[v1.8] AskAdmin – File and software access permission setting tool

3 This article with all headings and tags is the main content of TorrentBoss. All rights reserved. To repost or reproduce, you must add a clear footnote with the URL to this article!
3 Any manual or automated full-website collection / crawling behavior is strictly prohibited.
3 Any resources shared on TorrentBoss are restricted to personal study and research only, any commercial conduct is strictly prohibited. Otherwise, you may get various types of copyright complaints and you will have to deal with them yourself
3 Before using (especially downloading) any resources shared by TorrentBoss, please first read our Frequently Asked Questions page. Otherwise, please bear all the consequences yourself.
This work is licensed under a Creative Commons Attribution-Noncommercial-ShareAlike 4.0 International License.

Everyone has more or less personal privacy on their phones and computers. To ensure that our privacy is not compromised, we may use App Lock on mobile phones to ensure that we provide passwords when accessing certain apps. But on the computer, as long as the computer is logged in, anyone can access any file and run any program on it. This can lead to privacy and disclosure of important information. In this case, AskAdmin can help you.

AskAdmin is a simple and practical tool for controlling file / application access permissions in Windows. Using it, you can block access to applications, files and folders selected by any unauthorized users. That is, it is able to save a huge amount of resources on your computer in a simple way. And to prevent access to more blocked items, AskAdmin allows you to set an access password.

In particular, AskAdmin offers a variety of software (such as games, chatting tools, web browsers, UWP, CMD, BAT, REG), restrict access to certain files / folders, change specific file name extensions, restrict software installation and running with specific extensions to avoid automatically installing malicious programs on your computer and much more. . In short, AskAdmin is ideal for children and business computer users, and can also be used against some malicious software.

If you have files, folders, or programs on your computer that you don’t want others to see or use, the traditional way of hiding them is unreliable and easy to crack. In this case, you can use AskAdmin to subtly limit their access, even without raising suspicion. Instead, they may think that this is a problem with the system.

// Official demo video //

// version statement //

AppAee provides a fully registered version of AskAdmin Multilingual for Windows 32-bit and 64-bit.

// Download URL //

Version Download Size
v1.8 1.18 MB

(Homepage)

If some download link is missing, and you need it, please send us an email (including post link and missing link) to remind us to re-upload the missing file for you. And, give us some time to respond.
If there is a password for an archive, it should be “appnee.com”.
Most saved downloads (including the 32-bit version) may be requested for re-upload via email.

.

[v5.2] Ardamax Keylogger – Invisible monitoring software with remote installation

3 This article with all headings and tags is the main content of TorrentBoss. All rights reserved. To repost or reproduce, you must add a clear footnote with the URL to this article!
3 Any manual or automated complete website collection / crawling behavior is strictly prohibited.
3 Any resources shared on TorrentBoss are restricted to personal study and research only, any commercial conduct is strictly prohibited. Otherwise, you may get various types of copyright complaints and you will have to deal with them yourself
3 Before using (especially downloading) any resources shared by TorrentBoss, please read our FAQ page first. Otherwise, please bear all the consequences yourself.
This work is licensed under a Creative Commons Attribution-Noncommercial-ShareAlike 4.0 International License.

Sometimes there are many reasons to keep track of computer usage, such as a company wanting to know how its employees are doing at work, or a parent wanting to know how their children are using their computer, and you want to see what others are doing to your computer after you leave. Here is the software like Kilger (Keystroke logging) Comes 7 But it is better not to use it for illegal or immoral purposes!

Ardamax Keylogger is a compact but extremely powerful and flexible keylogger software (basically an invisible spy tool), developed by Russian Ardamax software. It can fully monitor and record any user activity on the installed computer (eg: record all keystrokes and clipboard, take screenshots, record microphones, visit websites and used applications), save all records as an encrypted log file or The web page is accessible only to the admin, then automatically send it to your specific email or FTP server.

As one of the most advanced key-loggers, Ardamax Keylogger also supports keyword filtering function, capable of taking periodic pictures with the camera, and even recording voice perfectly from the microphone. Also, it provides hidden mode (i.e., runs silently in the background) so that users do not find Ardamax Killer running. In this case, it will not appear in the Start menu, Taskbar, System Tray, Task Manager or Programs and Features or even be detected by anti-virus software. In other words, Ardamax Keylogger may disappear completely.

