Name="Subtle Reference"/&gt;
  &lt;w:LsdException Locked="false" Priority="32" QFormat="true"
   Name="Intense Reference"/&gt;
  &lt;w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"/&gt;
  &lt;w:LsdException Locked="false" Priority="37" SemiHidden="true"
   UnhideWhenUsed="true" Name="Bibliography"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"/&gt;
  &lt;w:LsdException Locked="false" Priority="41" Name="Plain Table 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="42" Name="Plain Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="45" Name="Plain Table 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="40" Name="Grid Table Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"/&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"/&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 6"/&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
 {mso-style-name:"Table Normal";
 mso-tstyle-rowband-size:0;
 mso-tstyle-colband-size:0;
 mso-style-noshow:yes;
 mso-style-priority:99;
 mso-style-parent:"";
 mso-padding-alt:0in 5.4pt 0in 5.4pt;
 mso-para-margin-top:0in;
 mso-para-margin-right:0in;
 mso-para-margin-bottom:8.0pt;
 mso-para-margin-left:0in;
 line-height:107%;
 mso-pagination:widow-orphan;
 font-size:11.0pt;
 font-family:"Calibri","sans-serif";
 mso-ascii-font-family:Calibri;
 mso-ascii-theme-font:minor-latin;
 mso-hansi-font-family:Calibri;
 mso-hansi-theme-font:minor-latin;}
&lt;/style&gt;
&lt;![endif]--&gt;

&lt;br /&gt;
&lt;div class="MsoNormal"&gt;
In order to demonstrate how serious the problem could be, I
had ended up creating a mini XSS puzzle of the kcal.pw series. Here is the
sample code for this puzzle:&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;o:OfficeDocumentSettings&gt;
  &lt;o:AllowPNG/&gt;
 &lt;/o:OfficeDocumentSettings&gt;
&lt;/xml&gt;&lt;![endif]--&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves/&gt;
  &lt;w:TrackFormatting/&gt;
  &lt;w:PunctuationKerning/&gt;
  &lt;w:ValidateAgainstSchemas/&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF/&gt;
  &lt;w:LidThemeOther&gt;EN-US&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables/&gt;
   &lt;w:SnapToGridInCell/&gt;
   &lt;w:WrapTextWithPunct/&gt;
   &lt;w:UseAsianBreakRules/&gt;
   &lt;w:DontGrowAutofit/&gt;
   &lt;w:SplitPgBreakAndParaMark/&gt;
   &lt;w:EnableOpenTypeKerning/&gt;
   &lt;w:DontFlipMirrorIndents/&gt;
   &lt;w:OverrideTableStyleHps/&gt;
  &lt;/w:Compatibility&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val="Cambria Math"/&gt;
   &lt;m:brkBin m:val="before"/&gt;
   &lt;m:brkBinSub m:val="--"/&gt;
   &lt;m:smallFrac m:val="off"/&gt;
   &lt;m:dispDef/&gt;
   &lt;m:lMargin m:val="0"/&gt;
   &lt;m:rMargin m:val="0"/&gt;
   &lt;m:defJc m:val="centerGroup"/&gt;
   &lt;m:wrapIndent m:val="1440"/&gt;
   &lt;m:intLim m:val="subSup"/&gt;
   &lt;m:naryLim m:val="undOvr"/&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
  DefSemiHidden="false" DefQFormat="false" DefPriority="99"
  LatentStyleCount="371"&gt;
  &lt;w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 7"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 8"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 9"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 9"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 7"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 8"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 9"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="header"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footer"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index heading"/&gt;
  &lt;w:LsdException Locked="false" Priority="35" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="caption"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of figures"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope address"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope return"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="line number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="page number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of authorities"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="macro"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="toa heading"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Closing"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Signature"/&gt;
  &lt;w:LsdException Locked="false" Priority="1" SemiHidden="true"
   UnhideWhenUsed="true" Name="Default Paragraph Font"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Message Header"/&gt;
  &lt;w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Salutation"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Date"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Note Heading"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Block Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Hyperlink"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="FollowedHyperlink"/&gt;
  &lt;w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/&gt;
  &lt;w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Document Map"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Plain Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="E-mail Signature"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Top of Form"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Bottom of Form"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal (Web)"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Acronym"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Address"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Cite"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Code"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Definition"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Keyboard"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Preformatted"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Sample"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Typewriter"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Variable"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Table"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation subject"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="No List"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Contemporary"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Elegant"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Professional"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Balloon Text"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="Table Grid"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Theme"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"/&gt;
  &lt;w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Revision"/&gt;
  &lt;w:LsdException Locked="false" Priority="34" QFormat="true"
   Name="List Paragraph"/&gt;
  &lt;w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"/&gt;
  &lt;w:LsdException Locked="false" Priority="30" QFormat="true"
   Name="Intense Quote"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="19" QFormat="true"
   Name="Subtle Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="21" QFormat="true"
   Name="Intense Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="31" QFormat="true"
   Name="Subtle Reference"/&gt;
  &lt;w:LsdException Locked="false" Priority="32" QFormat="true"
   Name="Intense Reference"/&gt;
  &lt;w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"/&gt;
  &lt;w:LsdException Locked="false" Priority="37" SemiHidden="true"
   UnhideWhenUsed="true" Name="Bibliography"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"/&gt;
  &lt;w:LsdException Locked="false" Priority="41" Name="Plain Table 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="42" Name="Plain Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="45" Name="Plain Table 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="40" Name="Grid Table Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"/&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"/&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 6"/&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin-top:0in;
	mso-para-margin-right:0in;
	mso-para-margin-bottom:8.0pt;
	mso-para-margin-left:0in;
	line-height:107%;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;}
&lt;/style&gt;
&lt;![endif]--&gt;

&lt;br /&gt;
&lt;div class="MsoNormal" style="text-align: left;"&gt;
&lt;i&gt;$xss = $_POST['xss'];&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;

&lt;/i&gt;&lt;br /&gt;
&lt;div class="MsoNormal" style="text-align: left;"&gt;
&lt;i&gt;if (preg_match('/&amp;lt;(?:\w+)\W+?[\w]/', $xss)) {&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;

&lt;/i&gt;&lt;br /&gt;
&lt;div class="MsoNormal" style="text-align: left;"&gt;
&lt;i&gt;echo 'I don\'t think so&lt;br /&gt;
';&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;

&lt;/i&gt;&lt;br /&gt;
&lt;div class="MsoNormal" style="text-align: left;"&gt;
&lt;i&gt;} else {&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;

&lt;/i&gt;&lt;br /&gt;
&lt;div class="MsoNormal" style="text-align: left;"&gt;
&lt;i&gt;echo $xss;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;

&lt;/i&gt;&lt;br /&gt;
&lt;div class="MsoNormal" style="text-align: left;"&gt;
&lt;i&gt;}&lt;/i&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="text-align: left;"&gt;
&lt;i&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;o:OfficeDocumentSettings&gt;
  &lt;o:AllowPNG/&gt;
 &lt;/o:OfficeDocumentSettings&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="text-align: left;"&gt;
&lt;i&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves/&gt;
  &lt;w:TrackFormatting/&gt;
  &lt;w:PunctuationKerning/&gt;
  &lt;w:ValidateAgainstSchemas/&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF/&gt;
  &lt;w:LidThemeOther&gt;EN-US&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables/&gt;
   &lt;w:SnapToGridInCell/&gt;
   &lt;w:WrapTextWithPunct/&gt;
   &lt;w:UseAsianBreakRules/&gt;
   &lt;w:DontGrowAutofit/&gt;
   &lt;w:SplitPgBreakAndParaMark/&gt;
   &lt;w:EnableOpenTypeKerning/&gt;
   &lt;w:DontFlipMirrorIndents/&gt;
   &lt;w:OverrideTableStyleHps/&gt;
  &lt;/w:Compatibility&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val="Cambria Math"/&gt;
   &lt;m:brkBin m:val="before"/&gt;
   &lt;m:brkBinSub m:val="--"/&gt;
   &lt;m:smallFrac m:val="off"/&gt;
   &lt;m:dispDef/&gt;
   &lt;m:lMargin m:val="0"/&gt;
   &lt;m:rMargin m:val="0"/&gt;
   &lt;m:defJc m:val="centerGroup"/&gt;
   &lt;m:wrapIndent m:val="1440"/&gt;
   &lt;m:intLim m:val="subSup"/&gt;
   &lt;m:naryLim m:val="undOvr"/&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
  DefSemiHidden="false" DefQFormat="false" DefPriority="99"
  LatentStyleCount="371"&gt;
  &lt;w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 7"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 8"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 9"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 9"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 7"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 8"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 9"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="header"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footer"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index heading"/&gt;
  &lt;w:LsdException Locked="false" Priority="35" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="caption"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of figures"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope address"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope return"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="line number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="page number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of authorities"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="macro"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="toa heading"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Closing"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Signature"/&gt;
  &lt;w:LsdException Locked="false" Priority="1" SemiHidden="true"
   UnhideWhenUsed="true" Name="Default Paragraph Font"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Message Header"/&gt;
  &lt;w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Salutation"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Date"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Note Heading"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Block Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Hyperlink"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="FollowedHyperlink"/&gt;
  &lt;w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/&gt;
  &lt;w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Document Map"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Plain Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="E-mail Signature"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Top of Form"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Bottom of Form"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal (Web)"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Acronym"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Address"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Cite"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Code"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Definition"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Keyboard"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Preformatted"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Sample"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Typewriter"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Variable"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Table"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation subject"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="No List"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Contemporary"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Elegant"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Professional"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Balloon Text"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="Table Grid"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Theme"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"/&gt;
  &lt;w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Revision"/&gt;
  &lt;w:LsdException Locked="false" Priority="34" QFormat="true"
   Name="List Paragraph"/&gt;
  &lt;w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"/&gt;
  &lt;w:LsdException Locked="false" Priority="30" QFormat="true"
   Name="Intense Quote"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="19" QFormat="true"
   Name="Subtle Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="21" QFormat="true"
   Name="Intense Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="31" QFormat="true"
   Name="Subtle Reference"/&gt;
  &lt;w:LsdException Locked="false" Priority="32" QFormat="true"
   Name="Intense Reference"/&gt;
  &lt;w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"/&gt;
  &lt;w:LsdException Locked="false" Priority="37" SemiHidden="true"
   UnhideWhenUsed="true" Name="Bibliography"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"/&gt;
  &lt;w:LsdException Locked="false" Priority="41" Name="Plain Table 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="42" Name="Plain Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="45" Name="Plain Table 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="40" Name="Grid Table Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"/&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"/&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 6"/&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin-top:0in;
	mso-para-margin-right:0in;
	mso-para-margin-bottom:8.0pt;
	mso-para-margin-left:0in;
	line-height:107%;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;}
&lt;/style&gt;
&lt;![endif]--&gt;

&lt;/i&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
Let’s take a look at the following RegEx and what see it
does: ```/&amp;lt;(?:\w+)\W+?[\w]/```&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
It detects any presence of an open tag, followed by any
potential attributes, separators and whatsoever. Although the RegEx looks specious,
it is technically sufficient for preventing XSS in HTML context. If you look
closely, you will find the RegEx utilizes non-greedy matching which requires
backtracking. As mentioned before, PHP has a default backtrack limit
(pcre.backtrack_limit, 100000). However, PHP favours "fail silently",
which makes pcre_match simply returns false instead of throwing an exception
when the input reaches the limit. As a result, submitting a long enough payload
will bypass the filter.&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
Let’s try using the preg_match function to test the regular
expression with a large number of A’s:&lt;/div&gt;
&amp;nbsp;

&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div class="MsoNormal" style="text-align: left;"&gt;
&lt;br /&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;o:OfficeDocumentSettings&gt;
  &lt;o:AllowPNG/&gt;
 &lt;/o:OfficeDocumentSettings&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="text-align: left;"&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves/&gt;
  &lt;w:TrackFormatting/&gt;
  &lt;w:PunctuationKerning/&gt;
  &lt;w:ValidateAgainstSchemas/&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF/&gt;
  &lt;w:LidThemeOther&gt;EN-US&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables/&gt;
   &lt;w:SnapToGridInCell/&gt;
   &lt;w:WrapTextWithPunct/&gt;
   &lt;w:UseAsianBreakRules/&gt;
   &lt;w:DontGrowAutofit/&gt;
   &lt;w:SplitPgBreakAndParaMark/&gt;
   &lt;w:EnableOpenTypeKerning/&gt;
   &lt;w:DontFlipMirrorIndents/&gt;
   &lt;w:OverrideTableStyleHps/&gt;
  &lt;/w:Compatibility&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val="Cambria Math"/&gt;
   &lt;m:brkBin m:val="before"/&gt;
   &lt;m:brkBinSub m:val="--"/&gt;
   &lt;m:smallFrac m:val="off"/&gt;
   &lt;m:dispDef/&gt;
   &lt;m:lMargin m:val="0"/&gt;
   &lt;m:rMargin m:val="0"/&gt;
   &lt;m:defJc m:val="centerGroup"/&gt;
   &lt;m:wrapIndent m:val="1440"/&gt;
   &lt;m:intLim m:val="subSup"/&gt;
   &lt;m:naryLim m:val="undOvr"/&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
  DefSemiHidden="false" DefQFormat="false" DefPriority="99"
  LatentStyleCount="371"&gt;
  &lt;w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 7"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 8"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 9"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 9"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 7"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 8"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 9"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="header"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footer"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index heading"/&gt;
  &lt;w:LsdException Locked="false" Priority="35" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="caption"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of figures"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope address"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope return"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="line number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="page number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of authorities"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="macro"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="toa heading"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Closing"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Signature"/&gt;
  &lt;w:LsdException Locked="false" Priority="1" SemiHidden="true"
   UnhideWhenUsed="true" Name="Default Paragraph Font"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Message Header"/&gt;
  &lt;w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Salutation"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Date"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Note Heading"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Block Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Hyperlink"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="FollowedHyperlink"/&gt;
  &lt;w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/&gt;
  &lt;w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Document Map"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Plain Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="E-mail Signature"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Top of Form"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Bottom of Form"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal (Web)"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Acronym"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Address"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Cite"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Code"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Definition"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Keyboard"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Preformatted"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Sample"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Typewriter"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Variable"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Table"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation subject"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="No List"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Contemporary"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Elegant"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Professional"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Balloon Text"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="Table Grid"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Theme"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"/&gt;
  &lt;w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Revision"/&gt;
  &lt;w:LsdException Locked="false" Priority="34" QFormat="true"
   Name="List Paragraph"/&gt;
  &lt;w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"/&gt;
  &lt;w:LsdException Locked="false" Priority="30" QFormat="true"
   Name="Intense Quote"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="19" QFormat="true"
   Name="Subtle Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="21" QFormat="true"
   Name="Intense Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="31" QFormat="true"
   Name="Subtle Reference"/&gt;
  &lt;w:LsdException Locked="false" Priority="32" QFormat="true"
   Name="Intense Reference"/&gt;
  &lt;w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"/&gt;
  &lt;w:LsdException Locked="false" Priority="37" SemiHidden="true"
   UnhideWhenUsed="true" Name="Bibliography"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"/&gt;
  &lt;w:LsdException Locked="false" Priority="41" Name="Plain Table 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="42" Name="Plain Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="45" Name="Plain Table 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="40" Name="Grid Table Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"/&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"/&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 6"/&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin-top:0in;
	mso-para-margin-right:0in;
	mso-para-margin-bottom:8.0pt;
	mso-para-margin-left:0in;
	line-height:107%;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;}
&lt;/style&gt;
&lt;![endif]--&gt;

&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;i&gt;var_dump(preg_match('/&amp;lt;(?:\w+)\W+?[\w]/',
'&lt;a 1000000="" a="" href="https://www.blogger.com/null" i="" str_repeat=""&gt;&lt;/a&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
The proof of concept is simple. It simulates the input being matched with the vulnerable RegEx (A being repeated 1000000 times). And it does return false &lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class="MsoNormal"&gt;
&lt;form action="http://s30003-101809-vkp.tarentum.hack.me/index.php" method="post"&gt;
&lt;i&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;textarea name="xss" style="display: none;"&gt;&lt;/textarea&gt;&lt;/i&gt;&lt;/form&gt;
&lt;i&gt;
&lt;script&gt;&lt;br&gt;document.forms[0].xss.value = '&lt;script' + Array(999999).join('/') + '&gt;alert(1)&lt;\/script&gt;';&lt;br&gt;document.forms[0].submit();&lt;br&gt;&lt;/script&gt; &lt;/i&gt;&lt;/div&gt;
&lt;blockquote class="tr_bq"&gt;
&lt;b&gt;Conclusion &lt;/b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/blockquote&gt;
&lt;br /&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves/&gt;
  &lt;w:TrackFormatting/&gt;
  &lt;w:PunctuationKerning/&gt;
  &lt;w:ValidateAgainstSchemas/&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF/&gt;
  &lt;w:LidThemeOther&gt;EN-US&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables/&gt;
   &lt;w:SnapToGridInCell/&gt;
   &lt;w:WrapTextWithPunct/&gt;
   &lt;w:UseAsianBreakRules/&gt;
   &lt;w:DontGrowAutofit/&gt;
   &lt;w:SplitPgBreakAndParaMark/&gt;
   &lt;w:EnableOpenTypeKerning/&gt;
   &lt;w:DontFlipMirrorIndents/&gt;
   &lt;w:OverrideTableStyleHps/&gt;
  &lt;/w:Compatibility&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val="Cambria Math"/&gt;
   &lt;m:brkBin m:val="before"/&gt;
   &lt;m:brkBinSub m:val="--"/&gt;
   &lt;m:smallFrac m:val="off"/&gt;
   &lt;m:dispDef/&gt;
   &lt;m:lMargin m:val="0"/&gt;
   &lt;m:rMargin m:val="0"/&gt;
   &lt;m:defJc m:val="centerGroup"/&gt;
   &lt;m:wrapIndent m:val="1440"/&gt;
   &lt;m:intLim m:val="subSup"/&gt;
   &lt;m:naryLim m:val="undOvr"/&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
  DefSemiHidden="false" DefQFormat="false" DefPriority="99"
  LatentStyleCount="371"&gt;
  &lt;w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 7"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 8"/&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 9"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 9"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 7"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 8"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 9"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="header"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footer"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index heading"/&gt;
  &lt;w:LsdException Locked="false" Priority="35" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="caption"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of figures"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope address"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope return"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="line number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="page number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote reference"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of authorities"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="macro"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="toa heading"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Closing"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Signature"/&gt;
  &lt;w:LsdException Locked="false" Priority="1" SemiHidden="true"
   UnhideWhenUsed="true" Name="Default Paragraph Font"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Message Header"/&gt;
  &lt;w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Salutation"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Date"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Note Heading"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Block Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Hyperlink"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="FollowedHyperlink"/&gt;
  &lt;w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/&gt;
  &lt;w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Document Map"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Plain Text"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="E-mail Signature"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Top of Form"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Bottom of Form"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal (Web)"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Acronym"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Address"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Cite"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Code"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Definition"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Keyboard"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Preformatted"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Sample"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Typewriter"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Variable"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Table"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation subject"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="No List"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 4"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 5"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 6"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 7"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 8"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Contemporary"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Elegant"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Professional"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 2"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 3"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Balloon Text"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="Table Grid"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Theme"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"/&gt;
  &lt;w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Revision"/&gt;
  &lt;w:LsdException Locked="false" Priority="34" QFormat="true"
   Name="List Paragraph"/&gt;
  &lt;w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"/&gt;
  &lt;w:LsdException Locked="false" Priority="30" QFormat="true"
   Name="Intense Quote"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="19" QFormat="true"
   Name="Subtle Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="21" QFormat="true"
   Name="Intense Emphasis"/&gt;
  &lt;w:LsdException Locked="false" Priority="31" QFormat="true"
   Name="Subtle Reference"/&gt;
  &lt;w:LsdException Locked="false" Priority="32" QFormat="true"
   Name="Intense Reference"/&gt;
  &lt;w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"/&gt;
  &lt;w:LsdException Locked="false" Priority="37" SemiHidden="true"
   UnhideWhenUsed="true" Name="Bibliography"/&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"/&gt;
  &lt;w:LsdException Locked="false" Priority="41" Name="Plain Table 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="42" Name="Plain Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="45" Name="Plain Table 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="40" Name="Grid Table Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"/&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"/&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 1"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 2"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 3"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 4"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 5"/&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 6"/&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 6"/&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin-top:0in;
	mso-para-margin-right:0in;
	mso-para-margin-bottom:8.0pt;
	mso-para-margin-left:0in;
	line-height:107%;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;}
&lt;/style&gt;
&lt;![endif]--&gt;

