MZ@ !L!This program cannot be run in DOS mode. $Rؕ3}3}3}H̴3}H̱3}Rich3}PEL!  0@.rsrc @@@@Xx>(@Xpy HZv0H`p 0`@^26 4 (,3C8Ի ZMUICOUA.CSS COUAPRINT.CSS HARDADMIN.HTM HARDUSER.HTM IESECHELP.HTM SOFTADMIN.HTM IELOCK.JPG"Ԁw\V1(GRr"?j֜ MUI>zh-CNHȐInternet Explorer X:_v[hQMn Microsoft YaHei UIP Internet Explorer X:_v[hQMn(IE ESC)MNON`Ov gRhVf2NegWN Web Q[v\o(W;eQvΘi0P#Internet Explorer X:_v[hQMn؞`Q N:N Administrators ~T Users ~/T(u0P?~ {tXT(&A):PQ Pi P/Q /T(u(cP) P/i sQPI (u7b(&U):P P P/ /T(u(cP) P/ sQP SysLink<A> gsQ Internet Explorer X:_v[hQMnv~Oo`</A>PP2nx[P2SmȀQhR:_v Internet Explorer Microsoft YaHei UIPDDP#!5iPSkSysLink<A>N gsQ Internet Explorer vX:_[hQMnv~Oo`</A>PS2nx[N{tXTN{vU_ O Y Internet Explorer0PA ^(uX:_v[hQMnPA X:_v[hQMn]/T(u0PA4VS_VERSION_INFO @% @%?StringFileInfo080404B0LCompanyNameMicrosoft Corporation: FileDescriptionIOD Hr,g f\v+FileVersion11.00.9600.16384 (winblue_rtm.130821-1623)8 InternalNameiesetup.dll.LegalCopyright Microsoft Corporation. All rights reserved.HOriginalFilenameiesetup.dll.muiDProductNameInternet ExplorerFProductVersion11.00.9600.16384(OleSelfRegisterDVarFileInfo$Translation/* Style sheet optimized for IE4x - Last updated 1/16/03 */ body { color: #000000; background: #FFFFFF; font-size: 75%; font-family: Microsoft YaHei UI, Microsoft YaHei, 宋体, Verdana, Arial, Sans Serif; } a:link, a:visited { color: "#0000FF"; text-decoration:"underline";} a:active { color: "#FF0000"; cursor:hand; text-decoration:"underline";} a:hover { color: "#FF0000"; cursor:hand; text-decoration:"underline";} h1 { font-size: 125%; margin-bottom:" .5em"; clear:both; } h2 { font-size: 115%; margin-top: "1.5em"; margin-bottom:" .5em"; clear:both; } h3 { font-size: 105%; margin-top: "1.2em"; margin-bottom: ".5em"; clear:both; } p { margin-top:" .6em"; margin-bottom: ".6em"; } ol { margin-top: ".5em"; margin-bottom: 0; margin-left: "2.1em"; padding-left: "0em"; margin-right:"2.1em" } ul { margin-top: ".6em"; margin-bottom: 0; list-style-type: disc; margin-left: "1.5em"; padding-left: "0em"; margin-right: "1.5em"; } li { margin-bottom: ".7em"; clear:both; } table { font-size: 100%; margin-top: "1em"; margin-bottom: "1em"; } th { text-align: left; background: #DDDDDD; vertical-align: bottom; padding: .2em; padding-left: .45em; padding-right: .5em;} tr { vertical-align: top; } td { background: #EEEEEE; vertical-align: top; padding: .2em; padding-left: .45em; padding-right: .5em;} p.proclabel { font-size: 105%; font-weight: bold; clear: both; } p.note,p.tip, p.important, p.caution, p.warning { font-weight:bold; clear:both; margin-top:"1em"; margin-bottom:"-.25em"; } /***********************************/ /* Style for print only functionality used with external URL link coUA_print.css*/ span.printOnly {display:none } /***************************************************/ /* STYLES USED IN IE DELIVERABLE ONLY */ td.ie { background: #FFFFFF; vertical-align: top; padding: .2em; padding-left: .45em; padding-right: .5em;} p.bigproc { font-size: 110%; font-weight: bold; clear: both; } /* last updated 6/15/99 */ body { color: #000000; background: #FFFFFF; font-size: 75%; font-family: Microsoft YaHei UI, Microsoft YaHei, 宋体, Verdana, Arial, Sans Serif; } H1 { font-size: 150% } H2 { font-size: 115% } H3 { font-size: 105% } span.printOnly { display:inline; } #nav { display:none } div.expand { margin-left: "1.5em"; display:block; } img.expand { margin-left: "1.5em"; display: none} table { font-size: 105%; border-collapse: collapse; } th { text-align:left; border-style: solid; border-width: 1px; border-bottom-width: 2px; } td { border-style: solid; border-width: 1px; } ul { margin-left: "1.5em"; list-style-type: disc; } #text { overflow:visible; } img.thumbnail {vertical-align: top; margin-left: 0; width:auto; border-width: 1; } PAD Internet Explorer 增强的安全配置已启用

