Return to Unfiction unforum
 a.r.g.b.b 
FAQ FAQ   Search Search 
 
Welcome!
New users, PLEASE read these forum guidelines. New posters, SEARCH before posting and read these rules before posting your killer new campaign. New players may also wish to peruse the ARG Player Tutorial.

All users must abide by the Terms of Service.
Website Restoration Project
This archiving project is a collaboration between Unfiction and Sean Stacey (SpaceBass), Brian Enigma (BrianEnigma), and Laura E. Hall (lehall) with
the Center for Immersive Arts.
Announcements
This is a static snapshot of the
Unfiction forums, as of
July 23, 2017.
This site is intended as an archive to chronicle the history of Alternate Reality Games.
 
The time now is Tue Nov 12, 2024 6:29 pm
All times are UTC - 4 (DST in action)
View posts in this forum since last visit
View unanswered posts in this forum
Calendar
 Forum index » Archive » Archive: Perplex City » PXC: Puzzles
[SOLVED] Dinah's Handout Puzzle
View previous topicView next topic
Page 1 of 2 [17 Posts]   Goto page: 1, 2 Next
Author Message
Dorkmaster
Unfictologist


Joined: 27 Jul 2004
Posts: 1328
Location: The People's Republic of Dork

[SOLVED] Dinah's Handout Puzzle

Since no one has commented directly in the correct thread, I will post this (completely ripped from the wiki, BTW.) But I wanted to ensure that everyone had access to this...

Apparently, Dinah had handed out postcards and printouts of an email conversation to those who gave her the password "Exchange". This information is also available at the wiki. However, in one of the emails was this:

Code:
AAPOR NFWGC IARUW KRPED BVTVI STKTK NSNYI NQRDK NIESA NUSMO
OMVOX VIWPZ SOCKO FTNVN NYQGG GNSRW AYQEM HMMXQ OPLTP OMENE
FKVMF IBEEB RXLWN AXVLT JZOEN NBCMG UELOC ERGLF SHXQU SNLWU
BYGAR TPKHA ATRQU XRSLS TUSEK LJATD TAYOS GASOB RRFIF EVPIO
NKUIV SNPIN ZEDQZ WAGPO FEGBS VULLF UTYGL XKHKB XVIPL YHUEU
YREEA MASBR VOEJG LXIBR OXNDG YTSNR WBAOE RTCKM AVUOD FABDB
DKLNT DLJTX IVQRO ZFTTE MGANO TBQIV UZGLU XVFOW YYWPH HRAOZ
IWHWY TZAOX WUETM QCVDM CZTPO WRNYC JYUVG GLVKT XBCDX GBPIG
JBFBC DWHRN RVHML LGVVV RFSHU MHZTB MQSGO BRSCR YLCRA YEZEF
SQKLY JMHVQ GCRSE SWBSC RATNY XNWYE UNATI UTTWM BNQXV BLIBG
WVYLP ABHVG LCLFX PUDBE QPGUD HUTPO PEFGO PRWBQ YTYRW XKLVN
GTXZC GMGOJ OHHRB RKGQA ERCVY PTBMF GVMDR APDVE LLMTU NTUCP
BPGRC LJXVF FPLPX EZPHQ OAOSM GBBGI VESAG YYCMR YIBZP IAMXO
GIWXZ AGRRV HMFES EPREK NYXTU CHCMO SFAJO VAIVO WRXNX ZEIAX
AKNDB ZPIQC AOZIT SORGB TJEUB VKJLA MHBGV FUMGH MAHUE IMODR
ZYVOL NCZHV FGAYF RKXAD UZZGG OVMSL YNRUM ILVOG YGPRL YTTET
TSRCS AABEF AYVNJ EZVXU RJBJM RIJXU ZTLGI UEOWW GFBEI QBARV
BEUGL BCHZZ ABXCR CWYKM WORXR TCSQE IZUIA IWRID XTNIT PYWAI
VQKIG UMTSP NEXTV AELEJ GHLMS HACCY AZGVO ZVIFE VGMLI VQFRR
CJVTX SGSIY RNIXR RRRLK NOVRZ HVFXK OYKBF ISTYN HBPIC GBLUI
OSEVJ ZLPOY MRYSX BVVYM QWNLQ XVIFP URSKN PREUB YMRCJ BKEDJ
JYMBU XKGSO LAUCP BPGRN VXAYO KKTQH XLBMB UZKFM DHOVH QVWKE
EBWVR ICTKP TGCNW EUVVS SFVTD EIFGN OCNVH PNYXL ETTRZ BRDAV
SECDU QTPUI YIIGL BXEPH NBWPR QWGIK EZTHE EKSVB WABAR GMPII
LMCSN OPCGH QCWRV QOPOB PERLP BYKZO ILNQI HRPRL FWBHH RZOTE
GBYYT LQCBX NYBLN PHFDC ATPOR UYYET YWHVS IEQFX MIDXL QIWGI
YVMII QOAFI FEZZC YECSX AOGRM VPXCU DHSOZ KBYFP HQLIE GGLCR
HUIMF FXIRP BZAVC QKBSQ RSRIB RXNET BRMSH LBGOS XQVDC RWFOL
BSTJE BBATS WBPDD BVTVI STKTF RMISB EQVTI RMJMT SZMIM KEZGZ
WCPBY WGIWX OLEBO OSQAX NEREI TYZKA HATDP DUVNI VPEFG OPCMY
PGRJN RWYZW XKQCV YOIVT QYBSR EVKCM GSZHV FSGCU EWWIJ VFOSE
SWPKE NYTJY BBATS WBPDK MRPTG DUDPB QIVQW TFPOP TQAYO NXEIL
OUIVA VDHAC CYAZC CFABT GWMEI EEKEI LSXVG MQCIF ZOPAL OAYNY
TJOCT LBAIX MGGLZ MXAIW YOGUE XKGSR QTJRW HKNOE UIKGU PGHZI
WYIRP OUWSN GFTJA BFLKE EWSRO XRGXF RTJGS ATLSB NRETJ OCTLZ
HVGEU VYJHY BWXQV QNDMW MBRSI PEQAH KEUGL XNCJV HCGHC JTVTA
CQHBY ATSQF JONVE CXDNY XTKPS CHMFF QBGTF VGPIN VGGNK RBIKH
JBHVR PKZWA FWEFF VIEVW WOGCI KUEZS ZKYKW BCYNY RNBDO VRESG
NBNZK RJRRH XYFYM PTRGO MFWMK ZTUVE UTIAH SOJGM GPFLX GBXPJ
GOADW GBEEF HCDJR ITFRF GBXUK XWJNI FZGGU LSSSB STJEI PEJED
LLXRU ULXVI WGNCA LGNOU TUTGR IRXOA EGXHL YVWNK PICYP LTPOG
CUBLC RANRJ IJXRH GHKHA IKTMW GRRDO RSBZE QFUNG KLMBC LOUIE
RMMEC MWZEV DGWVG HUTIG MIECR GMBCT BMGPT RDOAT BKJEE FEPBM
PESER FGAYF RKTBI WCVQN DMWMA AQARP IEITT CLRXQ IKBTB TSUDH
UHMBT AGUET TPRWA BJGEG DCREZ QUIFZ UNVMD VEVAS VIBHX OOEVR
ASMCT LBNTY MGGAD OFSRA GKFBR HNIJU SNCYR EHVVL GOVIA ZSCUF
FUTRW HRJIE TTBOW VLHNE GMKSE TGDCT URAEA LRQEI ECIKZ YKNBB
NLGOV GHQCP EDHEU TBUIG CRQIF IQRLT JATRJ GUOZO IPVGS HIVNR
IIRYW BDORM BWCLF DQUUV DWLGU EPHIQ FKEEH RVOLK TBVPI ZZGGT
PODAG EOPAO RSLNR FOXXN KTOMG HCIOY SWLFO HTHVT PREIA URQRD
IKAXI IICIH VOVYT MNAYQ TPRVC ERYXA IUEWB UEDPO OATXO CPYRA
ERWFW ZHVPS NXNIR PPTCG ITBUZ PCUEG HTEMO GGEKV EGDNR OXZHT
LROFE TOQTR QBATP RSZHV EJXVF FPLWU IFZOP ALOAY GBBGC WZIOT
JSMKC NDTLB TGQCS JAAKP LRGOR RMFMJ EFIIK KHLGI ZTRCY SATMN
DEEVO FONTV UWKUE GNMLV VMHHG IKUIK RTOEG HGFQE WZTZZ IMRYR
VTLTB WROFA JVSTB FENEK GMZSG HTBVM


This was part of an email, written from Sente to "xxxx".

Sente apparently has an extremely casual attitude about this, as if it was another social experiment... they discuss the location of the "dropoff" and that one could watch via a webcam, and they discuss locales, until they reach the conclusion that the Abbey Road address is best. Then, sente presents this idea, as a "bonus" to the people that show up (again, reinforcing the idea that puzzles are important parts of daily life to perplex city's denizens).

Anyway, after cracking the code with a Vignere cracking program (is it brute force? I dunno...) enaxor came up with this translation:

Spoiler (Rollover to View):
As far as we can now tell, the Academy was founded in around 573 BC.
Certainly it can be shown to exist by the year 571 BC, when we learn
from the journal of Degabus of Malme that:

An groupe of scholars have late taken residence in the city, purposeing
here to study both the ancient and the modern mysteries. They have for
a year or more taken rooms with Mrs. Feon of Kingdom Street, who
complains mightily of the noxious stink emanating from their alchymical
experimentations, but I hear they have in mind to remove to the cellars
late of Mr. Beston Brewer so recently passed away.

Academy scholars will naturally be familiar with the Beston rooms. These
are unlikely to be the original cellars once occupied by that scholarly
fellowship but do seem to be in roughly the right location later the
same year. Degabus notes a behavior pattern that might be familiar
to the more junior members of the academy:

The scholares of Beston Cellars may rightly be called the natural
inheritors of those brewing rooms; for I observed this night in
Thilke Market as I returned home, after dining with Mrs. Haarten,
a supposed scholar whom I identified by his cap drunken and reeling
in the street. I made as to pass by him swiftly but he being jovial
in his cups called out: "Hi Sir, would you pass by a scholar without
raising your arm?" Quoth I: "I see no scholar here, Sir, unless it be
a scholar of the sweetened sleep." Quoth he: "Sir, think you that viti
culture is no subject for study?" Quoth I: "Sir, do not call your
pursuit study, for the more you study in this fashion the duller your
mind becomes." I think I may consider myself the match in wit for
any a scholar called by some academicians.

Despite the continuing disapproval of the townsfolk, the Academy remained.
It grew in size, taking on additional rooms in the area of those original
stone cellars, and offering a tuition service to the sons and daughters of
wealthy townsfolk as a way of funding its continuing research. No scholars
of note were yet resident in the academy, although Varkin writes that she
passed through on her way north and comments that she enjoyed an excellent
dinner though the tables of this Academy be fine indeed the discourse
of its scholars is finer yet.

The Academy's first significant expansion came in 452 BC with a gift from
Naskent Taversen. Taversen, one of the city's wealthiest and most influential
land owners, had been fascinated by the studies of the academy. He had sent
his only daughter Aetiant to be educated by the scholars and is known to have
observed some of Macelvoy's early experiments with static electricity. Aetiant
Taversen became a scholar at the Academy and apparently negotiated with her
father the substantial gift he gave the institution his last years. Taversen
gifted his house along with various surrounding pieces of property to the
Academy in perpetuity. With this, his bequest, the Academy was able to shore
up its financial situation which until then had been uncertain at best. The
patronage of Naskent Taversen also brought the academy to the attention of
many other wealthy and important people across the country when in 443 BC
Aetiant Taversen was elected by the other fellows of the Academy to become
its first master. She was able to preside over an unprecedented period of
growth and success in which for the first time the Academy was able to
select its pupils.


Dunno what relevance this may play out in the future, or what we can truly glean from it (other than that Traversen Square or whatever "Traversen" is not some real locale on Earth...) But again, it wasn't covered, so here 'tis. Wink
_________________
"The future is here. It's just not widely distributed yet." -William Gibson
"Always read stuff that will make you look good if you die in the middle of it." - PJ O'Rourke
"ACADEMY, n. A modern school where football is taught." - Ambrose Bierce


PostPosted: Mon Mar 21, 2005 3:44 pm
 View user's profile Visit poster's website AIM Address
 Back to top 
LordKinbote
Decorated

Joined: 25 Sep 2002
Posts: 261

I don't think code cracking programs count as brute force.

Cracking the Vigenere cipher by hand without knowing the key, which not horribly, horribly difficult, is not trivial at all. It involves finding repeated strings of letters, counting the distance between similar strings, and deriving the length of the key, then doing n frequency-of-letter attacks (n being the length of the key) to find out the key. After you know the key, deciphering is tedious but straightforward.

However, it really helps if the key is an actual word or phrase. I don't think it was in this case, which makes finding the key that much more difficult. So thank God we have computers to do it for us.

PostPosted: Mon Mar 21, 2005 8:50 pm
 View user's profile AIM Address
 Back to top 
Mikeyj
Unfictologist


Joined: 18 Oct 2004
Posts: 1847
Location: London

Frequency analysis would have been made trickier cos of the archaic wording in this case a well
_________________
Irrelevant musings.

PostPosted: Tue Mar 22, 2005 12:01 pm
 View user's profile Visit poster's website
 Back to top 
growfybruce
Veteran


Joined: 20 Oct 2004
Posts: 81
Location: London, UK

LordKinbote wrote:
I don't think code cracking programs count as brute force.


In this case, brute forcing would have been simply trying every possible key - which isn't what the program in question did.

If you're interested in writing one of these programs yourself, cracking a Vigenere requires two steps:

  1. Find the key length by building a 'coincidence table'

    For a range of offsets (say, 1 to 250), count how many letters appear in both the original text and the text offset by a number of characters.

    For example, at an offset of 2..

    Code:
    AAPORNFWGCIARUWKRPEDBVTVISTKTKNSNYINQRDKNIESANUSMO...
      AAPORNFWGCIARUWKRPEDBVTVISTKTKNSNYINQRDKNIESANUSMO...
                           ^    ^^  ^


    ..we find four matches in the first 50 characters of our ciphertext. Now calculate the total number of matches as a percentage of comparisons performed. Typically you'll get around a 4% match purely from chance - but when the offset is the key length (or a multiple of the key length) this should climb to 6% or more.

    In our example, the coincidence table shows 6% or better matches at offsets of 31 (7.09%), 62 (6.66%), 93 (6.89%) and so on. Our key is therefore very likely to be 31 characters long.

  2. Build a letter frequency table for each character in the key

    We now know that, in our example, every 31st character is shifted by the same number of letters in the alphabet. So, take every 31st character starting with the first and create a letter frequency table:

    Code:
    A  13.33%    B   1.11%    C   2.22%    D   4.44%    E   6.67%    F   3.33%
    G   1.11%    H   3.33%    I   8.89%    J   0.00%    K   1.11%    L   3.33%
    M   2.22%    N   4.44%    O  10.00%    P   1.11%    Q   0.00%    R   3.33%
    S   4.44%    T  15.56%    U   6.67%    V   1.11%    W   1.11%    X   0.00%
    Y   1.11%    Z   0.00%


    Now, for each of the 26 possible alphabetic shifts, calculate the difference between that distribution and the standard letter frequencies for the plaintext's language. Typical English letter frequency is something like:

    Code:
    A   7.81%    B   1.28%    C   2.93%    D   4.11%    E  13.05%    F   2.88%
    G   1.39%    H   5.85%    I   6.77%    J   0.23%    K   0.42%    L   3.60%
    M   2.62%    N   7.28%    O   8.21%    P   2.15%    Q   0.14%    R   6.64%
    S   6.46%    T   9.02%    U   2.77%    V   1.00%    W   1.49%    X   0.30%
    Y   1.51%    Z   0.09%


    In fact, for our example, the best fit occurs when 'A' (ciphertext) = 'A' (plaintext). This makes the first character of our key 'A'.

    Taking every 31st character starting from the second gives this distribution:

    Code:
    A   5.56%    B   4.44%    C   1.11%    D   2.22%    E   0.00%    F   0.00%
    G   2.22%    H   0.00%    I   7.78%    J   3.33%    K   3.33%    L   5.56%
    M   7.78%    N   2.22%    O   0.00%    P   8.89%    Q   6.67%    R   0.00%
    S   1.11%    T   2.22%    U   2.22%    V   8.89%    W  13.33%    X   3.33%
    Y   0.00%    Z   7.78%


    In this example, the best fit occurs when 'I' (ciphertext) = 'A' (plaintext), so the second character of our key is probably 'I'.

    Obviously, in order to find our entire key, we need to do this another 29 times - once for every letter in the key.


It is entirely possible to find the key and crack the cipher by hand using exactly the same method; extracting meaning from what at first looks like noise. However, for long keys, a computer program is an invaluable tool.
_________________
Bruceł ~ I have a fridge full of Red Bull that says insomnia will get me first

PostPosted: Tue Mar 22, 2005 12:22 pm
 View user's profile
 Back to top 
LordKinbote
Decorated

Joined: 25 Sep 2002
Posts: 261

Mikeyj wrote:
Frequency analysis would have been made trickier cos of the archaic wording in this case a well


If you were doing it by word, yes. But doing it by frequency of letter probably would have worked.

Besides, when you do a word frequency analysis, you're not looking for archaic words anyway, you're looking for the "the"s and the "and"s. This passage isn't devoid of common words.

PostPosted: Tue Mar 22, 2005 12:37 pm
 View user's profile AIM Address
 Back to top 
LordKinbote
Decorated

Joined: 25 Sep 2002
Posts: 261

growfybruce wrote:
In this case, brute forcing would have been simply trying every possible key - which isn't what the program in question did.


I know, you said exactly what I did, but just went into much greater detail.

PostPosted: Tue Mar 22, 2005 12:39 pm
 View user's profile AIM Address
 Back to top 
growfybruce
Veteran


Joined: 20 Oct 2004
Posts: 81
Location: London, UK

If anyone's interested in what I was trying to do at the pub, I was looking for the keylength by trying to find common strings in the ciphertext.

The string I concentrated on for a while was 'GL' - here's the beginning of the ciphertext with '**'s instead of each 'GL' and their locations written beside the rows:

Code:
             1         2         3         4         5
    12345678901234567890123456789012345678901234567890

  0 AAPORNFWGCIARUWKRPEDBVTVISTKTKNSNYINQRDKNIESANUSMO
 50 OMVOXVIWPZSOCKOFTNVNNYQGGGNSRWAYQEMHMMXQOPLTPOMENE
100 FKVMFIBEEBRXLWNAXVLTJZOENNBCMGUELOCER**FSHXQUSNLWU = 138
150 BYGARTPKHAATRQUXRSLSTUSEKLJATDTAYOSGASOBRRFIFEVPIO
200 NKUIVSNPINZEDQZWAGPOFEGBSVULLFUTY**XKHKBXVIPLYHUEU = 234
250 YREEAMASBRVOEJ**XIBROXNDGYTSNRWBAOERTCKMAVUODFABDB = 265
300 DKLNTDLJTXIVQROZFTTEMGANOTBQIVUZ**UXVFOWYYWPHHRAOZ = 333
350 IWHWYTZAOXWUETMQCVDMCZTPOWRNYCJYUVG**VKTXBCDXGBPIG = 386
400 JBFBCDWHRNRVHMLLGVVVRFSHUMHZTBMQSGOBRSCRYLCRAYEZEF
450 SQKLYJMHVQGCRSESWBSCRATNYXNWYEUNATIUTTWMBNQXVBLIBG
500 WVYLPABHV**CLFXPUDBEQPGUDHUTPOPEFGOPRWBQYTYRWXKLVN = 510


Next I drew a matrix of differences between these locations:

Code:
    138  234  265  333  386  510

138   -   96  127  195  248  372
234        -   31   99  152  276
265             -   68  121  245
333                  -   53  177
386                       -  124
510                            -


Finally, I looked to see if I had a group of numbers with a common denominator...

...which is where I gave up because I couldn't see one (in fact, 31, 124, 248 and 372 in that list all share 31 as a common divisor - but there was simply too much noise to pull that out).
_________________
Bruceł ~ I have a fridge full of Red Bull that says insomnia will get me first

PostPosted: Tue Mar 22, 2005 12:47 pm
 View user's profile
 Back to top 
enaxor
I Have No Life

Joined: 25 Feb 2003
Posts: 2395

Thanks to all of you that posted. Smile I felt very bad that what I did to find the key, could have been considered brute forcing a solve.

Since I've had a few people ask what program I used I was going to post it in the Tools thread, but just realized Addlepated posted it here back in October.
_________________
10/05/2007, 04/23/2009, 07/02/2015
The world is a much dimmer place.


PostPosted: Tue Mar 22, 2005 1:10 pm
 View user's profile
 Back to top 
growfybruce
Veteran


Joined: 20 Oct 2004
Posts: 81
Location: London, UK

To be honest, enaxor, I doubt anyone would have had the necessary patience to do it by hand.

Certainly, if no one else had, I was going to go looking for a key cracker...
_________________
Bruceł ~ I have a fridge full of Red Bull that says insomnia will get me first

PostPosted: Tue Mar 22, 2005 1:14 pm
 View user's profile
 Back to top 
Rolerbe
Unfettered


Joined: 01 Mar 2005
Posts: 330
Location: North America

enaxor wrote:
I felt very bad that what I did to find the key, could have been considered brute forcing a solve.


Using tools is not 'brute force'. No one would say using a hammer to drive a nail is brute force...
_________________
Failure isn't the worst thing in the world. Repeatedly trying really, really hard, then failing, now that's something.

PostPosted: Tue Mar 22, 2005 1:18 pm
 View user's profile
 Back to top 
RI_Barnica
Veteran

Joined: 01 Nov 2004
Posts: 124

So, I see that the vignere key was: aikoannacainegarnetkurttippyvon

I break it down to:
aiko
anna
caine
garnet
kurt
tippy
von

I'm new to ARGs; should I recognize those names?
Or are they just the signature of the artists? Or.. are they some sort of clue?
_________________
"The mad fishmonger of Worcester shovels his periwinkles everywhere. " -Charles Fort

PostPosted: Tue Mar 22, 2005 1:28 pm
 View user's profile Visit poster's website
 Back to top 
Dorkmaster
Unfictologist


Joined: 27 Jul 2004
Posts: 1328
Location: The People's Republic of Dork

Okay! Okay, it wasn't brute force! Laughing (I did put a question mark after it...) Anyway, It's solved. It was good work. I do not mean to put enaxor down as an enemy of the ARG state or anything... I apologize for any derogatory inflection that may have occured with using the BF comment. Good solve, and let's move on. Rolling Eyes
_________________
"The future is here. It's just not widely distributed yet." -William Gibson
"Always read stuff that will make you look good if you die in the middle of it." - PJ O'Rourke
"ACADEMY, n. A modern school where football is taught." - Ambrose Bierce


PostPosted: Tue Mar 22, 2005 2:21 pm
 View user's profile Visit poster's website AIM Address
 Back to top 
enaxor
I Have No Life

Joined: 25 Feb 2003
Posts: 2395

No harm done Dorkmaster. My problem is, I'm so computer illiterate that I wouldn't know a brute force if it bit me on the butt. Very Happy Since brute force is usually considered a no-no in args, I was just glad to see that the consensus was, it wasn't.
_________________
10/05/2007, 04/23/2009, 07/02/2015
The world is a much dimmer place.


PostPosted: Tue Mar 22, 2005 3:03 pm
 View user's profile
 Back to top 
LordKinbote
Decorated

Joined: 25 Sep 2002
Posts: 261

Rolerbe wrote:
enaxor wrote:
I felt very bad that what I did to find the key, could have been considered brute forcing a solve.


Using tools is not 'brute force'. No one would say using a hammer to drive a nail is brute force...


Depends on how heavy the hammer is, I'd imagine. Wink

PostPosted: Tue Mar 22, 2005 3:45 pm
 View user's profile AIM Address
 Back to top 
Paranoid
Guest


Possible link?

I am self confessedly paranoid, and very very new to all of this (approiximately 1 hour). But and I just want to get this out of my system.

In the http://forums.unfiction.com/forums/viewtopic.php?t=10139 page, some person pointed out the atist's name looked like an ambigram of anna. Some other person has in this post asked whether a list of names is familiar, one being anna. Am I being overly paranoid?[/quote]

PostPosted: Fri May 06, 2005 2:09 pm
 Back to top 
Display posts from previous:   Sort by:   
Page 1 of 2 [17 Posts]   Goto page: 1, 2 Next
View previous topicView next topic
 Forum index » Archive » Archive: Perplex City » PXC: Puzzles
Jump to:  

You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You can download files in this forum
You cannot post calendar events in this forum



Powered by phpBB © 2001, 2005 phpBB Group