MZ@ !L!This program cannot be run in DOS mode. $Rؕ3}3}3}H̴3}H̱3}Rich3}PEL!  0(@h.rsrc @@@@Xx>(@Xpy HZv0H ` p             0|p(l0! 8+.p6<|A VMUICOUA.CSS COUAPRINT.CSS HARDADMIN.HTM HARDUSER.HTM IESECHELP.HTM SOFTADMIN.HTM IELOCK.JPG"Ԁw\V1(GRr"?j֜ MUI>en-USHȐInternet Explorer Enhanced Security ConfigurationMS Shell DlgP Internet Explorer Enhanced Security Configuration (IE ESC) reduces the exposure of your server to potential attacks from Web-based content.P#Internet Explorer Enhanced Security Configuration is enabled by default for Administrators and Users groups.P?~ &Administrators:PQ Pi P/Q On (Recommended) P/i OffPI &Users:P P P/ On (Recommended) P/ OffP SysLink<A>More about Internet Explorer Enhanced Security Configuration</A>PP2OKP2CancelȀQhInternet Explorer HardenedMS Shell DlgPDDP#!5iPSkSysLink<A>Learn more about Internet Explorer's Enhanced Security Configuration</A>PS2OK>Please log in as an Administrator to repair Internet Explorer.(Applying Enhanced Security Configuration&Enhanced Security Configuration is ON.4VS_VERSION_INFO @% @%?StringFileInfo040904B0LCompanyNameMicrosoft CorporationHFileDescriptionIOD Version Mapv+FileVersion11.00.9600.16384 (winblue_rtm.130821-1623)8 InternalNameiesetup.dll.LegalCopyright Microsoft Corporation. All rights reserved.HOriginalFilenameiesetup.dll.muiDProductNameInternet ExplorerFProductVersion11.00.9600.16384(OleSelfRegisterDVarFileInfo$Translation /* Style sheet optimized for IE4x - Last updated 1/16/03 */ body { color: #000000; background: #FFFFFF; font-size: 70%; font-family: Verdana, Arial, Sans Serif; } a:link, a:visited { color: "#0000FF"; text-decoration:"underline";} a:active { color: "#FF0000"; cursor:hand; text-decoration:"underline";} a:hover { color: "#FF0000"; cursor:hand; text-decoration:"underline";} h1 { font-size: 125%; margin-bottom:" .5em"; clear:both; } h2 { font-size: 110%; margin-top: "1.5em"; margin-bottom:" .5em"; clear:both; } h3 { font-size: 100%; margin-top: "1.2em"; margin-bottom: ".5em"; clear:both; } p { margin-top:" .6em"; margin-bottom: ".6em"; } ol { margin-top: ".5em"; margin-bottom: 0; margin-left: "2.1em"; padding-left: "0em"; margin-right:"2.1em" } ul { margin-top: ".6em"; margin-bottom: 0; list-style-type: disc; margin-left: "1.5em"; padding-left: "0em"; margin-right: "1.5em"; } li { margin-bottom: ".7em"; clear:both; } table { font-size: 100%; margin-top: "1em"; margin-bottom: "1em"; } th { text-align: left; background: #DDDDDD; vertical-align: bottom; padding: .2em; padding-left: .45em; padding-right: .5em;} tr { vertical-align: top; } td { background: #EEEEEE; vertical-align: top; padding: .2em; padding-left: .45em; padding-right: .5em;} p.proclabel { font-size: 100%; font-weight: bold; clear: both; } p.note,p.tip, p.important, p.caution, p.warning { font-weight:bold; clear:both; margin-top:"1em"; margin-bottom:"-.25em"; } /***********************************/ /* Style for print only functionality used with external URL link coUA_print.css*/ span.printOnly {display:none } /***************************************************/ /* STYLES USED IN IE DELIVERABLE ONLY */ td.ie { background: #FFFFFF; vertical-align: top; padding: .2em; padding-left: .45em; padding-right: .5em;} p.bigproc { font-size: 110%; font-weight: bold; clear: both; } P/* last updated 6/15/99 */ body { color: #000000; background: #FFFFFF; font-size: 70%; font-family: Verdana, Arial, Sans Serif; } H1 { font-size: 150% } H2 { font-size: 115% } H3 { font-size: 100% } span.printOnly { display:inline; } #nav { display:none } div.expand { margin-left: "1.5em"; display:block; } img.expand { margin-left: "1.5em"; display: none} table { font-size: 100%; border-collapse: collapse; } th { text-align:left; border-style: solid; border-width: 1px; border-bottom-width: 2px; } td { border-style: solid; border-width: 1px; } ul { margin-left: "1.5em"; list-style-type: disc; } #text { overflow:visible; } img.thumbnail {vertical-align: top; margin-left: 0; width:auto; border-width: 1; }  Internet Explorer Enhanced Security Configuration is enabled

