MZ@ !L!This program cannot be run in DOS mode. $Rؕ3}3}3}H̴3}H̱3}Rich3}PEL!  @.rsrc@@@@Xx>(@Xpy HZv0H ` p             0^$8" @,/8=>|tMUICOUA.CSS COUAPRINT.CSS HARDADMIN.HTM HARDUSER.HTM IESECHELP.HTM SOFTADMIN.HTM IELOCK.JPG"Ԁw\V1(GRr"?j֜ MUI>fr-FRHȐConfiguration de scurit renforce d Internet ExplorerMS Shell DlgP La Configuration de scurit renforce d Internet Explorer (IE ESC) diminue l exposition de votre serveur des attaques potentielles provenant de contenus Web.P#La Configuration de scurit renforce d Internet Explorer est active par dfaut pour les groupes Administrateurs et Utilisateurs.P?~ &Administrateurs:PQ Pi P/Q Activ (recommand) P/i DsactivPI &Utilisateurs:P P P/ Activ (recommand) P/ DsactivP SysLink<A>Pour en savoir plus sur la Configuration de scurit renforce</A>PP2OKP2AnnulerPAȀQhInternet Explorer renforcMS Shell DlgPDDP#!5iPSkSysLink<A>En savoir plus sur la Configuration de scurit renforce d Internet Explorer</A>PS2OKHConnectez-vous en tant qu'administrateur pour rparer InternetExplorer.5Application de la configuration de scurit renforcePA3La Configuration de scurit renforce est ACTIVE.PA4VS_VERSION_INFO @% @%?StringFileInfo040C04B0LCompanyNameMicrosoft CorporationHFileDescriptionIOD Version Mapv+FileVersion11.00.9600.16384 (winblue_rtm.130821-1623)8 InternalNameiesetup.dll/LegalCopyright Microsoft Corporation. Tous droits rservs.HOriginalFilenameiesetup.dll.muiDProductNameInternet ExplorerFProductVersion11.00.9600.16384(OleSelfRegisterDVarFileInfo$Translation /* Style sheet optimized for IE4x - Last updated 1/16/03 */ body { color: #000000; background: #FFFFFF; font-size: 70%; font-family: Verdana, Arial, Sans Serif; } a:link, a:visited { color: "#0000FF"; text-decoration:"underline";} a:active { color: "#FF0000"; cursor:hand; text-decoration:"underline";} a:hover { color: "#FF0000"; cursor:hand; text-decoration:"underline";} h1 { font-size: 125%; margin-bottom:" .5em"; clear:both; } h2 { font-size: 110%; margin-top: "1.5em"; margin-bottom:" .5em"; clear:both; } h3 { font-size: 100%; margin-top: "1.2em"; margin-bottom: ".5em"; clear:both; } p { margin-top:" .6em"; margin-bottom: ".6em"; } ol { margin-top: ".5em"; margin-bottom: 0; margin-left: "2.1em"; padding-left: "0em"; margin-right:"2.1em" } ul { margin-top: ".6em"; margin-bottom: 0; list-style-type: disc; margin-left: "1.5em"; padding-left: "0em"; margin-right: "1.5em"; } li { margin-bottom: ".7em"; clear:both; } table { font-size: 100%; margin-top: "1em"; margin-bottom: "1em"; } th { text-align: left; background: #DDDDDD; vertical-align: bottom; padding: .2em; padding-left: .45em; padding-right: .5em;} tr { vertical-align: top; } td { background: #EEEEEE; vertical-align: top; padding: .2em; padding-left: .45em; padding-right: .5em;} p.proclabel { font-size: 100%; font-weight: bold; clear: both; } p.note,p.tip, p.important, p.caution, p.warning { font-weight:bold; clear:both; margin-top:"1em"; margin-bottom:"-.25em"; } /***********************************/ /* Style for print only functionality used with external URL link coUA_print.css*/ span.printOnly {display:none } /***************************************************/ /* STYLES USED IN IE DELIVERABLE ONLY */ td.ie { background: #FFFFFF; vertical-align: top; padding: .2em; padding-left: .45em; padding-right: .5em;} p.bigproc { font-size: 110%; font-weight: bold; clear: both; } P/* last updated 6/15/99 */ body { color: #000000; background: #FFFFFF; font-size: 70%; font-family: Verdana, Arial, Sans Serif; } H1 { font-size: 150% } H2 { font-size: 115% } H3 { font-size: 100% } span.printOnly { display:inline; } #nav { display:none } div.expand { margin-left: "1.5em"; display:block; } img.expand { margin-left: "1.5em"; display: none} table { font-size: 100%; border-collapse: collapse; } th { text-align:left; border-style: solid; border-width: 1px; border-bottom-width: 2px; } td { border-style: solid; border-width: 1px; } ul { margin-left: "1.5em"; list-style-type: disc; } #text { overflow:visible; } img.thumbnail {vertical-align: top; margin-left: 0; width:auto; border-width: 1; }  La Configuration de sécurité renforcée d’Internet Explorer est activée