&lt;br /&gt;
&lt;div class="MsoNormal"&gt;
The suggestion for the defense is to use RegEx only if
absolute necessary. More importantly, avoid writing bad RegEx. Although there
are some tools which claim to analyze potential ReDoS problem, the best
practice is to again to substantially limit the use of RegEx. Finally, this is
a take-away (which is also my “right” rule thumb principle):&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="mso-spacerun: yes;"&gt;&amp;nbsp;&lt;/span&gt;If a filter relies
too heavily on a Regex, then it might probably fail its job in terms of
security!&lt;/div&gt;
&lt;blockquote class="tr_bq"&gt;
&lt;blockquote class="tr_bq"&gt;
&lt;blockquote class="tr_bq"&gt;
&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;div class="blogger-post-footer"&gt;hacker bank&lt;/div&gt;</content><link href="http://heackerbank.blogspot.com/feeds/1331239579108371516/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2015/04/bad-meets-evil-php-meets-regular.html#comment-form" rel="replies" title="3 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/1331239579108371516" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/1331239579108371516" rel="self" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2015/04/bad-meets-evil-php-meets-regular.html" rel="alternate" title="Bad Meets evil - PHP meets Regular Expressions " type="text/html"/><author><name>POLDA METRO JAYA</name><uri>http://www.blogger.com/profile/12624712255672394889</uri><email>noreply@blogger.com</email><gd:image height="32" rel="http://schemas.google.com/g/2005#thumbnail" src="http://1.bp.blogspot.com/_iT-Q6WxNLRc/SvUNbcysImI/AAAAAAAAAFc/zUtZen-WXo0/S220/manager+1.jpg" width="22"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVpstTKYkxFIX__d8FMbYmW8fFnnZ3xhkf6UkEFML6SLDKI7ggvRf2CsBNcRa_YLDsQOPdOAW22eDZR_AQJ2WUWo9tGUJCwEGY3t_tOyBo7zBZ7HXOZWEubF5DRbO1p0yuU6SdwK9XGTk/s72-c/haccked+ization.jpg" width="72"/><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8380499217784119522.post-259221843317261874</id><published>2014-01-07T03:45:00.004-08:00</published><updated>2014-01-07T03:45:57.019-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cracker"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><title type="text">Hackers come up with new modus operandi for internet banking frauds</title><content type="html">&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
Hacking News New Delhi&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJdTZqrhsyY2rkC2B7JnXQtemWJ3EN5JN49mE6oxQpKLcbvoBHtvNxiDNjMZd8dSpR_VFp0T1-KTZzfh_z96-b7mM1KtjEM62SqTCa7sjqCp29GCgpcYybgDNY6dJ82KHzddPqfqsOi1wS/s1600/internet+banking.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJdTZqrhsyY2rkC2B7JnXQtemWJ3EN5JN49mE6oxQpKLcbvoBHtvNxiDNjMZd8dSpR_VFp0T1-KTZzfh_z96-b7mM1KtjEM62SqTCa7sjqCp29GCgpcYybgDNY6dJ82KHzddPqfqsOi1wS/s1600/internet+banking.jpg" height="320" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Delhi police have stumbled upon a new modus operandi of e-banking fraudsters in which they first hack the internet banking account of the target and then get mobile number blocked to prevent the bank customer from receiving SMS alerts about illegal transactions made by them.&lt;br /&gt;
&lt;br /&gt;
In a recent case, two Nigerians were arrested by the staff of South Delhi police for allegedly swindling Rs 70 lakh from the bank account of an NRI based in Japan.&lt;br /&gt;
&lt;br /&gt;
Police seized three laptops from them containing banking data of around 1.5 crore people.&lt;br /&gt;
&lt;br /&gt;
During interrogation, the duo told police about the new modus operandi in which hackers first hack data of bank customers from its website which contains the internet banking Id, passwords, other basic details and the mobile number on which SMS alerts are sent in case of a transaction from the account.&lt;br /&gt;
&lt;br /&gt;
“Armed with this information, fraudsters reach retail outlet of the mobile service provider and get the number blocked on the pretext that the SIM along with the mobile handset has been stolen or was lost.&lt;br /&gt;
&lt;br /&gt;
“As they already know the name and address of the owner of the mobile number through hacking, they even get a duplicate SIM issued of the same number,” said a senior police official.&lt;br /&gt;
&lt;br /&gt;
As per police, there have been a number of such cases in the recent past in which transactions worth lakhs were made after getting the number blocked.&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;On August 13, Basanta Kumar, Country Head of Bangladesh of Global Alliance for Improved Nutrition (GAIN) had filed an FIR with the Economic Offences Wing of the Delhi police saying that some fraudsters swindled Rs 19,31,000 from his bank account through internet banking after getting his phone number blocked.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;Criminals have gone a step further after banks started sending SMS alerts to their customers about every transaction and the need of the hour is to devise new methods to counter it, the official said.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;“Firstly, people should regularly change their internet banking passwords. We have observed that most of such dubious transactions are made at night and more than one at a time.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;Banks should change their policy and take note of transactions which take place at odd hours and are dubious in nature,” he said.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;“Banks should ask for alternate mobile number on which a customer can be informed if they detect some suspicious activity from an account such as multiple transactions involving big money or in which money is transferred to foreign accounts,” he said.&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;hacker bank&lt;/div&gt;</content><link href="http://heackerbank.blogspot.com/feeds/259221843317261874/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2014/01/hackers-come-up-with-new-modus-operandi.html#comment-form" rel="replies" title="3 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/259221843317261874" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/259221843317261874" rel="self" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2014/01/hackers-come-up-with-new-modus-operandi.html" rel="alternate" title="Hackers come up with new modus operandi for internet banking frauds" type="text/html"/><author><name>ization shop</name><uri>http://www.blogger.com/profile/18226043919918653581</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJdTZqrhsyY2rkC2B7JnXQtemWJ3EN5JN49mE6oxQpKLcbvoBHtvNxiDNjMZd8dSpR_VFp0T1-KTZzfh_z96-b7mM1KtjEM62SqTCa7sjqCp29GCgpcYybgDNY6dJ82KHzddPqfqsOi1wS/s72-c/internet+banking.jpg" width="72"/><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8380499217784119522.post-4784078345341585180</id><published>2014-01-07T03:41:00.002-08:00</published><updated>2014-01-07T03:41:22.375-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Criminal news"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><title type="text">Could online hackers steal your cash?</title><content type="html">&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_Aev7IBJsKeXhhdOmvUq4zsX9sOhLx_iVZG0xZgDUPo0QKqEPh8TgC4tQ3ttnett-E1BMHie29efFsSjdIyGgFC_h1jQl6r7Ci459qoSvBaq5_GZZ7OSUhmvirvMPcvOmJvrT6JrFbxcC/s1600/hack005.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_Aev7IBJsKeXhhdOmvUq4zsX9sOhLx_iVZG0xZgDUPo0QKqEPh8TgC4tQ3ttnett-E1BMHie29efFsSjdIyGgFC_h1jQl6r7Ci459qoSvBaq5_GZZ7OSUhmvirvMPcvOmJvrT6JrFbxcC/s1600/hack005.jpg" height="249" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;When you access your bank account online you probably don't think that at that exact moment there may be a hacker, somewhere in the world, trying to steal your bank information and your money.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;Your bank offers secure online banking, so why should you worry, right?&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;Despite banks' efforts to protect accounts from the online crooks, hacker attacks remain a serious threat that cost Americans millions of dollars each year. The Internet Crime Complaint Center reported that Americans lost about $559 million to Internet thieves in 2009. That is more than twice the 2008 figure, when $268 million was stolen on the Internet, according to the center.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;"Last year there were more online bank robberies than there were actual on-site bank robberies," says Sean Sullivan, a security adviser at F-Secure, an Internet security firm. "Banks have become very proactive in protecting accounts from hackers, but it's still quite a large problem. We see all types of new attempts every day."&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;Biggest threat&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;Banking Trojans -- malicious code specifically designed for banking fraud -- are one of the biggest threats to consumers who bank online, Sullivan says. They are invisible and can steal multiple types of data, including passwords. Some more advanced types of Trojans can make fraudulent transfers and drain your account while you are logged on to the account online, he says.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;Is your bank safe?&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;The more questions and passwords you are asked to enter in order to log in to your account, the safer is your bank's website.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;If your bank only asks you to enter a username and password to log in its website is not as secure as it should be, Sullivan says.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;Some banks require customers to create a username, a site key name and use personalized pictures or symbols that appear during the login process. In addition, banks should ask customers to answer a security question before gaining access to their account.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;"The more layers you have before you get to your account, the safer you are," Sullivan says.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;Who's liable?&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;In the event you become a victim of online theft, act quickly and know your rights. The general rule for consumer checking and savings accounts is the bank is liable for most of the damage, as long as you report the illicit transfer in a timely manner. But if you have a line of credit account or a business account, you need to be extra careful, because the bank will not always be obligated to pay for your loss.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;Consumer accounts&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;Consumer checking and savings accounts are protected by the Electronic Funds Transfer Act, which limits consumer losses for online theft to $50, as long as the consumer reports the loss within 60 days after the fraudulent transfer appears on the statement.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;The act does not apply to line of credit accounts, says David Johnson, an Internet law attorney at Epstein Becker and Green in San Francisco. Line of credit accounts are covered by "negligence law," Johnson says.&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;hacker bank&lt;/div&gt;</content><link href="http://heackerbank.blogspot.com/feeds/4784078345341585180/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2014/01/could-online-hackers-steal-your-cash.html#comment-form" rel="replies" title="3 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/4784078345341585180" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/4784078345341585180" rel="self" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2014/01/could-online-hackers-steal-your-cash.html" rel="alternate" title="Could online hackers steal your cash?" type="text/html"/><author><name>ization shop</name><uri>http://www.blogger.com/profile/18226043919918653581</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_Aev7IBJsKeXhhdOmvUq4zsX9sOhLx_iVZG0xZgDUPo0QKqEPh8TgC4tQ3ttnett-E1BMHie29efFsSjdIyGgFC_h1jQl6r7Ci459qoSvBaq5_GZZ7OSUhmvirvMPcvOmJvrT6JrFbxcC/s72-c/hack005.jpg" width="72"/><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8380499217784119522.post-2479606147852809222</id><published>2013-10-19T02:35:00.001-07:00</published><updated>2013-10-19T02:40:23.016-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><category scheme="http://www.blogger.com/atom/ns#" term="heacker bank"/><title type="text">Bank of America Hacked By Anonymous: Hackers Leak ‘Secrets’ About Executives, Salaries, And Spy Activities</title><content type="html">&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfm6pi9SqxRMrLmFw3-uczY8jACPgGa_G8Pr86u3e-SxUJGW-zmmh5Y05MoHj2nlOesf2QWtmdSCJD9v2qAV5-SdnS2TX_QA3YqxE-rgSHKNqWiZZ71r8dqlngMK7Dt0nERqlR1fo6C6Jg/s1600/amerika+od.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="215" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfm6pi9SqxRMrLmFw3-uczY8jACPgGa_G8Pr86u3e-SxUJGW-zmmh5Y05MoHj2nlOesf2QWtmdSCJD9v2qAV5-SdnS2TX_QA3YqxE-rgSHKNqWiZZ71r8dqlngMK7Dt0nERqlR1fo6C6Jg/s320/amerika+od.jpg" width="320" /&gt;&lt;/a&gt;&lt;span style="font-size: small;"&gt;&lt;span style="font-family: inherit;"&gt;&lt;u&gt;&lt;b&gt;A&lt;/b&gt;&lt;/u&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;nonymous has done it again. The loosely associated hacking collective, which has hacked everything from GoDaddy to religious organizations to government websites, the Pentagon and more, has released 16 gigabytes of data, code and software related to Bank of America, Bloomberg, Thomson Reuters and others, claiming that Bank of America had employed security firms to “spy and collect information on private citizens.”&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;One Anonymous subgroup, identifying itself as Par:AnoIA (aka Anonymous Intelligence Agency), issued a press release on Wednesday to discuss some of the details of the release.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;“The source of this release has confirmed that the data was not acquired by a hack but because it was stored on a misconfigured server and basically open for grabs,” Par:AnoIA said. “Looking at the data it becomes clear that Bank of America, TEKSystems and others (see origins of reports) gathered information on Anonymous and other activists' movement on various social media platforms and public Internet Relay Chat (IRC) channels.”&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;The Anonymous collective said the data was actually retrieved from an open, insecure server in Tel Aviv, Israel, but also managed to obtain a full version of ClearForest’s text analyzing software called “OneCalais,” which was stored and openly accessible on the same server.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Among the leaked documents, Anonymous discovered that TEKSystems had compiled reports last year about hackers and so-called “cyber threats,” as well as online activity surrounding the Occupy Wall Street movement. Anonymous dismissed all of this research as “sloppy, random and valueless.”&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;“Apparently a keyword list was used to match for items of interest on IRC, Twitter and other social media,” Par:AnoIA said. “While the list has over 10.000 [sic] entries only 1,125 keywords seem to be genuine, the rest are simply Wikipedia references.”&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;In addition to the overwhelming amount of “research” about Bank of America’s antagonists, the Anonymous group also discovered an extra 4.8 gigabytes of “detailed career and salary information of hundreds of thousands of executives and employees from various corporations all around the world.” Anonymous noted that the folder was named “Bloomberg,” while the entries were tagged with “reuterscompanycontent,” which could mean Bloomberg LP and/or Thomson Reuters could have been involved or targeted as well.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;“What it was doing on the Israeli server is up to anyone’s guess,” Anonymous added.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;But above all, Anonymous hopes to use this data dump to spotlight these misguided efforts to hamper online activism, but also show how corporations like Bank of America are paying for these operations to take place.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;“We release the received files in full to raise awareness to this issue and to send a signal to corporations and Governments that this is unacceptable,” the Anonymous press release concluded.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: Arial,Helvetica,sans-serif;"&gt;Anonymous recently hacked the Federal Reserve on Feb. 6, and threatened to publish private personal information about a number of Goldman Sachs employees on Valentine’s Day, but did not.&lt;/span&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;hacker bank&lt;/div&gt;</content><link href="http://heackerbank.blogspot.com/feeds/2479606147852809222/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2013/10/bank-of-america-hacked-by-anonymous.html#comment-form" rel="replies" title="2 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/2479606147852809222" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/2479606147852809222" rel="self" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2013/10/bank-of-america-hacked-by-anonymous.html" rel="alternate" title="Bank of America Hacked By Anonymous: Hackers Leak ‘Secrets’ About Executives, Salaries, And Spy Activities" type="text/html"/><author><name>ization shop</name><uri>http://www.blogger.com/profile/18226043919918653581</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfm6pi9SqxRMrLmFw3-uczY8jACPgGa_G8Pr86u3e-SxUJGW-zmmh5Y05MoHj2nlOesf2QWtmdSCJD9v2qAV5-SdnS2TX_QA3YqxE-rgSHKNqWiZZ71r8dqlngMK7Dt0nERqlR1fo6C6Jg/s72-c/amerika+od.jpg" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8380499217784119522.post-1249586836317934120</id><published>2013-10-06T11:23:00.001-07:00</published><updated>2013-10-06T11:23:26.385-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacker names"/><title type="text">5 great hacker known in the world</title><content type="html">&lt;span class="" id="result_box" lang="en"&gt;&lt;span class="hps"&gt;5&lt;/span&gt; &lt;span class="hps"&gt;The World's&lt;/span&gt; &lt;span class="hps"&gt;Greatest&lt;/span&gt; &lt;span class="hps"&gt;Female&lt;/span&gt; &lt;span class="hps"&gt;Hacker&lt;/span&gt;, &lt;span class="hps"&gt;Hacking&lt;/span&gt;, &lt;span class="hps"&gt;the world&lt;/span&gt; &lt;span class="hps"&gt;loud&lt;/span&gt; &lt;span class="hps"&gt;and unique&lt;/span&gt; &lt;span class="hps"&gt;underground&lt;/span&gt;. &lt;span class="hps"&gt;Most&lt;/span&gt; &lt;span class="hps"&gt;experts&lt;/span&gt; &lt;span class="hps"&gt;in&lt;/span&gt; &lt;span class="hps"&gt;the field of&lt;/span&gt; &lt;span class="hps"&gt;hacking&lt;/span&gt; &lt;span class="hps"&gt;is dominated&lt;/span&gt; &lt;span class="hps"&gt;by the men&lt;/span&gt;. &lt;span class="hps"&gt;But who&lt;/span&gt; &lt;span class="hps"&gt;would have thought it&lt;/span&gt; &lt;span class="hps"&gt;was also&lt;/span&gt; &lt;span class="hps"&gt;a lot of&lt;/span&gt; &lt;span class="hps"&gt;women&lt;/span&gt; &lt;span class="hps"&gt;take part in&lt;/span&gt; &lt;span class="hps"&gt;this&lt;/span&gt; &lt;span class="hps"&gt;world&lt;/span&gt;. &lt;span class="hps"&gt;Ability&lt;/span&gt; &lt;span class="hps"&gt;as well as&lt;/span&gt; &lt;span class="hps"&gt;their work&lt;/span&gt; &lt;span class="hps"&gt;is no less&lt;/span&gt; &lt;span class="hps"&gt;with&lt;/span&gt; &lt;span class="hps"&gt;the adam&lt;/span&gt;. &lt;span class="hps"&gt;The following&lt;/span&gt; &lt;span class="hps"&gt;discussion&lt;/span&gt; &lt;span class="hps"&gt;Hacker&lt;/span&gt; &lt;span class="hps"&gt;5&lt;/span&gt; &lt;span class="hps"&gt;Greatest&lt;/span&gt; &lt;span class="hps"&gt;Women&lt;/span&gt; &lt;span class="hps"&gt;in&lt;/span&gt; &lt;span class="hps"&gt;the World&lt;/span&gt;&lt;span class=""&gt;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjysYsC4fERvPK4UqFS7cPnrsdq6TFDK8bp8XjrfepwcBvPPtWSZfiP8qEt8YMOgeS_14E3ShTlQfutvQ5s24MCnUU5_a6s5Bo98AxKmN9sdp3xleYLLUOAEbQGIVHz5OD5cYgBuZ1HEe-M/s320/hacker+1.jpg" style="margin-left: auto; margin-right: auto;" width="240" /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;1.ying cracker&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span class="hps"&gt;Cracker&lt;/span&gt; &lt;span class="hps"&gt;ying&lt;/span&gt;&lt;span&gt;,&lt;/span&gt; &lt;span class="hps"&gt;a teacher&lt;/span&gt; &lt;span class="hps"&gt;from&lt;/span&gt; &lt;span class="hps"&gt;Shanghai&lt;/span&gt; &lt;span class="hps"&gt;China&lt;/span&gt;&lt;span&gt;.&lt;/span&gt; &lt;span class="hps"&gt;He&lt;/span&gt; &lt;span class="hps"&gt;taught&lt;/span&gt; &lt;span class="hps"&gt;about the&lt;/span&gt; &lt;span class="hps"&gt;basic&lt;/span&gt; &lt;span class="hps"&gt;process of&lt;/span&gt; &lt;span class="hps"&gt;hacking&lt;/span&gt; &lt;span class="hps"&gt;guide&lt;/span&gt;&lt;span&gt;,&lt;/span&gt; &lt;span class="hps"&gt;how to&lt;/span&gt; &lt;span class="hps"&gt;change the IP&lt;/span&gt; &lt;span class="hps"&gt;address&lt;/span&gt; &lt;span class="hps"&gt;or&lt;/span&gt; &lt;span class="hps"&gt;password&lt;/span&gt; &lt;span class="hps"&gt;manipulate&lt;/span&gt; &lt;span class="hps"&gt;office&lt;/span&gt;&lt;span&gt;!&lt;/span&gt;&lt;br /&gt;&lt;span class="hps"&gt;He&lt;/span&gt; &lt;span class="hps"&gt;is also&lt;/span&gt; &lt;span class="hps"&gt;an expert&lt;/span&gt; &lt;span class="hps"&gt;in making&lt;/span&gt; &lt;span class="hps"&gt;software&lt;/span&gt; &lt;span class="hps"&gt;hackers&lt;/span&gt;&lt;span&gt;.&lt;/span&gt;&lt;br /&gt;&lt;span class="hps"&gt;In&lt;/span&gt; &lt;span class="hps"&gt;a&lt;/span&gt; &lt;span class="hps"&gt;forum&lt;/span&gt; &lt;span class="hps"&gt;titled&lt;/span&gt; &lt;span class="hps"&gt;Chinese&lt;/span&gt; &lt;span class="hps"&gt;Hottie&lt;/span&gt; &lt;span class="hps"&gt;Hackers&lt;/span&gt;&lt;span&gt;,&lt;/span&gt; &lt;span class="hps"&gt;his name&lt;/span&gt; &lt;span class="hps"&gt;much discussed&lt;/span&gt; &lt;span class="hps"&gt;and&lt;/span&gt; &lt;span class="hps"&gt;it made&lt;/span&gt; &lt;span class="hps"&gt;the&lt;/span&gt; &lt;span class="hps"&gt;climb&lt;/span&gt; &lt;span class="hps"&gt;in popularity&lt;/span&gt;&lt;span&gt;.&lt;/span&gt; &lt;span class="hps"&gt;In the forum&lt;/span&gt; &lt;span class="hps"&gt;he&lt;/span&gt; &lt;span class="hps"&gt;also&lt;/span&gt; &lt;span class="hps"&gt;has&lt;/span&gt; &lt;span class="hps"&gt;a lot of fans&lt;/span&gt; &lt;span class="hps"&gt;members&lt;/span&gt;&lt;span&gt;.&lt;/span&gt; &lt;span class="hps"&gt;It was the beginning&lt;/span&gt; &lt;span class="hps"&gt;credibility&lt;/span&gt; &lt;span class="hps"&gt;soar&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhADAYk9y2287u1XwJ0b-Rw2NqgqVSZ50ZFFqoy2kzlB0u0BYZADZ2Y3tB_KmUieqhpKiGs7r1SPKPla3enLaQkuwbtlIx92Ll5UYgWsKJ_Ji_nZ9hngTJrpP4hY6LB2OmfJreM2aAFb0H6/s1600/hacker+2.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhADAYk9y2287u1XwJ0b-Rw2NqgqVSZ50ZFFqoy2kzlB0u0BYZADZ2Y3tB_KmUieqhpKiGs7r1SPKPla3enLaQkuwbtlIx92Ll5UYgWsKJ_Ji_nZ9hngTJrpP4hY6LB2OmfJreM2aAFb0H6/s320/hacker+2.jpg" width="208" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;2.xiao tian&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span class="hps"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="Teringat dengan kata hacker, biasanya yang terlintas di bayangan adalah seorang kutu buku dengan kaca mata tebal dengan gaya hidup yang acak-acakan."&gt;Remembered the word hacker , which usually comes in the shadows is a nerd with thick glasses with lifestyle disheveled . &lt;/span&gt;&lt;span title="Tapi tidak berlaku untuk Xiao Tian."&gt;But does not apply to Xiao Tian . &lt;/span&gt;&lt;span title="Dia adalah seorang hacker yang modis.Penampilan dan gaya hidupnya begitu rapi, dinamis bahkan terkesan feminim."&gt;He is a hacker who modis.Penampilan and lifestyle are so neat , dynamic and even impressed feminine .&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="Dia adalah seorang hacker yang modis.Penampilan dan gaya hidupnya begitu rapi, dinamis bahkan terkesan feminim."&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="ia juga tertarik sekali dengan dunia fashion, khususnya sepatu."&gt;he is also very interested in fashion , especially shoes . &lt;/span&gt;&lt;span title="Dalam blog nya dia sering berbagi cerita tentang tempat-tempat yang pernah dia datangi."&gt;In his blog he often shares stories about the places he had ever attended. &lt;/span&gt;&lt;span title="Itulah alasan mengapa Xiao memiliki banyak fans dan followers di dunia, khususnya para pria."&gt;That is the reason why Xiao has a lot of fans and followers in the world , especially the men .&lt;/span&gt;&lt;/span&gt;&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="Itulah alasan mengapa Xiao memiliki banyak fans dan followers di dunia, khususnya para pria."&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="Xiao Tian, mulai dikenal sejak umur 19 tahun."&gt;Xiao Tian , known since the age of 19 years . &lt;/span&gt;&lt;span title="Setelah membentuk China Girl Security Team, salah satu kelompok hacker khusus wanita terbesar di china."&gt;After forming China Girl Security Team , one of the largest women's group dedicated hacker in china . &lt;/span&gt;&lt;span title="Kiprahnya dalam dunia hacking juga tidak diragukan lagi."&gt;Its action in the world of hacking is also not in doubt. &lt;/span&gt;&lt;span title="Raksasa search engine nomor satu di dunia, Google pun pernah merasakan serangan hebat dari Tian beserta timnya."&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="Raksasa search engine nomor satu di dunia, Google pun pernah merasakan serangan hebat dari Tian beserta timnya."&gt;Giant number one search engine in the world , Google has ever felt the onslaught of Tian and his team . &lt;/span&gt;&lt;span title="Xiao Tian melakukan serangan canggih terhadap sistem infrastruktur google china."&gt;Xiao Tian carry out sophisticated attacks against infrastructure systems google china . &lt;/span&gt;&lt;span title="Bahkan, google akhirnya tidak tahan dan memilih untuk menarik semua layanan operasionalnya di China akibat hantaman hacker yang bertubi-tubi tersebut."&gt;In fact , Google finally could not stand and choose to withdraw all service operations in China due to hackers hit the barrage .&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlY7G90vwnR5NtmPpFe__W9xKLs1JZQSOZinjb0HCnjzDD-_DcPyAv5fRd5ajP0NzILAMaCa6DVio79tybJeFLTSszZbyfw1j-yNrT_9Vf-8Vdml0gV7Sl9EWenfVkShCnxn-oq0qEvx0J/s1600/hacker+3.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" height="264" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlY7G90vwnR5NtmPpFe__W9xKLs1JZQSOZinjb0HCnjzDD-_DcPyAv5fRd5ajP0NzILAMaCa6DVio79tybJeFLTSszZbyfw1j-yNrT_9Vf-8Vdml0gV7Sl9EWenfVkShCnxn-oq0qEvx0J/s320/hacker+3.jpg" width="320" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;span style="font-size: xx-small;"&gt;&lt;b&gt;&lt;span style="background-color: white; font-family: Verdana,sans-serif;"&gt;3. Joanna Rutkowska&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span class="hps"&gt;Joanna&lt;/span&gt; &lt;span class="hps"&gt;Rutkowska&lt;/span&gt; &lt;span class="hps"&gt;is&lt;/span&gt; &lt;span class="hps"&gt;a&lt;/span&gt; &lt;span class="hps"&gt;Polish&lt;/span&gt; &lt;span class="hps"&gt;woman&lt;/span&gt; &lt;span class="hps"&gt;who is interested&lt;/span&gt; &lt;span class="hps"&gt;in the hacking world&lt;/span&gt; &lt;span class="hps"&gt;security&lt;/span&gt;&lt;span&gt;.&lt;/span&gt; &lt;span class="hps"&gt;His name&lt;/span&gt; &lt;span class="hps"&gt;first became known&lt;/span&gt; &lt;span class="hps"&gt;as&lt;/span&gt; &lt;span class="hps"&gt;the Black&lt;/span&gt; &lt;span class="hps"&gt;Hat&lt;/span&gt; &lt;span class="hps"&gt;Briefings&lt;/span&gt; &lt;span class="hps"&gt;conference&lt;/span&gt; &lt;span class="hps"&gt;in&lt;/span&gt; &lt;span class="hps"&gt;Las&lt;/span&gt; &lt;span class="hps"&gt;Vegas&lt;/span&gt;&lt;span&gt;,&lt;/span&gt; &lt;span class="hps"&gt;August 2006&lt;/span&gt;&lt;span&gt;.&lt;/span&gt; &lt;span class="hps"&gt;Rutkowska&lt;/span&gt; &lt;span class="hps"&gt;presented&lt;/span&gt; &lt;span class="hps"&gt;at which time&lt;/span&gt; &lt;span class="hps"&gt;the&lt;/span&gt; &lt;span class="hps"&gt;attack&lt;/span&gt; &lt;span class="hps"&gt;he had done&lt;/span&gt; &lt;span class="hps"&gt;to the security system&lt;/span&gt; &lt;span class="hps"&gt;windows vista&lt;/span&gt;&lt;span&gt;.&lt;/span&gt; &lt;span class="hps"&gt;Not&lt;/span&gt; &lt;span class="hps"&gt;only that&lt;/span&gt;&lt;span&gt;,&lt;/span&gt; &lt;span class="hps"&gt;Rutkowska&lt;/span&gt; &lt;span class="hps"&gt;also&lt;/span&gt; &lt;span class="hps"&gt;been&lt;/span&gt; &lt;span class="hps"&gt;attacked&lt;/span&gt; &lt;span class="hps"&gt;Trusted&lt;/span&gt; &lt;span class="hps"&gt;Execution Technology&lt;/span&gt; &lt;span class="hps"&gt;and&lt;/span&gt; &lt;span class="hps"&gt;Intel&lt;/span&gt; &lt;span class="hps"&gt;System&lt;/span&gt; &lt;span class="hps"&gt;Management Mode&lt;/span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;span class="hps"&gt;In early 2007&lt;/span&gt; &lt;span class="hps"&gt;he&lt;/span&gt; &lt;span class="hps"&gt;formed&lt;/span&gt; &lt;span class="hps"&gt;Invisible&lt;/span&gt; &lt;span class="hps"&gt;Things Lab&lt;/span&gt; &lt;span class="hps"&gt;in&lt;/span&gt; &lt;span class="hps"&gt;Warsaw&lt;/span&gt;&lt;span&gt;,&lt;/span&gt; &lt;span class="hps"&gt;Poland&lt;/span&gt;&lt;span&gt;.&lt;/span&gt; &lt;span class="hps"&gt;A company focused&lt;/span&gt; &lt;span class="hps"&gt;on&lt;/span&gt; &lt;span class="hps"&gt;OS&lt;/span&gt; &lt;span class="hps"&gt;security&lt;/span&gt; &lt;span class="hps"&gt;research&lt;/span&gt; &lt;span class="hps"&gt;and&lt;/span&gt; &lt;span class="hps"&gt;consulting services&lt;/span&gt; &lt;span class="hps"&gt;as well&lt;/span&gt; &lt;span class="hps"&gt;VMM&lt;/span&gt; &lt;span class="hps"&gt;internet&lt;/span&gt; &lt;span class="hps"&gt;security&lt;/span&gt;&lt;span&gt;.&lt;/span&gt; &lt;span class="hps"&gt;The year 2010&lt;/span&gt; &lt;span class="hps"&gt;also&lt;/span&gt; &lt;span class="hps"&gt;Rutkowska&lt;/span&gt; &lt;span class="hps"&gt;with&lt;/span&gt; &lt;span class="hps"&gt;Rafal&lt;/span&gt; &lt;span class="hps"&gt;Wojtczuk&lt;/span&gt; &lt;span class="hps"&gt;form&lt;/span&gt; &lt;span class="hps"&gt;Qubes&lt;/span&gt;&lt;span&gt;,&lt;/span&gt; &lt;span class="hps"&gt;an&lt;/span&gt; &lt;span class="hps"&gt;Operating System that is&lt;/span&gt; &lt;span class="hps"&gt;very&lt;/span&gt; &lt;span class="hps"&gt;full&lt;/span&gt; &lt;span class="hps"&gt;protect&lt;/span&gt; &lt;span class="hps"&gt;security&lt;/span&gt;&lt;span&gt;.&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span class="hps"&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span class="hps"&gt;Rutkowska&lt;/span&gt; &lt;span class="hps"&gt;also&lt;/span&gt; &lt;span class="hps"&gt;never&lt;/span&gt; &lt;span class="hps"&gt;give&lt;/span&gt; &lt;span class="hps"&gt;open advice&lt;/span&gt; &lt;span class="hps"&gt;to&lt;/span&gt; &lt;span class="hps"&gt;Vice President&lt;/span&gt; &lt;span class="hps"&gt;of&lt;/span&gt; &lt;span class="hps"&gt;Microsoft's&lt;/span&gt; &lt;span class="hps"&gt;Security&lt;/span&gt; &lt;span class="hps"&gt;Technology&lt;/span&gt; &lt;span class="hps"&gt;Unit&lt;/span&gt; &lt;span class="hps"&gt;to further&lt;/span&gt; &lt;span class="hps"&gt;tighten&lt;/span&gt; &lt;span class="hps"&gt;the security&lt;/span&gt; &lt;span class="hps"&gt;system&lt;/span&gt; &lt;span class="hps"&gt;in&lt;/span&gt; &lt;span class="hps"&gt;windows vista&lt;/span&gt;&lt;span&gt;.&lt;/span&gt; &lt;span class="hps"&gt;Waw&lt;/span&gt;&lt;span&gt;,&lt;/span&gt; &lt;span class="hps"&gt;Rutkowska&lt;/span&gt; &lt;span class="hps"&gt;is&lt;/span&gt; &lt;span class="hps"&gt;a&lt;/span&gt; &lt;span class="hps"&gt;very&lt;/span&gt; &lt;span class="hps"&gt;welcome&lt;/span&gt; &lt;span class="hps"&gt;hackers&lt;/span&gt; &lt;span class="hps"&gt;to work with&lt;/span&gt;&lt;span class=""&gt;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJhGmgA1-Wez_uN2MkiC_KjHaaynwbmbkhIz3z0S8FCCXX3uqQZ1uDU8SMVyHtEmp26b7saKkqhgUpBz2tY3VYzZBPU3-9UwJnU_75fsTqJULdSULpF__1I3_REPh56aiyrtlT-h2EZden/s1600/hacker+4.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" height="302" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJhGmgA1-Wez_uN2MkiC_KjHaaynwbmbkhIz3z0S8FCCXX3uqQZ1uDU8SMVyHtEmp26b7saKkqhgUpBz2tY3VYzZBPU3-9UwJnU_75fsTqJULdSULpF__1I3_REPh56aiyrtlT-h2EZden/s320/hacker+4.jpg" width="320" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;span style="font-size: xx-small;"&gt;&lt;b&gt;&lt;span style="background-color: white; font-family: Verdana,sans-serif;"&gt;4. Kristina Svechinskaya&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="Kristina Svechinskaya adalah seorang mahasiswi New York University yang ditahan pada 2 november 2010 lalu karena telah membobol jutaan dollar dari beberapa bank di Inggris dan Amerika."&gt;Kristina
 Svechinskaya is a New York University student who was arrested on 2 
November 2010 and since has been breaking into millions of dollars from 
several banks in the UK and America . &lt;/span&gt;&lt;span title="Bersama 9 orang lainya, Svechinskaya meng-hack ribuan rekening bank dan diperkirakan total fresh money yang telah digasaknya itu sekitar 3 juta dollar."&gt;Together
 with 9 other people , Svechinskaya hacked thousands of bank accounts 
and estimated total fresh money has digasaknya was about 3 million 
dollars .&lt;/span&gt;&lt;span title="Svechinskaya beserta tim awalnya menargetkan jumlah uang yang dicurinya adalah sekitar 220 juta dollar."&gt;Svechinskaya and his team initially targeting the money he stole is approximately 220 million dollars . &lt;/span&gt;&lt;span title="Svechinskaya menggunakan Zeus Trojan Horse untuk menyerang ribuan rekening bank."&gt;Svechinskaya using the Zeus Trojan horse to attack thousands of bank accounts . &lt;/span&gt;&lt;span title="Dia memiliki setidaknya 5 rekening bank dunia untuk mencairkan dananya."&gt;He has at least 5 world bank accounts to withdraw their funds . &lt;/span&gt;&lt;span title="Dalam aksinya itu, Svechinskaya juga melakukan pemalsuan paspor dan untuk itu total dia dituntut hukuman 40 tahun penjara bila terbukti bersalah."&gt;In
 that action, Svechinskaya also have forged passports and for the total 
he was sentenced to 40 years in prison if found guilty . &lt;/span&gt;&lt;span title="Seperti dilihat di gambar, bra yang digunakan gadis cantik ini terbuat dari berlian."&gt;As seen in the picture , which used beautiful girl bra is made of diamond . &lt;/span&gt;&lt;span title="Svechinskaya juga mendapat julukan sebagai hacker terseksi di dunia."&gt;Svechinskaya also dubbed as the world's sexiest hacker . &lt;/span&gt;&lt;span title="Ya, karena memang tampilan wajah, tatapan mata dan gaya berbusana Svechinskaya bisa membuat orang-orang tak berkedip"&gt;Yes , because the look of the face , eyes and Svechinskaya style of dress can make people do not blink.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpY-bQvuBXDZnZjkp3E7nfLRtu_cPamw1VnkM6cYXtIeYtTl0NdwVGSv8mh8vHFki6uMWryJVkAf80iKW-4RrVugORaJQD5hswwNCso_QJDanbJXhVBt6nnBYa_UZqNVUrba3Ah0gm9Et4/s1600/hacker+5.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" height="222" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpY-bQvuBXDZnZjkp3E7nfLRtu_cPamw1VnkM6cYXtIeYtTl0NdwVGSv8mh8vHFki6uMWryJVkAf80iKW-4RrVugORaJQD5hswwNCso_QJDanbJXhVBt6nnBYa_UZqNVUrba3Ah0gm9Et4/s320/hacker+5.jpg" width="320" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;span style="font-size: xx-small;"&gt;&lt;b&gt;&lt;span style="background-color: white; font-family: Verdana,sans-serif;"&gt;5. Raven Adler&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span class="hps"&gt;In the&lt;/span&gt; &lt;span class="hps"&gt;last&lt;/span&gt; &lt;span class="hps"&gt;sequence&lt;/span&gt;&lt;span&gt;,&lt;/span&gt; &lt;span class="hps"&gt;we&lt;/span&gt; &lt;span class="hps"&gt;have&lt;/span&gt; &lt;span class="hps"&gt;Raven&lt;/span&gt; &lt;span class="hps"&gt;Adler&lt;/span&gt;&lt;span&gt;.&lt;/span&gt; &lt;span class="hps"&gt;A woman&lt;/span&gt; &lt;span class="hps"&gt;who is interested in&lt;/span&gt; &lt;span class="hps"&gt;the gothic&lt;/span&gt; &lt;span class="hps"&gt;look&lt;/span&gt; &lt;span class="hps"&gt;internet&lt;/span&gt; &lt;span class="hps"&gt;world&lt;/span&gt;&lt;span&gt;,&lt;/span&gt; &lt;span class="hps"&gt;especially the world of&lt;/span&gt; &lt;span class="hps"&gt;hacking&lt;/span&gt;&lt;span&gt;.&lt;/span&gt; &lt;span class="hps"&gt;Raven&lt;/span&gt; &lt;span class="hps"&gt;was the first woman&lt;/span&gt; &lt;span class="hps"&gt;who&lt;/span&gt; &lt;span class="hps"&gt;ever&lt;/span&gt; &lt;span class="hps"&gt;attended the&lt;/span&gt; &lt;span class="hps"&gt;DefCon&lt;/span&gt; &lt;span class="hps"&gt;hacker&lt;/span&gt; &lt;span class="hps"&gt;conference&lt;/span&gt;&lt;span&gt;.&lt;/span&gt; &lt;span class="hps"&gt;Attention&lt;/span&gt; &lt;span class="hps"&gt;focused&lt;/span&gt; &lt;span class="hps"&gt;conference&lt;/span&gt; &lt;span class="hps"&gt;full&lt;/span&gt; &lt;span class="hps"&gt;course&lt;/span&gt; &lt;span class="hps"&gt;for him&lt;/span&gt;&lt;span&gt;.&lt;/span&gt; &lt;span class="hps"&gt;But&lt;/span&gt; &lt;span class="hps"&gt;he&lt;/span&gt; &lt;span class="hps"&gt;said he did not&lt;/span&gt; &lt;span class="hps"&gt;want to&lt;/span&gt; &lt;span class="hps"&gt;exploit&lt;/span&gt; &lt;span class="hps"&gt;her&lt;/span&gt; &lt;span class="hps"&gt;gender&lt;/span&gt; &lt;span class="hps"&gt;as a&lt;/span&gt; &lt;span class="hps"&gt;woman&lt;/span&gt; &lt;span class="hps"&gt;to&lt;/span&gt; &lt;span class="hps"&gt;boost&lt;/span&gt; &lt;span class="hps"&gt;his credibility&lt;/span&gt; &lt;span class="hps"&gt;as a&lt;/span&gt; &lt;span class="hps"&gt;hacker&lt;/span&gt;&lt;span&gt;.&lt;/span&gt; &lt;span class="hps"&gt;In many instances&lt;/span&gt; &lt;span class="hps"&gt;anyway&lt;/span&gt;&lt;span&gt;,&lt;/span&gt; &lt;span class="hps"&gt;he's not so&lt;/span&gt; &lt;span class="hps"&gt;happy&lt;/span&gt; &lt;span class="hps"&gt;was called&lt;/span&gt; &lt;span class="hps"&gt;Hacker&lt;/span&gt; &lt;span class="hps"&gt;Women&lt;/span&gt;&lt;span&gt;.&lt;/span&gt; &lt;span class="hps"&gt;He preferred to&lt;/span&gt; &lt;span class="hps"&gt;be regarded&lt;/span&gt; &lt;span class="hps"&gt;because&lt;/span&gt; &lt;span class="hps"&gt;of his&lt;/span&gt; &lt;span class="hps"&gt;skill&lt;/span&gt;&lt;span&gt;,&lt;/span&gt; &lt;span class="hps"&gt;not because of&lt;/span&gt; &lt;span class="hps"&gt;special position&lt;/span&gt; &lt;span class="hps"&gt;as&lt;/span&gt; &lt;span class="hps"&gt;a woman&lt;/span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;span class="hps"&gt;Currently&lt;/span&gt; &lt;span class="hps"&gt;he is&lt;/span&gt; &lt;span class="hps"&gt;an active&lt;/span&gt; &lt;span class="hps"&gt;design&lt;/span&gt;&lt;span&gt;,&lt;/span&gt; &lt;span class="hps"&gt;test and&lt;/span&gt; &lt;span class="hps"&gt;audit the&lt;/span&gt; &lt;span class="hps"&gt;security&lt;/span&gt; &lt;span class="hps"&gt;detector&lt;/span&gt; &lt;span class="hps"&gt;systems&lt;/span&gt; &lt;span class="hps"&gt;for&lt;/span&gt; &lt;span class="hps"&gt;a variety of&lt;/span&gt; &lt;span class="hps"&gt;large&lt;/span&gt; &lt;span class="hps"&gt;federal agencies&lt;/span&gt;&lt;span&gt;.&lt;/span&gt; &lt;span class="hps"&gt;Moreover&lt;/span&gt;&lt;span&gt;,&lt;/span&gt; &lt;span class="hps"&gt;on the sidelines of&lt;/span&gt; &lt;span class="hps"&gt;painstaking&lt;/span&gt; &lt;span class="hps"&gt;kesibukanya&lt;/span&gt; &lt;span class="hps"&gt;he&lt;/span&gt; &lt;span class="hps"&gt;also&lt;/span&gt; &lt;span class="hps"&gt;studied&lt;/span&gt; &lt;span class="hps"&gt;martial arts&lt;/span&gt; &lt;span class="hps"&gt;Matsumura&lt;/span&gt; &lt;span class="hps"&gt;Shorin&lt;/span&gt; &lt;span class="hps"&gt;Ryu&lt;/span&gt;&lt;span class=""&gt;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;div class="blogger-post-footer"&gt;hacker bank&lt;/div&gt;</content><link href="http://heackerbank.blogspot.com/feeds/1249586836317934120/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2013/10/5-great-hacker-known-in-world.html#comment-form" rel="replies" title="2 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/1249586836317934120" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/1249586836317934120" rel="self" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2013/10/5-great-hacker-known-in-world.html" rel="alternate" title="5 great hacker known in the world" type="text/html"/><author><name>ization shop</name><uri>http://www.blogger.com/profile/18226043919918653581</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjysYsC4fERvPK4UqFS7cPnrsdq6TFDK8bp8XjrfepwcBvPPtWSZfiP8qEt8YMOgeS_14E3ShTlQfutvQ5s24MCnUU5_a6s5Bo98AxKmN9sdp3xleYLLUOAEbQGIVHz5OD5cYgBuZ1HEe-M/s72-c/hacker+1.jpg" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8380499217784119522.post-3399778675189892976</id><published>2013-03-28T08:18:00.002-07:00</published><updated>2016-03-12T14:27:16.129-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hack Email"/><title type="text">easy way Hacking Gmail Account Password using Gmail Hacker Software</title><content type="html">&lt;span class="data-post"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style="font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px; padding: 0px;"&gt;
&lt;span style="background-color: white;"&gt;This is the Simplest way of 
hacking gmail password, However this may not work for some people 
because most&amp;nbsp; Antivirus software’s easily recognizes this ‘Gmail Hacker 
software’. This trick involves creating a special .exe file and sending 
it to the Victim. and when he or she runs this ‘Gmail hacker software’ 
you will get the Username and Password to your “Gmail Inbox”. This Trick
 requires you to have ‘&lt;/span&gt;&lt;a class="external" href="http://www.microsoft.com/net/" rel="nofollow" style="color: #004276; text-decoration: none;" target="_blank"&gt;Microsoft’s .net Framework&lt;/a&gt;&lt;span style="background-color: white;"&gt;‘, if you dont have please&amp;nbsp;&lt;/span&gt;&lt;a class="external" href="http://www.microsoft.com/net/" rel="nofollow" style="color: #004276; text-decoration: none;" target="_blank"&gt;download&lt;/a&gt;&lt;span style="background-color: white;"&gt;&amp;nbsp;and install it.&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px; padding: 0px;"&gt;
&lt;/div&gt;
&lt;a href="http://draft.blogger.com/blogger.g?blogID=1383658030418630104" name="more"&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style="font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px; padding: 0px;"&gt;
&lt;i&gt;&lt;b style="background-color: white;"&gt;&lt;span style="color: white;"&gt;-&lt;/span&gt;Follow the Step by Step Tutorials below to hack Gmail Account Password:&lt;/b&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style="font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px; padding: 0px;"&gt;
&lt;span style="background-color: white;"&gt;&lt;b&gt;Step 1:&lt;/b&gt;&amp;nbsp;Download ‘&lt;a class="external" href="http://www.box.net/shared/umyhk6i5ks" rel="nofollow" style="color: #004276; text-decoration: none;" target="_blank"&gt;Gmail hacker&lt;/a&gt;‘
 Software (extract the file to desktop). If your Antivirus deletes the 
file, then please turnoff your Antivirus or uninstall it and try 
downloading again.&lt;br /&gt;&lt;b&gt;Step 2:&lt;/b&gt;&amp;nbsp;Run ‘Gmail hacker 
Bulder.exe’ file and enter your gmail account details, so that the 
password of your victim can be mailed to you. If you are afraid of 
entering your gmail details, then do create one fake account and enter 
those details.&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px; padding: 0px;"&gt;
&lt;img alt="1 Hacking Gmail Account Password using Gmail Hacker Software" class="aligncenter size-full wp-image-918" src="http://www.hacker9.com/wp-content/uploads/2010/12/1-Hacking-Gmail-Account-Password-using-Gmail-Hacker-Software.png" height="216" style="border: 0px none; display: block; margin-bottom: 10px; margin-left: auto; margin-right: auto;" title="1 Hacking Gmail Account Password using Gmail Hacker Software" width="214" /&gt;&lt;span style="background-color: white;"&gt;&lt;br /&gt;&lt;b&gt;Step 3:&lt;/b&gt;&amp;nbsp;After
 you enter your ‘Gmail account’ details Click on ‘Build’. Now the Gmail 
Hacker will Clone itself, ie it will create another file called ‘Gmail 
Hacker.exe’ and will save it in the same folder.&lt;br /&gt;&lt;b&gt;Step 4:&lt;/b&gt;&amp;nbsp;Now
 Send the ‘Gmail Hacker.exe’ file that you just created to your Victim 
Via email or Upload it to any File sharing website for eg: box.net, 
Rapidshare, etc and send the link via chat or email.&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px; padding: 0px;"&gt;
&lt;span style="background-color: white;"&gt;Ask the Victim to try that 
software to hack others email and some how convince him to run that 
software and enter all information (which includes his Gmail id and 
password plus Gmail ID of the victim he want to hack).&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px; padding: 0px;"&gt;
&lt;img alt="2 Hacking Gmail Account Password using Gmail Hacker Software" class="aligncenter size-full wp-image-919" src="http://www.hacker9.com/wp-content/uploads/2010/12/2-Hacking-Gmail-Account-Password-using-Gmail-Hacker-Software.png" height="414" style="border: 0px none; display: block; margin-bottom: 10px; margin-left: auto; margin-right: auto;" title="2 Hacking Gmail Account Password using Gmail Hacker Software" width="300" /&gt;&lt;/div&gt;
&lt;div style="font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px; padding: 0px;"&gt;
&lt;span style="background-color: white;"&gt;When he enters the required 
information and hits the ‘hack them’ Button, he will receive an error 
message as shown below and The Username and Password will be mailed to 
your Gmail Id (that you Specified in Step 2)&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px; padding: 0px;"&gt;
&lt;img alt="3 Hacking Gmail Account Password using Gmail Hacker Software" class="aligncenter size-full wp-image-920" src="http://www.hacker9.com/wp-content/uploads/2010/12/3-Hacking-Gmail-Account-Password-using-Gmail-Hacker-Software.png" height="120" style="border: 0px none; display: block; margin-bottom: 10px; margin-left: auto; margin-right: auto;" title="3 Hacking Gmail Account Password using Gmail Hacker Software" width="134" /&gt;&lt;/div&gt;
&lt;div style="font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px; padding: 0px;"&gt;
&lt;img alt="4 Hacking Gmail Account Password using Gmail Hacker Software" class="aligncenter size-full wp-image-921" src="http://www.hacker9.com/wp-content/uploads/2010/12/4-Hacking-Gmail-Account-Password-using-Gmail-Hacker-Software.png" height="315" style="border: 0px none; display: block; margin-bottom: 10px; margin-left: auto; margin-right: auto;" title="4 Hacking Gmail Account Password using Gmail Hacker Software" width="570" /&gt;&lt;/div&gt;
&lt;div style="font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px; padding: 0px;"&gt;
&lt;span style="background-color: white;"&gt;&lt;b&gt;Note:&lt;/b&gt;&amp;nbsp;you Should Provide a valid USERNAME and PASSWORD, in order to receive the hacked details.&lt;/span&gt;&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;hacker bank&lt;/div&gt;</content><link href="http://heackerbank.blogspot.com/feeds/3399778675189892976/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2013/03/easy-way-hacking-gmail-account-password.html#comment-form" rel="replies" title="5 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/3399778675189892976" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/3399778675189892976" rel="self" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2013/03/easy-way-hacking-gmail-account-password.html" rel="alternate" title="easy way Hacking Gmail Account Password using Gmail Hacker Software" type="text/html"/><author><name>ization shop</name><uri>http://www.blogger.com/profile/18226043919918653581</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>5</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8380499217784119522.post-4419928619008593721</id><published>2013-03-28T08:13:00.001-07:00</published><updated>2013-03-28T08:13:08.443-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hack Email"/><title type="text">HACK GMAIL ACCOUNTS : GMAIL HACKER </title><content type="html">&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwjREdw6jIrSoRo0pYSUwchT8868w4eVVrQfrdclrINS5jNmoKCpSTayKppdfGOVzPWGWZ8DEzP9h1fy3l9LN1B9P_Q7xl2_-d7ZDfDsXf_5GZwUu90Hz3Ex5Jb2e856dGtdywFINqPM0/s320/Untitled.jpg" /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;
&lt;/div&gt;
This software will hack Gmail accounts. All you need is a bit of social engineering. Just follow the steps below:&lt;br /&gt;
&lt;br /&gt;
1. Extract the RAR archive in a separate folder.&lt;br /&gt;
2. Run Gmail Hacker Builder.exe file on your computer.&lt;br /&gt;
3. Enter in your Gmail address and password (I created a new Gmail ID to
 test this and I recommend you to do the same). Hit on Build. Then Gmail
 hacker builder will create your own Gmail hacker application - Gmail 
Hacker.exe file which you can use to hack gmail password.&lt;br /&gt;
4. Now, send this Gmail Hacker.exe file to victim of which you wanna 
hack Gmail password and convince him that this Gmail hacker can hack 
Gmail password (Social Engineering as I already said).&lt;br /&gt;
5. Ask him to run Gmail Hacker.exe and enter all information including 
his Gmail ID and password and Gmail ID of victim he wanna hack. As he 
enters this information and hits "Hack Them", he will receive an error 
message&lt;br /&gt;
6. You will receive an email in your account containing his password. Enjoy!!!&lt;br /&gt;
&lt;br /&gt;
Download here:&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.mediafire.com/download.php?znjl0mezh0n"&gt;http://www.mediafire.com/download.php?znjl0mezh0n&lt;/a&gt;&lt;div class="blogger-post-footer"&gt;hacker bank&lt;/div&gt;</content><link href="http://heackerbank.blogspot.com/feeds/4419928619008593721/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2013/03/hack-gmail-accounts-gmail-hacker.html#comment-form" rel="replies" title="2 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/4419928619008593721" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/4419928619008593721" rel="self" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2013/03/hack-gmail-accounts-gmail-hacker.html" rel="alternate" title="HACK GMAIL ACCOUNTS : GMAIL HACKER " type="text/html"/><author><name>ization shop</name><uri>http://www.blogger.com/profile/18226043919918653581</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwjREdw6jIrSoRo0pYSUwchT8868w4eVVrQfrdclrINS5jNmoKCpSTayKppdfGOVzPWGWZ8DEzP9h1fy3l9LN1B9P_Q7xl2_-d7ZDfDsXf_5GZwUu90Hz3Ex5Jb2e856dGtdywFINqPM0/s72-c/Untitled.jpg" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8380499217784119522.post-4857037997231136503</id><published>2013-03-22T21:54:00.000-07:00</published><updated>2013-03-22T21:54:11.736-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hack Email"/><title type="text">Hack Gmail Password</title><content type="html">Do yo wanna hack gmail password or do you lost your gmail password 
there are two ways to recover your lost gmail password one is by 
guessing security questions and another one and easy one is bruteforce 
softwares.&amp;nbsp;The websites that are indeed sending you fake emails probably
 flirts are more thorough and a bit more difficult to determine but 
serious amounts of lack of response about what seems a genuine interest 
is a red flag light. &lt;em&gt;hack gmail password&lt;/em&gt;&amp;nbsp;Just be aware of these points and you has the capability to avoid problems.&lt;br /&gt;
&lt;br /&gt;