Internet Explorer 增强的安全配置已启用

Internet Explorer 增强的安全配置当前已在服务器上启用。它配置了许多定义用户如何浏览 Internet 和 Intranet 网站的安全设置。该设置还降低了你的服务器暴露在可能带来安全风险的网站的可能性。有关此配置中安全设置的完整列表,请参阅Internet Explorer 增强的安全配置的效果

该增强的安全级别可能会阻止网站在 Internet Explorer 中正确显示并限制对网络资源的访问,如通用命名约定(UNC)共享上的文件。如果你想浏览一个需要使用已禁用的 Internet Explorer 功能的网站,可以将该网站添加到本地 Intranet 或“受信任的站点区域”的包含列表中。有关详细信息,请参阅管理 Internet Explorer 增强的安全配置

P Internet Explorer 增强的安全配置已启用

Internet Explorer 增强的安全配置已启用

你的服务器管理员已将增强的安全设置应用到 Internet Explorer。这些安全设置可能会阻止你访问某些网站和网络资源,或阻止执行其他浏览器操作,如下载文件。如果你信任某个网站并需要它发挥作用,你可以将该网址添加到受信任的站点区域。有关详细信息,请参阅启用 Internet Explorer 增强的安全配置时如何浏览

有关详细信息,请联系你的服务器管理员。

PInternet Explorer 增强的安全配置概述

Internet Explorer security zones settings

Effects of Internet Explorer Enhanced Security Configuration on security zones

Managing Internet Explorer Enhanced Security Configuration

Turning off Internet Explorer Enhanced Security Configuration

Browser security best practices

Internet Explorer Enhanced Security Configuration places your server and Internet Explorer in a configuration that decreases the exposure of your server to potential attacks that can occur through web content and application scripts. As a result, some web sites might not display or perform as expected. Review the following topics for more information about the settings used in this configuration.

Internet Explorer security zones settings

In Internet Explorer, you can configure security settings for several built-in security zones: the Internet zone, the Local intranet zone, the Trusted sites zone, and the Restricted sites zone. Internet Explorer Enhanced Security Configuration assigns security levels to these zones as follows:

  • For the Internet zone, the security level is set to High.

  • For the Trusted sites zone, the security level is set to Medium, which allows browsing of many Internet sites.

  • For the Local intranet zone, the security level is set to Medium-low, which allows your user credentials (user name and password) to be sent automatically to sites and applications that need them.

  • For the Restricted sites zone, the security level is set to High.

  • All Internet and intranet sites are assigned to the Internet zone by default. Intranet sites are not part of the Local intranet zone unless you explicitly add them to this zone.

Top of page

Effects of Internet Explorer Enhanced Security Configuration on security zones

Internet Explorer Enhanced Security Configuration adjusts the security levels for the existing security zones. The following table describes how each zone is affected.

Security zone Default security level Result

Internet

High

All web sites are assigned to this zone by default. Web pages might not display as expected, and applications that require the web browser might not work correctly because scripts, ActiveX controls, and file downloads have been disabled. If you trust an Internet web site, you can add that site to the Trusted sites zone.

Trusted sites

Medium

This zone is for the Internet sites whose content you trust.