La Configuration de sécurité renforcée d’Internet Explorer est activée

La Configuration de sécurité renforcée d’Internet Explorer est actuellement activée sur votre serveur. Ceci configure un certain nombre de paramètres de sécurité qui définissent comment les utilisateurs explorent les sites Internet et intranet. La configuration réduit également l’exposition de votre serveur à des sites Web risquant de compromettre la sécurité. Pour une liste complète des paramètres de sécurité inclus dans cette configuration, voir la page sur les effets de la Configuration de sécurité renforcée d’Internet Explorer.

Le niveau renforcé de sécurité peut compromettre l’affichage de certains sites Web dans Internet Explorer et restreindre l’accès à des ressources réseau, telles que des fichiers sur des partages UNC (Universal Naming Convention). Si vous souhaitez explorer un site Web qui nécessite une fonctionnalité d’Internet Explorer qui a été désactivée, vous pouvez ajouter ce site Web aux listes d’inclusion dans les zones Intranet local ou Sites approuvés. Pour plus d’informations, voir la page sur la gestion de la Configuration de sécurité renforcée d’Internet Explorer.

 La Configuration de sécurité renforcée d’Internet Explorer est activée

La Configuration de sécurité renforcée d’Internet Explorer est activée

Votre administrateur de serveur a appliqué des paramètres de sécurité à Internet Explorer. Ces paramètres de sécurité pourraient vous empêcher d’accéder à certains sites Web et à certaines ressources réseau, ou d’effectuer d’autres opérations de navigateur, telles que le téléchargement de fichiers. Si vous approuvez un site Web et souhaitez garantir son fonctionnement, vous pouvez ajouter le site Web à la zone Sites approuvés. Pour plus d’informations, voir la page sur l’exploration lorsque la Configuration de sécurité renforcée est activée.

Pour plus d’informations, contactez l’administrateur de votre serveur.

PADVue d’ensemble de la configuration de sécurité renforcée d’Internet Explorer

Internet Explorer security zones settings

Effects of Internet Explorer Enhanced Security Configuration on security zones

Managing Internet Explorer Enhanced Security Configuration

Turning off Internet Explorer Enhanced Security Configuration

Browser security best practices

Internet Explorer Enhanced Security Configuration places your server and Internet Explorer in a configuration that decreases the exposure of your server to potential attacks that can occur through web content and application scripts. As a result, some web sites might not display or perform as expected. Review the following topics for more information about the settings used in this configuration.

Internet Explorer security zones settings

In Internet Explorer, you can configure security settings for several built-in security zones: the Internet zone, the Local intranet zone, the Trusted sites zone, and the Restricted sites zone. Internet Explorer Enhanced Security Configuration assigns security levels to these zones as follows:

  • For the Internet zone, the security level is set to High.

  • For the Trusted sites zone, the security level is set to Medium, which allows browsing of many Internet sites.

  • For the Local intranet zone, the security level is set to Medium-low, which allows your user credentials (user name and password) to be sent automatically to sites and applications that need them.

  • For the Restricted sites zone, the security level is set to High.

  • All Internet and intranet sites are assigned to the Internet zone by default. Intranet sites are not part of the Local intranet zone unless you explicitly add them to this zone.

Top of page

Effects of Internet Explorer Enhanced Security Configuration on security zones

Internet Explorer Enhanced Security Configuration adjusts the security levels for the existing security zones. The following table describes how each zone is affected.

Security zone Default security level Result

Internet

High

All web sites are assigned to this zone by default. Web pages might not display as expected, and applications that require the web browser might not work correctly because scripts, ActiveX controls, and file downloads have been disabled. If you trust an Internet web site, you can add that site to the Trusted sites zone.

Trusted sites

Medium

This zone is for the Internet sites whose content you trust.