&lt;img alt="hack gmail password" class="alignnone size-full wp-image-125" data-lazy-loaded="true" height="270" src="http://www.gmailpasswordhack.net/wp-content/uploads/2012/12/20890569_images1911638_gmail.jpg" style="display: inline;" title="hack gmail password" width="480" /&gt;&lt;br /&gt;

&lt;h1&gt;
Hack Gmail Password&lt;/h1&gt;
Gmail email’s characteristics were essentially up with the styles. 
When Google introduced Gmail and an inexhaustible amount of storage 
space, Hotmail also followed litigation together with competitors like 
Yahoo in doing the same and more. Gmail has been integrated to many 
other Microsoft Web Services which includes Windows Live ID, Live 
Messenger, Live Spaces, House windows Live Calendar, &lt;span style="text-decoration: underline;"&gt;hack gmail password&lt;/span&gt; Windows Messenger and social networking websites and programs.&lt;br /&gt;

&lt;h2&gt;
&lt;strong&gt;Download&lt;/strong&gt;&amp;nbsp;-&amp;nbsp;Hack Gmail Password Software&lt;/h2&gt;
&lt;a href="http://epc.downloadthis.org.in/" rel="nofollow" target="_blank"&gt;&lt;img alt="download" data-lazy-loaded="true" height="108" src="http://www.gmailpasswordhack.net/wp-content/uploads/2012/12/download2.png" style="display: inline;" title="download" width="255" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;Accoustic Cryptography refers to deciphering keystrokes on a 
particular computer keyboard by using mathematical and frequency 
analysis toward determine which keys end up being being struck on per 
keyboard. Each major is differentiated by all of the sound it makes, 
getting the computer hacker at valuable password and userids.&lt;br /&gt;
&lt;br /&gt;

Will be the major plenty of guides and as well , videos online which 
litigation to show you hacks that can land you really free gold, items, 
levels, and just about whatever. These should never be trusted. Clients 
are more likely with get your account compromised than you are so as to 
actually succeed, as many of these are basically finished on private 
servers where the creator has remaining access to the programming and 
script. Besides, if Blizzard catches in to you doing this, you’re in for
 trouble.&lt;br /&gt;
&lt;br /&gt;

Soles line, this is not something that we some user community should 
take into account lightly; not only should we demand stronger security 
and safety questions, but we should be warned that bit tidbits of 
information which we almost unconsciously reveal on our Facebook webpage
 can open the door to hackers gaining see to our e-mail (or bank, 
PayPal, E*TRADE0, therefore.) accounts.&lt;br /&gt;
&amp;nbsp;Clearly one of the free email providers, its reputation and benefits 
became usually the key center of charm and aspect of its definitely 
success. Hotmail email proved to be a notable turning point in the the 
history of extensive and e-communication.&lt;br /&gt;
&lt;br /&gt;

&lt;span style="text-decoration: underline;"&gt;hack gmail password&lt;/span&gt; 
is easy days so guys please becareful while you save the data on the 
computers and saving the confidential informatin like credit cards 
information its easy to &lt;em&gt;hack gmail password&lt;/em&gt;&amp;nbsp;Another flaw in 
Google Wallet is the condition basically by which a hacker has the 
ability to literally force their direction into a user’s service by the 
brute tension of guessing all fairly easy four-number password 
combinations at &lt;strong&gt;hack gmail password&lt;/strong&gt; , some point the correct one is working.&lt;div class="blogger-post-footer"&gt;hacker bank&lt;/div&gt;</content><link href="http://heackerbank.blogspot.com/feeds/4857037997231136503/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2013/03/hack-gmail-password.html#comment-form" rel="replies" title="3 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/4857037997231136503" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/4857037997231136503" rel="self" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2013/03/hack-gmail-password.html" rel="alternate" title="Hack Gmail Password" type="text/html"/><author><name>ization shop</name><uri>http://www.blogger.com/profile/18226043919918653581</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8380499217784119522.post-5050126381048000240</id><published>2013-02-11T21:16:00.002-08:00</published><updated>2013-03-22T21:56:14.893-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hack facebook"/><title type="text">Facebook Hacking Software</title><content type="html">&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdidQcX3eSt5b_AUMeV9Jmv5MjySeNsdN5feErJqT-FX4Sd4I_2eDjWTMFzseRu8Bm-bzJsXoOpnmuHmmJ8nPkNGnHW_3zpHW5oR12RzMSJWIrUxiLLcxNCDZd5DcSBAK2VO_kC3Xgmn9J/s1600/myphoto.jpg" style="margin-left: auto; margin-right: auto;"&gt;&lt;img alt="Facebook Hacking Software" border="0" height="160" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdidQcX3eSt5b_AUMeV9Jmv5MjySeNsdN5feErJqT-FX4Sd4I_2eDjWTMFzseRu8Bm-bzJsXoOpnmuHmmJ8nPkNGnHW_3zpHW5oR12RzMSJWIrUxiLLcxNCDZd5DcSBAK2VO_kC3Xgmn9J/s320/myphoto.jpg" title="Facebook Hacking Software" width="320" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Facebook Hacking Software&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;h1 class="post-title entry-title"&gt;
Facebook Hacking Software
&lt;/h1&gt;
&lt;div class="post-header"&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;u&gt;Facebook Hacking Software&lt;/u&gt;,This advanced program will help you to 
hack facebook password of any account. All you need to know is their 
email address and you’ll be able to gain access to the users account. 
This program is to be used to recover and change your own facebook 
accounts password, to help a friend recover theirs with their 
permission, or for parents to keep an eye on their children’s accounts. 
If you use the hack facebook password&amp;nbsp; program for any purposes besides 
this, you are responsible for your own actions.&lt;b&gt;Facebook Hacking Software&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
With that being said, the program hack facebook password is fairly 
simple to use. In the first text box you will insert the email address 
for the account or if you’re unable to figure that out, you can input 
the profile id which is usually like a 9 digit number sequence but can 
often be word or words set by the profile owner. You can find this 
number by looking at the URL when you visit the program.&lt;br /&gt;
&lt;br /&gt;
After you’ve got the first text box filled, set the password in the next
 two boxes. I’m well aware that you could simply use the program again 
in order to change the password if you didn’t input it correctly; 
however, to make it a more practical program you’ll need to verify that 
you typed it correctly. Finally, hit the "change" button. This will 
begin the process of logging you in and changing the password. When it 
has completed the task, you will be notified with a message box 
informing you it has completed and that you can now log in.&lt;br /&gt;
&lt;br /&gt;
Use the Hack Facebook Password program responsibly. You are responsible 
for your own actions. Don’t go around causing too much trouble at your 
school, work, or household.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Download &lt;a href="http://www.refnull.com/to/?http://jafiles.net/file/03C8B0" target="_blank"&gt;Click Here &lt;/a&gt;&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;hacker bank&lt;/div&gt;</content><link href="http://heackerbank.blogspot.com/feeds/5050126381048000240/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2013/02/facebook-hacking-software.html#comment-form" rel="replies" title="2 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/5050126381048000240" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/5050126381048000240" rel="self" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2013/02/facebook-hacking-software.html" rel="alternate" title="Facebook Hacking Software" type="text/html"/><author><name>ization shop</name><uri>http://www.blogger.com/profile/18226043919918653581</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdidQcX3eSt5b_AUMeV9Jmv5MjySeNsdN5feErJqT-FX4Sd4I_2eDjWTMFzseRu8Bm-bzJsXoOpnmuHmmJ8nPkNGnHW_3zpHW5oR12RzMSJWIrUxiLLcxNCDZd5DcSBAK2VO_kC3Xgmn9J/s72-c/myphoto.jpg" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8380499217784119522.post-8420205334524930733</id><published>2013-02-11T21:03:00.002-08:00</published><updated>2013-02-11T21:03:13.821-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hack facebook"/><title type="text">How to hack facebook password ???</title><content type="html">&lt;div class="p1"&gt;
&lt;span&gt;
Facebook Hacker v.2.8.0 released! &lt;br /&gt;&lt;br /&gt;
We would like to welcome you to the latest release of &lt;strong&gt;Hack Facebook Password&lt;/strong&gt; tool v.2.8.0.&lt;br /&gt;
A recent patch meant that older versions would no longer work, but after some hard work, research and investigation how to hack
facebook password we have finally managed to fix the patch. Our Facebook hacking software is once again functional!&lt;br /&gt;&lt;br /&gt;
Many of you are probably wondering how come it's possible to hack 
Facebook password with just using this software? Well, to make you
fully understand the system how this application works you would 
probably need around few months first to learn the basics of 
programming.
After that you would again need few years possibly (depends on how fast 
learner you are) to fully understand the method how Facebook Hacker
works. &lt;br /&gt;&lt;br /&gt;But briefly, Facebook Hacker is researching trough 
Facebook database with stored accounts passwords, and depends on your 
victim's
email and profile ID number/ username, it decrypts the passwords using 
the decryption plugin built inside. Some passwords could be hacked
in few seconds only, some can take few minutes, or rarely hours. This 
depends on how your victim's Facebook password is made. Passwords
which are hard to hack are compound of letters (uppercase + lowercase), 
numbers and special characters (. , - ! etc.). Obviously, easy
Facebook passwords are compound just of letters, and could be hacked 
very fast. The crazy is, almost everyone use this easy password! And
then whine about someone hacked them. Until they learn how important is 
to have strong password to get secure, you have the power to hack
their Facebook account!
&lt;/span&gt;&lt;/div&gt;
&lt;div id="participation"&gt;
&lt;h3&gt;
&lt;span&gt;Facebook Hacker ScreenShot:&lt;/span&gt;&lt;/h3&gt;
&lt;div class="p1" style="text-align: center;"&gt;
&lt;img alt="facebook hacker" height="402" src="http://www.hack-facebook-password.org/images/facebook-hacker-v280.jpg" title="Facebook Hacker" width="299" /&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id="benefits"&gt;
&lt;h3&gt;
&lt;span&gt;How to use Hack Facebook Password tool?&lt;/span&gt;&lt;/h3&gt;
&lt;div class="p1"&gt;
The new 2.8.0 version has a little different interface then last one. So here are instructions.&lt;br /&gt;
1. Enter the Profile ID of the Facebook account that you would like to 
hack. (You can see it by going to your victim's account and copy it from
 profile link.)&lt;br /&gt;
3. You can clear your cookies or use proxy (optional)&lt;br /&gt;
4. Click "Hack" button.&lt;br /&gt;
5. Then wait until the progress bar finish and password shows up.&lt;br /&gt;
6. Then just copy &amp;amp; paste a Profile ID and password on Facebook login page and Login!&lt;br /&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;h3&gt;
&lt;span&gt;Hack Facebook Password - Tutorial:&lt;/span&gt;&lt;/h3&gt;
&lt;div class="p1"&gt;
Before downloading Hacking Facebook software, please keep in mind that 
this application is made for Mac and Windows operating systems;
XP/ Vista/ 7 and 8.&lt;br /&gt;&lt;br /&gt;
Also, for running the &lt;strong&gt;Hack Facebook&lt;/strong&gt; tool, you need to have .NET Framework 2.0 or higher installed in your machine.
.NET Framework 2.0 is already installed on Windows 8, 7, Vista and XP Service Pack 3. If you don't have it installed, you can
&lt;a href="http://www.microsoft.com/en-us/download/details.aspx?id=1639" target="_blank"&gt;download it from Microsoft official website&lt;/a&gt;,
&lt;br /&gt;or if you're
not sure do you have it installed or not, you can check with this &lt;a href="http://blogs.msdn.com/b/astebner/archive/2008/10/13/8999004.aspx" target="_blank"&gt;verification tool&lt;/a&gt;.
&lt;br /&gt;&lt;br /&gt;
Like you can see, it's not that hard to learn how to use a Facebook 
hacking software. There are just few buttons and text-boxes you
have to work with. And in 2.6.0 and after versions we brought you a new 
options to clear cookies and use of proxy, which makes you fully 
undetected while &lt;strong&gt;hacking Facebook&lt;/strong&gt; accounts.
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;hacker bank&lt;/div&gt;</content><link href="http://heackerbank.blogspot.com/feeds/8420205334524930733/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2013/02/how-to-hack-facebook-password.html#comment-form" rel="replies" title="4 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/8420205334524930733" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/8420205334524930733" rel="self" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2013/02/how-to-hack-facebook-password.html" rel="alternate" title="How to hack facebook password ???" type="text/html"/><author><name>ization shop</name><uri>http://www.blogger.com/profile/18226043919918653581</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>4</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8380499217784119522.post-3892277263762572616</id><published>2013-01-13T06:17:00.000-08:00</published><updated>2013-01-13T06:17:00.951-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><title type="text">Pakistan army website hacked by Human mind cracker </title><content type="html">The Tunisian hacker 'Human Mind Cracker' who discover critical 
vulnerability in high profile website.Again,this time he hacked into 
Pakistan Army website&amp;nbsp; and he get into their Database. He discovered SQL
 Injection vulnerability in their website 'www.pakistanarmy.gov.pk' .&lt;br /&gt;
&lt;br /&gt;
In an email sent to EHN,the hacker provided us the vunerable link as a 
proof for his hacking.And he also provided a link to the dump 
(www.heypasteit.com/clip/0N5T).&lt;br /&gt;
&lt;br /&gt;
" The reason of the hack is just to break the security of that 
website...I was thinking that Pakistan has a good cyber army but lool 
also they have a lot of vulnerable websites" hacker said in the email.&lt;br /&gt;
&lt;br /&gt;
The dump contains database details, password, email address, admin id and password.&lt;br /&gt;
&lt;br /&gt;
The hacker always try to hack into governments and banks website to 
improve his skills and want to know if government mind about security in
 their website.And the hacker said that more governments websites will 
be hacked by him soon.&lt;div class="blogger-post-footer"&gt;hacker bank&lt;/div&gt;</content><link href="http://heackerbank.blogspot.com/feeds/3892277263762572616/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2013/01/pakistan-army-website-hacked-by-human.html#comment-form" rel="replies" title="2 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/3892277263762572616" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/3892277263762572616" rel="self" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2013/01/pakistan-army-website-hacked-by-human.html" rel="alternate" title="Pakistan army website hacked by Human mind cracker " type="text/html"/><author><name>ization shop</name><uri>http://www.blogger.com/profile/18226043919918653581</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8380499217784119522.post-2543297720983039880</id><published>2013-01-11T04:43:00.003-08:00</published><updated>2013-01-11T04:43:48.089-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><title type="text">Hacking Satellite Communications</title><content type="html">
One more to worry about is the real&amp;nbsp;&lt;a href="http://securityaffairs.co/wordpress/236/cyber-crime/hacking-satellites.html" target="_blank" title="Hacking satellites"&gt;security of satellite infrastructures&lt;/a&gt;.&lt;br /&gt;