Internet Explorer Enhanced Security Configuration is enabled

Internet Explorer Enhanced Security Configuration is currently enabled on your server. This configures a number of security settings that define how users browse Internet and intranet Web sites. The configuration also reduces the exposure of your server to Web sites that might pose a security risk. For a complete list of the security settings in this configuration, see Effects of Internet Explorer Enhanced Security Configuration.

This enhanced level of security can prevent Web sites from displaying correctly in Internet Explorer and restrict access to network resources, such as files on Universal Naming Convention (UNC) shares. If you want to browse a Web site that requires Internet Explorer functionality that has been disabled, you can add the Web site to the inclusion lists in the Local intranet or Trusted sites zones. For more information, see Managing Internet Explorer Enhanced Security Configuration.

 Internet Explorer Enhanced Security Configuration is enabled

Internet Explorer Enhanced Security Configuration is enabled

Your server administrator has applied enhanced security settings to Internet Explorer. These security settings might prevent you from accessing certain Web sites and network resources, or performing other browser operations, such as downloading files. If you trust a Web site and need it to be functional, you can add the Web site to the Trusted Sites zone. For more information, see How to browse when Internet Explorer Enhanced Security Configuration is enabled.

For more information, contact your server administrator.

PADInternet Explorer Enhanced Security Configuration Overview

Internet Explorer security zones settings

Effects of Internet Explorer Enhanced Security Configuration on security zones

Managing Internet Explorer Enhanced Security Configuration

Turning off Internet Explorer Enhanced Security Configuration

Browser security best practices

Internet Explorer Enhanced Security Configuration places your server and Internet Explorer in a configuration that decreases the exposure of your server to potential attacks that can occur through web content and application scripts. As a result, some web sites might not display or perform as expected. Review the following topics for more information about the settings used in this configuration.

Internet Explorer security zones settings

In Internet Explorer, you can configure security settings for several built-in security zones: the Internet zone, the Local intranet zone, the Trusted sites zone, and the Restricted sites zone. Internet Explorer Enhanced Security Configuration assigns security levels to these zones as follows:

  • For the Internet zone, the security level is set to High.

  • For the Trusted sites zone, the security level is set to Medium, which allows browsing of many Internet sites.

  • For the Local intranet zone, the security level is set to Medium-low, which allows your user credentials (user name and password) to be sent automatically to sites and applications that need them.

  • For the Restricted sites zone, the security level is set to High.

  • All Internet and intranet sites are assigned to the Internet zone by default. Intranet sites are not part of the Local intranet zone unless you explicitly add them to this zone.

Top of page

Effects of Internet Explorer Enhanced Security Configuration on security zones

Internet Explorer Enhanced Security Configuration adjusts the security levels for the existing security zones. The following table describes how each zone is affected.

Security zone Default security level Result

Internet

High

All web sites are assigned to this zone by default. Web pages might not display as expected, and applications that require the web browser might not work correctly because scripts, ActiveX controls, and file downloads have been disabled. If you trust an Internet web site, you can add that site to the Trusted sites zone.

Trusted sites

Medium

This zone is for the Internet sites whose content you trust.

Local intranet

Medium-Low

When visiting web sites on your organization's intranet, you might be repeatedly prompted for credentials (your user name and password) because the Enhanced Security Configuration disables the automatic detection of intranet web sites. To automatically send credentials to selected intranet sites, add those sites to the Local intranet zone. Additionally, access to scripts, executable files, and other files in a shared folder are restricted unless the shared folder is added to this zone.

Caution

Do not add Internet web sites to the Local intranet zone, because your credentials are sent automatically to the web site upon request.

Restricted sites

High

This zone contains sites that are not trusted, such as sites that might damage your computer or data if you attempt to download or run files from them.