Local intranet

Medium-Low

When visiting web sites on your organization's intranet, you might be repeatedly prompted for credentials (your user name and password) because the Enhanced Security Configuration disables the automatic detection of intranet web sites. To automatically send credentials to selected intranet sites, add those sites to the Local intranet zone. Additionally, access to scripts, executable files, and other files in a shared folder are restricted unless the shared folder is added to this zone.

Caution

Do not add Internet web sites to the Local intranet zone, because your credentials are sent automatically to the web site upon request.

Restricted sites

High

This zone contains sites that are not trusted, such as sites that might damage your computer or data if you attempt to download or run files from them.

In addition to raising the default security level of each zone, the Enhanced Security Configuration also adjusts Internet extensibility and security settings to further reduce exposure to possible future security threats. These settings can be found on the Advanced tab of the Internet Options dialog box. The following table describes the options that are in effect when the Enhanced Security Configuration is enabled.

Setting Name Default Description

Enable third-party browser extensions

Off

Disables Internet Explorer add-ons that might have been created by companies other than Microsoft.

Play sounds in web pages

Off

Disables music and other sounds.

Play animations in web pages

Off

Disables animations.

Check for publisher’s certificate revocation

On

Automatically checks a publisher’s certificate to see whether it has been revoked before accepting it as valid.

Check for server certificate revocation

On

Automatically checks a web site's certificate to determine if the certificate has been revoked.

Check for signatures on downloaded programs

On

Automatically checks that all programs downloaded have a valid digital signature.

Do not save encrypted pages to disk

On

Disables saving encrypted information in the Temporary Internet Files folder.

Empty Temporary Internet Files folder when browser is closed

On

Automatically clears the Temporary Internet Files folder when Internet Explorer is closed.

Enable DOM storage

On

Enables web sites to store information about your browsing session using the Document Object Model (DOM).

Enable Integrated Windows Authentication

On

Requires the use of the “Negotiate” authentication protocol to respond to authentication requests from web servers. Negotiate allows for the use of either Kerberos (preferred) or NTLM for authentication.

Use SSL 3.0

On

Enables the use of the SSL 3.0 protocol for communicating with a web site that supports encrypted communications.

Use TLS 1.0

On

Enables the use of TLS 1.0 protocol for communicating with a web site that supports encrypted communications.

Warn about certificate address mismatch

On

Automatically compares the address in the security certificate with the web site's address and displays a warning if the two addresses do not match before loading the web site.

Warn if POST submittal is redirected to a zone that does not permit posts

On

Displays a warning when you submit information into a form on a web site that is redirected to an address that is different from the one that is hosting the form. This helps prevent your information or browser from being redirected to a non-secure site.

To assist you in getting to necessary resources on the internet with the Enhanced Security Configuration enabled, the following sites and locations are trusted by default:

  • The Microsoft Update web site is added to the Trusted sites zone. This allows you to continue to get important updates for your operating system.

  • The Windows error reporting site is added to the Trusted sites zone. This allows you to report problems encountered with your operating system and search for fixes.

  • The Microsoft TechNet and MSDN sites are added to the Trusted sites zone. This allows you to research information in online articles and other technical topics.

  • The Microsoft redirection site “go.microsoft.com” is added to the Trusted sites zone. This allows you to be connected to the most current versions of Microsoft online content.

  • Several local computer sites (such as http://localhost, https://localhost, and hcp://system) are added to the Local intranet zone. This allows applications and code to work locally so that you can complete common administrative tasks.

  • The privacy level is set to Medium for the Trusted sites zone. You can make the privacy setting more restrictive by blocking specific sites, preventing location awareness, and blocking cookies from specific sites.

Top of page

Managing Internet Explorer Enhanced Security Configuration

Internet Explorer Enhanced Security Configuration is designed to reduce your server's exposure to security threats. To ensure that you get the most benefit from Enhanced Security Configuration, consider these browser management recommendations:

  • All Internet and intranet sites are assigned to the Internet zone by default. If you trust an Internet or intranet site and need it to be functional, add the Internet site to the Trusted sites zone, and add the intranet site to the Local intranet zone.