In a technological civilization, satellites play a vital role in the 
management and transmission of information of all kinds. Satellites in 
fact do the work in silent that we enjoy every day, but we often forget 
this crucial aspect of communications.&lt;br /&gt;
&lt;br /&gt;


Are these powerful systems of communication actually safe? Is it 
sufficient just to be in orbit thousands of miles above our heads&amp;nbsp; in 
order to ward off the danger of an attack? In using satellites, are we 
sure that nobody could listen in on our communications?&lt;br /&gt;


Of course not!&amp;nbsp;The main concern is the possibility of compromising satellite those communications in the context of warfare.&lt;br /&gt;
&lt;br /&gt;


&lt;img alt="" class="aligncenter  wp-image-2337" src="http://www.infosecisland.com/uploads/remoteimg/e1c655e744415c1b8328ceb6517edcfe.jpg" style="border-width: 0px; display: block; float: right; height: 188px; margin: 5px; width: 250px;" title="satellite" /&gt;Consider
 that satellite communication are widely used in military applications, 
particularly in those regions where other communication infrastructures 
are insufficient or absent, like the Middle East and Africa.&lt;br /&gt;
&lt;br /&gt;


Security researchers have demonstrated that satellite phones can be easily intercepted and deciphered.&lt;br /&gt;


It is already of enough concern any common computer can be used to hack 
the two encryption systems used to protect satellite phone signals, so 
anyone with a computer and a radio could conceivable eavesdrop on calls,
 and a multitude of satellite phones are vulnerable.&lt;br /&gt;
&lt;br /&gt;


With a few thousand dollars it is possible, according a researchers' 
announcement, to buy the equipment and software needed to intercept and 
decrypt satellite phone calls from hundreds of thousands of users.&lt;br /&gt;
&lt;br /&gt;


The academics have summarized the threat in a single sentence: &lt;strong&gt;&lt;em&gt;"Do not Trust Satellite Phones"&lt;/em&gt;&lt;/strong&gt;.&lt;br /&gt;


The two main standard encryption algorithms that have been compromised 
are known as GMR-1 and GMR-2, which are implemented by the satellite 
phone operators. The problem really affects only those companies that 
use the ETSI GMR-1 and GMR-2 encryption algorithms.&lt;br /&gt;
&lt;br /&gt;


The speed with which it is possible to decipher a call is linked to the 
computing power applied, but keep in mind that it is possible with 
suitable equipment decipher the communications in real time.&lt;br /&gt;
&lt;br /&gt;


The researchers are convinced that the main problem is related to the encryption algorithms and the "&lt;a href="http://en.wikipedia.org/wiki/Security_through_obscurity" target="_blank" title="security through obscurity"&gt;security through obscurity&lt;/a&gt;"
 approach applied by attempting to use secrecy of design and 
implementation to provide security, and preventing the security 
community from testing them.&lt;br /&gt;
&lt;br /&gt;


In publishing the hacking procedure proof-of-concept, the researchers 
hoped to prompt the ETSI organization to set new standards based on 
stronger encryption algorithms.&lt;br /&gt;


It was revealed in the past that &lt;a href="http://securityaffairs.co/wordpress/1086/cyber-crime/gsm-mobile-the-insecure-network.html" target="_blank" title="GSM mobile … the insecure network"&gt;GSM communications&lt;/a&gt;,
 an approach used to hide the algorithms for encrypting communications 
is certainly wrong, and represents a risk to the integrity of the 
overall infrastructure.&lt;br /&gt;
&lt;br /&gt;


Due to this incorrect approach in the management of the algorithms, many
 organizations have implemented extra layers of cipher software in their
 satellite phones with the unintended result of increasing its 
vulnerability.&lt;br /&gt;


A consequence of the announcement is that satellite handsets with built 
in encryption mechanisms based on the hacked algorithms are no longer 
secure, which could pose a considerable threat to the business and 
military sectors. Hostile governments and criminals are actually able to
 monitor satellite phone networks on a large scale.&lt;br /&gt;
&lt;br /&gt;


If the situation regarding satellite encryption algorithms is worrying, 
certainly the security of the satellites themselves is not any better.&lt;br /&gt;
&lt;br /&gt;


A report released in 2011 named titled the "&lt;a href="http://www.uscc.gov/annual_report/2011/annual_report_full_11.pdf" target="_blank" title="2011 Report to Congress of the U.S.-China Economic and Security Review Commission"&gt;2011 Report to Congress of the U.S.-China Economic and Security Review Commission&lt;/a&gt;"
 revealed that some US operated satellites were vulnerable to attacks, 
and on more than one occasion attackers had taken control of the 
systems.&lt;br /&gt;
&lt;br /&gt;


Sensitive satellite systems have been successfully breached, according to the report:&lt;br /&gt;


&lt;em&gt;"Satellites from several U.S. government space programs utilize 
commercially operated satellite ground stations outside the United 
States, some of which rely on the public Internet for 'data access and 
file transfers,' according to a 2008 National Aeronautics and Space 
Administration quarterly report.† The use of the Internet to perform 
certain communications functions presents potential opportunities for 
malicious actors to gain access to restricted networks."&amp;nbsp;&lt;/em&gt;&lt;br /&gt;
&lt;br /&gt;


Information regarding several attacks to satellite control systems are 
in the public domain, and these events have been confirmed also by The 
National Aeronautics and Space Administration (NASA).&lt;br /&gt;


Below is a brief list of events:&lt;br /&gt;

&lt;ul&gt;
&lt;li&gt;
On October 20, 2007, Landsat-7, a U.S. earth observation satellite 
jointly managed by the National Aeronautics and Space Administration and
 the U.S. Geological Survey, experienced 12 or more minutes of 
interference.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;
On June 20, 2008, Terra EOS [earth observation system] AM–1, a National 
Aeronautics and Space Administration- managed program for earth 
observation, experienced two or more minutes of interference.The 
responsible party achieved all steps required to command the satellite 
but did not issue commands.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;
On July 23, 2008, Landsat-7 experienced 12 or more minutes of 
interference. The responsible party did not achieve all steps required 
to command the satellite.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;
On October 22, 2008, Terra EOS AM–1 experienced nine or more minutes of 
interference. The responsible party achieved all steps required to 
command the satellite but did not issue commands.&lt;/li&gt;
&lt;/ul&gt;
In the report, the responsibility for the attacks was assigned to China,
 but similar hacks can be conducted by every hostile foreign government.
 We must consider that compromised satellites are a serious risk, the 
exposure could affect communications in the business and military 
sectors, and also can cause the loss of sensitive and strategic 
technological information.&lt;br /&gt;
&lt;br /&gt;


My last consideration is related to threats to satellite systems. In our
 imagination we make the mistake of considering only as possible sources
 of attacks as being foreign governments.&lt;br /&gt;


The proof that this view is wrong arrived in recent weeks when the group&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;a href="http://securityaffairs.co/wordpress/1881/hacking/anonymous-united-as-one-divided-by-zero-a-click-for-freedom.html" target="_blank" title="Anonymous “United as one, divided by zero” a click for freedom"&gt;Anonymous &lt;/a&gt;announced that it had successfully hacked a NASA satellite The group has also published on&amp;nbsp;&lt;a href="http://pastebin.com/Vc7uNWRA" target="_blank" title="NSA hack"&gt;Pastebin&amp;nbsp;&lt;/a&gt;evidence of knowledge on NASA project.&lt;br /&gt;
&lt;br /&gt;


Clearly the situation&amp;nbsp;merits&amp;nbsp;a&amp;nbsp;high level of attention&amp;nbsp;given the&amp;nbsp;looming threat.&lt;div class="blogger-post-footer"&gt;hacker bank&lt;/div&gt;</content><link href="http://heackerbank.blogspot.com/feeds/2543297720983039880/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2013/01/hacking-satellite-communications.html#comment-form" rel="replies" title="2 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/2543297720983039880" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/2543297720983039880" rel="self" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2013/01/hacking-satellite-communications.html" rel="alternate" title="Hacking Satellite Communications" type="text/html"/><author><name>ization shop</name><uri>http://www.blogger.com/profile/18226043919918653581</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8380499217784119522.post-4468390982114397525</id><published>2013-01-11T04:39:00.000-08:00</published><updated>2013-01-11T04:40:34.923-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><title type="text">Hacker satellite grid to counter Internet censorship   </title><content type="html">The Hackerspace Global Grid
 is hoping to build its own satellite network in an effort to counter 
various Internet censorship initiatives such as the controversial Stop 
Online Piracy Act (SOPA) act.&lt;br /&gt;
In addition to launching communications satellites into space, the 
group plans to develop a grid of ground stations to track and 
communicate with the satellites.  &lt;br /&gt;
&lt;img alt="Hacker satellite grid to counter Internet censorship" height="208" src="http://img.tgdaily.net/sites/default/files/stock/article_images/military/milstar.jpg" style="height: 13em; width: 20.8125em;" width="333" /&gt;&lt;br /&gt;
&lt;br /&gt;
"The
 first goal is an uncensorable internet in space. Let's take the 
internet out of the control of terrestrial entities. [We] can put 
humanity back in space in a meaningful way," hacktivist Nick Farr told 
the &lt;i&gt;BBC&lt;/i&gt; on the sidelines of the Chaos Communication Congress in Berlin.&lt;br /&gt;
&lt;br /&gt;
"The goal is to get back to where we were in the 1970s. Hackers find 
it offensive that we've had the technology since before many of us were 
born and we haven't gone back. We believe communication is a human 
right."&lt;br /&gt;
&lt;br /&gt;
Hackerspace Global Grid participant Armin Bauer expressed similar 
sentiments, but acknowledged that hobbyists have thus far only managed 
to put a few small satellites in orbit due to budgetary constraints. &lt;br /&gt;
"Professionals can track satellites from ground stations, but usually
 they don't have to because, if you pay a large sum [to send the 
satellite up on a rocket], they put it in an exact place."  &lt;br /&gt;
&lt;br /&gt;
However, Bauer plans to create a network of low-cost ground stations 
that can be purchased (at 100 euros each) or built by individuals that 
could be in place during the first half of 2012. Operating together in a
 global network, the stations would be capable of pinpoint satellites, 
helping them to send data back to Earth. &lt;br /&gt;
"It's kind of a reverse GPS. GPS uses satellites to calculate where 
we are, and this tells us where the satellites are. We would use GPS 
co-ordinates but also improve on them by using fixed sites in 
precisely-known locations," he added.&lt;br /&gt;
&lt;br /&gt;
Aside from budgetary constraints and technical difficulties, the 
Hackerspace Global Grid also faces potential legal threats from various 
countries opposed to the anti-censorship plan.&lt;br /&gt;
&lt;br /&gt;
"There is an interesting legal dimension in that outer space is not 
governed by the countries over which it floats," explained Prof Alan 
Woodward from the computing department at the University of Surrey.&lt;br /&gt;
"So, theoretically it could be a place for illegal communication to 
thrive. However, the corollary is that any country could take the law 
into their own hands and disable the satellites.&lt;br /&gt;
&lt;br /&gt;&lt;div class="blogger-post-footer"&gt;hacker bank&lt;/div&gt;</content><link href="http://heackerbank.blogspot.com/feeds/4468390982114397525/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2013/01/hacker-satellite-grid-to-counter.html#comment-form" rel="replies" title="2 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/4468390982114397525" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/4468390982114397525" rel="self" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2013/01/hacker-satellite-grid-to-counter.html" rel="alternate" title="Hacker satellite grid to counter Internet censorship   " type="text/html"/><author><name>ization shop</name><uri>http://www.blogger.com/profile/18226043919918653581</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8380499217784119522.post-6014277900383259809</id><published>2013-01-11T04:28:00.001-08:00</published><updated>2013-01-11T04:28:53.826-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><title type="text">Hackers plan to circumvent SOPA by launching their own satellite </title><content type="html">&lt;span id="intellitxt" name="intellitxt"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjb4colJ-MpnRA6EqQo5JbjQFQPcAr0VB97WtWi2CbNdW_f3yYElfo8l0MduN6gyHYxa29zUMUzZGHpIX63Cl8QAtrld2XoivFNFxmmj_E3jI5VlKPO6R3nkE7EU4zb_BC2gWn-K2Xj3rfk/s1600/satellite.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjb4colJ-MpnRA6EqQo5JbjQFQPcAr0VB97WtWi2CbNdW_f3yYElfo8l0MduN6gyHYxa29zUMUzZGHpIX63Cl8QAtrld2XoivFNFxmmj_E3jI5VlKPO6R3nkE7EU4zb_BC2gWn-K2Xj3rfk/s320/satellite.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
The term “hacker” carries 
with it several connotations, with meanings that are both positive and 
negative. Among the positive descriptors, the word “resourceful” comes 
to mind. So, when faced with the possible reality of SOPA
 being written into law, a group in Germany has decided to take action 
instead of throwing up their hands and giving up. If the United States 
is going to lock down the current version of the internet, they plan to 
make their own by launching a satellite into orbit.&lt;br /&gt;
&lt;br /&gt;

An ambitious undertaking, but one that is actually feasible with the 
lowering of costs associated with putting a payload into space. 
Introduced at the Chaos Communication Congress in Berlin, the plan calls
 for the launching of a single satellite into low orbit that would 
communicate with a series of ground stations to create an independent 
network.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;Called the Hackerspace Global Grid (HGG), the network would 
operate like a GPS system, only in reverse. In theory, the plan would 
give users continuous access to the network by using the ground stations
 as a global relaying system. When one base station is in range of of 
the satellite,
 it would take the signals received and re-broadcast them to the rest of
 the network it was a part of. In theory this plan can work experts have
 said, but there are hurdles — chief among them being financial.&lt;br /&gt;
&lt;br /&gt;

While not nearly as expensive as in decades past, space travel and 
payload delivery is still costly. The price tag on building a satellite 
with equipment that can handle the rigors of space can still run in the 
millions of dollars, making it an expensive enterprise indeed. Couple 
that with the fact that no single country can govern space itself, there
 are no laws to protect the HGG orbital device. Any country could come 
along and try to disable it with no ramifications.&lt;br /&gt;
&lt;br /&gt;

As far as logistical hurdles, unless the HGG satellite is in 
geosynchronous orbit, it’s going to be very difficult to track. Instead 
of having a known point in space where the device travels at the same 
speed as the Earth so appears to not move, a low orbit satellite would 
be moving very quickly. Even if the team behind the HGG could put it out
 far enough for geosync to be accomplished, the distance might be too 
great to get a good signal on the ground.&lt;br /&gt;
&lt;br /&gt;

Nevertheless, the group is moving ahead with plans to develop the 
ground stations and communications protocol they are going to use. They 
plan to have two ground stations deployed by the next Chaos 
Communication Conference, as well as having a stock available for 
purchase by private individuals. If you’re as fascinated with the 
project as we are, you can get involved by checking out &lt;a href="http://aerospaceresearch.net/constellation/"&gt;Constellation&lt;/a&gt;, a project that the HGG has joined for collaboration. &lt;br /&gt;
&lt;div class="blogger-post-footer"&gt;hacker bank&lt;/div&gt;</content><link href="http://heackerbank.blogspot.com/feeds/6014277900383259809/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2013/01/hackers-plan-to-circumvent-sopa-by.html#comment-form" rel="replies" title="2 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/6014277900383259809" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/6014277900383259809" rel="self" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2013/01/hackers-plan-to-circumvent-sopa-by.html" rel="alternate" title="Hackers plan to circumvent SOPA by launching their own satellite " type="text/html"/><author><name>ization shop</name><uri>http://www.blogger.com/profile/18226043919918653581</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjb4colJ-MpnRA6EqQo5JbjQFQPcAr0VB97WtWi2CbNdW_f3yYElfo8l0MduN6gyHYxa29zUMUzZGHpIX63Cl8QAtrld2XoivFNFxmmj_E3jI5VlKPO6R3nkE7EU4zb_BC2gWn-K2Xj3rfk/s72-c/satellite.jpg" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8380499217784119522.post-5651137187766864651</id><published>2013-01-10T08:15:00.003-08:00</published><updated>2013-01-10T08:15:33.334-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><title type="text">New bank hacking program hits three continents</title><content type="html">&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4RzfeSZYp5F7ECl-T6B1B0z94qLmBbFD9H_VAMtwBNh4dkUXbZ1hY3N-LDWYudb6wZTgwyEwHy0SvVOeNhaPoPkv83690SIHi8TUfKQPqEaMQkkRknNm3yMq1k7mWx0Hvam3CxuQAQ_-N/s1600/-399117085241.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="204" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4RzfeSZYp5F7ECl-T6B1B0z94qLmBbFD9H_VAMtwBNh4dkUXbZ1hY3N-LDWYudb6wZTgwyEwHy0SvVOeNhaPoPkv83690SIHi8TUfKQPqEaMQkkRknNm3yMq1k7mWx0Hvam3CxuQAQ_-N/s400/-399117085241.jpg" width="300" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;i style="font-weight: normal;"&gt;A new wave of automated hacking of online bank accounts 
might have stolen $78 million in the past year from customers in Europe,
 Latin America and the United States.&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
This is according to researchers who peered into the computers of the hacking gangs.&lt;br /&gt;
The groups used recent improvements to two families of existing 
malicious software, known as Zeus and SpyEye, which lodged on the 
computers of clients at 60 banks.&lt;br /&gt;
&lt;br /&gt;
While previous versions of the software have proved adept at stealing
 logon information, the latest variants automate the subsequent transfer
 of funds to accounts controlled by accomplices.&lt;br /&gt;
&lt;br /&gt;
The findings, to be released on Tuesday by security firms McAfee and 
Guardian Analytics, confirmed and expanded on research from Japan-based 
Trend Micro Inc that was first reported last week by Reuters.&lt;br /&gt;
“This looks like the beginning of a new technique,” said Guardian’s 
Vice President Craig Priess, whose firm specializes in protecting banks.&lt;br /&gt;
&lt;br /&gt;
The software is sophisticated enough to defeat “chip and PIN” and 
other two-factor authentication and to avoid transferring the entire 
contents of an account at one time, which can trigger review, according 
to the study.&lt;br /&gt;
&lt;br /&gt;
Trend Micro said it had seen the automated versions in action in Germany, the United Kingdom and Italy.&lt;br /&gt;
Guardian and Intel Corp-owned McAfee said the same technology, while 
still emerging, had been used by a dozen gangs against consumers and 
business clients of financial institutions in those countries and 
Colombia, the Netherlands, and the United States.&lt;br /&gt;
&lt;br /&gt;
“Someone designing this system has insider knowledge as to what the 
banks are looking for,” said Dave Marcus, research director at Mcafee 
Labs.&lt;br /&gt;
&lt;br /&gt;
Server logs viewed by the researchers saw commands from the fraud 
rings to transfer a total of $78 million, including $130000 from one 
account. The banks may have been able to block some of those 
transactions, the researchers acknowledged.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Money mules&lt;/b&gt;&lt;br /&gt;
Though written and controlled by different groups, SpyEye and Zeus 
share the ability to be installed on computers that visit malicious 
websites or legitimate pages that have been compromised by hackers, as 
well as through tainted links in emails.&lt;br /&gt;
&lt;br /&gt;
The programs already have used a technique called “web injection” to 
generate new entry fields when victims log on to any number of banks or 
other sensitive websites. Instead of seeing a bank ask for an account 
number and password, for example, a victimized user sees requests for 
both of those and an ATM card number. All that information is sent to 
the hacker, who signs in and transfers money to an accomplice’s account.&lt;br /&gt;
&lt;br /&gt;
Those transfers can be time-consuming, and the hacker has to consider how much can be sent at once without drawing attention.&lt;br /&gt;
Multiple, smaller transfers are preferable but take more time.&lt;br /&gt;
&lt;br /&gt;
For the past year or more, some variants have also captured one-time 
passwords, such as those sent from the banks by text messages to client 
cell phones as an added security measure. But a hacker had to be online 
within 30 or 60 seconds in order to use the one-time password.&lt;br /&gt;
&lt;br /&gt;
The new software allows the criminal to siphon money out at all 
hours, potentially increasing the number of hacked accounts and the 
speed with which they are drained.&lt;br /&gt;
&lt;br /&gt;
Brett Stone-Gross, a senior security researcher with Dell Inc unit 
Dell SecureWorks, said previously that the main limiting factor for 
crime groups is the number of accomplices, known as money mules, that 
they can hire to accept transfers from victim accounts. Automation will 
not lessen the need for mules, Stone-Gross said.&lt;br /&gt;
&lt;br /&gt;
Trend Micro spoke online with sellers of the automated transfer 
modules who were based in Russia, Ukraine and Romania, where arrests and
 prosecutions are rare. It said the new software costs between $300 and 
$4000.&lt;br /&gt;
&lt;br /&gt;
Banks generally compensate individuals in full for such losses if 
they are detected quickly. But recent versions of SpyEye and Zeus can 
present fake account balances to individual bank customers, so they 
might not realize their savings are being drained until too late.&lt;div class="blogger-post-footer"&gt;hacker bank&lt;/div&gt;</content><link href="http://heackerbank.blogspot.com/feeds/5651137187766864651/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2013/01/new-bank-hacking-program-hits-three.html#comment-form" rel="replies" title="2 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/5651137187766864651" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/5651137187766864651" rel="self" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2013/01/new-bank-hacking-program-hits-three.html" rel="alternate" title="New bank hacking program hits three continents" type="text/html"/><author><name>ization shop</name><uri>http://www.blogger.com/profile/18226043919918653581</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4RzfeSZYp5F7ECl-T6B1B0z94qLmBbFD9H_VAMtwBNh4dkUXbZ1hY3N-LDWYudb6wZTgwyEwHy0SvVOeNhaPoPkv83690SIHi8TUfKQPqEaMQkkRknNm3yMq1k7mWx0Hvam3CxuQAQ_-N/s72-c/-399117085241.jpg" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8380499217784119522.post-2168063805290900029</id><published>2012-12-28T08:58:00.000-08:00</published><updated>2012-12-28T08:58:09.621-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><title type="text">Mideast hackers disrupt websites of U.S. banks over anti-Islam film, says more shutdowns to come </title><content type="html">&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZGdFju3rarhYfKIG3q-jw9Rwhz7dHzS4knu78ORqShirxDwR7NXR3KIrs0bLzP0IYrHqlqvaWGVQsDE0K1fL2ThTBPYAmrFxGq1plgwW92mfIELDP9B2JzvaKKHqCZK-K2AUojI0MbbcC/s1600/hack29n-2-web.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="223" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZGdFju3rarhYfKIG3q-jw9Rwhz7dHzS4knu78ORqShirxDwR7NXR3KIrs0bLzP0IYrHqlqvaWGVQsDE0K1fL2ThTBPYAmrFxGq1plgwW92mfIELDP9B2JzvaKKHqCZK-K2AUojI0MbbcC/s320/hack29n-2-web.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
A hacker group based in the Middle East has flaunted its online muscle 
against several of America’s largest financial firms, temporarily 
keeping customers from accessing their information on banking websites 
and promising similar shut downs again next week.&lt;br /&gt;
&lt;br /&gt;


 But while cyberattacks are routinely done to glean private account information, this threat appears different — it’s political.&lt;br /&gt;
&lt;br /&gt;


 The group — identifying itself as the Izz ad-Din al-Qassam Cyber 
Fighters — claimed responsibility in a post on Pastebin, a site used by 
hackers, according to The New York Times.&lt;br /&gt;
&lt;br /&gt;


 The group said the attacks are linked to the anti-Islam film that sparked deadly protests this month across the Muslim world.&lt;br /&gt;


 “Insult to a prophet is not acceptable especially when it is the Last 
prophet Muhammad,” the post said. “So as we promised before, the attack 
will be continued until the removal of that sacrilegious movie from the 
Internet.”&lt;br /&gt;
&lt;br /&gt;


 Websites of JPMorgan Chase, Citigroup and Bank of America were affected
 last week, while Wells Fargo’s website was hit Tuesday, U.S. Bank was 
affected Wednesday and PNC Financial Services was disrupted Thursday.&lt;br /&gt;
&lt;br /&gt;


 A PNC spokesman told The Times it was taking “appropriate measures.”&lt;br /&gt;


 But ABC News said it was shut out of the PNC site for about three hours Thursday, leaving some customers to gripe on social media.&lt;br /&gt;


 “Hopefully it can be up soon,” posted Facebook user Stacy Briggs-Gerlach. “Never realized how dependent I am on it!!! ”&lt;br /&gt;
&lt;br /&gt;


 The hackers in their post even wrote a timetable for their attacks and implored other “cyberspace workers to join us.”&lt;br /&gt;


 Security experts told the Daily News that the group’s boasting 
beforehand indicates just how certain they are of being able to shake up
 the banks’ business.&lt;br /&gt;


 But these hackers haven’t exactly brought the firms to their knees, 
said Rob Rachwald, director of security strategy for Imperva, a data 
security company.&lt;br /&gt;
&lt;br /&gt;


 “[Officials] know that if the bank is breached and that suddenly 
everyone’s account number is publicized, that will really kill their 
business, whereas going offline for a little while is just 
embarrassing,” Rachwald said. “In this case, this shows data security 
practice at the banks is still really solid.”&lt;br /&gt;


 It’s unclear the exact origin of the attacks, although Connecticut Sen.
 Joseph Lieberman told C-Span last week they appear to be coming out of 
Iran. Some observers speculate the Iranian government at least knew of 
the attacks, if not actually orchestrated them.&lt;br /&gt;
&lt;br /&gt;


 The fact that the hackers are trying to recruit more people to join 
them — and want to hit banks in other countries — is alarming, said Atif
 Mushtaq, a senior staff scientist for online security company FireEye.&lt;br /&gt;


 “You can’t really prevent this type of attack [on your website]. You 
can mitigate it a little,” he said. “But the real question is, when is 
this going to end?&lt;div class="blogger-post-footer"&gt;hacker bank&lt;/div&gt;</content><link href="http://heackerbank.blogspot.com/feeds/2168063805290900029/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2012/12/mideast-hackers-disrupt-websites-of-us.html#comment-form" rel="replies" title="2 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/2168063805290900029" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/2168063805290900029" rel="self" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2012/12/mideast-hackers-disrupt-websites-of-us.html" rel="alternate" title="Mideast hackers disrupt websites of U.S. banks over anti-Islam film, says more shutdowns to come " type="text/html"/><author><name>ization shop</name><uri>http://www.blogger.com/profile/18226043919918653581</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZGdFju3rarhYfKIG3q-jw9Rwhz7dHzS4knu78ORqShirxDwR7NXR3KIrs0bLzP0IYrHqlqvaWGVQsDE0K1fL2ThTBPYAmrFxGq1plgwW92mfIELDP9B2JzvaKKHqCZK-K2AUojI0MbbcC/s72-c/hack29n-2-web.jpg" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8380499217784119522.post-8369353021224390453</id><published>2012-12-03T10:59:00.005-08:00</published><updated>2012-12-03T10:59:45.182-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><category scheme="http://www.blogger.com/atom/ns#" term="heacker bank"/><title type="text">DOS hackers take HSBC websites down</title><content type="html">&lt;div class="storyBody"&gt;
  
  
  
  
     Some HSBC customers are still unable to access some of HSBC's 
online portals and services following a denial-of-service attack, 
resulting in customers being unable to log on for several hours.&lt;br /&gt;

&lt;figure&gt;&lt;img alt="HSBC" height="300" src="http://cdn-static.zdnet.com/i/story/70/00/006015/hsbc-bank-branch.jpg" width="400" /&gt;&lt;figcaption&gt;&lt;span style="font-size: x-small;"&gt;Some HSBC web services went down on Thursday due to a DDoS attack.&lt;/span&gt;&lt;/figcaption&gt;&lt;/figure&gt;
Twitter users began reporting the problems accessing the sites at around 17:45BST.&lt;br /&gt;

"Anyone else having problems with HSBC&amp;nbsp;Internet Banking not working? Site seems to be down," &lt;a href="https://twitter.com/Mrs_Spartacus/status/258969891124682753"&gt;wrote&lt;/a&gt; a user with the name of 'Mrs_Spartacus'.&lt;br /&gt;
&lt;br /&gt;

According to Mark Denne, a partner at West Avenue Capital, the sites 
us.hsbc.com, hsbc.co.uk and offshore.hsbc.com were all still offline 
still at around 20:00BST.&lt;br /&gt;

"HSBC down. http://www.us.hsbc.com , http://www.hsbc.co.uk &amp;amp; 
http://www.offshore.hsbc.com all offline. Looks serious. Anyone else 
seeing this?" he &lt;a href="https://twitter.com/markdenne/status/259005082765496320"&gt;said on Twitter&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;

At around 20:15BST HSBC provided details of the problem, blaming hackers for the downtime.&lt;br /&gt;
&lt;br /&gt;

"On 18 October 2012 HSBC servers came under a denial of service 
attack which affected a number of HSBC websites around the world. This 
denial of service attack did not affect any customer data, but did 
prevent customers using HSBC online services, including internet 
banking," the company said in a statement.&lt;br /&gt;