In addition to raising the default security level of each zone, the Enhanced Security Configuration also adjusts Internet extensibility and security settings to further reduce exposure to possible future security threats. These settings can be found on the Advanced tab of the Internet Options dialog box. The following table describes the options that are in effect when the Enhanced Security Configuration is enabled.

Setting Name Default Description

Enable third-party browser extensions

Off

Disables Internet Explorer add-ons that might have been created by companies other than Microsoft.

Play sounds in web pages

Off

Disables music and other sounds.

Play animations in web pages

Off

Disables animations.

Check for publisher’s certificate revocation

On

Automatically checks a publisher’s certificate to see whether it has been revoked before accepting it as valid.

Check for server certificate revocation

On

Automatically checks a web site's certificate to determine if the certificate has been revoked.

Check for signatures on downloaded programs

On

Automatically checks that all programs downloaded have a valid digital signature.

Do not save encrypted pages to disk

On

Disables saving encrypted information in the Temporary Internet Files folder.

Empty Temporary Internet Files folder when browser is closed

On

Automatically clears the Temporary Internet Files folder when Internet Explorer is closed.

Enable DOM storage

On

Enables web sites to store information about your browsing session using the Document Object Model (DOM).

Enable Integrated Windows Authentication

On

Requires the use of the “Negotiate” authentication protocol to respond to authentication requests from web servers. Negotiate allows for the use of either Kerberos (preferred) or NTLM for authentication.

Use SSL 3.0

On

Enables the use of the SSL 3.0 protocol for communicating with a web site that supports encrypted communications.

Use TLS 1.0

On

Enables the use of TLS 1.0 protocol for communicating with a web site that supports encrypted communications.

Warn about certificate address mismatch

On

Automatically compares the address in the security certificate with the web site's address and displays a warning if the two addresses do not match before loading the web site.

Warn if POST submittal is redirected to a zone that does not permit posts

On

Displays a warning when you submit information into a form on a web site that is redirected to an address that is different from the one that is hosting the form. This helps prevent your information or browser from being redirected to a non-secure site.

To assist you in getting to necessary resources on the internet with the Enhanced Security Configuration enabled, the following sites and locations are trusted by default:

  • The Microsoft Update web site is added to the Trusted sites zone. This allows you to continue to get important updates for your operating system.

  • The Windows error reporting site is added to the Trusted sites zone. This allows you to report problems encountered with your operating system and search for fixes.

  • The Microsoft TechNet and MSDN sites are added to the Trusted sites zone. This allows you to research information in online articles and other technical topics.

  • The Microsoft redirection site “go.microsoft.com” is added to the Trusted sites zone. This allows you to be connected to the most current versions of Microsoft online content.

  • Several local computer sites (such as http://localhost, https://localhost, and hcp://system) are added to the Local intranet zone. This allows applications and code to work locally so that you can complete common administrative tasks.

  • The privacy level is set to Medium for the Trusted sites zone. You can make the privacy setting more restrictive by blocking specific sites, preventing location awareness, and blocking cookies from specific sites.

Top of page

Managing Internet Explorer Enhanced Security Configuration

Internet Explorer Enhanced Security Configuration is designed to reduce your server's exposure to security threats. To ensure that you get the most benefit from Enhanced Security Configuration, consider these browser management recommendations:

  • All Internet and intranet sites are assigned to the Internet zone by default. If you trust an Internet or intranet site and need it to be functional, add the Internet site to the Trusted sites zone, and add the intranet site to the Local intranet zone.

  • If you want to run a browser-based client application over the Internet, you should add the web page that hosts the application to the Trusted sites zone.

  • If you want to run a browser-based client application over a protected and secure local intranet, you should add the web page that hosts the application to the Local intranet zone.

  • Add internal sites and local servers to the Local intranet zone to make sure you have access to, and can run, applications from your servers.

  • Use unattend.txt to add intranet sites and UNC servers to the Local intranet zone inclusion list as part of the installation process.

  • Use client computers to download drivers, service packs, and other updates. Avoid any browsing from servers.

  • If you use disk imaging to install operating systems on your servers, add the intranet sites and UNC servers you trust to the Local intranet zone, and add the Internet sites that you trust to the Trusted sites zone on the base image. You can then change the list on images for different server types and needs.