// Key Features //

Features Description
Keystroke logging Records all typed keystrokes, passwords and hidden characters.
The browser is capturing একটি Records a log of all websites visited for all browsers
Webcam recording Periodically takes pictures of webcams and saves them for logging.
Distribute email logs Keylogger can send you recorded logs via e-mail delivery at specific times – perfect for remote monitoring!
FTP delivery Ardamax Keylogger can upload recorded logs via FTP delivery.
Microphone recording Record voice from microphone with real-time compression.
Network Delivery Sends recorded logs via LAN.
Clipboard logging Capture all text copied to the Windows Clipboard.
Invisible mode This makes it completely invisible to anyone. Ardamax Keylogger is not visible in Task Bar, System Tray, Windows 2000 / XP / 2003 / Vista / Windows 7 Task Manager, Process Viewer (Process Explorer, WinTasks etc.), Start Menu and Windows Startup List.
Visual surveillance Periodically creates screenshots and saves compressed images for logging.
Chat monitoring Ardamax Keylogger is designed to record and monitor both aspects of a conversation in the following chat: AIM, Windows Live Messenger, ICQ, Skype, Yahoo Messenger, Google Talk, Miranda, QiP
Security Allows you to save program settings, hidden modes and log files.
Application monitoring Keylogger will record the application that received the keystroke!
Time / date tracking This allows you to mark the exact time of keystroke in a window!
Powerful log viewer You can view and save the log as an HTML page or plain text with the Keylogger Log Viewer.
Small size Ardamax Keylogger is several times smaller than other programs with the same features. It has no additional modules and libraries, so its size is small and performance is high.
Unicode Ardamax Keylogger fully supports Unicode characters which can record keystrokes by incorporating characters from Japanese, Chinese, Arabic and many other character sets.
Other features
  • Windows 2000/2003 / XP / Vista / 7/8/10 support
  • Monitors multi-user machines
  • Automatic startup
  • Friendly interface
  • Easy to install

// version statement //

TorrentBoss provides Ardamax Keylogger Professional Edition multilingual full installer and license files for Windows 32-bit and 64-bit.

// Installation Notes //

For v5.2:

  1. Change your system time to 2021 (v4.5 to 2016, v5.1 to 2019), otherwise it will force you to install the latest version (which does not exist)
  2. Download and install the program
  3. Copy the license file in the following ways:
    • Windows Vista +: C: ProgramData IWG
    • Windows XP: C: Documents and Settings All Users Application Data IWG
  4. Done

// prompt //

  • The default language of the main program of v5.1 + is Russian, to change it:
    1. Right click on the system try icon
    2. Click the fourth item from the top
    3. And click on the fourth item in the left panel
    4. You can then change the language options in the right panel
    5. Restart the main program
    6. Done

// Warning //

The program may be reported as false Win64: KeyloggerX-gen [Trj] Threats with high risk. Use Virus Total Perform a complete, authentic scan and decide whether or not to use it manually.

*** Please note: Antivirus software is not always accurate, just be careful and use it at your own risk.

// Download URL //

License Version Download Size
Professional version v4.5 Saved n / a
v5.1 Saved n / a
v5.2 1.92 MB

(No homepage)

If some download link is missing, and you need it, please send us an email (including post link and missing link) to remind us to re-upload the missing file for you. And, give us some time to respond.
If there is a password for an archive, it should be “appnee.com”.
Most saved downloads (including the 32-bit version) may be requested for re-upload via email.

.

Lock It Easy (LiE) – Secure your USB drive data with a password

3 This article with all headings and tags is the main content of TorrentBoss. All rights reserved. To repost or reproduce, you must add a clear footnote with the URL to this article!
3 Any manual or automated full-website collection / crawling behavior is strictly prohibited.
3 Any resources shared on TorrentBoss are restricted to personal study and research only, any commercial conduct is strictly prohibited. Otherwise, you may get various types of copyright complaints and you will have to deal with them yourself
3 Before using (especially downloading) any resources shared by TorrentBoss, please read our FAQ page first. Otherwise, please bear all the consequences yourself.
This work is licensed under a Creative Commons Attribution-Noncommercial-ShareAlike 4.0 International License.

Lock It Easy can encrypt your U-disk (USB flash) to keep your data secure. With its humanized design operation interface, you can easily achieve encryption of all or part of a USB partition in just a few steps.