"We are taking appropriate action, working hard to restore service.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;We are pleased to say that some sites are now back up and running," it 
added.&lt;br /&gt;

  
 &lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;hacker bank&lt;/div&gt;</content><link href="http://heackerbank.blogspot.com/feeds/8369353021224390453/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2012/12/dos-hackers-take-hsbc-websites-down.html#comment-form" rel="replies" title="2 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/8369353021224390453" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/8369353021224390453" rel="self" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2012/12/dos-hackers-take-hsbc-websites-down.html" rel="alternate" title="DOS hackers take HSBC websites down" type="text/html"/><author><name>ization shop</name><uri>http://www.blogger.com/profile/18226043919918653581</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8380499217784119522.post-2768593786388282675</id><published>2012-11-26T11:55:00.001-08:00</published><updated>2012-11-26T12:06:02.813-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Website Hacking"/><title type="text">Ways Hackers Penetrate A Website</title><content type="html">&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRY1RlZH484AR2MR4H8-PKYjhlabEHVzdO2gjnxOAOrXsfiKNTJpQ4BuLj-pkCUXaGu49VCHfnmNZ6D8d1xnWwtW6DiwvaMrO3PgT1XpMD0E9AR-06wuPdNVeAjqmkYub37QvWB6PvyPQJ/s1600/123564.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRY1RlZH484AR2MR4H8-PKYjhlabEHVzdO2gjnxOAOrXsfiKNTJpQ4BuLj-pkCUXaGu49VCHfnmNZ6D8d1xnWwtW6DiwvaMrO3PgT1XpMD0E9AR-06wuPdNVeAjqmkYub37QvWB6PvyPQJ/s1600/123564.jpeg" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="Cara cara seorang hacker menembus ataupun menyusup dan juga merusak suatu website adalah sebagai berikut.Teknik teknik itu antara lain:"&gt;How can a hacker to penetrate or infiltrate and destroy a website is as berikut.Teknik techniques include:&lt;/span&gt;&lt;span title="1."&gt;1. &lt;/span&gt;&lt;span title="IP Spoofing"&gt;IP Spoofing&lt;/span&gt;&lt;span title="2."&gt;2. &lt;/span&gt;&lt;span title="FTP Attack"&gt;FTP Attack&lt;/span&gt;&lt;span title="3."&gt;3. &lt;/span&gt;&lt;span title="Unix Finger Exploits"&gt;Finger Unix Exploits&lt;/span&gt;&lt;span title="4."&gt;4. &lt;/span&gt;&lt;span title="Flooding &amp;amp; Broadcasting"&gt;Flooding &amp;amp; Broadcasting&lt;/span&gt;&lt;span title="5."&gt;5. &lt;/span&gt;&lt;span title="Fragmented Packet Attacks"&gt;Fragmented Packet Attacks&lt;/span&gt;&lt;span title="6."&gt;6. &lt;/span&gt;&lt;span title="E-mail Exploits"&gt;E-mail Exploits&lt;/span&gt;&lt;span title="7."&gt;7. &lt;/span&gt;&lt;span title="DNS and BIND Vulnerabilities"&gt;DNS and BIND Vulnerabilities&lt;/span&gt;&lt;span title="8."&gt;8. &lt;/span&gt;&lt;span title="Password Attacks"&gt;Password Attacks&lt;/span&gt;&lt;span title="9.Proxy Server Attacks"&gt;9.Proxy Server Attacks&lt;/span&gt;&lt;span title="10."&gt;10. &lt;/span&gt;&lt;span title="Remote Command Processing Attacks"&gt;Command Processing Remote Attacks&lt;/span&gt;&lt;span title="11."&gt;11. &lt;/span&gt;&lt;span title="Remote File System Attack"&gt;Remote File System Attack&lt;/span&gt;&lt;span title="12."&gt;12. &lt;/span&gt;&lt;span title="Selective Program Insertions"&gt;Selective insertions Program&lt;/span&gt;&lt;span title="13."&gt;13. &lt;/span&gt;&lt;span title="Port Scanning"&gt;Port Scanning&lt;/span&gt;&lt;span title="14.TCP/IP Sequence Stealing, Passive Port Listening and Packet"&gt;Sequence 14.TCP/IP Stealing, Passive Listening Port and Packet&lt;/span&gt;&lt;span title="15."&gt;15. &lt;/span&gt;&lt;span title="HTTPD Attacks"&gt;HTTPD Attacks&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="HTTPD Attacks"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="1."&gt;1. &lt;/span&gt;&lt;span title="IP Spoofing"&gt;IP Spoofing&lt;/span&gt;&lt;span title="IP Spoofing juga dikenal sebagai Source Address Spoofing, yaitu pemalsuan alamat IP attacker sehingga sasaran menganggap alamat IP attacker adalah alamat IP dari host di dalam network bukan dari luar network."&gt;IP
 Spoofing is also known as the Source Address Spoofing, the attacker IP 
address forgery assume that the target IP address of the attacker is the
 IP address of the host in the network and not from outside the network.
 &lt;/span&gt;&lt;span title="Misalkan attacker mempunyai IP address type A 66.25.xx.xx ketika attacker melakukan serangan jenis ini maka Network yang diserang akan menganggap IP attacker adalah bagian dari Networknya misal 192.xx.xx.xx yaitu IP type C."&gt;Suppose
 the attacker has type A 66.25.xx.xx IP address when the attacker to 
attack this type of network that attacked it will assume the attacker IP
 is part of the IP networknya 192.xx.xx.xx eg type C.&lt;/span&gt;&lt;span title="IP Spoofing terjadi ketika seorang attacker ?mengakali?"&gt;IP spoofing occurs when an attacker? Outsmart? &lt;/span&gt;&lt;span title="packet routing untuk mengubah arah dari data atau transmisi ke tujuan yang berbeda."&gt;packet routing to change the direction of the data or the transmission to different destinations. &lt;/span&gt;&lt;span title="Packet untuk routing biasanya di transmisikan secara transparan dan jelas sehingga membuat attacker dengan mudah untuk memodifikasi asal data ataupun tujuan dari data."&gt;Packet
 routing is usually transmitted in a transparent and clear so that makes
 it easy to modify the attacker with the data source or destination of 
the data. &lt;/span&gt;&lt;span title="Teknik ini bukan hanya dipakai oleh attacker tetapi juga dipakai oleh para security profesional untuk men tracing identitas dari para attacker"&gt;This
 technique is not only used by the attacker but also used by security 
professionals to download tracing the identity of the attacker&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="Teknik ini bukan hanya dipakai oleh attacker tetapi juga dipakai oleh para security profesional untuk men tracing identitas dari para attacker"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="2."&gt;2. &lt;/span&gt;&lt;span title="FTP Attack"&gt;FTP Attack&lt;/span&gt;&lt;span title="Salah satu serangan yang dilakukan terhadap File Transfer Protocol adalah serangan buffer overflow yang diakibatkan oleh malformed command."&gt;One of the attacks carried out against the File Transfer Protocol is a buffer overflow attack caused by malformed command. &lt;/span&gt;&lt;span title="tujuan menyerang FTP server ini rata-rata adalah untuk mendapatkan command shell ataupun untuk melakukan Denial Of Service."&gt;destination FTP server attack this average is to get a command shell or to perform a Denial of Service. &lt;/span&gt;&lt;span title="Serangan Denial Of Service akhirnya dapat menyebabkan seorang user atau attacker untuk mengambil resource didalam network tanpa adanya autorisasi, sedangkan command shell dapat membuat seorang attacker mendapatkan akses ke sistem server dan file-file data yang akhirnya seorang attacker bisa membuat anonymous root-acces yang mempunyai hak"&gt;Denial
 Of Service attacks may eventually lead to a user or attacker to 
retrieve the resource in the network without authorization, while the 
command shell can make an attacker gain access to the server system and 
data files that eventually an attacker can make anonymous root-acces a 
right &lt;/span&gt;&lt;span title="penuh terhadap system bahkan network yang diserang"&gt;a full range of network attack system even&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="penuh terhadap system bahkan network yang diserang"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="3."&gt;3. &lt;/span&gt;&lt;span title="Unix Finger Exploits"&gt;Finger Unix Exploits&lt;/span&gt;&lt;span title="Pada masa awal internet, Unix OS finger utility digunakan secara efficient untuk men sharing informasi diantara pengguna."&gt;In the early days of the internet, Unix OS finger efficient utility used to download the information sharing among users. &lt;/span&gt;&lt;span title="Karena permintaan informasi terhadap informasi finger ini tidak menyalahkan peraturan, kebanyakan system Administrator meninggalkan utility ini (finger) dengan keamanan yang sangat minim, bahkan tanpa kemanan sama sekali."&gt;Due
 to requests for information on this finger information not blame the 
rules, many system administrators leave this utility (finger) with 
minimal security, even without any security at all. &lt;/span&gt;&lt;span title="Bagi seorang attacker utility ini sangat berharga untuk melakukan informasi tentang footprinting, termasuk nama login dan informasi contact."&gt;For an attacker is invaluable utility for information on footprinting, including login names and contact information.&lt;/span&gt;&lt;span title="Utility ini juga Menyediakan keterangan yang sangat baik tentang aktivitas user didalam sistem, berapa lama user berada dalam sistem dan seberapa jauh user merawat sistem."&gt;This
 utility also provides excellent information about user activity in the 
system, how long the user is in the system and how much users care 
system. &lt;/span&gt;&lt;span title="Informasi yang dihasilkan dari finger ini dapat meminimalisasi usaha kracker dalam menembus sebuah sistem."&gt;Information generated from this finger to minimize effort kracker in penetrating a system. &lt;/span&gt;&lt;span title="Keterangan pribadi tentang user yang dimunculkan oleh finger daemon ini sudah cukup bagi seorang atacker untuk melakukan social engineering dengan menggunakan social skillnya untuk memanfaatkan user agar ?memberitahu?"&gt;Personal
 information about the user that is raised by the finger daemon is 
already enough for a atacker to do social engineering by using social 
skillnya user to utilize that? Tell? &lt;/span&gt;&lt;span title="password dan kode akses terhadap system."&gt;passwords and access codes to the system.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="password dan kode akses terhadap system."&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="4."&gt;4. &lt;/span&gt;&lt;span title="Flooding &amp;amp; Broadcasting"&gt;Flooding &amp;amp; Broadcasting&lt;/span&gt;&lt;span title="Seorang attacker bisa menguarangi kecepatan network dan host-host yang berada di dalamnya secara significant dengan cara terus melakukan request/permintaan terhadap suatu informasi dari sever yang bisa menangani serangan classic Denial Of Service(Dos), mengirim request ke satu port secara berlebihan dinamakan flooding,"&gt;An
 attacker could menguarangi speed networks and hosts that are in it are 
significant in a way continue to request / demand any information from 
servers that can handle classic attack Denial of Service (Dos), send a 
request to a port called excessive flooding, &lt;/span&gt;&lt;span title="kadang hal ini juga disebut spraying."&gt;sometimes it is also called spraying. &lt;/span&gt;&lt;span title="Tujuan dari kedua serangan ini adalah sama yaitu membuat network resource yang Menyediakan informasi menjadi lemah dan akhirnya menyerah."&gt;The
 purpose of both is the same attack that make network resource that 
provides information to become weak and eventually gave up.&lt;/span&gt;&lt;span title="Serangan dengan cara Flooding bergantung kepada dua faktor yaitu: ukuran dan/atau volume (size and/or volume)."&gt;Flooding attacks by relying on two factors: the size and / or volume (size and / or volume). &lt;/span&gt;&lt;span title="Seorang attacker dapat menyebabkan Denial Of Service dengan cara melempar file berkapasitas besar atau volume yang besar dari paket yang kecil kepada sebuah system."&gt;An attacker can cause a Denial of Service by throwing a large-capacity files or a large volume of small packet to a system. &lt;/span&gt;&lt;span title="Dalam keadaan seperti itu network server akan menghadapi kemacetan: terlalu banyak informasi yang diminta dan tidak cukup power untuk mendorong data agar berjalan."&gt;In
 such circumstances the network server will deal with congestion: too 
much information being requested and not enough power to push the data 
to run. &lt;/span&gt;&lt;span title="Pada dasarnya paket yang besar membutuhkan kapasitas proses yang besar pula, tetapi secara tidak normal paket yang kecil dan sama dalam volume yang besar akan menghabiskan resource secara percuma, dan mengakibatkan kemacetan"&gt;Basically
 the package requires a greater processing capacity, but it is not 
normal and the same small package in large volumes would be useless to 
spend resources and cause congestion&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="Pada dasarnya paket yang besar membutuhkan kapasitas proses yang besar pula, tetapi secara tidak normal paket yang kecil dan sama dalam volume yang besar akan menghabiskan resource secara percuma, dan mengakibatkan kemacetan"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="5."&gt;5. &lt;/span&gt;&lt;span title="Fragmented Packet Attacks"&gt;Fragmented Packet Attacks&lt;/span&gt;&lt;span title="Data-data internet yang di transmisikan melalui TCP/IP bisa dibagi lagi ke dalam paket-paket yang hanya mengandung paket pertama yang isinya berupa informasi bagian utama( kepala) dari TCP."&gt;Internet
 data is transmitted via TCP / IP can be further divided into packages 
that contain only the contents of the first package of information the 
main part (head) of TCP. &lt;/span&gt;&lt;span title="Beberapa firewall akan mengizinkan untuk memroses bagian dari paket-paket yang tidak mengandung informasi alamat asal pada paket pertamanya, hal ini akan mengakibatkan beberapa type system menjadi crash."&gt;Some
 firewalls will allow to process part of a package that does not contain
 the information on the packet source address first, this will result in
 some type of system to crash. &lt;/span&gt;&lt;span title="Contohnya, server NT akan menjadi crash jika paket-paket yang dipecah(fragmented packet) cukup untuk menulis ulang informasi paket pertama dari suatu protokol"&gt;For
 example, the NT server will be a crash if the packets are broken up 
(fragmented packet) enough information to rewrite the first packet of a 
protocol&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="Contohnya, server NT akan menjadi crash jika paket-paket yang dipecah(fragmented packet) cukup untuk menulis ulang informasi paket pertama dari suatu protokol"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="6."&gt;6. &lt;/span&gt;&lt;span title="E-mail Exploits"&gt;E-mail Exploits&lt;/span&gt;&lt;span title="Peng-exploitasian e-mail terjadi dalam lima bentuk yaitu: mail floods, manipulasi perintah (command manipulation), serangan tingkat transportasi(transport level attack), memasukkan berbagai macam kode (malicious code inserting) dan social engineering(memanfaatkan sosialisasi secara fisik)."&gt;Peng-exploitasian
 e-mail occurred in five formats: mail floods, manipulation command 
(command manipulation), the attack rate of transport (transport level 
attack), include a variety of code (inserting malicious code) and social
 engineering (use of physical socialization). &lt;/span&gt;&lt;span title="Penyerangan email bisa membuat system menjadi crash, membuka dan menulis ulang bahkan mengeksekusi file-file aplikasi atau juga membuat akses ke fungsi fungsi perintah (command function)"&gt;The
 attack could make the email system to crash, open and execute even 
rewrite the application files or also make access to command functions 
(command function)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="Penyerangan email bisa membuat system menjadi crash, membuka dan menulis ulang bahkan mengeksekusi file-file aplikasi atau juga membuat akses ke fungsi fungsi perintah (command function)"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="7."&gt;7. &lt;/span&gt;&lt;span title="DNS and BIND Vulnerabilities"&gt;DNS and BIND Vulnerabilities&lt;/span&gt;&lt;span title="Berita baru-baru ini tentang kerawanan (vulnerabilities) tentang aplikasi Barkeley Internet Name Domain (BIND) dalam berbagai versi mengilustrasikan kerapuhan dari Domain Name System (DNS), yaitu krisis yang diarahkan pada operasi dasar dari Internet (basic internet operation)"&gt;Recent
 news about the vulnerabilities (vulnerabilities) on apps Berkeley 
Internet Name Domain (BIND) in various versions illustrate the fragility
 of the Domain Name System (DNS), which is a crisis that is directed at 
the basic operation of the Internet (internet basic operation)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="Berita baru-baru ini tentang kerawanan (vulnerabilities) tentang aplikasi Barkeley Internet Name Domain (BIND) dalam berbagai versi mengilustrasikan kerapuhan dari Domain Name System (DNS), yaitu krisis yang diarahkan pada operasi dasar dari Internet (basic internet operation)"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="8."&gt;8. &lt;/span&gt;&lt;span title="Password Attacks"&gt;Password Attacks&lt;/span&gt;&lt;span title="Password merupakan sesuatu yang umum jika kita bicara tentang kemanan."&gt;Password is a common thing when we talk about security. &lt;/span&gt;&lt;span title="Kadang seorang user tidak perduli dengan nomor pin yang mereka miliki, seperti bertransaksi online di warnet, bahkan bertransaksi online dirumah pun sangat berbahaya jika tidak dilengkapi dengan software security seperti SSL dan PGP."&gt;Sometimes
 a user does not care about the number of pins they have, such as online
 transaction in the cafe, even transact online at home is very dangerous
 if it is not equipped with security software such as SSL and PGP. &lt;/span&gt;&lt;span title="Password adalah salah satu prosedur kemanan yang sangat sulit untuk diserang, seorang attacker mungkin saja mempunyai banyak tools (secara teknik maupun dalam kehidupan sosial) hanya untuk membuka sesuatu yang dilindungi oleh password."&gt;Password
 security is one procedure that is very difficult to attack, an attacker
 might have many tools (both technical and social life) just to open 
something that is protected by a password.&lt;/span&gt;&lt;span title="Ketika seorang attacker berhasil mendapatkan password yang dimiliki oleh seorang user, maka ia akan mempunyai kekuasaan yang sama dengan user tersebut."&gt;When an attacker managed to get a password that is owned by a user, then it will have the same powers to the user. &lt;/span&gt;&lt;span title="Melatih karyawan/user agar tetap waspada dalam menjaga passwordnya dari social engineering setidaknya dapat meminimalisir risiko, selain berjaga-jaga dari praktek social enginering organisasi pun harus mewaspadai hal ini dengan cara teknikal."&gt;Train
 employees / users to remain vigilant in safeguarding the password of 
social engineering can at least minimize the risk, except in case of 
social engineering practices organizations must be aware of this 
technical way. &lt;/span&gt;&lt;span title="Kebanyakan serangan yang dilakukan terhadap password adalah menebak (guessing), brute force, kracking dan sniffing"&gt;Most of the attacks are carried out against password guessing (guessing), brute force, cracking and sniffing&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="Kebanyakan serangan yang dilakukan terhadap password adalah menebak (guessing), brute force, kracking dan sniffing"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="9.Proxy Server Attacks"&gt;9.Proxy Server Attacks&lt;/span&gt;&lt;span title="Salah satu fungsi Proxy server adalah untuk mempercepat waktu response dengan cara menyatukan proses dari beberapa host dalam suatu trusted network"&gt;One
 function of proxy servers is to speed up response time by bringing 
together processes from multiple hosts in a trusted network&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="Salah satu fungsi Proxy server adalah untuk mempercepat waktu response dengan cara menyatukan proses dari beberapa host dalam suatu trusted network"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="10."&gt;10. &lt;/span&gt;&lt;span title="Remote Command Processing Attacks"&gt;Command Processing Remote Attacks&lt;/span&gt;&lt;span title="Trusted Relationship antara dua atau lebih host Menyediakan fasilitas pertukaran informasi dan resource sharing."&gt;Trusted Relationship between two or more host facilities provide information exchange and resource sharing. &lt;/span&gt;&lt;span title="Sama halnya dengan proxy server, trusted relationship memberikan kepada semua anggota network kekuasaan akses yang sama di satu dan lain system (dalam network)."&gt;Similar
 to a proxy server, trusted relationships give all members equal access 
to the power network in one or another system (the network).&lt;/span&gt;&lt;span title="Attacker akan menyerang server yang merupakan anggota dari trusted system."&gt;Attacker will attack a server that is a member of the trusted system. &lt;/span&gt;&lt;span title="Sama seperti kerawanan pada proxy server, ketika akses diterima, seorang attacker akan mempunyai kemampuan mengeksekusi perintah dan mengkases data yang tersedia bagi user lainnya"&gt;Just
 as the latency to the proxy server, when access is received, an 
attacker would have the ability to execute commands and accessing the 
data available to other users&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="Sama seperti kerawanan pada proxy server, ketika akses diterima, seorang attacker akan mempunyai kemampuan mengeksekusi perintah dan mengkases data yang tersedia bagi user lainnya"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="11."&gt;11. &lt;/span&gt;&lt;span title="Remote File System Attack"&gt;Remote File System Attack&lt;/span&gt;&lt;span title="Protocol-protokol untuk tranportasi data ?tulang punggung dari internet?"&gt;Transport protocols for data? Backbone of the internet? &lt;/span&gt;&lt;span title="adalah tingkat TCP (TCPLevel) yang mempunyai kemampuan dengan mekanisme untuk baca/tulis (read/write) Antara network dan host."&gt;is the TCP level (TCPLevel) with a mechanism that has the ability to read / write (read / write) between network and host. &lt;/span&gt;&lt;span title="Attacker bisa dengan mudah mendapatkan jejak informasi dari mekanisme ini untuk mendapatkan akses ke direktori file"&gt;Attacker can easily get trace information from this mechanism to gain access to the file directory&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="Attacker bisa dengan mudah mendapatkan jejak informasi dari mekanisme ini untuk mendapatkan akses ke direktori file"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="12."&gt;12. &lt;/span&gt;&lt;span title="Selective Program Insertions"&gt;Selective insertions Program&lt;/span&gt;&lt;/span&gt;&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="Selective Program Insertions"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="Selective Program Insertions adalah serangan yang dilakukan ketika attacker menaruh program-program penghancur, seperti virus, worm dan trojan (mungkin istilah ini sudah anda kenal dengan baik ?) pada system sasaran."&gt;Selective
 Program insertions are performed when the attacker attacks put 
destroyer programs, such as viruses, worms and trojans (perhaps the term
 is already familiar to you?) On the target system. &lt;/span&gt;&lt;span title="Program-program penghancur ini sering juga disebut malware."&gt;Destruction programs is often called malware. &lt;/span&gt;&lt;span title="Program-program ini mempunyai kemampuan untuk merusak system, pemusnahan file, pencurian password sampai dengan membuka backdoor"&gt;These programs have the ability to damage the system, destruction of files, theft of passwords to open the backdoor&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="Program-program ini mempunyai kemampuan untuk merusak system, pemusnahan file, pencurian password sampai dengan membuka backdoor"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="13."&gt;13. &lt;/span&gt;&lt;span title="Port Scanning"&gt;Port Scanning&lt;/span&gt;&lt;span title="Melalui port scanning seorang attacker bisa melihat fungsi dan cara bertahan sebuah system dari berbagai macam port."&gt;Through port scanning an attacker can see the functions and how to survive a system from a variety of ports. &lt;/span&gt;&lt;span title="Seorang atacker bisa mendapatkan akses kedalam sistem melalui port yang tidak dilindungi."&gt;A atacker can get access to the system through an unprotected port. &lt;/span&gt;&lt;span title="Sebaia contoh, scaning bisa digunakan untuk menentukan dimana default SNMP string di buka untuk publik, yang artinya informasi bisa di extract untuk digunakan dalam remote command attack"&gt;Sebaia
 example, scanning can be used to determine where the default SNMP 
string in the open for the public, which means that the information can 
be extracted for use in remote command attack&lt;/span&gt;&lt;span title="14.TCP/IP Sequence Stealing, Passive Port Listening and Packet"&gt;Sequence&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="14.TCP/IP Sequence Stealing, Passive Port Listening and Packet"&gt;14.TCP/IP Stealing, Passive Listening Port and Packet&lt;/span&gt;&lt;span title="Interception TCP/IP Sequence Stealing, Passive Port Listening dan Packet Interception berjalan untuk mengumpulkan informasi yang sensitif untuk mengkases network."&gt;Interception
 TCP / IP Sequence Stealing, Passive Listening Port and Packet 
Interception runs to collect sensitive information for accessing the 
network. &lt;/span&gt;&lt;span title="Tidak seperti serangan aktif maupun brute-force, serangan yang menggunakan metoda ini mempunyai lebih banyak kualitas stealth-like"&gt;Unlike active attacks and brute-force, attack using this method have more stealth-like qualities&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="Tidak seperti serangan aktif maupun brute-force, serangan yang menggunakan metoda ini mempunyai lebih banyak kualitas stealth-like"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="15."&gt;15. &lt;/span&gt;&lt;span title="HTTPD Attacks"&gt;HTTPD Attacks&lt;/span&gt;&lt;span title="Kerawanan yang terdapat dalam HTTPD ataupun webserver ada lima macam: buffer overflows, httpd bypasses, cross scripting, web code vulnerabilities, dan URL floods"&gt;Vulnerabilities
 found in HTTPD webserver or there are five kinds: buffer overflows, 
bypasses httpd, cross scripting, web code vulnerabilities, and URL 
floods&lt;/span&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;hacker bank&lt;/div&gt;</content><link href="http://heackerbank.blogspot.com/feeds/2768593786388282675/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2012/11/ways-hackers-penetrate-website.html#comment-form" rel="replies" title="2 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/2768593786388282675" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/2768593786388282675" rel="self" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2012/11/ways-hackers-penetrate-website.html" rel="alternate" title="Ways Hackers Penetrate A Website" type="text/html"/><author><name>ization shop</name><uri>http://www.blogger.com/profile/18226043919918653581</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRY1RlZH484AR2MR4H8-PKYjhlabEHVzdO2gjnxOAOrXsfiKNTJpQ4BuLj-pkCUXaGu49VCHfnmNZ6D8d1xnWwtW6DiwvaMrO3PgT1XpMD0E9AR-06wuPdNVeAjqmkYub37QvWB6PvyPQJ/s72-c/123564.jpeg" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8380499217784119522.post-1305293898140604538</id><published>2012-10-30T10:07:00.001-07:00</published><updated>2012-10-30T10:09:00.498-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><title type="text">Paul Graham Publicly Releases Nodejitsu From Hacker News Jail</title><content type="html">&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEXmxaKemULTgjkQM6aWqLsEI7t7_SNlg-gsZGYyli7FNTseK8Z04J9X6t_ZTCUHRduSa4_bUwwB9XG51dgxy055x81nXR40laF2M7D_j-v3gMLWXjqwBgAZAQPfHijEiH34f7MroJtFId/s1600/paulgraham.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="283" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEXmxaKemULTgjkQM6aWqLsEI7t7_SNlg-gsZGYyli7FNTseK8Z04J9X6t_ZTCUHRduSa4_bUwwB9XG51dgxy055x81nXR40laF2M7D_j-v3gMLWXjqwBgAZAQPfHijEiH34f7MroJtFId/s320/paulgraham.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="Notorious Nodejitsu just got a big fat “get out of jail free” card from Paul Graham."&gt;Notorious Nodejitsu just got a big fat "get out of jail free" card from Paul Graham. &lt;/span&gt;&lt;span title="The New York-based startup has been persona non grata on the influential geek forum Hacker News since ."&gt;The New York-based startup has been persona non grata on the forum Hacker News Influential geek since. &lt;/span&gt;&lt;span title="."&gt;. &lt;/span&gt;&lt;span title="."&gt;. &lt;/span&gt;&lt;span title="well, we first heard about the drama, oh, back in December?"&gt;well, we first heard about the drama, oh, back in December?&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="well, we first heard about the drama, oh, back in December?"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="Mr."&gt;Mr. &lt;/span&gt;&lt;span title="Graham, who runs Y Combinator and Hacker News, says Nodejitsu was banned for spamming; Nodejitsu's founders suspected it was because they compete with Y Combinator alum Heroku."&gt;Graham,
 who runs Y Combinator and Hacker News, says Nodejitsu was banned for 
spamming; Nodejitsu's founders Because they suspected it was Y 
Combinator alum Compete with Heroku. &lt;/span&gt;&lt;span title="But as of Sunday night, Nodejitsu's back in the game."&gt;But as of Sunday night, Nodejitsu's back in the game.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="But as of Sunday night, Nodejitsu's back in the game."&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="Heroku and Nodejitsu both host apps for developers, although Nodejitsu does it only for apps written in node.js, while Heroku has a wider range of offerings, including Java and Ruby."&gt;Heroku
 and Nodejitsu both host apps for developers, although Nodejitsu does it
 only for apps written in node.js, while Heroku has a wider range of 
offerings, Including Java and Ruby. &lt;/span&gt;&lt;span title="Heroku launched “experimental support” for node.js in April 2010, as Nodejitsu was just getting started."&gt;Heroku Launched "experimental support" for node.js in April 2010, as Nodejitsu was just getting started. &lt;/span&gt;&lt;span title="The race was on."&gt;The race was on.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="The race was on."&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="Yesterday, a Hacker News user posted an alternative to the forum called Lamer News, inspired by all the kvetching and conspiracy theory surrounding the opaque moderator policies of Hacker News."&gt;Yesterday,
 a Hacker News user posted an alternative to the forum called Lamer 
News, inspired by all the kvetching and conspiracy theory surrounding 
the moderator opaque policies of Hacker News. &lt;/span&gt;&lt;span title="Some users say the site is “a shill for Y Combinator companies;” “why did Hacker News remove my blog post,” and so on."&gt;Some users say the site is "a shill for Y Combinator companies;" "why did Hacker News remove my blog post," and so on. &lt;/span&gt;&lt;span title="Foursquare's Eric Friedman's personal domain, marketing.fm, was mysteriously banned after a post about VC breakfast etiquette; others have been mystified as to why their submissions did or didn't show up."&gt;Foursquare's
 Eric Friedman's personal domain, marketing.fm, was mysteriously banned 
after a post about VC breakfast etiquette; others have been mystified as
 to why their submissions did or did not show up.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="Foursquare's Eric Friedman's personal domain, marketing.fm, was mysteriously banned after a post about VC breakfast etiquette; others have been mystified as to why their submissions did or didn't show up."&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="The site provoked a discussion about Hacker News policies in general."&gt;The site provoked a discussion about Hacker News policies in general. &lt;/span&gt;&lt;span title="“We don't ban sites of competitors of companies we fund,” Mr."&gt;"We do not ban sites of competitors of companies we fund," Mr. &lt;/span&gt;&lt;span title="Graham said in the thread."&gt;Graham said in the thread. &lt;/span&gt;&lt;span title="“Even if we wanted to do something like that, how could we ever get away with it?” Then he leapt to a conclusion: “I'm guessing you're referring to Nodejitsu.com."&gt;"Even
 if we wanted to do something like that, how could we ever get away with
 it?" Then he leapt to a conclusion: "I'm guessing you're referring to 
Nodejitsu.com. &lt;/span&gt;&lt;span title="They're banned because they created an army of sockpuppets to vote up their posts.”"&gt;They're banned Because they created an army of sockpuppets to vote up their posts. "&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="They're banned because they created an army of sockpuppets to vote up their posts.”"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="The accusation brought a fiery rebuttal from Nodejitsu's clear-eyed CEO Charlie Robbins, a coder who was recruited out of college to work at Microsoft, did his time coding in the finance sector, and also serves served until recently as the CTO of General Assembly."&gt;The
 accusation brought a fiery rebuttal from Nodejitsu's clear-eyed CEO 
Charlie Robbins, a coder who was recruited out of college to work at 
Microsoft, did his time coding in the finance sector, and also serves 
served until recently as the CTO of the General Assembly. &lt;/span&gt;&lt;span title="“Your claim that Nodejitsu 'created an army of sockpuppets to vote up their posts' is outrageous."&gt;"Your claim that Nodejitsu 'created an army of sockpuppets to vote up their posts' is outrageous. &lt;/span&gt;&lt;span title="Let me enumerate the issue here,” he wrote, and proceeded to pick apart Mr."&gt;Let me enumerate the issue here, "he wrote, and proceeded to pick apart Mr. &lt;/span&gt;&lt;span title="Graham's statement and attack Hacker News for its lack of transparency in four arguments."&gt;Graham's statement and attack Hacker News for its lack of transparency in four arguments.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title="Graham's statement and attack Hacker News for its lack of transparency in four arguments."&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="Mr."&gt;Mr. &lt;/span&gt;&lt;span title="Robbins explained that banning Nodejitsu meant that not only was the company's blog blocked, any developer using Nodejitsu would run into trouble if he or she tried to put an app on Hacker News–something that is commonly done to get users or feedback."&gt;Explained
 that banning Nodejitsu Robbins meant that not only was the company's 
blog blocked, any developer using Nodejitsu would run into trouble if he
 or she tried to put an app on Hacker News-something that is commonly 
done to get users or feedback.&lt;/span&gt;&lt;span title="“The problem with that is you are also penalizing Nodejitsu customers (like myself) that host their projects on their platform,” Frank Denbow, a local founder and coder, wrote in the thread."&gt;"The
 problem with that is you are also penalizing Nodejitsu customers (like 
myself) that host their projects on their platform," Frank Denbow, a 
local founder and coder, wrote in the thread. &lt;/span&gt;&lt;span title="“I support the Nodejitsu guys but I'm not an employee and don't share all their viewpoints; I was just working on my first Nodejs project for NodeKnockout and wanted to get some feedback from the HN community, but my site was blocked also"&gt;"I
 support the Nodejitsu guys but I'm not an employee and do not share all
 their Viewpoints; I was just working on my first project for 
NodeKnockout Nodejs and wanted to get some feedback from the HN 
community, but my site was blocked also &lt;/span&gt;&lt;span title=".”"&gt;. "&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="" id="result_box" lang="en"&gt;&lt;span title=".”"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="“I didn't realize users' stuff was hosted on subdomains."&gt;"I did not Realize users' stuff was hosted on subdomains. &lt;/span&gt;&lt;span title="Ok, I’ll unban nodejitsu.com,” Mr."&gt;Ok, I'll unban nodejitsu.com, "Mr. &lt;/span&gt;&lt;span title="Graham responded."&gt;Graham RESPONDED. &lt;/span&gt;&lt;span title="“We don’t ban sites lightly."&gt;"We do not ban lightly sites. &lt;/span&gt;&lt;span title="We only do it when people make repeated, deliberate efforts to bypass lighter weight protections … I'm happy to unban nodejitsu.com if you promise to stop trying to game HN."&gt;We
 only do it when people make-repeated, deliberate efforts to bypass 
protections lighter weight ... I'm happy to unban nodejitsu.com if you 
promise to stop trying to game HN. &lt;/span&gt;&lt;span title="In your case I recommend the following standard for what counts as gaming HN: if you're not sure, don't.”"&gt;In your case I recommend the following standards for what counts as gaming HN: if you're not sure, do not. "&lt;/span&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;hacker bank&lt;/div&gt;</content><link href="http://heackerbank.blogspot.com/feeds/1305293898140604538/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2012/10/paul-graham-publicly-releases-nodejitsu.html#comment-form" rel="replies" title="1 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/1305293898140604538" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/1305293898140604538" rel="self" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2012/10/paul-graham-publicly-releases-nodejitsu.html" rel="alternate" title="Paul Graham Publicly Releases Nodejitsu From Hacker News Jail" type="text/html"/><author><name>ization shop</name><uri>http://www.blogger.com/profile/18226043919918653581</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEXmxaKemULTgjkQM6aWqLsEI7t7_SNlg-gsZGYyli7FNTseK8Z04J9X6t_ZTCUHRduSa4_bUwwB9XG51dgxy055x81nXR40laF2M7D_j-v3gMLWXjqwBgAZAQPfHijEiH34f7MroJtFId/s72-c/paulgraham.jpg" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8380499217784119522.post-3916320564541715879</id><published>2012-10-20T09:09:00.001-07:00</published><updated>2012-10-20T09:09:16.429-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="php"/><title type="text">Handy PHP classes</title><content type="html">&lt;div style="font-family: Arial,Helvetica,sans-serif;"&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;&amp;nbsp;Handy PHP classes &lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
I've just released my PHP Infusion
 Extension to enhance the functionality and the usability of the PHP 
scripting language. I'll offer you a few of my toys I've developed 
somewhen under the use of PHP Infusion to show you how you can simplify 
your code with a few new functions. I want to share 3 calculation 
classes at this time - take it as a afterwards christmas present ;)&lt;br /&gt;