The following procedures describe how to add site to the Trusted sites and the Local intranet zone:

Add sites to the Trusted sites zone
  1. Navigate to the site that you want to add. Click the Tools icon and then select Internet options.

  2. Click the Security tab.

  3. Click Trusted sites and then click Sites.

  4. In the Trusted sites dialog box, click Add to add the site to the list, and then click Close.

  5. Refresh the page to view the site from its new zone.

Note
  • A web page can be part of only one zone at a time. You cannot add a page to both the Trusted sites zone and the Local intranet zone.

  • Internet Explorer maintains two different lists of sites for the Trusted sites zone. One list is in effect when Enhanced Security Configuration is enabled, and a separate list is in effect when Enhanced Security Configuration is disabled. When you add a web page to the Trusted sites zone, you are adding it only to the list that is currently in effect.

  • When you add a web page to the Trusted sites zone, you are adding the domain for that page. Therefore, all pages within that domain are also added. Many Internet sites use more than one domain to host their content. You may have to add several domains to the Trusted sites zone to have full functionality for one site. For example, if you add http://www.microsoft.com/windows/ to your Trusted sites zone, you are adding http://www.microsoft.com. If you then want to view the Support site, you will have to add http://support.microsoft.com separately, because the Support site is a separate domain.

  • You can use wildcard characters to add all subdomains for a given domain. For example, you can add *.microsoft.com to the list, which adds both www.microsoft.com and support.microsoft.com.

Add sites to the Local intranet zone
  1. Navigate to the site that you want to add. Click the Tools icon and then select Internet options.

  2. Click the Security tab.

  3. Click Local intranet and then click Sites.

  4. In the Local intranet dialog box, click Add to add the site to the list, and then click Close.

  5. Refresh the page to view the site from its new zone.

Note
  • Do not add Internet sites to the Local intranet zone because your credentials are sent automatically to the site if they are requested.

  • A web page can be part of only one zone at a time. You cannot add a page to both the Trusted sites zone and the Local intranet zone.

  • Internet Explorer maintains two different lists of sites for the Local intranet zone. One list is in effect when Enhanced Security Configuration is enabled, and a separate list is in effect when Enhanced Security Configuration is disabled. When you add a web page to the Local intranet zone, you are adding it only to the list that is currently in effect.

  • Enhanced Security Configuration also restricts access to scripts, executable files, and other potentially unsafe files on a UNC path unless it is added to the Local intranet zone explicitly. For example, if you want to access \\server\share\setup.exe, you must add \\server to the Local intranet zone.

Top of page

Turning off Internet Explorer Enhanced Security Configuration

Keeping the Internet Explorer Enhanced Security Configuration enabled on your servers is recommended to help ensure that your servers are not inadvertently exposed to malware or other browser-based attacks. However, in some environments you might wish to turn off the Internet Explorer Enhanced Security Configuration protections to enable easier browsing for administrators or standard users.

To turn off Internet Explorer Enhanced Security Configuration
  1. Close any Internet Explorer browser windows that you might have open.

  2. Open Server Manager

  3. If your server is running Windows Server® 2008 R2, in the Security Information section of Server Summary, click Configure IE ESC to open the Internet Explorer Enhanced Security Configuration dialog.

    If your server is running Windows Server® 2012, click Configure this local server to open the Local Server configuration page. Then, in the Properties area, next to IE Enhanced Security Configuration, click On to open the Internet Explorer Enhanced Security Configuration dialog.

  4. To allow members of the local Administrators group to use Internet Explorer in its default client configuration, under Administrators click Off.

    To allow members of all other groups to use Internet Explorer in its default client configuration, under Users click Off.

    Note

    Once the Internet Explorer Enhanced Configuration is turned off for one set of users, Server Manager will display Off next to Internet Explorer Enhanced Security Configuration.

  5. Click OK to apply your changes.

Top of page

Browser security best practices

Using servers for Internet browsing does not adhere to sound security practices because Internet browsing increases the exposure of your server to potential security attacks. Regardless of the browser you use, you should restrict browsing on your server.

To reduce the risk to your server of potential attacks from malicious web-based content:

  • Do not use servers for browsing general web content.

  • Use client computers to download drivers, service packs, and other updates.

  • Do not view web sites you cannot confirm are secure.