Lock it is easy to carry and free, no installation required!

// Key Features //

  • USB Drive Password Protection: Protect your information. Easy and safe.
  • Public / Private Zone Partitioning: Determine how much USB flash drive you want to share with others and how much you want to keep for yourself

// Download URL //

License Version Download Size
Freeware v1.2.4.0 Final 435 KB

(No homepage)

If some download link is missing, and you need it, please send us an email (including post link and missing link) to remind us to re-upload the missing file for you. And, give us some time to respond.
If there is a password for an archive, it should be “appnee.com”.
Most saved downloads (including the 32-bit version) may be requested for re-upload via email.

.

Pocket Kilbox – Process and File Killer

3 This article with all headings and tags is the main content of TorrentBoss. All rights reserved. To repost or reproduce, you must add a clear footnote with the URL to this article!
3 Any manual or automated complete website collection / crawling behavior is strictly prohibited.
3 Any resources shared on TorrentBoss are restricted to personal study and research only, any kind of commercial conduct is strictly prohibited. Otherwise, you may get various types of copyright complaints and you will have to deal with them yourself
3 Before using (especially downloading) any resources shared by TorrentBoss, please read our Frequently Asked Questions page first. Otherwise, please bear all the consequences yourself.
This work is licensed under a Creative Commons Attribution-Noncommercial-ShareAlike 4.0 International License.

Killbox is a very popular tool of many antivirus BBS, it is almost the best partner of the famous “Hijack this”(Manual Anti-Virus Tool).

KillBox is basically a powerful tool that can delete any file, whether the file is an EXE or other file like DLL, and whether the file is running, or it is not being called through the system, KillBox can delete it at once. A few simple steps. For this reason, Kilbox is very useful for anti-virus use.

Many of the currently popular viruses (worms, Trojans) have separate files, nothing to do with the system, so we can safely delete these virus files. But in the process of removal, viruses are always difficult to remove because they are slippery, even some world-renowned security software vendors recommend that it is better to kill the viruses in safe mode.

With Killbox, everything becomes easier. First locate the virus’s file through some system analysis tools such as HijackThis, then enter its full path in KillBox, or you can browse and select the virus, finally you have to click the last one-click “Delete File” button (some May require a virus) to restart the computer).

BTW, Pocket Kilbox is portable and free!

[ Related Link ]

[ Download URLs ]

(v2.0.0.978 Final | Homepage)

If some download link is missing, and you need it, please send us an email (including post link and missing link) to remind us to re-upload the missing file for you. And, give us some time to respond.
If there is a password for an archive, it should be “appnee.com”.
Most saved downloads (including the 32-bit version) may be requested to be re-uploaded via email.

.

Recovery – Quickly recover deleted files

3 This article with all headings and tags is the main content of TorrentBoss. All rights reserved. To repost or reproduce, you must add a clear footnote with the URL to this article!
3 Any manual or automated full-website collection / crawling behavior is strictly prohibited.
3 Any resources shared on TorrentBoss are restricted to personal study and research only, any commercial conduct is strictly prohibited. Otherwise, you may get various types of copyright complaints and you will have to deal with them yourself
3 Before using (especially downloading) any resources shared by TorrentBoss, please read our FAQ page first. Otherwise, please bear all the consequences yourself.
This work is licensed under a Creative Commons Attribution-Noncommercial-ShareAlike 4.0 International License.

Recovery is a basic data recovery software, portable, free, and very small, about 160 KB. Its main use is to recover important files that were removed from the recycle bin due to incorrect operation.

In fact, it can even recover deleted files (Shift + Del). You can choose a different single partition to manage and filter search results by file name.

[ Download URLs ]

(v3.2.13 Final | Homepage)

If some download link is missing, and you need it, please send us an email (including post link and missing link) to remind us to re-upload the missing file for you. And, give us some time to respond.
If there is a password for an archive, it should be “appnee.com”.
Most saved downloads (including the 32-bit version) may be requested for re-upload via email.

.