Local intranet

Medium-Low

When visiting web sites on your organization's intranet, you might be repeatedly prompted for credentials (your user name and password) because the Enhanced Security Configuration disables the automatic detection of intranet web sites. To automatically send credentials to selected intranet sites, add those sites to the Local intranet zone. Additionally, access to scripts, executable files, and other files in a shared folder are restricted unless the shared folder is added to this zone.

Caution

Do not add Internet web sites to the Local intranet zone, because your credentials are sent automatically to the web site upon request.

Restricted sites

High

This zone contains sites that are not trusted, such as sites that might damage your computer or data if you attempt to download or run files from them.

In addition to raising the default security level of each zone, the Enhanced Security Configuration also adjusts Internet extensibility and security settings to further reduce exposure to possible future security threats. These settings can be found on the Advanced tab of the Internet Options dialog box. The following table describes the options that are in effect when the Enhanced Security Configuration is enabled.

Setting Name Default Description

Enable third-party browser extensions

Off

Disables Internet Explorer add-ons that might have been created by companies other than Microsoft.

Play sounds in web pages

Off

Disables music and other sounds.

Play animations in web pages

Off

Disables animations.

Check for publisher’s certificate revocation

On

Automatically checks a publisher’s certificate to see whether it has been revoked before accepting it as valid.

Check for server certificate revocation

On

Automatically checks a web site's certificate to determine if the certificate has been revoked.

Check for signatures on downloaded programs

On

Automatically checks that all programs downloaded have a valid digital signature.

Do not save encrypted pages to disk

On

Disables saving encrypted information in the Temporary Internet Files folder.

Empty Temporary Internet Files folder when browser is closed

On

Automatically clears the Temporary Internet Files folder when Internet Explorer is closed.

Enable DOM storage

On

Enables web sites to store information about your browsing session using the Document Object Model (DOM).

Enable Integrated Windows Authentication

On

Requires the use of the “Negotiate” authentication protocol to respond to authentication requests from web servers. Negotiate allows for the use of either Kerberos (preferred) or NTLM for authentication.

Use SSL 3.0

On

Enables the use of the SSL 3.0 protocol for communicating with a web site that supports encrypted communications.

Use TLS 1.0

On

Enables the use of TLS 1.0 protocol for communicating with a web site that supports encrypted communications.

Warn about certificate address mismatch

On

Automatically compares the address in the security certificate with the web site's address and displays a warning if the two addresses do not match before loading the web site.

Warn if POST submittal is redirected to a zone that does not permit posts

On

Displays a warning when you submit information into a form on a web site that is redirected to an address that is different from the one that is hosting the form. This helps prevent your information or browser from being redirected to a non-secure site.

To assist you in getting to necessary resources on the internet with the Enhanced Security Configuration enabled, the following sites and locations are trusted by default:

  • The Microsoft Update web site is added to the Trusted sites zone. This allows you to continue to get important updates for your operating system.

  • The Windows error reporting site is added to the Trusted sites zone. This allows you to report problems encountered with your operating system and search for fixes.

  • The Microsoft TechNet and MSDN sites are added to the Trusted sites zone. This allows you to research information in online articles and other technical topics.

  • The Microsoft redirection site “go.microsoft.com” is added to the Trusted sites zone. This allows you to be connected to the most current versions of Microsoft online content.

  • Several local computer sites (such as http://localhost, https://localhost, and hcp://system) are added to the Local intranet zone. This allows applications and code to work locally so that you can complete common administrative tasks.

  • The privacy level is set to Medium for the Trusted sites zone. You can make the privacy setting more restrictive by blocking specific sites, preventing location awareness, and blocking cookies from specific sites.

Top of page

Managing Internet Explorer Enhanced Security Configuration

Internet Explorer Enhanced Security Configuration is designed to reduce your server's exposure to security threats. To ensure that you get the most benefit from Enhanced Security Configuration, consider these browser management recommendations:

  • All Internet and intranet sites are assigned to the Internet zone by default. If you trust an Internet or intranet site and need it to be functional, add the Internet site to the Trusted sites zone, and add the intranet site to the Local intranet zone.

  • If you want to run a browser-based client application over the Internet, you should add the web page that hosts the application to the Trusted sites zone.

  • If you want to run a browser-based client application over a protected and secure local intranet, you should add the web page that hosts the application to the Local intranet zone.

  • Add internal sites and local servers to the Local intranet zone to make sure you have access to, and can run, applications from your servers.

  • Use unattend.txt to add intranet sites and UNC servers to the Local intranet zone inclusion list as part of the installation process.

  • Use client computers to download drivers, service packs, and other updates. Avoid any browsing from servers.