&lt;h2&gt;
xColor - a color calculation class&lt;/h2&gt;
&lt;div style="background: #efefef; padding: 5px;"&gt;
&lt;strong&gt;Attention:&lt;/strong&gt; This library isn't maintained anymore. Take a look at the jQuery color plugin instead!&lt;/div&gt;
I needed a bunch of functions to perform calculations on color 
values. I searched around the internet but I couldn't make a find, 
wherefore I've started with analysing and reverse engeneering color 
calclulations in graphic programs such as Fireworks and Adobe Photoshop.
 This step was really easy, most of the equations are really obvious. 
But I also needed a handy class which is able to handle several input 
formats like integers, &lt;acronym title="hue, saturation and lightness"&gt;HSL&lt;/acronym&gt;/&lt;acronym title="hue, saturation and value"&gt;HSV&lt;/acronym&gt;, &lt;acronym title="red, green and blue"&gt;RGB&lt;/acronym&gt;
 and so on. I decided to implement input and output filters and perform 
all calculations on RGB values. This concept worked really good. So the 
interface for the class looks like this:&lt;br /&gt;

&lt;pre class="prettyprint"&gt;&lt;i style="color: blue;"&gt;&lt;span class="pun"&gt;&amp;lt;?&lt;/span&gt;&lt;/i&gt;&lt;span class="pln"&gt;&lt;i style="color: blue;"&gt;php
&lt;/i&gt;
&lt;i style="color: blue;"&gt;$xc &lt;/i&gt;&lt;/span&gt;&lt;i style="color: blue;"&gt;&lt;span class="pun"&gt;=&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="kwd"&gt;new&lt;/span&gt;&lt;span class="pln"&gt; xColor&lt;/span&gt;&lt;span class="pun"&gt;;&lt;/span&gt;&lt;span class="pln"&gt;
$xc&lt;/span&gt;&lt;span class="pun"&gt;-&amp;gt;&lt;/span&gt;&lt;span class="pln"&gt;setType&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="pln"&gt;T_COLOR_HEX&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; T_COLOR_RGB&lt;/span&gt;&lt;span class="pun"&gt;);&lt;/span&gt;&lt;span class="pln"&gt;
$c1 &lt;/span&gt;&lt;span class="pun"&gt;=&lt;/span&gt;&lt;span class="pln"&gt; $xc&lt;/span&gt;&lt;span class="pun"&gt;-&amp;gt;&lt;/span&gt;&lt;span class="pln"&gt;random&lt;/span&gt;&lt;span class="pun"&gt;();&lt;/span&gt;&lt;span class="pln"&gt;
$c2 &lt;/span&gt;&lt;span class="pun"&gt;=&lt;/span&gt;&lt;span class="pln"&gt; $xc&lt;/span&gt;&lt;span class="pun"&gt;-&amp;gt;&lt;/span&gt;&lt;span class="pln"&gt;random&lt;/span&gt;&lt;span class="pun"&gt;();&lt;/span&gt;&lt;span class="pln"&gt;

$xc&lt;/span&gt;&lt;span class="pun"&gt;-&amp;gt;&lt;/span&gt;&lt;span class="pln"&gt;setType&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="pln"&gt;T_COLOR_RGB&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; T_COLOR_HEX&lt;/span&gt;&lt;span class="pun"&gt;);&lt;/span&gt;&lt;span class="pln"&gt;
echo $xc&lt;/span&gt;&lt;span class="pun"&gt;-&amp;gt;&lt;/span&gt;&lt;span class="pln"&gt;red&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="pln"&gt;$c1&lt;/span&gt;&lt;span class="pun"&gt;);&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="com"&gt;// 90FFFF&lt;/span&gt;&lt;span class="pln"&gt;
echo $xc&lt;/span&gt;&lt;span class="pun"&gt;-&amp;gt;&lt;/span&gt;&lt;span class="pln"&gt;green&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="pln"&gt;$c1&lt;/span&gt;&lt;span class="pun"&gt;);&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="com"&gt;// FF0CFF&lt;/span&gt;&lt;span class="pln"&gt;
echo $xc&lt;/span&gt;&lt;span class="pun"&gt;-&amp;gt;&lt;/span&gt;&lt;span class="pln"&gt;blue&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="pln"&gt;$c1&lt;/span&gt;&lt;span class="pun"&gt;);&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="com"&gt;// FFFFB8&lt;/span&gt;&lt;span class="pln"&gt;
echo $xc&lt;/span&gt;&lt;span class="pun"&gt;-&amp;gt;&lt;/span&gt;&lt;span class="pln"&gt;webround&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="pln"&gt;$c2&lt;/span&gt;&lt;span class="pun"&gt;);&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="com"&gt;// 66CC99&lt;/span&gt;&lt;span class="pln"&gt;

&lt;/span&gt;&lt;span class="com"&gt;// Get the color point on a gradient&lt;/span&gt;&lt;span class="pln"&gt;
$xc&lt;/span&gt;&lt;span class="pun"&gt;-&amp;gt;&lt;/span&gt;&lt;span class="pln"&gt;gradientLevel&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="pln"&gt;$c1&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; $c2&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="lit"&gt;100&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; rand&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="lit"&gt;0&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="lit"&gt;100&lt;/span&gt;&lt;span class="pun"&gt;));&lt;/span&gt;&lt;span class="pln"&gt;

&lt;/span&gt;&lt;span class="pun"&gt;?&amp;gt;&lt;/span&gt;&lt;/i&gt;&lt;/pre&gt;
I believe "gradient level" is not a admitted term. Think about the 
gradient level as a point on a gradient between two colors. In the 
example above I used a step width of 100, so that the point you want to 
choose also have to be in the interval &lt;em&gt;[0, 100]&lt;/em&gt;. 100 is a good 
example to represent percents as a color - for example to visualize a 
trend from 0% to 100% with a gradient from red to green.&lt;br /&gt;

&lt;h2&gt;
xFraction - a fraction calculation class&lt;/h2&gt;
This class is the result of thinking about numbers - and yes a little
 part of my own wolframalpha. In general we could represent all rational
 numbers as a fraction. Trade this class as the implementation of this 
idea. The first thing I did was also finding equations to represent 
every number as a fraction. Natural numbers, integers, rational and real
 numbers. Even if I cancel the fractions (using an eclidean based &lt;em&gt;GCD()&lt;/em&gt;
 implementation) after every real operation, there is the problem with 
the maximum size. PHP does not offer int64 before PHP6 (never ;) ), so 
we could trade this class more as a proof of concept because the least 
value is 1/(2&lt;sup&gt;31&lt;/sup&gt;-1) and the largest is (2&lt;sup&gt;31&lt;/sup&gt;-1)/1 because PHP does not have unsigned integers. But let's come to the example:&lt;br /&gt;

&lt;pre class="prettyprint" style="color: blue;"&gt;&lt;i&gt;&lt;span class="pun"&gt;&amp;lt;?&lt;/span&gt;&lt;span class="pln"&gt;php

$xf &lt;/span&gt;&lt;span class="pun"&gt;=&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="kwd"&gt;new&lt;/span&gt;&lt;span class="pln"&gt; xFraction&lt;/span&gt;&lt;span class="pun"&gt;;&lt;/span&gt;&lt;span class="pln"&gt;
$tmp &lt;/span&gt;&lt;span class="pun"&gt;=&lt;/span&gt;&lt;span class="pln"&gt; $xf&lt;/span&gt;&lt;span class="pun"&gt;-&amp;gt;&lt;/span&gt;&lt;span class="pln"&gt;div&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="pln"&gt;$xf&lt;/span&gt;&lt;span class="pun"&gt;-&amp;gt;&lt;/span&gt;&lt;span class="pln"&gt;mul&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="str"&gt;"9.4'31'"&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;[-&lt;/span&gt;&lt;span class="lit"&gt;4&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="lit"&gt;3&lt;/span&gt;&lt;span class="pun"&gt;]),&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="lit"&gt;4.9&lt;/span&gt;&lt;span class="pun"&gt;);&lt;/span&gt;&lt;span class="pln"&gt;

var_dump&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="pln"&gt;$xf&lt;/span&gt;&lt;span class="pun"&gt;-&amp;gt;&lt;/span&gt;&lt;span class="pln"&gt;add&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="pln"&gt;$tmp&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="lit"&gt;23&lt;/span&gt;&lt;span class="pun"&gt;));&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="com"&gt;// [297371, 14553, 1] ~ 20,434&lt;/span&gt;&lt;span class="pln"&gt;
var_dump&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="pln"&gt;$xf&lt;/span&gt;&lt;span class="pun"&gt;-&amp;gt;&lt;/span&gt;&lt;span class="pln"&gt;mul&lt;/span&gt;&lt;span class="pun"&gt;(-&lt;/span&gt;&lt;span class="lit"&gt;2&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;[&lt;/span&gt;&lt;span class="lit"&gt;22&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="lit"&gt;7&lt;/span&gt;&lt;span class="pun"&gt;]));&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="com"&gt;// [44, 7, -1] ~ -2PI&lt;/span&gt;&lt;span class="pln"&gt;
var_dump&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="pln"&gt;$xf&lt;/span&gt;&lt;span class="pun"&gt;-&amp;gt;&lt;/span&gt;&lt;span class="pln"&gt;equal&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="str"&gt;"7.44'5'"&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;[&lt;/span&gt;&lt;span class="lit"&gt;6701&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="lit"&gt;900&lt;/span&gt;&lt;span class="pun"&gt;]));&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="com"&gt;// true&lt;/span&gt;&lt;span class="pln"&gt;

&lt;/span&gt;&lt;span class="pun"&gt;?&amp;gt;&lt;/span&gt;&lt;/i&gt;&lt;/pre&gt;
As you see, I've wrote a more intelligent input detection as with 
xColor - BTW if you wonder about the short form of arrays, take a look 
at my PHP Patches.
 You are able to pass strings, doubles, integers and arrays to every 
function. If you use string parameter, the input is trade as double 
value with the possebility to highlight a repeating part. I've started 
to implement an intelligent detection of repeating places with real 
doubles, but this is no fun. I wouldn't say, that I hate double, but I 
really don't like it's approximated inaccuracy. A little side note: The 
result of every function is an array with three elements; numerator, 
denominator and the sign. To get a double from this result you can use &lt;em&gt;$ret[0] * $ret[2] / $ret[1]&lt;/em&gt;&lt;br /&gt;
&lt;br /&gt;

&lt;h2&gt;
xPassport - a class to validate german passports&lt;/h2&gt;
xPassport is the fledgling class of this collection. This class is one of my first classes from &lt;del&gt;too many&lt;/del&gt; &lt;ins&gt;a few&lt;/ins&gt;
 years ago. As the name suggests, it is possible to get some information
 from german passport numbers like the age, the date of issue and with 
the birth date we can check the age - for example "least 18". Did you 
know, that the scramble value is 7, 3, 1, 7, 3, ...? This is cool 
because we can easily use a binary calculation &lt;i style="color: blue;"&gt;:-)&lt;/i&gt;&lt;br /&gt;

&lt;pre class="prettyprint" style="color: blue;"&gt;&lt;i&gt;&lt;span class="pun"&gt;&amp;lt;?&lt;/span&gt;&lt;span class="pln"&gt;php

$xp &lt;/span&gt;&lt;span class="pun"&gt;=&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="kwd"&gt;new&lt;/span&gt;&lt;span class="pln"&gt; xPassport&lt;/span&gt;&lt;span class="pun"&gt;;&lt;/span&gt;&lt;span class="pln"&gt;
&lt;/span&gt;&lt;span class="kwd"&gt;if&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="kwd"&gt;false&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;!==&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="pln"&gt;$age &lt;/span&gt;&lt;span class="pun"&gt;=&lt;/span&gt;&lt;span class="pln"&gt; $xp&lt;/span&gt;&lt;span class="pun"&gt;-&amp;gt;&lt;/span&gt;&lt;span class="pln"&gt;getAge&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="str"&gt;'0123456789d&amp;lt;&amp;lt;0123456&amp;lt;0123456&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;0'&lt;/span&gt;&lt;span class="pun"&gt;))&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;{&lt;/span&gt;&lt;span class="pln"&gt;
	echo &lt;/span&gt;&lt;span class="str"&gt;'You are '&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; $age&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="str"&gt;' years old'&lt;/span&gt;&lt;span class="pun"&gt;;&lt;/span&gt;&lt;span class="pln"&gt;
&lt;/span&gt;&lt;span class="pun"&gt;}&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="kwd"&gt;else&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;{&lt;/span&gt;&lt;span class="pln"&gt;
	echo &lt;/span&gt;&lt;span class="str"&gt;'The given number is not correct!'&lt;/span&gt;&lt;span class="pun"&gt;;&lt;/span&gt;&lt;span class="pln"&gt;
&lt;/span&gt;&lt;span class="pun"&gt;}&lt;/span&gt;&lt;span class="pln"&gt;

&lt;/span&gt;&lt;span class="pun"&gt;?&amp;gt;&lt;/span&gt;&lt;/i&gt;&lt;/pre&gt;
Okay, I hope you enjoy these classes. Happy playing and reading of the source :-)&lt;div class="blogger-post-footer"&gt;hacker bank&lt;/div&gt;</content><link href="http://heackerbank.blogspot.com/feeds/3916320564541715879/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2012/10/handy-php-classes.html#comment-form" rel="replies" title="1 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/3916320564541715879" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/3916320564541715879" rel="self" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2012/10/handy-php-classes.html" rel="alternate" title="Handy PHP classes" type="text/html"/><author><name>ization shop</name><uri>http://www.blogger.com/profile/18226043919918653581</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8380499217784119522.post-8452818460620354474</id><published>2012-10-20T08:52:00.000-07:00</published><updated>2012-10-20T08:52:04.774-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="php"/><title type="text">PHP 5.3.6 Hacking </title><content type="html">&lt;br /&gt;
It took me a while but here's a new toy. Today I publish my own PHP fork
based on the PHP 5.3.6 code base with a few changes that make the everydays
developer life more bearable. It includes some of the patches I've already
published about 3 years ago, my defcon extension and also my infusion extension
plus a good bunch of extra gimmickries.&lt;br /&gt;


In the MySQL-landscape, you can see that the server is forked again and
again which result in a seperate project every time; such as Drizzle, MariaDB,
OurDelta or the Percona server. I don't want to maintain my own PHP version,
but it's fun to improve PHP's behaviour under the view of faster development and
also faster execution.&lt;br /&gt;


Okay, get the source from github and see what has changed so far&lt;br /&gt;


&lt;div class="button"&gt;
&lt;a href="https://github.com/infusion/PHP"&gt;Download the modified PHP 5.3.6&lt;/a&gt;&lt;/div&gt;
&lt;h2&gt;
Performance improvements&lt;/h2&gt;
&lt;h3&gt;
Hardcoded strlen() and count()&lt;/h3&gt;
&lt;em&gt;strlen()&lt;/em&gt; is both, often used and very slow at the same time. In
various PHP performance instructions, you can read that &lt;em&gt;isset()&lt;/em&gt; is
much faster to determine if a string has at least a certain size. If you want
to check the exact length, you end up with something like this:
&lt;em&gt;strlen($str) == 32&lt;/em&gt; -&amp;gt; &lt;em&gt;isset($str[31]) &amp;amp;&amp;amp;
!isset($str[32])&lt;/em&gt;. This is very ugly and hard to read. I added a
&lt;strong&gt;new opcode&lt;/strong&gt; for &lt;em&gt;count()&lt;/em&gt; and &lt;em&gt;strlen()&lt;/em&gt;, which
results in up to 10 times faster function execution. A &lt;em&gt;strlen()&lt;/em&gt; with a
constant string like &lt;em&gt;strlen("foo")&lt;/em&gt; is optimized away to a constant
"&lt;em&gt;3&lt;/em&gt;" at compile time; which is cool because this way more verbose code
is not a problem anymore.&lt;br /&gt;


&lt;h3&gt;
Hardcoded constants&lt;/h3&gt;
The constants &lt;em&gt;true&lt;/em&gt;, &lt;em&gt;false&lt;/em&gt; and &lt;em&gt;null&lt;/em&gt; are used also
very often. Unfortunately, every usage of either of these constants invokes a
constant lookup. There is no problem with this, constant lookups are fast, but
I nevertheless implemented these constants directly in the parser to avoid
these lookups.&lt;br /&gt;


&lt;h3&gt;
Optimized smart strings&lt;/h3&gt;
PHP makes use of the &lt;em&gt;smart string library&lt;/em&gt; - an internal dynamic
growing string library. I optimized the &lt;em&gt;smart_str_append_long()&lt;/em&gt;
function to add integer numbers much faster. I've also added a new function
&lt;em&gt;smart_str_append_const()&lt;/em&gt; to concatenate a smart string buffer with a
constant string.&lt;br /&gt;


&lt;h3&gt;
Time call optimization&lt;/h3&gt;
For every &lt;em&gt;time()&lt;/em&gt; call in PHP, there is also a &lt;em&gt;time(NULL)&lt;/em&gt;
call to the kernel - and a few more for internal handlers. I thought, that this
is optimized away by using the SAPI layer. But the SAPI method to use a cached
&lt;em&gt;time(0)&lt;/em&gt; is implemented very spartan. So I removed all
&lt;em&gt;time(NULL)&lt;/em&gt; and &lt;em&gt;time(0)&lt;/em&gt; calls with the internal SAPI handler
and also implemented a SAPI hook for CGI/FCGI. You may know, that there is no
chance of getting the time via CGI/FCGI. But I patched also lighttpd and nginx
to send the time as &lt;em&gt;RAW_TIME&lt;/em&gt;. There is a risk that this optimization
breaks your script because you get an old cached time value if the script runs
more than one second - for example inside of a daemon written in PHP. Thus,
I've added a new ini variable called &lt;em&gt;use_sapi_time&lt;/em&gt; to turn this
optional optimization on.&lt;br /&gt;


&lt;h3&gt;
strtr() table generation optimization&lt;/h3&gt;
&lt;em&gt;strtr()&lt;/em&gt; creates an internal lookup table to speed-up the character
replacement. Unfortunately, &lt;em&gt;gcc&lt;/em&gt; can not optimize this table generation
away. So I hardcoded this table instead of beeing generated anew for each
call.&lt;br /&gt;


&lt;h3&gt;
Turn off $_REQUEST variable if it's not needed&lt;/h3&gt;
Registering PHP's super globals consumes superfluous time. The
&lt;em&gt;$_REQUEST&lt;/em&gt; variable contains all request relevant parameters, but I
never use it and use &lt;em&gt;$_POST&lt;/em&gt;, &lt;em&gt;$_COOKIE&lt;/em&gt;, &lt;em&gt;$_GET&lt;/em&gt;
directly under an OOP fashion instead. Anyway, I added "r" to the ini variable
&lt;em&gt;variables_order&lt;/em&gt; to make the filling of&lt;em&gt;the $_REQUEST&lt;/em&gt; array
optional.&lt;br /&gt;


&lt;h2&gt;
New PHP functions&lt;/h2&gt;
&lt;h3&gt;
bool exists(mixed $var[, ...])&lt;/h3&gt;
&lt;em&gt;exists()&lt;/em&gt; is &lt;em&gt;isset()&lt;/em&gt;'s little brother not taking null
values into account. It just tests for the existence of variables and
attributes. My old patch removed the null check of &lt;em&gt;isset()&lt;/em&gt; but I
wanted to keep backwards compatibility and added a new &lt;del&gt;function&lt;/del&gt;
&lt;ins&gt;language construct&lt;/ins&gt; &lt;em&gt;exists().&lt;/em&gt;&lt;br /&gt;


&lt;sub&gt;&lt;em&gt;Example&lt;/em&gt;&lt;/sub&gt;&lt;br /&gt;


&lt;pre class="prettyprint" style="color: blue;"&gt;&lt;i&gt;&lt;span class="kwd"&gt;if&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="pln"&gt;exists&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="pln"&gt;$var&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; $var&lt;/span&gt;&lt;span class="pun"&gt;-&amp;gt;&lt;/span&gt;&lt;span class="pln"&gt;attr&lt;/span&gt;&lt;span class="pun"&gt;))&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;{}&lt;/span&gt;&lt;/i&gt;&lt;/pre&gt;
&lt;h3&gt;
string str_random(int $len[, string $chars="0123...XYZ"]);&lt;/h3&gt;
Generates a random string very quickly using the underlaying operating
system.&lt;br /&gt;


&lt;sub&gt;&lt;em&gt;Example&lt;/em&gt;&lt;/sub&gt;&lt;br /&gt;


&lt;pre class="prettyprint" style="color: blue;"&gt;&lt;i&gt;&lt;span class="pln"&gt;echo str_random&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="lit"&gt;16&lt;/span&gt;&lt;span class="pun"&gt;);&lt;/span&gt;&lt;/i&gt;&lt;/pre&gt;
&lt;h3&gt;
int ob_fwrite(resource $fd[, int $len=0])&lt;/h3&gt;
Writes the ob buffer to an opened file handle.&lt;br /&gt;


&lt;sub&gt;&lt;em&gt;Example&lt;/em&gt;&lt;/sub&gt;&lt;br /&gt;


&lt;pre class="prettyprint" style="color: blue;"&gt;&lt;i&gt;&lt;span class="pln"&gt;ob_start&lt;/span&gt;&lt;span class="pun"&gt;();&lt;/span&gt;&lt;span class="pln"&gt;
$fd &lt;/span&gt;&lt;span class="pun"&gt;=&lt;/span&gt;&lt;span class="pln"&gt; fopen&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="str"&gt;'/cache/site.txt'&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="str"&gt;'w+'&lt;/span&gt;&lt;span class="pun"&gt;);&lt;/span&gt;&lt;span class="pln"&gt;
echo &lt;/span&gt;&lt;span class="str"&gt;"This goes to the file"&lt;/span&gt;&lt;span class="pun"&gt;;&lt;/span&gt;&lt;span class="pln"&gt;
ob_fwrite&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="pln"&gt;$fd&lt;/span&gt;&lt;span class="pun"&gt;);&lt;/span&gt;&lt;span class="pln"&gt;
ob_end_clean&lt;/span&gt;&lt;span class="pun"&gt;();&lt;/span&gt;&lt;/i&gt;&lt;/pre&gt;
&lt;h3&gt;
mixed timechop(int $time[, mixed $format=2, bool $is_array=false])&lt;/h3&gt;
Chops a time into smaller pieces and returns it as formatted string or as
array. The format is a mixed type and can be defined as integer as a number of
entities or as string to define the units you want to get. The types for the
selective mode are defined as:&lt;br /&gt;