  • Use a limited user account instead of an administrator account for general web browsing.

  • Use Group Policy settings to keep unauthorized users from making inappropriate changes to browser security settings.

Top of page

 Internet Explorer Enhanced Security Configuration is not enabled

Caution: Internet Explorer Enhanced Security Configuration is not enabled

Internet Explorer Enhanced Security Configuration configures your server and Internet Explorer in a way that decreases the exposure of your server to potential attacks through Web content and application scripts. This is done by raising the default security levels on Internet Explorer security zones and changing the default settings.

Keeping the Internet Explorer Enhanced Security Configuration enabled on your servers is recommended to help ensure that your servers are not inadvertently exposed to malware or other browser-based attacks. For more information, including the complete list of changes that are implemented by Internet Explorer Enhanced Security Configuration, see the Internet Explorer Enhanced Security Configuration overview.


To turn on Internet Explorer Enhanced Security Configuration

  1. Close any Internet Explorer windows that you might have open.
  2. Open Server Manager.
    • If your server is running Windows Server® 2008 R2, in the Security Information section of Server Summary, click Configure IE ESC to open the Internet Explorer Enhanced Security Configuration dialog.
    • If your server is running Windows Server® 2012, click Configure this local server to open the Local Server configuration page. Then, in the Properties area, next to IE Enhanced Security Configuration, click Off to open the Internet Explorer Enhanced Security Configuration dialog.
  3. To use Internet Explorer Enhanced Configuration when members of the local Administrators group are logged on, under Administrators click On.
  4. To use Internet Explorer Enhanced Configuration when all other users are logged on, under Users click On (Recommended).
  5. Click OK to apply your changes.

Note: Once the Internet Explorer Enhanced Configuration is turned on for both sets of users, Server Manager will display On (Recommended) next to Internet Explorer Enhanced Security Configuration.