AVG Internet Security 2011 ~ 2015 Universal Keygen and Serial

3 This article with all headings and tags is the main content of TorrentBoss. All rights reserved. To repost or reproduce, you must add a clear footnote with the URL to this article!
3 Any manual or automated complete website collection / crawling behavior is strictly prohibited.
3 Any resources shared on TorrentBoss are restricted to personal study and research only, any kind of commercial conduct is strictly prohibited. Otherwise, you may get various types of copyright complaints and you will have to deal with them yourself
3 Before using (especially downloading) any resources shared by TorrentBoss, please read our Frequently Asked Questions page first. Otherwise, please bear all the consequences yourself.
This work is licensed under a Creative Commons Attribution-Noncommercial-ShareAlike 4.0 International License.

First, if you use the latest version of AVG or the following license numbers do not work well, go to the 20+ AVG Internet Security Universal License Number or AVG 2011 ~ 2018 All Products Universal Keygens Collection.

// Warning License Number for AVG //

  • 8MEH-R6633-YP39H-YCNSR-HCPKV-EEMBR-ACED
  • 8MEH-RGHD3-SUKUO-SXPWA-PWQVP-9EMBR-ACED
  • 8MEH-RGHD3-SUKUO-SXPWA-PDNML-9EMBR-ACED
  • 8MEH-R3VBQ-DC433-3FPOA-YOQFR-NEMBR-ACED
  • 8MEH-RB32G-UP98U-TRLQR-BKQQO-CEMBR-ACED
  • 8MEH-RU7JQ-ACDRM-MQEPR-GHSH8-FEMBR-ACED
  • 8MEH-RF3MY-BZ7CJ-9LUAR-SG97J-CEMBR-ACED
  • 8MEH-RS47Y-82HT8-GONVA-BQGH3-DEMBR-ACED
  • 8MEH-RGM33-K474L-6FGRR-8DOQK-UEMBR-ACED
  • 8MEH-RGM33-K474L-6FGRR-899MQ-UEMBR-ACED
  • 8MEH-RW2ZU-29S4F-26QCR-WFZV4-BEMBR-ACED
  • 8MEH-RREY3-L2LQA-LUMOR-UHNK2-6EMBR-ACED
  • 8MEH-RPDWL-THRLY-O8Z3R-474SC-4EMBR-ACED
  • 8MEH-RPTGT-KMOL7-EEEVR-KORKD-LEMBR-ACED
  • 8MEH-RMXLW-HN44A-BABPA-SBK3B-PEMBR-ACED
  • 8MEH-RCKOP-BP9KK-YW8EA-6K8TK-sembra-acid
  • 8MEH-RFR8J-PTS8Q-92ATA-OTV8K-JEMBR-ACED
  • 8MEH-RCKOP-BP9KK-YW8EA-6XSTN-SEMBR-ACED
  • 8MEH-RNZLL-2Y4QX-79PPA-MRVQG-AEMBR-ACED
  • 8MEH-RF3MY-BZ7CJ-9LUAR-SDNYQ-CEMBR-ACED
  • 8MEH-RYH2W-SAT6N-H2HGA-WPNL4-9EMBR-ACED
  • 8MEH-RLKZO-8CQHH-HSYKA-KGQ7A-SEMBR-ACED
  • 8MEH-RF3MY-BZ7CJ-9LUAR-SJG6J-CEMBR-ACED
  • 8MEH-R2CML-SS7FW-MOXFR-TXSKS-3EMBR-ACED
  • 8MEH-RCKOP-BP9KK-YW8EA-6V6VM-SEMBR-ACED
  • 8MEH-R2CML-SS7FW-MOXFR-TVC9T-3EMBR-ACED
  • 8MEH-RFR8J-PTS8Q-92ATA-O4WHO-JEMBR-ACED
  • 8MEH-RPDWL-THRLY-O8Z3R-4H3OA-4EMBR-ACED
  • 8MEH-RCB97-4HRT9-P4RRR-RRFOP-2EMBR-ACED
  • 8MEH-RF3MY-BZ7CJ-9LUAR-ST99N-CEMBR-ACED
  • 8MEH-RMXLW-HN44A-BABPA-S9NQF-PEMBR-ACED
  • 8MEH-RGM33-K474L-6FGRR-8RR7K-UEMBR-ACED
  • 8MEH-RF3MY-BZ7CJ-9LUAR-SZSVO-CEMBR-ACED
  • 8MEH-RR6GC-KLJJD-S7DBA-NQFWZ-EEMBR-ACED
  • 8MEH-RFR8J-PTS8Q-92ATA-OSP8J-JEMBR-ACED
  • 8MEH-RCKOP-BP9KK-YW8EA-6TSZM-SEMBR-ACED
  • 8MEH-RAJC2-O3P77-KRRQA-HJO7K-REMBR-ACED
  • 8MEH-R6BFE-HWUHF-DPNDA-VFUWX-2EMBR-ACED
  • 8MEH-RXYFD-JUV72-8922R-FTBZ6-QEMBR-ACED
  • 8MEH-RFR8J-PTS8Q-92ATA-ORC6Q-JEMBR-ACED
  • 8MEH-RS47Y-82HT8-GONVA-BCCCZ-DEMBR-ACED
  • 8MEH-RXYFD-JUV72-8922R-FTDO8-QEMBR-ACED