&lt;pre class="prettyprint"&gt;&lt;span class="pln"&gt;k &lt;/span&gt;&lt;span class="pun"&gt;-&lt;/span&gt;&lt;span class="pln"&gt; decade
y &lt;/span&gt;&lt;span class="pun"&gt;-&lt;/span&gt;&lt;span class="pln"&gt; years
n &lt;/span&gt;&lt;span class="pun"&gt;-&lt;/span&gt;&lt;span class="pln"&gt; months
w &lt;/span&gt;&lt;span class="pun"&gt;-&lt;/span&gt;&lt;span class="pln"&gt; weeks
d &lt;/span&gt;&lt;span class="pun"&gt;-&lt;/span&gt;&lt;span class="pln"&gt; days
h &lt;/span&gt;&lt;span class="pun"&gt;-&lt;/span&gt;&lt;span class="pln"&gt; hours
m &lt;/span&gt;&lt;span class="pun"&gt;-&lt;/span&gt;&lt;span class="pln"&gt; minutes
s &lt;/span&gt;&lt;span class="pun"&gt;-&lt;/span&gt;&lt;span class="pln"&gt; seconds&lt;/span&gt;&lt;/pre&gt;
The time value switches to the delta of the current time and the passed
value if the value is too big and looks like a unix timestamp.&lt;br /&gt;


&lt;sub&gt;&lt;em&gt;Example&lt;/em&gt;&lt;/sub&gt;&lt;br /&gt;


&lt;pre class="prettyprint" style="color: blue;"&gt;&lt;i&gt;&lt;span class="pln"&gt;var_dump&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="pln"&gt;timechop&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="lit"&gt;2392383&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="str"&gt;"ynwdms"&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="kwd"&gt;true&lt;/span&gt;&lt;span class="pun"&gt;));&lt;/span&gt;&lt;/i&gt;&lt;/pre&gt;
&lt;h3&gt;
int xround(int $num)&lt;/h3&gt;
Round to the next power of 10. This breaks down 10&lt;sup&gt;log(n) /
log(10)&lt;/sup&gt; by using a fast binary search.&lt;br /&gt;


&lt;sub&gt;&lt;em&gt;Example&lt;/em&gt;&lt;/sub&gt;&lt;br /&gt;


&lt;pre class="prettyprint" style="color: blue;"&gt;&lt;i&gt;&lt;span class="pln"&gt;echo xround&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="lit"&gt;2344&lt;/span&gt;&lt;span class="pun"&gt;);&lt;/span&gt;&lt;/i&gt;&lt;/pre&gt;
&lt;h3&gt;
double sigfig(double $num, int $figs)&lt;/h3&gt;
Calculates the significant figures of a number.&lt;br /&gt;


&lt;sub&gt;&lt;em&gt;Example&lt;/em&gt;&lt;/sub&gt;&lt;br /&gt;


&lt;pre class="prettyprint" style="color: blue;"&gt;&lt;i&gt;&lt;span class="pln"&gt;echo sigfig&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="lit"&gt;123.34&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="lit"&gt;4&lt;/span&gt;&lt;span class="pun"&gt;);&lt;/span&gt;&lt;/i&gt;&lt;/pre&gt;
&lt;h3&gt;
int sgn(double $num)&lt;/h3&gt;
Calculates the sign of a number.&lt;br /&gt;


&lt;sub&gt;&lt;em&gt;Example&lt;/em&gt;&lt;/sub&gt;&lt;br /&gt;


&lt;pre class="prettyprint" style="color: blue;"&gt;&lt;i&gt;&lt;span class="pln"&gt;echo sgn&lt;/span&gt;&lt;span class="pun"&gt;(-&lt;/span&gt;&lt;span class="lit"&gt;0.23&lt;/span&gt;&lt;span class="pun"&gt;);&lt;/span&gt;&lt;/i&gt;&lt;/pre&gt;
&lt;h3&gt;
string strcut(string $str, int $num[, string $x='...'])&lt;/h3&gt;
Cuts a string if it's longer then a max value and appends a given string.
This function doesn't chop words.&lt;br /&gt;


&lt;sub&gt;&lt;em&gt;Example&lt;/em&gt;&lt;/sub&gt;&lt;br /&gt;


&lt;pre class="prettyprint" style="color: blue;"&gt;&lt;i&gt;&lt;span class="pln"&gt;echo strcut&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="str"&gt;"This is a very very very very long string which will be
truncated"&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="lit"&gt;15&lt;/span&gt;&lt;span class="pun"&gt;);&lt;/span&gt;&lt;/i&gt;&lt;/pre&gt;
&lt;h3&gt;
string strcal(string $format, string $str[, int $len=-1])&lt;/h3&gt;
String calibration to check, if the string is in a given format with a
simple regexp format.&lt;br /&gt;


&lt;sub&gt;&lt;em&gt;Example&lt;/em&gt;&lt;/sub&gt;&lt;br /&gt;


&lt;pre class="prettyprint" style="color: blue;"&gt;&lt;i&gt;&lt;span class="kwd"&gt;if&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="pln"&gt;strcal&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="str"&gt;"a-z!"&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; $str&lt;/span&gt;&lt;span class="pun"&gt;))&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;{}&lt;/span&gt;&lt;/i&gt;&lt;/pre&gt;
&lt;h3&gt;
string strical(string $format, string $str[, int $len=-1])&lt;/h3&gt;
String calibration without care about upper and lower case.&lt;br /&gt;


&lt;sub&gt;&lt;em&gt;Example&lt;/em&gt;&lt;/sub&gt;&lt;br /&gt;


&lt;pre class="prettyprint" style="color: blue;"&gt;&lt;i&gt;&lt;span class="kwd"&gt;if&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="pln"&gt;strical&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="str"&gt;"a-z!"&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; $str&lt;/span&gt;&lt;span class="pun"&gt;))&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;{}&lt;/span&gt;&lt;/i&gt;&lt;/pre&gt;
&lt;h3&gt;
string strmap(string $str, array $replace)&lt;/h3&gt;
Brings a simple template parser to PHP. The idea comes from the C# printf()
functionalitys.&lt;br /&gt;


&lt;sub&gt;&lt;em&gt;Example&lt;/em&gt;&lt;/sub&gt;&lt;br /&gt;


&lt;pre class="prettyprint" style="color: blue;"&gt;&lt;i&gt;&lt;span class="pln"&gt;echo strmap&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="str"&gt;"This is {first} and {second}"&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;[&lt;/span&gt;&lt;span class="str"&gt;"first"&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;=&amp;gt;&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="str"&gt;"X"&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt;
&lt;/span&gt;&lt;span class="str"&gt;"second"&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;=&amp;gt;&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="str"&gt;"Y"&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="str"&gt;"third"&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;=&amp;gt;&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="str"&gt;"Z"&lt;/span&gt;&lt;span class="pun"&gt;]);&lt;/span&gt;&lt;/i&gt;&lt;/pre&gt;
&lt;h3&gt;
int bround(int $num, int $base)&lt;/h3&gt;
Round to the next multiple of a certain base.&lt;br /&gt;


&lt;sub&gt;&lt;em&gt;Example&lt;/em&gt;&lt;/sub&gt;&lt;br /&gt;


&lt;pre class="prettyprint" style="color: blue;"&gt;&lt;i&gt;&lt;span class="pln"&gt;echo bround&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="lit"&gt;283&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="lit"&gt;5&lt;/span&gt;&lt;span class="pun"&gt;);&lt;/span&gt;&lt;/i&gt;&lt;/pre&gt;
&lt;h3&gt;
mixed bound(mixed $num, mixed $min[, mixed $max])&lt;/h3&gt;
Limits a number to a specified lower min- and a upper max value&lt;br /&gt;


&lt;sub&gt;&lt;em&gt;Example&lt;/em&gt;&lt;/sub&gt;&lt;br /&gt;


&lt;pre class="prettyprint" style="color: blue;"&gt;&lt;i&gt;&lt;span class="pln"&gt;echo bound&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="lit"&gt;43&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="lit"&gt;22&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="lit"&gt;50&lt;/span&gt;&lt;span class="pun"&gt;);&lt;/span&gt;&lt;/i&gt;&lt;/pre&gt;
&lt;h2&gt;
Usability improvements&lt;/h2&gt;
&lt;h3&gt;
foreach() for strings&lt;/h3&gt;
Writing parsers in PHP mostly result in &lt;em&gt;for() + strlen() + substr()&lt;/em&gt;
constructs. I modified &lt;em&gt;foreach()&lt;/em&gt; to be able to loop through strings in
order to get the characters and their index. This is prettier and also much
faster then the previous method.&lt;br /&gt;


&lt;sub&gt;&lt;em&gt;Example&lt;/em&gt;&lt;/sub&gt;&lt;br /&gt;


&lt;pre class="prettyprint" style="color: blue;"&gt;&lt;i&gt;&lt;span class="com"&gt;// Simulating str_split($str)&lt;/span&gt;&lt;span class="pln"&gt;
$str &lt;/span&gt;&lt;span class="pun"&gt;=&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="str"&gt;"PHP is cool!"&lt;/span&gt;&lt;span class="pun"&gt;;&lt;/span&gt;&lt;span class="pln"&gt;
$arr &lt;/span&gt;&lt;span class="pun"&gt;=&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;[];&lt;/span&gt;&lt;span class="pln"&gt;

&lt;/span&gt;&lt;span class="kwd"&gt;foreach&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="pln"&gt;$str &lt;/span&gt;&lt;span class="kwd"&gt;as&lt;/span&gt;&lt;span class="pln"&gt; $k &lt;/span&gt;&lt;span class="pun"&gt;=&amp;gt;&lt;/span&gt;&lt;span class="pln"&gt; $v&lt;/span&gt;&lt;span class="pun"&gt;)&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;{&lt;/span&gt;&lt;span class="pln"&gt;
	$arr&lt;/span&gt;&lt;span class="pun"&gt;[&lt;/span&gt;&lt;span class="pln"&gt;$k&lt;/span&gt;&lt;span class="pun"&gt;]&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;=&lt;/span&gt;&lt;span class="pln"&gt; $v&lt;/span&gt;&lt;span class="pun"&gt;;&lt;/span&gt;&lt;span class="pln"&gt;
&lt;/span&gt;&lt;span class="pun"&gt;}&lt;/span&gt;&lt;/i&gt;&lt;/pre&gt;
&lt;h3&gt;
Delete characters with strtr()&lt;/h3&gt;
Deleting several characters from a string can cause multiple
&lt;em&gt;str_replace()&lt;/em&gt; calls. It's now possible to delete all characters at
once using &lt;em&gt;strtr()&lt;/em&gt;.&lt;br /&gt;


&lt;sub&gt;&lt;em&gt;Example&lt;/em&gt;&lt;/sub&gt;&lt;br /&gt;


&lt;pre class="prettyprint" style="color: blue;"&gt;&lt;span class="pln"&gt;$demise &lt;/span&gt;&lt;span class="pun"&gt;=&lt;/span&gt;&lt;span class="pln"&gt; strtr&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="str"&gt;"passion"&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="str"&gt;"os"&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="str"&gt;""&lt;/span&gt;&lt;span class="pun"&gt;);&lt;/span&gt;&lt;/pre&gt;
&lt;h3&gt;
Key implode&lt;/h3&gt;
I need a list of the keys of an array very often. One way to do this is
&lt;em&gt;implode(array_keys($arr))&lt;/em&gt;, which is not that fast and looks not really
nice. &lt;em&gt;implode()&lt;/em&gt; now has a new parameter be able to return the keys
instead of the value:&lt;br /&gt;


&lt;sub&gt;&lt;em&gt;Example&lt;/em&gt;&lt;/sub&gt;&lt;br /&gt;


&lt;pre class="prettyprint" style="color: blue;"&gt;&lt;i&gt;&lt;span class="pln"&gt;$keys &lt;/span&gt;&lt;span class="pun"&gt;=&lt;/span&gt;&lt;span class="pln"&gt; implode&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="str"&gt;','&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; $arr&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="kwd"&gt;true&lt;/span&gt;&lt;span class="pun"&gt;);&lt;/span&gt;&lt;/i&gt;&lt;/pre&gt;
&lt;h3&gt;
Negative string offsets&lt;/h3&gt;
What happens if you write &lt;em&gt;$str[-5]&lt;/em&gt;? Right, you get a warning and
the expression returns &lt;em&gt;null&lt;/em&gt;. But why should we give it away? We could
use negative string offsets in the same way as positive string offsets with the
difference, that we start at the end of the string. So &lt;em&gt;[0]&lt;/em&gt; is the
first character of the string, &lt;em&gt;[1]&lt;/em&gt; the second and &lt;em&gt;[-1]&lt;/em&gt; is the
last, &lt;em&gt;[-2]&lt;/em&gt; the second last and so on. This is really intuitive, makes
the code cleaner and avoid nasty &lt;em&gt;strlen()&lt;/em&gt; baubles.&lt;br /&gt;


&lt;sub&gt;&lt;em&gt;Example&lt;/em&gt;&lt;/sub&gt;&lt;br /&gt;


&lt;pre class="prettyprint" style="color: blue;"&gt;&lt;i&gt;&lt;span class="pln"&gt;$str&lt;/span&gt;&lt;span class="pun"&gt;[-&lt;/span&gt;&lt;span class="lit"&gt;1&lt;/span&gt;&lt;span class="pun"&gt;]&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;==&lt;/span&gt;&lt;span class="pln"&gt; $str&lt;/span&gt;&lt;span class="pun"&gt;[&lt;/span&gt;&lt;span class="pln"&gt;strlen&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="pln"&gt;$str&lt;/span&gt;&lt;span class="pun"&gt;)&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;-&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="lit"&gt;1&lt;/span&gt;&lt;span class="pun"&gt;]&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;==&lt;/span&gt;&lt;span class="pln"&gt; substr&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="pln"&gt;$str&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;-&lt;/span&gt;&lt;span class="lit"&gt;1&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="lit"&gt;1&lt;/span&gt;&lt;span class="pun"&gt;)&lt;/span&gt;&lt;/i&gt;&lt;/pre&gt;
&lt;h3&gt;
Binary numbers&lt;/h3&gt;
In C# you can define binary numbers in a similar way you write hexadecimal
numbers: 0x90. With this change you can define binary numbers with a
&lt;strong&gt;0b&lt;/strong&gt; prefix like this: &lt;em&gt;0b01001&lt;/em&gt;. I don't know, if this
feature is good for a common use, because, as you may know, there are after all
only 10 persons who understand binary. But I use bit sets very often and this
is a good and fast way to do this.&lt;br /&gt;


&lt;sub&gt;&lt;em&gt;Example&lt;/em&gt;&lt;/sub&gt;&lt;br /&gt;


&lt;pre class="prettyprint" style="color: blue;"&gt;&lt;i&gt;&lt;span class="lit"&gt;0b101&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;&amp;lt;&amp;lt;&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="lit"&gt;1&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;==&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="lit"&gt;0b1010&lt;/span&gt;&lt;/i&gt;&lt;/pre&gt;
&lt;h3&gt;
Short array&lt;/h3&gt;
Programmers are such a lazy folks and writing &lt;em&gt;array()&lt;/em&gt; is really
annoying. Here is an attempt to make this more handy.&lt;br /&gt;


&lt;sub&gt;&lt;em&gt;Example&lt;/em&gt;&lt;/sub&gt;&lt;br /&gt;


&lt;pre class="prettyprint" style="color: blue;"&gt;&lt;i&gt;&lt;span class="pln"&gt;$arr &lt;/span&gt;&lt;span class="pun"&gt;=&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;[&lt;/span&gt;&lt;span class="lit"&gt;1&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="lit"&gt;2&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;[&lt;/span&gt;&lt;span class="lit"&gt;5&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;=&amp;gt;&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="str"&gt;"foo"&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="lit"&gt;3.14159&lt;/span&gt;&lt;span class="pun"&gt;],&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="lit"&gt;9&lt;/span&gt;&lt;span class="pun"&gt;];&lt;/span&gt;&lt;/i&gt;&lt;/pre&gt;
&lt;h3&gt;
Better chr() handling&lt;/h3&gt;
Converting ascii-codes to real characters is possible with the
&lt;em&gt;chr()&lt;/em&gt;-function. Unfortunately, you only can pass one character at one
go. Now it's possible to pass a list of ascii-codes via an array or via a
variable parameter list of ascii-codes&lt;br /&gt;


&lt;sub&gt;&lt;em&gt;Example&lt;/em&gt;&lt;/sub&gt;&lt;br /&gt;


&lt;pre class="prettyprint" style="color: blue;"&gt;&lt;i&gt;&lt;span class="str"&gt;"Abc"&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;==&lt;/span&gt;&lt;span class="pln"&gt; chr&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="lit"&gt;65&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="lit"&gt;98&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="lit"&gt;99&lt;/span&gt;&lt;span class="pun"&gt;)&lt;/span&gt;&lt;/i&gt;&lt;/pre&gt;
&lt;h3&gt;
Microtime default parameter&lt;/h3&gt;
A very useless default parameter is the one of &lt;em&gt;microtime()&lt;/em&gt;. I can
remember, with PHP 4 everyone used a &lt;em&gt;explode()&lt;/em&gt; + subtractaction to
work around microtime()'s return value. With PHP 5 it became possible to return
the time as double, but this is not the default. I broke the API compatibility
here and return the µ-time as a double by default.&lt;br /&gt;


&lt;sub&gt;&lt;em&gt;Example&lt;/em&gt;&lt;/sub&gt;&lt;br /&gt;


&lt;pre class="prettyprint" style="color: blue;"&gt;&lt;i&gt;&lt;span class="pln"&gt;$time &lt;/span&gt;&lt;span class="pun"&gt;=&lt;/span&gt;&lt;span class="pln"&gt; microtime&lt;/span&gt;&lt;span class="pun"&gt;();&lt;/span&gt;&lt;/i&gt;&lt;/pre&gt;
&lt;h3&gt;
UTF-8 and ENT_QUOTES as default&lt;/h3&gt;
As most web applications &lt;del&gt;should&lt;/del&gt; work with UTF-8 to make
&lt;em&gt;i18n&lt;/em&gt; more easy, it is a good idea to bring UTF-8 as default into the
game. The same is true of &lt;em&gt;ENT_QUOTES&lt;/em&gt;. Okay, I must admit, this change
is also a little product of laziness because I hate writing &lt;em&gt;ENT_QUOTES,
"UTF-8"&lt;/em&gt; - thus this was the last time.&lt;br /&gt;


$encoded = htmlspecialchars($ugly);&lt;br /&gt;


&lt;h3&gt;
Disable include warnings&lt;/h3&gt;
A really annoying problem is when include-warnings spam the logfile, if you
put aside &lt;em&gt;file_exists()&lt;/em&gt; checks. You could add a @-sign in front of the
include command, but this forces PHP to be silence for the entire file. PHP now
has a new ini directive &lt;em&gt;ignore_include_warning&lt;/em&gt; to be able to disable
include warnings with ini_set() or globally.&lt;br /&gt;


&lt;h3&gt;
Omitting quoting with json_encode()&lt;/h3&gt;
Quoting is necessary to satisfy the json protocol. As an extension, it is
sometimes nice to define callbacks in a json string. I added a new bit-mask
constant namely &lt;em&gt;JSON_CALLBACK_CHECK&lt;/em&gt; in addition to the undocumented
&lt;em&gt;JSON_NUMERIC_CHECK&lt;/em&gt;. If the callback-check flag is set, the prefix
&lt;strong&gt;__cb&lt;/strong&gt; of a string value indicates a not quoted callback
string.&lt;br /&gt;


&lt;sub&gt;&lt;em&gt;Example&lt;/em&gt;&lt;/sub&gt;&lt;br /&gt;


&lt;pre class="prettyprint" style="color: blue;"&gt;&lt;i&gt;&lt;span class="pln"&gt;$json &lt;/span&gt;&lt;span class="pun"&gt;=&lt;/span&gt;&lt;span class="pln"&gt; json_encode&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="pln"&gt;array&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="pln"&gt;
	&lt;/span&gt;&lt;span class="str"&gt;"func"&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;=&amp;gt;&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="str"&gt;"__cbRaise"&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt;
	&lt;/span&gt;&lt;span class="str"&gt;"number"&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;=&amp;gt;&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="str"&gt;"1234"&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt;
	&lt;/span&gt;&lt;span class="str"&gt;"native"&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;=&amp;gt;&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="lit"&gt;9876&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt;
	&lt;/span&gt;&lt;span class="str"&gt;"nocb"&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;=&amp;gt;&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="str"&gt;"__cb is the beginning, but it isn't a Callback"&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt;
	&lt;/span&gt;&lt;span class="str"&gt;"123"&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;=&amp;gt;&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="str"&gt;"text"&lt;/span&gt;&lt;span class="pln"&gt;
&lt;/span&gt;&lt;span class="pun"&gt;),&lt;/span&gt;&lt;span class="pln"&gt; JSON_NUMERIC_CHECK &lt;/span&gt;&lt;span class="pun"&gt;|&lt;/span&gt;&lt;span class="pln"&gt; JSON_CALLBACK_CHECK&lt;/span&gt;&lt;span class="pun"&gt;);&lt;/span&gt;&lt;/i&gt;&lt;/pre&gt;
&lt;h2&gt;
MySQLi/mysqlnd changes&lt;/h2&gt;
&lt;h3&gt;
Native type casting turned on by default&lt;/h3&gt;
I think it's a good idea to turn on native type casting by default. This
reduces cache sizes of installations where people don't care about something
like that and increases also the execution performance if numbers from
databases are heavily involved in calculations.&lt;br /&gt;


&lt;h3&gt;
mysqli_fetch_all() returns associative arrays by default&lt;/h3&gt;
The MySQLi function &lt;em&gt;mysqli_fetch_all()&lt;/em&gt; returns an indexed array by
default. The performance benefit doing so is very low; using associative arrays
should be better with regard of easy and readable code.&lt;br /&gt;


&lt;h3&gt;
MySQLi matched rows&lt;/h3&gt;
The MySQLi attribute &lt;em&gt;matched_rows&lt;/em&gt; and the attendant
&lt;em&gt;&lt;/em&gt;procedural &lt;em&gt;mysqli_matched_rows()&lt;/em&gt; function return the number
of matched rows of the last SQL operation. If you updadate a table and the
&lt;em&gt;affected_rows&lt;/em&gt; number is e.g. 5, this doesn't mean that 5 is also the
number of elements that have matched the &lt;em&gt;WHERE&lt;/em&gt; clause. If you want to
retrieve the number, you need to run another &lt;em&gt;SELECT COUNT(1)&lt;/em&gt; query
with the same condition or parse the &lt;em&gt;mysqli_info()&lt;/em&gt; output for yourself
instead.&lt;br /&gt;


&lt;h3&gt;
mysqli_return($res,[$free=false])&lt;/h3&gt;
The function &lt;em&gt;mysqli_return()&lt;/em&gt; is the equivalent to
&lt;em&gt;mysql_result()&lt;/em&gt;. The difference of &lt;em&gt;mysqli_return()&lt;/em&gt; to it's
older pendant is, that the MySQLi version free's it's ressource after returning
the value by default. You can turn off this behaviour, but I wanted a function
which can be used to return and free a single value instantly.&lt;br /&gt;


&lt;sub&gt;&lt;em&gt;Example&lt;/em&gt;&lt;/sub&gt;&lt;br /&gt;


&lt;pre class="prettyprint" style="color: blue;"&gt;&lt;i&gt;&lt;span class="kwd"&gt;public&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="kwd"&gt;function&lt;/span&gt;&lt;span class="pln"&gt; value&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="pln"&gt;$query&lt;/span&gt;&lt;span class="pun"&gt;)&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;{&lt;/span&gt;&lt;span class="pln"&gt;
	$res &lt;/span&gt;&lt;span class="pun"&gt;=&lt;/span&gt;&lt;span class="pln"&gt; mysqli_query&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="pln"&gt;$this&lt;/span&gt;&lt;span class="pun"&gt;-&amp;gt;&lt;/span&gt;&lt;span class="pln"&gt;db&lt;/span&gt;&lt;span class="pun"&gt;,&lt;/span&gt;&lt;span class="pln"&gt; $query&lt;/span&gt;&lt;span class="pun"&gt;);&lt;/span&gt;&lt;span class="pln"&gt;
	&lt;/span&gt;&lt;span class="kwd"&gt;return&lt;/span&gt;&lt;span class="pln"&gt; mysqli_return&lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="pln"&gt;$res&lt;/span&gt;&lt;span class="pun"&gt;);&lt;/span&gt;&lt;span class="pln"&gt;
&lt;/span&gt;&lt;span class="pun"&gt;}&lt;/span&gt;&lt;/i&gt;&lt;/pre&gt;
&lt;h3&gt;
Tidied up PHP&lt;/h3&gt;
The PHP fork is rid of the followin old and depricated functionalities in
order to make the code base smaller and to improve the execution time. This may
limit the usage of PHP under some scenarios but first read on at the next
section.&lt;br /&gt;

&lt;ul&gt;
&lt;li&gt;Deleted define_syslog_variables&lt;/li&gt;
&lt;li&gt;Deleted magic quotes&lt;/li&gt;
&lt;li&gt;Deleted register globals&lt;/li&gt;
&lt;li&gt;Deleted ASP-tags&lt;/li&gt;
&lt;li&gt;Deleted short open tags and &amp;lt;?php= is the new &amp;lt;?=&lt;/li&gt;
&lt;li&gt;Deleted allow_call_time_pass_reference&lt;/li&gt;
&lt;li&gt;Reduced the default memory limit to 16MB&lt;/li&gt;
&lt;li&gt;Deleted safe mode&lt;/li&gt;
&lt;li&gt;Deleted disable functions/classes&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;
New ini file&lt;/h3&gt;
I've added a new ini file in order to have more control over PHP. It's
possible to define and delete constants, declare variables as &lt;em&gt;SUPER&lt;/em&gt;
and rename and delete functions and classes. The new ini file looks like
this:&lt;br /&gt;


&lt;pre class="prettyprint"&gt;&lt;span class="pun"&gt;[&lt;/span&gt;&lt;span class="typ"&gt;Constant&lt;/span&gt;&lt;span class="pun"&gt;]&lt;/span&gt;&lt;span class="pln"&gt;

&lt;/span&gt;&lt;i style="color: blue;"&gt;&lt;span class="pun"&gt;;;;&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="typ"&gt;General&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="typ"&gt;Config&lt;/span&gt;&lt;span class="pln"&gt;
&lt;/span&gt;&lt;span class="kwd"&gt;string&lt;/span&gt;&lt;span class="pln"&gt; ADMINPASS        &lt;/span&gt;&lt;span class="pun"&gt;=&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="str"&gt;"admin"&lt;/span&gt;&lt;span class="pun"&gt;;&lt;/span&gt;&lt;span class="pln"&gt;
&lt;/span&gt;&lt;span class="kwd"&gt;string&lt;/span&gt;&lt;span class="pln"&gt; ADMINMAIL        &lt;/span&gt;&lt;span class="pun"&gt;=&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="str"&gt;"robert@xarg.org"&lt;/span&gt;&lt;span class="pun"&gt;;&lt;/span&gt;&lt;span class="pln"&gt;

&lt;/span&gt;&lt;span class="kwd"&gt;string&lt;/span&gt;&lt;span class="pln"&gt; PASSSALT         &lt;/span&gt;&lt;span class="pun"&gt;=&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="str"&gt;"I'm a very good password salt"&lt;/span&gt;&lt;span class="pun"&gt;;&lt;/span&gt;&lt;span class="pln"&gt;
&lt;/span&gt;&lt;span class="kwd"&gt;int&lt;/span&gt;&lt;span class="pln"&gt; ONLINE_TIME         &lt;/span&gt;&lt;span class="pun"&gt;=&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="lit"&gt;1200&lt;/span&gt;&lt;span class="pun"&gt;;&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;==&lt;/span&gt;&lt;span class="pln"&gt; session&lt;/span&gt;&lt;span class="pun"&gt;.&lt;/span&gt;&lt;span class="pln"&gt;gc_maxlifetime

&lt;/span&gt;&lt;span class="pun"&gt;;;;&lt;/span&gt;&lt;span class="pln"&gt; DB &lt;/span&gt;&lt;span class="typ"&gt;Config&lt;/span&gt;&lt;span class="pln"&gt;
&lt;/span&gt;&lt;span class="kwd"&gt;string&lt;/span&gt;&lt;span class="pln"&gt; DB_USER          &lt;/span&gt;&lt;span class="pun"&gt;=&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="str"&gt;"root"&lt;/span&gt;&lt;span class="pun"&gt;;&lt;/span&gt;&lt;span class="pln"&gt;
&lt;/span&gt;&lt;span class="kwd"&gt;string&lt;/span&gt;&lt;span class="pln"&gt; DB_PASS          &lt;/span&gt;&lt;span class="pun"&gt;=&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="str"&gt;""&lt;/span&gt;&lt;span class="pun"&gt;;&lt;/span&gt;&lt;span class="pln"&gt;
&lt;/span&gt;&lt;span class="kwd"&gt;int&lt;/span&gt;&lt;span class="pln"&gt; CLUSTER_SIZE        &lt;/span&gt;&lt;span class="pun"&gt;=&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="lit"&gt;31&lt;/span&gt;&lt;span class="pun"&gt;;&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;(&lt;/span&gt;&lt;span class="lit"&gt;1&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;&amp;lt;&amp;lt;&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="lit"&gt;5&lt;/span&gt;&lt;span class="pun"&gt;)&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="pun"&gt;-&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="lit"&gt;1&lt;/span&gt;&lt;span class="pln"&gt;

&lt;/span&gt;&lt;span class="pun"&gt;;;;&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="typ"&gt;Test&lt;/span&gt;&lt;span class="pln"&gt;
&lt;/span&gt;&lt;span class="kwd"&gt;float&lt;/span&gt;&lt;span class="pln"&gt; TEST              &lt;/span&gt;&lt;span class="pun"&gt;=&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="str"&gt;"333.32=ddd"&lt;/span&gt;&lt;span class="pun"&gt;;&lt;/span&gt;&lt;span class="pln"&gt;
&lt;/span&gt;&lt;span class="kwd"&gt;delete&lt;/span&gt;&lt;span class="pln"&gt; PHP_VERSION_ID&lt;/span&gt;&lt;span class="pun"&gt;;&lt;/span&gt;&lt;span class="pln"&gt;
&lt;/span&gt;&lt;span class="kwd"&gt;delete&lt;/span&gt;&lt;span class="pln"&gt; CURLOPT_SSLCERTTYPE&lt;/span&gt;&lt;span class="pun"&gt;;&lt;/span&gt;&lt;span class="pln"&gt;