PADJFIFHHExifMM*bj(1r2i ' 'Adobe Photoshop CS4 Windows2010:12:10 12:59:44&(.HHJFIFHH Adobe_CMAdobed            "?   3!1AQa"q2B#$Rb34rC%Scs5&DTdE£t6UeuF'Vfv7GWgw5!1AQaq"2B#R3$brCScs4%&5DTdEU6teuFVfv'7GWgw ?TI%)$IJI$RLHNrU' ZxuԵo'`O mx qrkG]Vư9;]7r6Ha~ب?Qs\>%fԁхV6aLXÇųZUrw+G$#8 F2?TI%)$IJY][0Z.kwL>m*vklv.;1vkL:MNFZ5k kDf4q8_,k-dP'vkݒfC_`̍\RUrP.vDPRQs `^ǫ,X.5US.ok`1;l{ JKr/n-n5uone_?j[E  hK /T1K90q`1Hcx=\?~V95SM}_ek$}x}#"q+!08ukؙ}^eCVv#BޥT*T fCZvY[[۱|sX?3'bȩenƾsxSc}[B˯B@أ1 OMɫ;h[O-tŕ}P2:{?=~Yqs06. 8ϩx?TI%5z3鶷l#k?xš[CFsw~NiYY 7cx ;\#'+挎0/tKOz͏ ?8ʹՊ'JQ>1a:21vfQʧ.#ӶƱM>goC_zV챉7L"""4K{/_M/ ,qh[Swt$п߯&U~-ٙgdP}J]5o]V;Ĩɔ@Dly&#{A`YiYٜg= N?[i6n?ɰw.qnMq<@x;KTN$2K$7l Juag^K|V3Xu|z'dw~qX܏*~!Γ/ɏ6ns(grz1x93ʰ Ǻ@W]Q@hG!$l[Meb7:α47w63ܼo{R snyz< "]_%8ȀtLQ k/ٽ_c5ڗޯs1Z&>Ȳ~2rfroٝcc5ܵ7u\V\Z\9sNǷsG=R2"\/yȏ=\o{-;|1Akʗ }*GOGc8y#ϩ_i{*7a۽6mPz_C%ظ*{!v%y$Gv;|8B'U[6͔w++;6ȕO{,cŒ!ϥ#,72U/XG6iVL2kG絭,=Z9tgbًxcB湿k =Qp?|o1Xt~&GJm.zrzncXX3mZ@ߔDAyYFPhcmhZok{?ޮ՘*Ί,0o>v4^ͪB;lA*L`幩bX];m6|\jx*eqlMc2h_`n}i~mrkE'Gd8=[?>kրִp$kTցs2n_@&X׵s5%YCuV=7ߥ$iuӷ 9lYGsޚlg^ݷfj 7]I,FGr^" 6UZK{$ ^GZUnw `#i(d1vhB_ypW?K_X[Ajaxcԁ3)H⌵їWWѺYc5&;g'+?)f+YG~c_]ߣ?Du#"WS:-#͎Zܷ8cA?G&Ng7G(z2`jהt|ϩN{&Ik>,O>#۽'Wl3. z\11@d@YEUK'5:`_'?9?ߏconɹnPƗ=`+}[0nuXl<6?ufՎldWdCHVͳo .c W}c[^_.etdn~m>)wWҮZU51Q?Y~70L]Z!A K/0s$P#``塂5?4$J6gTI%1s bc"dYb1DRI$I%)$IK;3?Hk,Ɉ.uzԱoSlbNAvqcznPi13;_'"Y1|=F'UwT{0 }o?QqnoI̐C͂P}_[O?idSrq=Z]y.mߊ;[ϫ8#!FB|Zз'L8N1?TI%)$IJI$RI$I%4zf(5xCO}7X˛ZzY676Cw7cQWKIm3cD;΋;ֲƉ4?I҃>!ܸUedT=߷k5k3.6fd]SqɶG^G_Ӻ4daݡ-h'\+_|%fԁхV6aLXÇųZUrw+G$#8 F2?TI%)$IJY][0Z.kwL>m*vklv.;1vkL:MNFZ5k kDf4q8_,k-dP'vkݒfC_`̍\RUrP.vDPRQs `^ǫ,X.5US.ok`1;l{ JKr/n-n5uone_?j[E  hK /T1K90q`1Hcx=\?~V95SM}_ek$}x}#"q+!08ukؙ}^eCVv#BޥT*T fCZvY[[۱|sX?3'bȩenƾsxSc}[B˯B@أ1 OMɫ;h[O-tŕ}P2:{?=~Yqs06. 8ϩx?TI%5z3鶷l#k?xš[CFsw~NiYY 7cx ;\#'+挎0/tKOz͏ ?8ʹՊ'JQ>1a:21vfQʧ.#ӶƱM>goC_zV챉7L"""4K{/_M/ ,qh[Swt$п߯&U~-ٙgdP}J]5o]V;Ĩɔ@Dly&#{A`YiYٜg= N?[i6n?ɰw.qnMq<@x;KTN$2K$7l Juag^K|V3Xu|z'dw~qX܏*~!Γ/ɏ6ns(grz1x93ʰ Ǻ@W]Q@hG!$l[Meb7:α47w63ܼo{R snyz< "]_%8ȀtLQ k/ٽ_c5ڗޯs1Z&>Ȳ~2rfroٝcc5ܵ7u\V\Z\9sNǷsG=R2"\/yȏ=\o{-;|1Akʗ }*GOGc8y#ϩ_i{*7a۽6mPz_C%ظ*{!v%y$Gv;|8B'U[6͔w++;6ȕO{,cŒ!