  • If you want to run a browser-based client application over the Internet, you should add the web page that hosts the application to the Trusted sites zone.

  • If you want to run a browser-based client application over a protected and secure local intranet, you should add the web page that hosts the application to the Local intranet zone.

  • Add internal sites and local servers to the Local intranet zone to make sure you have access to, and can run, applications from your servers.

  • Use unattend.txt to add intranet sites and UNC servers to the Local intranet zone inclusion list as part of the installation process.

  • Use client computers to download drivers, service packs, and other updates. Avoid any browsing from servers.

  • If you use disk imaging to install operating systems on your servers, add the intranet sites and UNC servers you trust to the Local intranet zone, and add the Internet sites that you trust to the Trusted sites zone on the base image. You can then change the list on images for different server types and needs.

The following procedures describe how to add site to the Trusted sites and the Local intranet zone:

Add sites to the Trusted sites zone
  1. Navigate to the site that you want to add. Click the Tools icon and then select Internet options.

  2. Click the Security tab.

  3. Click Trusted sites and then click Sites.

  4. In the Trusted sites dialog box, click Add to add the site to the list, and then click Close.

  5. Refresh the page to view the site from its new zone.

Note
  • A web page can be part of only one zone at a time. You cannot add a page to both the Trusted sites zone and the Local intranet zone.

  • Internet Explorer maintains two different lists of sites for the Trusted sites zone. One list is in effect when Enhanced Security Configuration is enabled, and a separate list is in effect when Enhanced Security Configuration is disabled. When you add a web page to the Trusted sites zone, you are adding it only to the list that is currently in effect.

  • When you add a web page to the Trusted sites zone, you are adding the domain for that page. Therefore, all pages within that domain are also added. Many Internet sites use more than one domain to host their content. You may have to add several domains to the Trusted sites zone to have full functionality for one site. For example, if you add http://www.microsoft.com/windows/ to your Trusted sites zone, you are adding http://www.microsoft.com. If you then want to view the Support site, you will have to add http://support.microsoft.com separately, because the Support site is a separate domain.

  • You can use wildcard characters to add all subdomains for a given domain. For example, you can add *.microsoft.com to the list, which adds both www.microsoft.com and support.microsoft.com.

Add sites to the Local intranet zone
  1. Navigate to the site that you want to add. Click the Tools icon and then select Internet options.

  2. Click the Security tab.

  3. Click Local intranet and then click Sites.

  4. In the Local intranet dialog box, click Add to add the site to the list, and then click Close.

  5. Refresh the page to view the site from its new zone.

Note
  • Do not add Internet sites to the Local intranet zone because your credentials are sent automatically to the site if they are requested.

  • A web page can be part of only one zone at a time. You cannot add a page to both the Trusted sites zone and the Local intranet zone.

  • Internet Explorer maintains two different lists of sites for the Local intranet zone. One list is in effect when Enhanced Security Configuration is enabled, and a separate list is in effect when Enhanced Security Configuration is disabled. When you add a web page to the Local intranet zone, you are adding it only to the list that is currently in effect.

  • Enhanced Security Configuration also restricts access to scripts, executable files, and other potentially unsafe files on a UNC path unless it is added to the Local intranet zone explicitly. For example, if you want to access \\server\share\setup.exe, you must add \\server to the Local intranet zone.

Top of page

Turning off Internet Explorer Enhanced Security Configuration

Keeping the Internet Explorer Enhanced Security Configuration enabled on your servers is recommended to help ensure that your servers are not inadvertently exposed to malware or other browser-based attacks. However, in some environments you might wish to turn off the Internet Explorer Enhanced Security Configuration protections to enable easier browsing for administrators or standard users.

To turn off Internet Explorer Enhanced Security Configuration
  1. Close any Internet Explorer browser windows that you might have open.

  2. Open Server Manager

  3. If your server is running Windows Server® 2008 R2, in the Security Information section of Server Summary, click Configure IE ESC to open the Internet Explorer Enhanced Security Configuration dialog.