&lt;/span&gt;&lt;span class="pun"&gt;;;;&lt;/span&gt;&lt;span class="pln"&gt; SQL &lt;/span&gt;&lt;span class="typ"&gt;Shorthands&lt;/span&gt;&lt;span class="pln"&gt;
&lt;/span&gt;&lt;span class="kwd"&gt;string&lt;/span&gt;&lt;span class="pln"&gt; SQL_USER         &lt;/span&gt;&lt;span class="pun"&gt;=&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="str"&gt;"UID, UName, USex, UPic"&lt;/span&gt;&lt;span class="pun"&gt;;&lt;/span&gt;&lt;span class="pln"&gt;
&lt;/span&gt;&lt;span class="kwd"&gt;string&lt;/span&gt;&lt;span class="pln"&gt; SQL_NOLOG        &lt;/span&gt;&lt;span class="pun"&gt;=&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="str"&gt;"SET SQL_LOG_BIN = 0"&lt;/span&gt;&lt;span class="pun"&gt;;&lt;/span&gt;&lt;span class="pln"&gt;
&lt;/span&gt;&lt;span class="kwd"&gt;string&lt;/span&gt;&lt;span class="pln"&gt; SQL_TIMEOUT      &lt;/span&gt;&lt;span class="pun"&gt;=&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="str"&gt;"SET WAIT_TIMEOUT = 3600"&lt;/span&gt;&lt;span class="pun"&gt;;&lt;/span&gt;&lt;span class="pln"&gt;
&lt;/span&gt;&lt;span class="kwd"&gt;string&lt;/span&gt;&lt;span class="pln"&gt; SQL_DATE         &lt;/span&gt;&lt;span class="pun"&gt;=&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="str"&gt;"'%d.%m.%Y'"&lt;/span&gt;&lt;span class="pun"&gt;;&lt;/span&gt;&lt;span class="pln"&gt;
&lt;/span&gt;&lt;span class="kwd"&gt;string&lt;/span&gt;&lt;span class="pln"&gt; SQL_TIME         &lt;/span&gt;&lt;span class="pun"&gt;=&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="str"&gt;"'%H:%i'"&lt;/span&gt;&lt;span class="pun"&gt;;&lt;/span&gt;&lt;span class="pln"&gt;
&lt;/span&gt;&lt;span class="kwd"&gt;string&lt;/span&gt;&lt;span class="pln"&gt; SQL_DATETIME     &lt;/span&gt;&lt;span class="pun"&gt;=&lt;/span&gt;&lt;span class="pln"&gt; &lt;/span&gt;&lt;span class="str"&gt;"'%d.%m.%Y %H:%i:%s'"&lt;/span&gt;&lt;span class="pun"&gt;;&lt;/span&gt;&lt;span class="pln"&gt;

&lt;/span&gt;&lt;span class="pun"&gt;[&lt;/span&gt;&lt;span class="typ"&gt;Variable&lt;/span&gt;&lt;span class="pun"&gt;]&lt;/span&gt;&lt;span class="pln"&gt;
&lt;/span&gt;&lt;span class="kwd"&gt;super&lt;/span&gt;&lt;span class="pln"&gt; test&lt;/span&gt;&lt;span class="pun"&gt;;&lt;/span&gt;&lt;span class="pln"&gt;
&lt;/span&gt;&lt;span class="kwd"&gt;super&lt;/span&gt;&lt;span class="pln"&gt; time&lt;/span&gt;&lt;span class="pun"&gt;;&lt;/span&gt;&lt;span class="pln"&gt;

&lt;/span&gt;&lt;span class="pun"&gt;[&lt;/span&gt;&lt;span class="typ"&gt;Function&lt;/span&gt;&lt;span class="pun"&gt;]&lt;/span&gt;&lt;span class="pln"&gt;
&lt;/span&gt;&lt;span class="pun"&gt;;&lt;/span&gt;&lt;span class="pln"&gt;rename strlen          &lt;/span&gt;&lt;span class="pun"&gt;=&lt;/span&gt;&lt;span class="pln"&gt; abc&lt;/span&gt;&lt;span class="pun"&gt;;&lt;/span&gt;&lt;span class="pln"&gt;
&lt;/span&gt;&lt;span class="pun"&gt;;&lt;/span&gt;&lt;span class="kwd"&gt;delete&lt;/span&gt;&lt;span class="pln"&gt; substr_count&lt;/span&gt;&lt;span class="pun"&gt;;&lt;/span&gt;&lt;span class="pln"&gt;
&lt;/span&gt;&lt;span class="pun"&gt;;&lt;/span&gt;&lt;span class="kwd"&gt;delete&lt;/span&gt;&lt;span class="pln"&gt; substr&lt;/span&gt;&lt;span class="pun"&gt;;&lt;/span&gt;&lt;span class="pln"&gt;

&lt;/span&gt;&lt;span class="pun"&gt;[&lt;/span&gt;&lt;span class="typ"&gt;Class&lt;/span&gt;&lt;span class="pun"&gt;]&lt;/span&gt;&lt;span class="pln"&gt;
&lt;/span&gt;&lt;span class="kwd"&gt;delete&lt;/span&gt;&lt;span class="pln"&gt; stdClass&lt;/span&gt;&lt;span class="pun"&gt;;&lt;/span&gt;&lt;/i&gt;&lt;/pre&gt;
&lt;div style="color: blue;"&gt;
&lt;i&gt;I named the file &lt;em&gt;php-global.conf&lt;/em&gt; which can be defined with a
php.ini variable like so&lt;/i&gt;&lt;/div&gt;
&lt;div style="color: blue;"&gt;
&lt;i&gt;&lt;em&gt;globals.filename = "/etc/php-global.conf"&lt;/em&gt;&lt;/i&gt;&lt;/div&gt;
&lt;h3&gt;
Bug fixes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;chroot() wasn't enabled for fpm, just for the cgi SAPI&lt;/li&gt;
&lt;li&gt;Sending "private" with the nocache session cache limiter&lt;/li&gt;
&lt;li&gt;Make "false" printable with print_r instead of an empty string&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;
Some further ideas (not implemented yet)&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;A new &lt;em&gt;preg_replace()&lt;/em&gt; modifier to upper and lower strings
  directly&lt;/li&gt;
&lt;li&gt;&lt;em&gt;unpack()&lt;/em&gt; returns an array even if the count of the array is 1. A
    mixed type would be save the array handling; internally and in the user
    space&lt;/li&gt;
&lt;li&gt;If one character is used with arithmetic operation, it COULD be used as
    ascii-code instead of parsing the string&lt;/li&gt;
&lt;li&gt;I wrote my own &lt;em&gt;mysqli_real_escape()&lt;/em&gt; function based on the code
    of libmysqlclient. This function is strongly optimized and therefore
    faster. Additionally, it does not need a connection handle. I would be glad
    to see an escaping function, which can get the encoding from the local
    configuration instead of using a database handle.&lt;/li&gt;
&lt;li&gt;I did not investigated time finding out if APC optimizes &lt;em&gt;$i++&lt;/em&gt; to
    &lt;em&gt;++$i&lt;/em&gt; if the value is read-only. If not, it would be cool having
    such a feature directly in the core to save some time. But maybe this is a
    better job for an &lt;strong&gt;opcode optimizer&lt;/strong&gt;, which also reduces the
    number of redundant jumps and so on.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;
Ready for takeoff&lt;/h2&gt;
If you like the features of the modified PHP 5.3.6, you can get it from
github. I would be glad to hear further improvements that should get
implemented and also hear what you think about the changes I made.&lt;div class="blogger-post-footer"&gt;hacker bank&lt;/div&gt;</content><link href="http://heackerbank.blogspot.com/feeds/8452818460620354474/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2012/10/php-536-hacking.html#comment-form" rel="replies" title="1 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/8452818460620354474" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/8452818460620354474" rel="self" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2012/10/php-536-hacking.html" rel="alternate" title="PHP 5.3.6 Hacking " type="text/html"/><author><name>ization shop</name><uri>http://www.blogger.com/profile/18226043919918653581</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8380499217784119522.post-491488070019516560</id><published>2012-10-20T08:33:00.001-07:00</published><updated>2012-10-20T08:35:43.171-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><title type="text">Hackers may catch Indian banks napping</title><content type="html">&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiazUeqzO8OBe-OiHVSypLWvPVcF63FykW4acQZUlf5t6kq93DPTd4aAv44LouATa2VzSwVDq1mrNZRH3wQX14Ub0GX0Ah1OSr40ZrxVBSrleG0JvajSgoW2vsPd7vSXkaydvcLR7A7UAFn/s1600/cyber-hacker250.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiazUeqzO8OBe-OiHVSypLWvPVcF63FykW4acQZUlf5t6kq93DPTd4aAv44LouATa2VzSwVDq1mrNZRH3wQX14Ub0GX0Ah1OSr40ZrxVBSrleG0JvajSgoW2vsPd7vSXkaydvcLR7A7UAFn/s320/cyber-hacker250.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title="About two months ago, there was a major phishing attack on one of India's largest public sector banks."&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;With the rising incidence of cyber crime, how safe is Internet banking in India? Samir Kelekar finds out....&lt;/b&gt;&lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="font-family: inherit;"&gt;
&lt;span style="font-size: small;"&gt;&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title="About two months ago, there was a major phishing attack on one of India's largest public sector banks."&gt;About two months ago, there was a major phishing attack on one of India's largest public sector banks.&lt;/span&gt;&lt;span title="I too received a phishing mail even though I didn't even have an account in that bank then."&gt;I too received a phishing mail even though I did not even have an account in that bank then. &lt;/span&gt;&lt;span title="When I checked with the bank if account holders had lost money, they were not sure."&gt;When I checked with the bank if the account holders had lost money, they were not sure.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title="Users, who enter their credentials in a phishing site and subsequently lose money, do not always admit what they have done."&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title="Users, who enter their credentials in a phishing site and subsequently lose money, do not always admit what they have done."&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title="Users, who enter their credentials in a phishing site and subsequently lose money, do not always admit what they have done."&gt;Users, who enter their credentials in a phishing site and subsequently lose money, do not always admit what they have done. &lt;/span&gt;&lt;span title="Instead, they blame the bank for losing money."&gt;Instead, they blame the banks for losing money.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title="Instead, they blame the bank for losing money."&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="The increasing incidents of online fraud and hacking have put banks in a difficult position."&gt;The increasing incidents of online fraud and hacking have put banks in a difficult position. &lt;/span&gt;&lt;span title="Phishers are becoming more and more sophisticated and phishing mails have begun to appear in Hindi too, targeting the growing numbers of regional language Internet users."&gt;Phishers
 are Becoming more and more sophisticated and phishing mails have begun 
to Appear in Hindi too, targeting the growing numbers of regional 
language Internet users. &lt;/span&gt;&lt;span title="Also, it seems that the law applying to the loss of money in an Internet banking transaction is tilted against the banks."&gt;Also, it seems that the law applying to the loss of money in an Internet banking transaction is tilted against the banks.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title="Also, it seems that the law applying to the loss of money in an Internet banking transaction is tilted against the banks."&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="A well-known legal expert says the liability of cyber crime, in which the customer is not a co-conspirator, is always on the banks."&gt;A
 well-known legal expert says the liability of cyber crime, in roomates 
the customer is not a co-conspirator, is always on the banks. &lt;/span&gt;&lt;span title="In other words, if a user loses her money, RBI may ask the concerned bank to compensate the user unless it can show that the user herself is involved in a conspiracy to steal the money."&gt;In
 other words, if a user loses her money, RBI may ask the concerned bank 
to compensate the user unless it can show that the user herself is 
INVOLVED in a conspiracy to steal the money.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title="In other words, if a user loses her money, RBI may ask the concerned bank to compensate the user unless it can show that the user herself is involved in a conspiracy to steal the money."&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="So, even if there is no anti-virus on the user's computer or a key-logger is installed by a malicious hacker on the user's machine, banks would still be held responsible for the loss of money."&gt;So,
 even if there is no anti-virus on the user's computer or a key-logger 
is installed by a malicious hacker on the user's machine, banks would 
still be held responsible for the loss of money. &lt;/span&gt;&lt;span title="To avoid these risks, experts say banks should come up with automated methods to ensure that the user's machine is secure before allowing her access to Internet banking."&gt;To
 avoid these risks, experts say banks should come up with automated 
methods to Ensure that the user's machine is secure before allowing her 
access to Internet banking.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title="To avoid these risks, experts say banks should come up with automated methods to ensure that the user's machine is secure before allowing her access to Internet banking."&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="But not many banks have realised the gravity of the situation and life goes on as usual for them."&gt;But not many banks have realized the gravity of the situation and life goes on as usual for them. &lt;/span&gt;&lt;span title="But surely it won't be long before banks start to realise how vulnerable they are."&gt;But surely it will not be long before banks start to Realise how vulnerable they are. &lt;/span&gt;&lt;span title="A chief information security officer (CISO) of a well known bank retorted when confronted with a blatant security hole in the bank's procedure: “Has a fraud happened?"&gt;A
 chief information security officer (CISO) of a well known bank retorted
 when confronted with a blatant security hole in the bank's procedure: 
"Has a fraud happened? &lt;/span&gt;&lt;span title="If not, why worry?”"&gt;If not, why worry? "&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title="If not, why worry?”"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="This means that he will wake up only when the bank is swindled of significant money, and it may be too late then to plug the hole."&gt;This
 means that he will wake up only when the bank is swindled of 
significant money, and it may be too late then to plug the hole. &lt;/span&gt;&lt;span title="The PSU banks usually do not reward performance adequately and hence, you can expect the bank personnel managing security to be not very highly motivated."&gt;Usually
 the PSU banks do not adequately reward performance and hence, you can 
expect the bank's managing security personnel to be not very highly 
motivated. &lt;/span&gt;&lt;span title="Further, with their present salary structure, PSU banks fail to attract top security professionals."&gt;Further, with their present salary structure, PSU banks fail to attract top security professionals.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title="Further, with their present salary structure, PSU banks fail to attract top security professionals."&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="Fortunately, in India the major frauds in banks are still not the ones involving hacking."&gt;Fortunately, in India the major frauds in banks are still not the ones involving hacking. &lt;/span&gt;&lt;span title="In most circumstances, it is an acquaintance, who defrauds the victim."&gt;In most circumstances, it is an acquaintance, who defrauds the victim. &lt;/span&gt;&lt;span title="Recently, in the US, large companies such as Sony and Citibank have been hacked and passwords of millions of users stolen."&gt;Recently, in the U.S., large companies such as Sony and Citibank have been hacked and passwords of millions of users stolen. &lt;/span&gt;&lt;span title="Why hasn’t such an incident happened in India?"&gt;Why has not such an incident happened in India? &lt;/span&gt;&lt;span title="My take is that hacker-criminals in India are not sophisticated enough as yet."&gt;My take is that the hacker-criminals in India are not sophisticated enough as yet. &lt;/span&gt;&lt;span title="And international criminals haven't turned their gaze towards India as yet."&gt;And international criminals have not turned their gaze towards India as yet. &lt;/span&gt;&lt;span title="But the situation could change anytime."&gt;But the situation could change anytime.&lt;/span&gt;&lt;span title="To be frank, not all security holes of Internet banking can be blamed on the banks."&gt;To be frank, not all security holes of Internet banking can be blamed on the banks. &lt;/span&gt;&lt;span title="Today's Internet infrastructure is full of holes, and still, banks are moving at high speed introducing newer and newer services, without closing the holes that are found."&gt;Today's
 Internet infrastructure is full of holes, and still, banks are moving 
at high speed introducing newer and newer services, without closing the 
holes that are found.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title="Today's Internet infrastructure is full of holes, and still, banks are moving at high speed introducing newer and newer services, without closing the holes that are found."&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="To give a few examples, most of the home routers come with default passwords, which few users change."&gt;To give a few examples, most of the home routers come with default passwords, roomates few users change. &lt;/span&gt;&lt;span title="As a result, it is not difficult for a hacker to log into them."&gt;As a result, it is not difficult for a hacker to log into them. &lt;/span&gt;&lt;span title="Wireless networks using WEP are vulnerable to WEP cracking, and software to do so is freely available on the net."&gt;Wireless networks are vulnerable to using WEP WEP cracking, and software to do so is freely available on the net. &lt;/span&gt;&lt;span title="And many of Indian payment gateways have security holes."&gt;And many of Indian payment gateways have security holes.&lt;/span&gt;&lt;span title="Banks have to also worry about mobile transactions, which are becoming common."&gt;Banks have to also worry about mobile transactions, roomates are Becoming Common.&lt;/span&gt;&lt;span title="Vulnerabilities have been found in iphones and other mobiles."&gt;Vulnerabilities have been found in iphones and other mobiles. &lt;/span&gt;&lt;span title="Mobiles are increasingly used on wireless hotspots also, and they are particularly vulnerable there."&gt;Mobiles are increasingly also used on wireless hotspots, and they are particularly vulnerable there. &lt;/span&gt;&lt;span title="Along with banks, the government also needs to wake up to online security needs."&gt;Along with banks, the government also needs to wake up to online security needs.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title="Along with banks, the government also needs to wake up to online security needs."&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="Recently, Indian Institute of Science, Bangalore tied up with a major Chinese company Huawei Technologies, which has funded its center for testing security in telecom systems."&gt;Recently,
 Indian Institute of Science, Bangalore tied up with a major Chinese 
company Huawei Technologies, roomates has funded its center for security
 testing in telecom systems. &lt;/span&gt;&lt;span title="It is inconceivable that our government exposes such a critical national security area to a foreign company."&gt;It is inconceivable that our government exposes such a critical national security area to a foreign company. &lt;/span&gt;&lt;span title="The UIDAI, another critical project for national security, is associated with the US companies with dubious credentials."&gt;The UIDAI, another critical project for national security, is associated with the U.S. companies with dubious credentials.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title="The UIDAI, another critical project for national security, is associated with the US companies with dubious credentials."&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="The government has also failed to act on cyber crime."&gt;The government has also failed to act on cyber crime. &lt;/span&gt;&lt;span title="Until a year ago, Bangalore had not had a single conviction in cyber crime."&gt;Until a year ago, Bangalore had not had a single conviction in cyber crime. &lt;/span&gt;&lt;span title="Having interacted with the cyber crime police, I can vouch for the good job the investigators are doing."&gt;Having interacted with the cyber crime police, I can vouch for the good job the Investigators are doing. &lt;/span&gt;&lt;span title="However, if the grapevine is to be believed, the reason for the zero rate of conviction seems to be that the powers-that-be have a tough time distinguishing between the IT Act as in the Income Tax Act and the IT Act as in the"&gt;However,
 if the grapevine is to be believed, the reason for the zero rate of 
conviction seems to be that the powers-that-be have a tough time 
Distinguishing between the IT Act as in the Income Tax Act and the IT 
Act as in the &lt;/span&gt;&lt;span title="Information Technology Act."&gt;Information Technology Act.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title="Information Technology Act."&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="There are also some bright sides."&gt;There are also some bright sides. &lt;/span&gt;&lt;span title="The two-factor authentication --- requiring a one-time password that is sent on a mobile --- is a much needed improvement that the RBI has mandated for banking transactions."&gt;The
 two-factor authentication --- requiring a one-time password that is 
sent on a mobile --- is a much needed improvement that the RBI has 
Mandated for banking transactions. &lt;/span&gt;&lt;span title="The hacker's task has got more difficult as he now has to hack the mobile of the victim too along with the desktop computer."&gt;The hacker's task has got more difficult as he now has to hack the mobile of the victim too along with the desktop computer. &lt;/span&gt;&lt;span title="However, two-factor authentication is not followed in case of transactions involving share purchase as the time factor is crucial there and one cannot wait for an SMS, which might take minutes or sometimes hours before making the transaction."&gt;However,
 two-factor authentication is not Followed in case of transactions 
involving share purchase as the time factor is crucial there and one can
 not wait for an SMS, roomates might take minutes or sometimes hours 
before making the transaction.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title="However, two-factor authentication is not followed in case of transactions involving share purchase as the time factor is crucial there and one cannot wait for an SMS, which might take minutes or sometimes hours before making the transaction."&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="What can a lay person do to protect his interest online?"&gt;What can a lay person do to protect his interest online? &lt;/span&gt;&lt;span title="While the law favours the user as of now, it is an open question if banks would compensate users in case of a major breach."&gt;While the law Favours the user as of now, it is an open question if banks would compensate users in case of a major breach. &lt;/span&gt;&lt;span title="Thus, it would be surely a good idea for high-value depositors to spread their funds across different banks."&gt;Thus, it would be surely a good idea for high-value depositors to spread their funds across different banks. &lt;/span&gt;&lt;span title="ICICI Bank has introduced an insurance policy, which provides a cover of Rs one lakh if money is lost due to fraudulent use of an ATM card."&gt;ICICI
 Bank has Introduced an insurance policy, roomates provides a cover of 
Rs one lakh if ​​money is lost due to fraudulent use of an ATM card. &lt;/span&gt;&lt;span title="This is a good start."&gt;This is a good start.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title="This is a good start."&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="Secondly, consumer forums should tie up with banks and security companies in educating the users about security of internet banking."&gt;Secondly,
 consumer forums should tie up with banks and security companies in 
educating the users about the security of internet banking. &lt;/span&gt;&lt;span title="After all, however difficult it may look, there is nothing better than taking the bull by the horns."&gt;After all, however difficult it may look, there is nothing better than taking the bull by the horns.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;hacker bank&lt;/div&gt;</content><link href="http://heackerbank.blogspot.com/feeds/491488070019516560/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2012/10/hackers-may-catch-indian-banks-napping.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/491488070019516560" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/491488070019516560" rel="self" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2012/10/hackers-may-catch-indian-banks-napping.html" rel="alternate" title="Hackers may catch Indian banks napping" type="text/html"/><author><name>ization shop</name><uri>http://www.blogger.com/profile/18226043919918653581</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiazUeqzO8OBe-OiHVSypLWvPVcF63FykW4acQZUlf5t6kq93DPTd4aAv44LouATa2VzSwVDq1mrNZRH3wQX14Ub0GX0Ah1OSr40ZrxVBSrleG0JvajSgoW2vsPd7vSXkaydvcLR7A7UAFn/s72-c/cyber-hacker250.jpg" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8380499217784119522.post-2761248493543299136</id><published>2012-10-20T08:22:00.001-07:00</published><updated>2012-10-20T08:25:11.993-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking News"/><title type="text">Islamic hackers threaten Bank of America and NY Stock Exchange</title><content type="html">&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOeEtAAlJlHvJCKenobMf4S2hcwYYWYLUFfG2nGh4tuK5EvVVMz4HD4Fhb9ikMwaHBQyEWC4AcJmmmhIfuzbxxm2XrpRyQKmIeDN2Hkbyp-V0uyIHz9OC3tIrrEj5k5jKiR3akX6NG92i_/s1600/images-sullivan-justin-getty.n.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="239" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOeEtAAlJlHvJCKenobMf4S2hcwYYWYLUFfG2nGh4tuK5EvVVMz4HD4Fhb9ikMwaHBQyEWC4AcJmmmhIfuzbxxm2XrpRyQKmIeDN2Hkbyp-V0uyIHz9OC3tIrrEj5k5jKiR3akX6NG92i_/s320/images-sullivan-justin-getty.n.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style="font-family: inherit; font-size: small;"&gt;&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title="The Bank of America's online banking site suffered occasional problems Tuesday after threats on the internet that a cyber-attack would be launched on the bank and other US targets in protest at a film mocking Islam."&gt;The
 Bank of America's online banking site suffered occasional problems 
Tuesday after threats on the internet that a cyber-attack would be 
Launched on the banks and other U.S. targets in protest at a movie 
mocking Islam.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: inherit; font-size: small;"&gt;&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title="The Bank of America's online banking site suffered occasional problems Tuesday after threats on the internet that a cyber-attack would be launched on the bank and other US targets in protest at a film mocking Islam."&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="A message on pastebin.com claiming to be from 'cyber fighters of Izz ad-din Al qassam'- a reference to the military wing of Hamas- declared that it would attack the Bank of America and the New York Stock Exchange as a first step"&gt;A
 message on pastebin.com claiming to be from 'cyber fighters of Izz 
ad-din al qassam'-a reference to the military wing of Hamas declared 
that it would attack the Bank of America and the New York Stock Exchange
 as a first step &lt;/span&gt;&lt;span title="in a campaign against “American Zionist Capitalists”."&gt;in a campaign against "American Zionist capitalists".&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: inherit; font-size: small;"&gt;&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title="in a campaign against “American Zionist Capitalists”."&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="The posting promised to continue aggressive actions until the “erasing of the nasty movie”, which although YouTube has blocked in volatile regions, remains available in other parts of the world."&gt;The
 posting promised to continue aggressive actions until the "Erasing of 
the nasty movie", although YouTube has blocked roomates in volatile 
regions, remains available in other parts of the world.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: inherit; font-size: small;"&gt;&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title="The posting promised to continue aggressive actions until the “erasing of the nasty movie”, which although YouTube has blocked in volatile regions, remains available in other parts of the world."&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="The film in question, a privately funded short-movie, mocking the Prophet Mohammad, has ignited days of demonstrations.The uproar has left many dead across the Arab world, including Africa, Asia and some Western countries."&gt;The
 movie in question, a privately funded short-movie, mocking the Prophet 
Mohammad, has ignited days of demonstrations.The Uproar has left many 
dead across the Arab world, Including Africa, Asia and some Western 
countries.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: inherit; font-size: small;"&gt;&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title="The film in question, a privately funded short-movie, mocking the Prophet Mohammad, has ignited days of demonstrations.The uproar has left many dead across the Arab world, including Africa, Asia and some Western countries."&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="A Bank of America spokesman told Reuters that the website had suffered some problems but was available to customers."&gt;A Bank of America spokesman told Reuters that the website had suffered some problems but was available to customers.&lt;/span&gt;&lt;span title="But customers contacted by Reuters in Michigan, Ohio, Georgia and New York said they couldn't access the site."&gt;But customers contacted by Reuters in Michigan, Ohio, Georgia and New York said they could not access the site.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: inherit; font-size: small;"&gt;&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title="But customers contacted by Reuters in Michigan, Ohio, Georgia and New York said they couldn't access the site."&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="The threat to the New York Stock Exchange has seemingly not materialized as trading continued as normal."&gt;The threat to the New York Stock Exchange has seemingly not materialized as trading continued as normal.&lt;/span&gt;&lt;span title="Bill Pennington, chief strategy officer at WhiteHat Security, told the weekly magazine InformationWeek that the problems on the Bank of America website do not necessarily mean they've been hacked."&gt;Bill
 Pennington, chief strategy officer at WhiteHat Security, told the 
weekly magazine InformationWeek that the problems on the Bank of America
 website do not necessarily mean they've been hacked.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: inherit; font-size: small;"&gt;&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title="Bill Pennington, chief strategy officer at WhiteHat Security, told the weekly magazine InformationWeek that the problems on the Bank of America website do not necessarily mean they've been hacked."&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="“It's reasonable to suppose it could be a coincidence,” he said, citing the recent GoDaddy outage, which was an internal technical error for which hackers claimed responsibility."&gt;"It's
 reasonable to suppose it could be a coincidence," he said, citing the 
recent outage GoDaddy, which was an internal technical error for 
roomates hackers claimed responsibility.&lt;/span&gt;&lt;span title="But he did concede that the website's problems could also be the result of hackers, saying that hacking was “pretty easy”."&gt;But he did concede that the website's problems could also be the result of hackers, saying that hacking was "pretty easy".&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: inherit; font-size: small;"&gt;&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title="But he did concede that the website's problems could also be the result of hackers, saying that hacking was “pretty easy”."&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="He said that only the perpetrators and possibly the victims [the Bank of America] will ever really know what happened."&gt;He said that only the perpetrators and possibly the victims [of the Bank of America] will ever really know what happened.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: inherit; font-size: small;"&gt;&lt;span class="long_text" id="result_box" lang="en"&gt;&lt;span title="He said that only the perpetrators and possibly the victims [the Bank of America] will ever really know what happened."&gt;&lt;br /&gt;&lt;/span&gt;&lt;span title="Pennington warned that businesses should expect more attacks, “It's probably going to get worse before it gets better,” he said."&gt;Pennington warned that businesses should expect more attacks, "It's probably going to get worse before it gets better," he said.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;hacker bank&lt;/div&gt;</content><link href="http://heackerbank.blogspot.com/feeds/2761248493543299136/comments/default" rel="replies" title="Post Comments" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2012/10/islamic-hackers-threaten-bank-of.html#comment-form" rel="replies" title="0 Comments" type="text/html"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/2761248493543299136" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/8380499217784119522/posts/default/2761248493543299136" rel="self" type="application/atom+xml"/><link href="http://heackerbank.blogspot.com/2012/10/islamic-hackers-threaten-bank-of.html" rel="alternate" title="Islamic hackers threaten Bank of America and NY Stock Exchange" type="text/html"/><author><name>ization shop</name><uri>http://www.blogger.com/profile/18226043919918653581</uri><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOeEtAAlJlHvJCKenobMf4S2hcwYYWYLUFfG2nGh4tuK5EvVVMz4HD4Fhb9ikMwaHBQyEWC4AcJmmmhIfuzbxxm2XrpRyQKmIeDN2Hkbyp-V0uyIHz9OC3tIrrEj5k5jKiR3akX6NG92i_/s72-c/images-sullivan-justin-getty.n.jpg" width="72"/><thr:total>0</thr:total></entry></feed>