// Use instructions //

  1. Download and install the AVG Internet Security 2011 ~ 2015 trial version from the official website
  2. When asked, choose a serial above or you can go “Help -> Activate“And then write”License number“Above (“Username“And”Institution“May be something you like or empty)
  3. That’s it!

Keygen by EMBRACE:

AVG Serial Version 1 by Vendetta:

// Related Links //

// Download URL //

Content Version Download Size
Official web installer The latest n / a
Keygen by EMBRACE Public TorrentBoss.com 57.7 KB
Keygen by Vendetta TorrentBoss.com 95.6 KB

(Homepage)

If some download link is missing, and you need it, please send us an email (including post link and missing link) to remind us to re-upload the missing file for you. And, give us some time to respond.
If there is a password for an archive, it should be “appnee.com”.
Most saved downloads (including the 32-bit version) may be requested to be re-uploaded via email.

.

TrueCrypt – Only the best open source, on-the-fly disk encryption utility

3 This article with all headings and tags is the main content of TorrentBoss. All rights reserved. To repost or reproduce, you must add a clear footnote with the URL to this article!
3 Any manual or automated full-website collection / crawling behavior is strictly prohibited.
3 Any resources shared on TorrentBoss are restricted to personal study and research only, any kind of commercial conduct is strictly prohibited. Otherwise, you may get various types of copyright complaints and you will have to deal with them yourself
3 Before using (especially downloading) any resources shared by TorrentBoss, please read our FAQ page first. Otherwise, please bear all the consequences yourself.
This work is licensed under a Creative Commons Attribution-Noncommercial-ShareAlike 4.0 International License.

To protect data security, we need to use some encryption software, but of the many such programs, the best must be TrueCrypt which has a wide range of functions, strong encryption capabilities and these three excellent conditions are easy to use. Same time!

TrueCrypt, the only free and open source On-the-fly (Real-Time) Virtual Dynamic Encryption Application At this point, it does not need to create any files on the hard drive to create an encrypted virtual disk. Users can see this encrypted disk as usual, but all files on this virtual disk will be encrypted automatically (encryption and decryption processes real-time), we need a password to access it.

TrueCrypt offers a variety of encryption algorithms, including: AES-256, Blowfish (448-bit key), CAST5, The snake, Triple DESAnd Two fish.

// Work Policy //

I can add the TrueCrypt working principle to a word: to create a virtual encrypted disk in a file, the encrypted object can be a file, a partition (including system partition) or an entire storage device (including USB, etc.). This is its advantage – which makes the whole encryption process much easier.

// Supported OS //

// Download URL //

(No homepage | Sourcefarge)

If some download link is missing, and you need it, please send us an email (including post link and missing link) to remind us to re-upload the missing file for you. And, give us some time to respond.
If there is a password for an archive, it should be “appnee.com”.
Most saved downloads (including the 32-bit version) may be requested to be re-uploaded via email.

.

UltraShredder – smash files safely

3 This article with all headings and tags is the main content of TorrentBoss. All rights reserved. To repost or reproduce, you must add a clear footnote with the URL to this article!
3 Any manual or automated full-website collection / crawling behavior is strictly prohibited.
3 Any resources shared on TorrentBoss are restricted to personal study and research only, any kind of commercial conduct is strictly prohibited. Otherwise, you may get various types of copyright complaints and you will have to deal with them yourself
3 Before using (especially downloading) any resources shared by TorrentBoss, please read our FAQ page first. Otherwise, please bear all the consequences yourself.
This work is licensed under a Creative Commons Attribution-Noncommercial-ShareAlike 4.0 International License.