ϥ#,72U/XG6iVL2kG絭,=Z9tgbًxcB湿k =Qp?|o1Xt~&GJm.zrzncXX3mZ@ߔDAyYFPhcmhZok{?ޮ՘*Ί,0o>v4^ͪB;lA*L`幩bX];m6|\jx*eqlMc2h_`n}i~mrkE'Gd8=[?>kրִp$kTցs2n_@&X׵s5%YCuV=7ߥ$iuӷ 9lYGsޚlg^ݷfj 7]I,FGr^" 6UZK{$ ^GZUnw `#i(d1vhB_ypW?K_X[Ajaxcԁ3)H⌵їWWѺYc5&;g'+?)f+YG~c_]ߣ?Du#"WS:-#͎Zܷ8cA?G&Ng7G(z2`jהt|ϩN{&Ik>,O>#۽'Wl3. z\11@d@YEUK'5:`_'?9?ߏconɹnPƗ=`+}[0nuXl<6?ufՎldWdCHVͳo .c W}c[^_.etdn~m>)wWҮZU51Q?Y~70L]Z!A K/0s$P#``塂5?4$J6gTI%1s bc"dYb1DRI$I%)$IK;3?Hk,Ɉ.uzԱoSlbNAvqcznPi13;_'"Y1|=F'UwT{0 }o?QqnoI̐C͂P}_[O?idSrq=Z]y.mߊ;[ϫ8#!FB|Zз'L8N1?TI%)$IJI$RI$I%4zf(5xCO}7X˛ZzY676Cw7cQWKIm3cD;΋;ֲƉ4?I҃>!ܸUedT=߷k5k3.6fd]SqɶG^G_Ӻ4daݡ-h'\+_| Adobed           s!1AQa"q2B#R3b$r%C4Scs5D'6Tdt& EFVU(eufv7GWgw8HXhx)9IYiy*:JZjzm!1AQa"q2#BRbr3$4CS%cs5DT &6E'dtU7()󄔤euFVfvGWgw8HXhx9IYiy*:JZjz ?N*UثWb]v*UثU<h*ؐ2qcpd O ^ٓA+79|Gh?9MwI)!N\y1Az5ʱisec)7s+Ɵ|⾓}ٚ;TZ7uSTҥ9*W⍾dehd, 1glO.#q;m>x倜yIea#5N*UثWb]GSӠIz+vjhayL$ Z/t-seGp٦x~3dtWBB{Rd )1xO,7vLj#sO5]O pd9uN*UثT\_ֻml ԓ(] q:ፖ/^J*/F/͐f4ꥢ_JW#^ Adp>Hq0;e(FPP,AEy h蛗qHKtS$;fii=dkj^0p竝C9P=>IYEeN*Uثum?DJգI"a#t=1R#K9uj8c`_g_@dU1DiABFyhk̉ZOuf1,;31kRz3Aɩ!d-F|zl|s;&^b`XE$*߱y=81_˒zq28E5 *(;2m ]-&Q%A7a#Q;5/,vQoWH_M@5mK'! HUXT5GP|Ay uSˇ0xĺ`Y~ [װha"淵V#пN*U .NT& Q!cxMcD*P{L;kw峳tB#ޒ^]Is759X`T)l"ia|G=O":L{y/__=~:~ky;{-.bWeFDŽK%I/(Xǚ{vOÇ7)_.]W˿edpo("k|v_OOn4W[ ]zN_K `+x‹TQASeeLn.6-Fm(oɌ^~QI?!1L^YVj{vsXN*UȦPe=9pҷb_n }pydg'a O}3o<Ǯ_F?9⽦9xϦ?[hg[O&&yX٪V!#Ñ!y$y!ľ_jxrd"{o/GGpxrdws\|9w37&]-?|V]ɢ??i#rZ*Oo.G5d9w0=+2y|j~S!9t"Z'Gc:?.igV\uNWp+f?iHx4k#szN*}DRCAO8^qOrl[O~6φ=G9Y[Iy*[M;8p!saQU#+Sf._(֪~|ּ%@ djHJN z t"(),lRD`AVSB>:b.3An~ pj+>fgvD3\?3<_4 ȚI ~ode)ϭLj:_v>ɗs#̶{0JRNȞ53nOYC j,1ܧb_N*x#ATqB2&22M!z-aќv2/I_gk! S34ڭ| . <S(bs@kkLrOJc$}*z\ʄ Ӎf*Bm_L'd ԓJiN7b`/JS'WjAZ̿"I$vz)/埞 \i"Y#%Mc8#-)5iH7FďgvyTW.V?g>2 ':sڅ%oT$ .,v;;>QHk&p,K=JĬ#;GcnÚF#D<$7|W.Xd&m,4=;3:i3XIYb`8 e"3<aWbN*Uث\G݊1Wb]v*U/4]CQUv\= W|02LE)-׺Ē(7w;#hb>_=?2e?W7c'6N3(45֧zj&w^fu.-EVU'/Ǫ)1X%=#)n@GȜpGuHL2/N*UثWb]v*Uث|)a!2O:NrsgQ[oZ؉ҴyHpP=cL"yW`ROqoe ZK;76td7?QS`=-K'[KHοK./}>N*UثWb]v*Uث|6Z|i珥AWN+3/)S4C0=.M<5{:䚏Ц?V&Kk̏ y-i!\~9