    If your server is running Windows Server® 2012, click Configure this local server to open the Local Server configuration page. Then, in the Properties area, next to IE Enhanced Security Configuration, click On to open the Internet Explorer Enhanced Security Configuration dialog.

  4. To allow members of the local Administrators group to use Internet Explorer in its default client configuration, under Administrators click Off.

    To allow members of all other groups to use Internet Explorer in its default client configuration, under Users click Off.

    Note

    Once the Internet Explorer Enhanced Configuration is turned off for one set of users, Server Manager will display Off next to Internet Explorer Enhanced Security Configuration.

  5. Click OK to apply your changes.

Top of page

Browser security best practices

Using servers for Internet browsing does not adhere to sound security practices because Internet browsing increases the exposure of your server to potential security attacks. Regardless of the browser you use, you should restrict browsing on your server.

To reduce the risk to your server of potential attacks from malicious web-based content:

  • Do not use servers for browsing general web content.

  • Use client computers to download drivers, service packs, and other updates.

  • Do not view web sites you cannot confirm are secure.

  • Use a limited user account instead of an administrator account for general web browsing.

  • Use Group Policy settings to keep unauthorized users from making inappropriate changes to browser security settings.

Top of page

PA Internet Explorer 增强的安全配置未启用

警告: Internet Explorer 增强的安全配置未启用

Internet Explorer 增强的安全配置可对你的服务器和 Internet Explorer 进行配置,通过 Web 内容和应用程序脚本降低你的服务器受到潜在攻击的可能性。此操作可通过在 Internet Explorer 安全区域中提高默认安全级别并更改默认设置来完成。

建议在你的服务器上始终开启 Internet Explorer 增强的安全配置,以帮助确保你的服务器不会意外受到恶意软件或其他基于浏览器的攻击。有关详细信息(包括 Internet Explorer 增强的安全配置实现的完整更改列表),请参阅 Internet Explorer 增强的安全配置概述。


启用 Internet Explorer 增强的安全配置

  1. 关闭可能已经打开的任何 Internet Explorer 窗口。
  2. 打开服务器管理器。
    • 如果你的服务器运行的是 Windows Server® 2008 R2,请在“服务器摘要”的“安全信息”部分中单击“配置 IE ESC”,以打开“Internet Explorer 增强的安全配置”对话框。
    • 如果你的服务器运行的是 Windows Server® 2012,请单击“配置此本地服务器”以打开“本地服务器”配置页。然后,在“属性”区域的“IE 增强的安全配置”旁边,单击“关闭”以打开“Internet Explorer 增强的安全配置”对话框。
  3. 要在本地 Administrators 组的成员登录时使用 Internet Explorer 增强的配置,请在“管理员”下单击“启用”
  4. 要在其他所有用户登录时使用 Internet Explorer 增强的配置,请在“用户”下单击“启用(推荐)”
  5. 单击“确定”以应用更改。

注意: 为两组用户启用 Internet Explorer 增强的配置后,服务器管理器将在“ Internet Explorer 增强的安全配置”旁边显示“启用(推荐)”