  • If you use disk imaging to install operating systems on your servers, add the intranet sites and UNC servers you trust to the Local intranet zone, and add the Internet sites that you trust to the Trusted sites zone on the base image. You can then change the list on images for different server types and needs.

The following procedures describe how to add site to the Trusted sites and the Local intranet zone:

Add sites to the Trusted sites zone
  1. Navigate to the site that you want to add. Click the Tools icon and then select Internet options.

  2. Click the Security tab.

  3. Click Trusted sites and then click Sites.

  4. In the Trusted sites dialog box, click Add to add the site to the list, and then click Close.

  5. Refresh the page to view the site from its new zone.

Note
  • A web page can be part of only one zone at a time. You cannot add a page to both the Trusted sites zone and the Local intranet zone.

  • Internet Explorer maintains two different lists of sites for the Trusted sites zone. One list is in effect when Enhanced Security Configuration is enabled, and a separate list is in effect when Enhanced Security Configuration is disabled. When you add a web page to the Trusted sites zone, you are adding it only to the list that is currently in effect.

  • When you add a web page to the Trusted sites zone, you are adding the domain for that page. Therefore, all pages within that domain are also added. Many Internet sites use more than one domain to host their content. You may have to add several domains to the Trusted sites zone to have full functionality for one site. For example, if you add http://www.microsoft.com/windows/ to your Trusted sites zone, you are adding http://www.microsoft.com. If you then want to view the Support site, you will have to add http://support.microsoft.com separately, because the Support site is a separate domain.

  • You can use wildcard characters to add all subdomains for a given domain. For example, you can add *.microsoft.com to the list, which adds both www.microsoft.com and support.microsoft.com.

Add sites to the Local intranet zone
  1. Navigate to the site that you want to add. Click the Tools icon and then select Internet options.

  2. Click the Security tab.

  3. Click Local intranet and then click Sites.

  4. In the Local intranet dialog box, click Add to add the site to the list, and then click Close.

  5. Refresh the page to view the site from its new zone.

Note
  • Do not add Internet sites to the Local intranet zone because your credentials are sent automatically to the site if they are requested.

  • A web page can be part of only one zone at a time. You cannot add a page to both the Trusted sites zone and the Local intranet zone.

  • Internet Explorer maintains two different lists of sites for the Local intranet zone. One list is in effect when Enhanced Security Configuration is enabled, and a separate list is in effect when Enhanced Security Configuration is disabled. When you add a web page to the Local intranet zone, you are adding it only to the list that is currently in effect.

  • Enhanced Security Configuration also restricts access to scripts, executable files, and other potentially unsafe files on a UNC path unless it is added to the Local intranet zone explicitly. For example, if you want to access \\server\share\setup.exe, you must add \\server to the Local intranet zone.

Top of page

Turning off Internet Explorer Enhanced Security Configuration

Keeping the Internet Explorer Enhanced Security Configuration enabled on your servers is recommended to help ensure that your servers are not inadvertently exposed to malware or other browser-based attacks. However, in some environments you might wish to turn off the Internet Explorer Enhanced Security Configuration protections to enable easier browsing for administrators or standard users.

To turn off Internet Explorer Enhanced Security Configuration
  1. Close any Internet Explorer browser windows that you might have open.

  2. Open Server Manager

  3. If your server is running Windows Server® 2008 R2, in the Security Information section of Server Summary, click Configure IE ESC to open the Internet Explorer Enhanced Security Configuration dialog.

    If your server is running Windows Server® 2012, click Configure this local server to open the Local Server configuration page. Then, in the Properties area, next to IE Enhanced Security Configuration, click On to open the Internet Explorer Enhanced Security Configuration dialog.

  4. To allow members of the local Administrators group to use Internet Explorer in its default client configuration, under Administrators click Off.

    To allow members of all other groups to use Internet Explorer in its default client configuration, under Users click Off.

    Note

    Once the Internet Explorer Enhanced Configuration is turned off for one set of users, Server Manager will display Off next to Internet Explorer Enhanced Security Configuration.

  5. Click OK to apply your changes.

Top of page

Browser security best practices

Using servers for Internet browsing does not adhere to sound security practices because Internet browsing increases the exposure of your server to potential security attacks. Regardless of the browser you use, you should restrict browsing on your server.

To reduce the risk to your server of potential attacks from malicious web-based content:

  • Do not use servers for browsing general web content.

  • Use client computers to download drivers, service packs, and other updates.

  • Do not view web sites you cannot confirm are secure.