UltraShredder is a small (~ 250 KB) file eraser from Germany that supports batch deletion. We see that it has an “Ultra” in its name, indicating that it is not a simple delete, but really allows us to safely delete sensitive data and it is unchangeable, so please be careful when you delete the file.

UltraShredder supports drag and drop, it simplifies operation and integrates recycle bin related activities which is more convenient.

// Warning //

If you accidentally delete a file, please use its delete function carefully.

// Download URL //

Softpedia fast link page

CNET fast link page

Official 1 Fast Link Page (Homepage)

If some download link is missing, and you need it, please send us an email (including post link and missing link) to remind us to re-upload the missing file for you. And, give us some time to respond.
If there is a password for an archive, it should be “appnee.com”.
Most saved downloads (including the 32-bit version) may be requested to be re-uploaded via email.

.

ClipClear – A great alternative to Microsoft Clipboard Viewer

3 This article with all headings and tags is the main content of TorrentBoss. All rights reserved. To repost or reproduce, you must add a clear footnote with the URL to this article!
3 Any manual or automated full-website collection / crawling behavior is strictly prohibited.
3 Any resources shared on TorrentBoss are restricted to personal study and research only, any commercial conduct is strictly prohibited. Otherwise, you may get various types of copyright complaints and you will have to deal with them yourself
3 Before using (especially downloading) any resources shared by TorrentBoss, please read our FAQ page first. Otherwise, please bear all the consequences yourself.
This work is licensed under a Creative Commons Attribution-Noncommercial-ShareAlike 4.0 International License.

When I first saw the name of this app, it made me think of a brand of skin care products. Clear, clearThe pronunciation is somewhat similar.

ClipClear allows text and images to be displayed on the clipboard, has the ability to clear the clipboard if someone peeks, and hides itself in a tray for quick and easy access. Moreover, it uses very little memory and can be used for free.

If you’re a clipboard person, or worried about privacy (eye to eye), this is a great alternative to Microsoft’s built-in clipboard viewer.

// Download URL //

SourceForge Fast Link Page (v3.0.4 Final | Homepage)

Softpedia fast link page

If some download link is missing, and you need it, please send us an email (including post link and missing link) to remind us to re-upload the missing file for you. And, give us some time to respond.
If there is a password for an archive, it should be “appnee.com”.
Most saved downloads (including the 32-bit version) may be requested for re-upload via email.

.

URI Crypter – 10KB e-mail address encryptor

3 This article with all headings and tags is the main content of TorrentBoss. All rights reserved. To repost or reproduce, you must add a clear footnote with the URL to this article!
3 Any manual or automated full-website collection / crawling behavior is strictly prohibited.
3 Any resources shared on TorrentBoss are restricted to personal study and research only, any kind of commercial conduct is strictly prohibited. Otherwise, you may get various types of copyright complaints and you will have to deal with them yourself
3 Before using (especially downloading) any resources shared by TorrentBoss, please read our FAQ page first. Otherwise, please bear all the consequences yourself.
This work is licensed under a Creative Commons Attribution-Noncommercial-ShareAlike 4.0 International License.

Depending on the needs of the job you may have to publish your office or personal email address on the internet and so get lots of junk mail every day, this is a really annoying thing!

So, to protect our mailbox from a lot of spam mail. We usually practice two solutions: use a form such as “abc at mail.com” or an image instead, the effect is not bad, but not convenient enough. So I am coming to introduce this URI Crypter to everyone!

URI Crypter is a URI Address Encryption Applet, which can allow your email address to be displayed in a web page format ASCII Code, the purpose is to prevent spam robot scanning activity, and then effectively prevent spam in return. After all, it’s portable and free.

Very easy to use, run the software, enter an e-mail address (URI), and if you want to add a description, then click “Crypt”, that’s all!

// Encrypted Email Address //

// Download URL //

Official 1 Fast Link Page (Homepage)

Official 1 Fast Link Page (Homepage)

Softpedia fast link page

If some download link is missing, and you need it, please send us an email (including post link and missing link) to remind us to re-upload the missing file for you. And, give us some time to respond.
If there is a password for an archive, it should be “appnee.com”.
Most saved downloads (including the 32-bit version) may be requested to be re-uploaded via email.

.

1 2 3 9