PADJFIFHH[ExifMM*bj(1r2i ' 'Adobe Photoshop CS4 Windows2010:08:06 16:58:09&(.%HHJFIFHH Adobe_CMAdobed            "?   3!1AQa"q2B#$Rb34rC%Scs5&DTdE£t6UeuF'Vfv7GWgw5!1AQaq"2B#R3$brCScs4%&5DTdEU6teuFVfv'7GWgw ?TI%)$IJI$RLH` I+=X:CL2\ uGce m2 dD|:),uX *σkxjsXk$NF.jf|/)/UC'x*.{Ĭz:05㱥Vl, Ì?bُ-*p`߼)#/vTviʨU:8?+<!ap0TI%)$IJXGu9`sNXwɵi_ufۮaZFPߣus*xeŭk{kZ]>st{xu["o{LA`=,f1,-lnvKZ;wQ*`/P2\A,lBX[%&&[ =xz;g?rYde3OO]-X&k =vl{mgqh1Uk.ήڎa4} ek굻&Ceh,gog'^3cïxyNteOӓu z4m#uWwf~d: 4r#:%f7TI%)b}fnơt_?ȳ|3SЙd:G'Re[{áٗK6 {G Re7T\S**ꝡp{*w?N?.cV* cx `\5amW9'<*u~X,Ɩ=׭^keouԑV}#{Fdz\kZjZVVW04#ps# ~x̋IfQ{|5ܠok &fu~1_k>'ψ>?tpߚ||r wZs)_W߯&q}_];AV c?~O|bECC5: 'ڐ'TN$2K$7l Jmlu 3/%+y~of<LG/LQ&Z3 g?Wz o%r?tp[1ޠ~ucz8]2ɻ/M*ۑiƷ>,{74M-:<1/ߔcz\-rc*rG;G?{,,]Nwsjk 'HonHR A/So ŧ\̪oXXbv8?nWMS1 3p}O` JƵIj3d"[p Q?l?U[6͔w++;<%SyyK&dhUִ]G?-WQ"|H`?+}Oc<p-pn.{?w 3?SŏXj)pVs2\.J6LCPv/0AH4!q.8mn&<}Ѯ}fdzmKn&A!k?˖eAfrAaW س5%<|Z6WQe-F[ijm}m8e}zy7OZ@ߛ~&Q?1iM©c_vgs` cGg<$=+pG ak^Yy4O"Z}w7n3Iv#?s8b,~twatg^ݹ@*ή$L$3c#E?UZK{2E[A Z|n{ r~m%f#0N>+ 79Wcƚi }funi~V܏98&?MHnᔤr@qFZî>*wW&s %KzL$Q^Z5g?"eoUs~akc43-tU +-tG_8:^C Ѭ~_ߑE_܆R,i&[HsX'B'.FNK<d;԰&6ۣvWʧ*W m}:O}1u1{9)dT2I0u+r_V}[n;bEtnZ^EpZ-iwUWUsw1.2';C|ϋ}C?W_T˛Ӵp&[m jgүCǯECmu@TO;b70L]Z! d sdF;[- zWI$LTI%,@"*C i!C$EJI$RI$\W֬:>1#&%?gk_7Ycޯzvvrkznc4;~llސdJ[u]MQ{h}f39? P3qnoI̐C͂*?̷*GebzH].mߌ;]}_̘xSqk@ lOTI%)$IJI$RI$I%4zATKn{.o_v =f/R?gg]lȺR}yn#MG_ӛoёvlqUµg-,CuwoBkB5ٔQS ׶_COcXS޴B澧z60Y>!] Z@\|cCR` :TI%)$IJI$RI$I%9vpvPܗoi}NvX'swfgX8B]丁L>c_.Wͯ˥5W 14dNUaqr8y#X0lǰlp{4{l몷?շs1GhʛeV15E̸eeیߊ}fNzrl K(šeomۜh]V5_bP1jmCkcCZ?ewב$Photoshop 3.08BIM%8BIMHH8BIM&?8BIM 8BIM8BIM 8BIM' 8BIMH/fflff/ff2Z5-8BIMp8BIM@@8BIM8BIMAielocknullboundsObjcRct1Top longLeftlongBtomlongRghtlongslicesVlLsObjcslicesliceIDlonggroupIDlongoriginenum ESliceOrigin autoGeneratedTypeenum ESliceTypeImg boundsObjcRct1Top