  • Use a limited user account instead of an administrator account for general web browsing.

  • Use Group Policy settings to keep unauthorized users from making inappropriate changes to browser security settings.

Top of page

PAD La Configuration de sécurité renforcée d’Internet Explorer n’est pas activée

Attention : la Configuration de sécurité renforcée d’Internet Explorer n’est pas activée

L’option Configuration de sécurité renforcée d’Internet Explorer configure votre serveur et Internet Explorer de façon à diminuer l’exposition de votre serveur à des attaques potentielles par un contenu Web ou des scripts d’applications. Cela se fait en élevant les niveaux de sécurité par défaut sur les zones de sécurité Internet Explorer et en modifiant les paramètres par défaut.

Il est recommandé de laisser la configuration de sécurité renforcée d’Internet Explorer activée sur vos serveurs afin de garantir que ces derniers ne sont pas exposés par inadvertance à des attaques de programmes malveillants ou via un navigateur. Pour obtenir plus d’informations, notamment la liste complète des modifications implémentées par la configuration de sécurité renforcée d’Internet Explorer, voir la vue d’ensemble de la Configuration de sécurité renforcée d’Internet Explorer.


Pour activer la configuration de sécurité renforcée d’Internet Explorer

  1. Fermez toutes les fenêtres Internet Explorer que vous avez éventuellement ouvertes.
  2. Ouvrez le Gestionnaire de serveur.
    • Si votre serveur exécute Windows Server® 2008 R2, dans la section Informations sur la sécurité de Résumé serveur, cliquez sur Paramétrer la Configuration de sécurité renforcée d’Internet Explorer pour ouvrir la boîte de dialogue Configuration de sécurité renforcée d’Internet Explorer.
    • Si votre serveur exécute Windows Server® 2012, cliquez sur Configurer ce serveur local pour ouvrir la page de configuration Serveur local. Ensuite, dans la zone Propriétés, en regard de Configuration de sécurité renforcée d’Internet Explore, cliquez sur Désactivé pour ouvrir la boîte de dialogue Configuration de sécurité renforcée d’Internet Explorer.
  3. Pour utiliser la configuration de sécurité renforcée d’Internet Explorer lorsque des membres du groupe Administrateurs local sont connectés, sous Administrateurs, cliquez sur Activé.
  4. Pour utiliser la configuration de sécurité renforcée d’Internet Explorer lorsque tous les autres utilisateurs sont connectés, sous Utilisateurs, cliquez sur Activé (recommandé).
  5. Cliquez sur OK pour appliquer les modifications apportées.

Remarque : une fois la configuration de sécurité renforcée d’Internet Explorer activée pour les deux ensembles d’utilisateurs, le Gestionnaire de serveur affiche Activé (recommandé) en regard de Configuration de sécurité renforcée d’Internet Explorer.