longLeftlongBtomlongRghtlongurlTEXTnullTEXTMsgeTEXTaltTagTEXTcellTextIsHTMLboolcellTextTEXT horzAlignenumESliceHorzAligndefault vertAlignenumESliceVertAligndefault bgColorTypeenumESliceBGColorTypeNone topOutsetlong leftOutsetlong bottomOutsetlong rightOutsetlong8BIM( ?8BIM8BIM8BIM A%JFIFHH Adobe_CMAdobed            "?   3!1AQa"q2B#$Rb34rC%Scs5&DTdE£t6UeuF'Vfv7GWgw5!1AQaq"2B#R3$brCScs4%&5DTdEU6teuFVfv'7GWgw ?TI%)$IJI$RLH` I+=X:CL2\ uGce m2 dD|:),uX *σkxjsXk$NF.jf|/)/UC'x*.{Ĭz:05㱥Vl, Ì?bُ-*p`߼)#/vTviʨU:8?+<!ap0TI%)$IJXGu9`sNXwɵi_ufۮaZFPߣus*xeŭk{kZ]>st{xu["o{LA`=,f1,-lnvKZ;wQ*`/P2\A,lBX[%&&[ =xz;g?rYde3OO]-X&k =vl{mgqh1Uk.ήڎa4} ek굻&Ceh,gog'^3cïxyNteOӓu z4m#uWwf~d: 4r#:%f7TI%)b}fnơt_?ȳ|3SЙd:G'Re[{áٗK6 {G Re7T\S**ꝡp{*w?N?.cV* cx `\5amW9'<*u~X,Ɩ=׭^keouԑV}#{Fdz\kZjZVVW04#ps# ~x̋IfQ{|5ܠok &fu~1_k>'ψ>?tpߚ||r wZs)_W߯&q}_];AV c?~O|bECC5: 'ڐ'TN$2K$7l Jmlu 3/%+y~of<LG/LQ&Z3 g?Wz o%r?tp[1ޠ~ucz8]2ɻ/M*ۑiƷ>,{74M-:<1/ߔcz\-rc*rG;G?{,,]Nwsjk 'HonHR A/So ŧ\̪oXXbv8?nWMS1 3p}O` JƵIj3d"[p Q?l?U[6͔w++;<%SyyK&dhUִ]G?-WQ"|H`?+}Oc<p-pn.{?w 3?SŏXj)pVs2\.J6LCPv/0AH4!q.8mn&<}Ѯ}fdzmKn&A!k?˖eAfrAaW س5%<|Z6WQe-F[ijm}m8e}zy7OZ@ߛ~&Q?1iM©c_vgs` cGg<$=+pG ak^Yy4O"Z}w7n3Iv#?s8b,~twatg^ݹ@*ή$L$3c#E?UZK{2E[A Z|n{ r~m%f#0N>+ 79Wcƚi }funi~V܏98&?MHnᔤr@qFZî>*wW&s %KzL$Q^Z5g?"eoUs~akc43-tU +-tG_8:^C Ѭ~_ߑE_܆R,i&[HsX'B'.FNK<d;԰&6ۣvWʧ*W m}:O}1u1{9)dT2I0u+r_V}[n;bEtnZ^EpZ-iwUWUsw1.2';C|ϋ}C?W_T˛Ӵp&[m jgүCǯECmu@TO;b70L]Z! d sdF;[- zWI$LTI%,@"*C i!C$EJI$RI$\W֬:>1#&%?gk_7Ycޯzvvrkznc4;~llސdJ[u]MQ{h}f39? P3qnoI̐C͂*?̷*GebzH].mߌ;]}_̘xSqk@ lOTI%)$IJI$RI$I%4zATKn{.o_v =f/R?gg]lȺR}yn#MG_ӛoёvlqUµg-,CuwoBkB5ٔQS ׶_COcXS޴B澧z60Y>!] Z@\|cCR` :TI%)$IJI$RI$I%9vpvPܗoi}NvX'swfgX8B]丁L>c_.Wͯ˥5W 14dNUaqr8y#X0lǰlp{4{l몷?շs1GhʛeV15E̸eeیߊ}fNzrl K(šeomۜh]V5_bP1jmCkcCZ?ewב$8BIM!UAdobe PhotoshopAdobe Photoshop CS48BIMBhttp://ns.adobe.com/xap/1.0/ Adobed           s!1AQa"q2B#R3b$r%C4Scs5D'6Tdt& EFVU(eufv7GWgw8HXhx)9IYiy*:JZjzm!1AQa"q2#BRbr3$4CS%cs5DT &6E'dtU7()󄔤euFVfvGWgw8HXhx9IYiy*:JZjz ?N*UثWb]v*UثU<h*ؐ2qcpd O ^ٓA dMle ICʡ?IpPi28ĉzH3oY-"_)#EsU8>/QŻX~7uEPWþs?~=,]JHSsW.^d z0m'6o2l!̫՘Wҧ͗p-QQk!'4i2On, "?'& Z?L+X" Ӹ=q'EOElN*UثWb-_Zto_"VC=+}a?O_Gxg~IJ Z2%VE#%KyF"?KPj~=9#56AVR*#9"6Z4n(AʳaH\Kd&blsJ<ۋ65Mj3NnnBF3tSܺN*UثT^i,G_Zz4.ë1ҿ쫙:m4ʇ/quzፗzחҙb$kړA q<}ˏ= vkN+;Aٲo?eaPug])ȒxZQ=yMq!Nst(㍝ح~7Q*KvV5iݩ,G^=O,(oY.<2F{s M{LH7GMKIvc`i!ꜿ7/<;3\gN*UتU4:Pb]*ǰUُ«MnjB#a L oViM8U<"S_oOΣ(꥟!'1}EYea{lv8cOӳ{0KhOu J+h(E6>YݡR:M*Ėvc04z,s˗s<1k=Q'bUƦi--#2D{#ZLwq|yCģdo4FF7,o)W\ uR}($-gnPܦo2R-|Q°FdmcpN&&8V\( j)5/jbz*@̨2hK?^Hn[e IOmq66.t2b"Ɂha\js o"kwѿh1>w{o[[>#"vOe rz GK)2sN*UثƴI+S 73'#"n5~% j  :m`?s^N*U/ՙdPb(sMg l݋_n },l4ITM!S\d{‡r\?wx|g?/ 7P4;pg`pdf-F/˹8yoV1>?o#r(W+$1PypF/ɌeAF/X̚#[]oS+60 —rm0?斒ѐ%f#zm"l~cܾEN*}DRC =>{cQ>GyƷ S)?)s7n?uד?r椚uv5'rN{T/&u @ [AM|vyşawmqhq@م'$Ko+5:/UyꝊv*UثWb]N*<#iEn/e3!LXie+Z̙̽ y枕vO1&{q$P+I浍쎖4/'Ϝ{SY5G1:<$< *f%һu_3 Z~r ȷca!!/^-u1ngӼ&n~?ry'gy3lsIy*[M;8p!sb5#F Kh{O=ҙdyHR6ױ'j dJ_sӴ ?~ 'LImpbpH*AAeQ ɴToJ* sG\`,oRO'dP];v?#+e9G$jBÓKYΙȳ ʓD}1Y^2Le;Iv$=Be'gV>Q-[IÔ@|ܣX@̭N-:zƼ?c[uڎ&r -#sGbHyN!)(Iee4$D1%.^y=V>)[.cu#2z;;k+H,c[[FA言*TI#JN_OSv]7)wP5䇪dIp{3s>'!g\7g$/X7c5n,2>o++s?y/@oO%d  .E2;M@0f* ` S+Timv8Ɨ[Q`;%w%&HcQL!kۖI־$ UeqٻOYˏ ?E*jT}B h]8x79kug<ZAna_N*yJ_g3&qcEJBM{^'4[5~{R!t3<`fYۺb'MW|-o6DŽ2ZzE!_+:.8MIqՏ/9ZMYj6ZGJ#LrOH`/R:Bd31x,Rhͯu[( ߊʠ'j}oYeO f*CڿvJӘz\Ŀ eir_]Vn/.?!kYMfKU%upe ?#v7h"k2Oot?S  VBGBT{;tl}ع9}%Y-[R]ķ$Q<$?QkvlxG]Ï?M:hZ4cG@m~X&Fv(Ŀj5'q% ğbeKriZzο?9\{O4l3:i3XXXwQ@x^K$G 4)G>_=?2e?W7a'6N3'%֧zj&wBOJdA D4_Y8쬤Ǥ>󓫍۸_N*UثWb]v*UتKJu_NV_s,Pˢ?O:G \f kϺ-=OR\_PĶpk;WgGfv*N*UثWb]v*Uثμީqe|Ӽ`㺒.56/FoZyk^Su_aT 7[5igBeHŘSԚe2I~ӵH&MnY}5*iJpٜN*UثWb]v*Uث̼6Z|i珥AWN+3/)S4C0=.M<5{䚏Ц?V&Kk̏ y-i!\~9