PJFIFddDucky<Adobed          !1AQ"aq2BRbr#3$Ss4CD%EUu6F !1QAa"q2BR3rb#C ?( ( (4'_-TpR̭_UyPk!rWPЧ96nJpR9M)[0}a*Q[apx1)54/6xa|$.zuevj{y尷cwn^^x-nHHp>>KIՕ6o(qA՝R⪼[mQ B.+ec;j۴a*MNz("M>Tļ֤s8N'fY˘t%ݺkʃXwqQ޴b (w_t&K|iBI;=և+PδQD>wj)>~"Ke_=kR7M $&9,[>ҐH}VRG.5 i#''D*AaZycy(Im>XW Jyo~=RLK&^uGy[Oz%'kq,e6*.[Rh ܗyb Oؤ'pS_FKqIzߝ*ɑѺ- ZVPB۩ZpJ1))էa=]Z/OY}OD'{DWZ=C«J;{(~TX2W Y*/Wŗl:Y_`  枸EUӷ (>ĥ{en?;jHBsm -vgE[wմfڳFNw.5;ؓRxdNeΒѓ D V IڷU[]>d]ĝn3 -DϦGVSէ~On/Bf6WYV@FDAiߥ#W]jam_malj*Q#.Б~koxWT9rdTo!H )*)*A+J*֚iu>e͂T̜PJN“ŵl<(2Kyen۵%@@0ӌXR6n\}$OmPi -]REP19FT6+18RV,\kdblvg4(`(Oj.=mI/fg*N sBv-x}%?!>m1dWzwQqJ`]sz?)J+̬XoAmJz>=zs_7e'̚/KnaQ"fLn HɄWj+ϱw`/{4KMkK]JԄ6Q֯ƼZd_]t_XnէMtu.NU3wZ\QpkTz3]lf<yKyϏ&2sjRB LST*")RH}ޠM{,.HNFرU[v 0u߯t[`@q,@N9"܇+F( >=y!ۘrK㑤<' ~yο5n[J)[@ *nJ7(Z_-Y-C,yKS {qv[7q/#!O[cҤZ*W2neMܺ/B\J%.ʄ |$-4vQHe۴= Mb?yݰxp^k"}+W ƫn|novV*Q|WzDۀc(ٕ̉I؄NeI[y;~\MQadLuI-o#˶kpK@Qڝ_MY2e8Juoa/RZUKĎ OjSeG^ٽˠ+.AZ(bmm,Fe87%#Z{N^̋Ru!i.U-*n.1/FnRrD}oVW?P=jƓJADF_58NʻhϽG~j~j+o^GJn/Ε([ؐHqRHGb\،"|= U A@s_Evi r+x|e4Qƕsm ix|+Vn% u?h#QMiʔʐNqE"ŸWOFpC86RU*&(t$`EWRG )56w]5rz˞.Wm4-1?Pq)[%-WQrq(Қ~nlU}^WznrNUlEbZ ͐.;]C'Ï^n?RuZ4sx'`Xx2n͵Y||ˤpsbs6/wn+Z)v!oiuKt8ʞMr];KUDnvkqNyՆ*ʔTcq֏<;kz|8Y98?j-Z7/_WFL:eÁ֮5&>\97IW9:*%/+cS|pۅIoNV½RȸT78nRJ,pơ-[!e}W~oKw0Y$ *bE$o>d)#k/z(HRADT~ot(mgsI>hƆ 'qHW(~;xJrpq1Pҷ\TZwvݺ{١)ksleD,dž|H<t7WV-慎?!Լk ro\E^u̔k]9M)Dr@KCKRB6L",_ :eiq^Z$G/`;'RdF%*n2C r()vU2Kq:hzxr.8J9Si5*D\Ҥ3nޞS9cWzO4нχn,Z0/ꃳN? пNk]uTQ_ka'>PW'_x}}=lԸUYO.] 'ٿzSY/S2ou(4 -# Ud8N XBhGBX7Y~}%t3?}!/$q>! "Oןq>'oWJOD'>t`AOQψx|gސuQ .Zae'4kZ}>oNj;hN)kPJR;i&لw!煤.:N*zUf[ {N}/KKk8v 4wj*\'Em.&M{w<*؟ϻ  HTzϫi`9ss@8%39P>zs^][oY6\V (SO^%Cn3kq#Ȗ+1T=3nr8 lRT=_C^c5IޕsGy!:՝v#XX1=Ӱ'1͜btX]r R}6;o ѷ F?LjӮpFU^Bj.'QT;i8O \7)y, |c}Z6"Nn+LZe]yN.']=֊ŨTFO+&Wa$P PoGnڥqF#L;|̰}fիw6E 04K-drnU0; UJdKJk/q 8 H%*"/.$kQO+k4ԤRgtϫzl92#OI _K]2Kq ~2~-ҏ{al39Xu'㭺qܨ<[$Wm@Y,èh Jw, ܰA ǔp%ى:r Bd2Bհ1ey U.Ze RQ9nNn7jM[P]F->bnBx~]YGr}3gv+;![ $Rxj(6ƩPL "!;,A>`OH5M~e5[mqC_+/kĻ~$=ȟ*o/!(BPRR;_ZJDT7Lƾuo {Xd(?'a-q{eU=)9Ld,a_evxsSڄ~!0[ڌMHJd3{ŏkE*L:o-x#)u, rVY+.j+NhG^)!B 7Dj6PWS-|W"oBt;Zk M%.$(y$)$s.фu{}a'Lt?qXyTֿƎgo>v pm Fn:8 5JBMMf8 (!u߇K 2_vzrG ͶchJ@QH߸YJB6ʐ( ( (+JX-9~i4?.bԲ,?c5Q}R ݎ^R\Ol%H} $w82*C߭"51͐ϰ#WӤUr{NZrtŽ*ĭI 'vEk?⽂SᰑK83@P@P@Vzra^ߝ2V㓕tc*[NbNW"%׎wW#gso88U[KҎ-=2s1[Km?U-RZMJ}:4n^Ib.E0ӏsvR0A._xyRkf $6VP-6@3Hf ( ( ( (?PADPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDING