{
  "version": 3,
  "sources": ["ssg:https://framerusercontent.com/modules/4WDicDWPLugPmfBxANTm/OLr8heTRybbY2GrPTxzD/Lyv2q3pwY-17.js"],
  "sourcesContent": ["import{jsx as e,jsxs as i}from\"react/jsx-runtime\";import*as t from\"react\";export const richText=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Elliptic Curve Cryptography (ECC) is a public key encryption technique based on elliptic curve theory, offering faster, smaller, and more efficient cryptographic keys compared to traditional methods like RSA.\"}),/*#__PURE__*/e(\"h2\",{children:\"Understanding Elliptic Curve Principles\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding the principles behind elliptic curves is crucial for grasping how Elliptic Curve Cryptography (ECC) works. Elliptic curves are not ellipses but are defined by specific mathematical equations that make them suitable for cryptographic applications.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Mathematical Foundation:\"}),\" Elliptic curves are described by the equation \\\\(y^2 = x^3 + ax + b \\\\).\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Symmetry:\"}),\" These curves are symmetric along the x-axis, which is a key property in their cryptographic use.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Efficiency:\"}),\" ECC operates efficiently on devices with limited resources, making it ideal for mobile and IoT devices.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security:\"}),\" ECC provides robust security with smaller key sizes compared to traditional methods like RSA.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Advantages Over Traditional Cryptography\"}),/*#__PURE__*/e(\"p\",{children:\"Elliptic Curve Cryptography (ECC) offers significant advantages over traditional cryptographic methods like RSA. ECC achieves the same level of security with much smaller key sizes, which translates to faster encryption and decryption processes. This efficiency is particularly beneficial for mobile and IoT devices with limited computational resources.\"}),/*#__PURE__*/e(\"p\",{children:\"Moreover, ECC's smaller key sizes reduce memory and processing requirements, making it ideal for applications requiring high performance and security. Its adoption in digital signatures, secure website access, and encrypted data streaming underscores its growing importance in modern cryptographic practices.\"}),/*#__PURE__*/e(\"h2\",{children:\"Implementing Elliptic Curve Security\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing Elliptic Curve Security involves understanding its technical intricacies and practical applications. ECC's efficiency and robust security make it a preferred choice for modern cryptographic needs.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Key Generation:\"}),\" ECC uses pairs of public and private keys derived from elliptic curve equations.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Performance:\"}),\" ECC achieves high security with smaller key sizes, reducing computational load.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Applications:\"}),\" Widely used in secure web communications, mobile encryption, and digital signatures.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Challenges:\"}),\" Requires specialized knowledge for correct implementation and interoperability.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Future of Elliptic Curve Cryptography\"}),/*#__PURE__*/e(\"p\",{children:\"Elliptic Curve Cryptography (ECC) is poised to shape the future of secure communications.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Advancements:\"}),\" Ongoing research aims to enhance ECC's security and efficiency.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Applications:\"}),\" ECC is increasingly used in mobile, IoT, and cryptocurrency security.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Adoption:\"}),\" Industries are rapidly adopting ECC for its robust encryption capabilities.\"]})})]})]});export const richText1=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Endpoint Detection and Response (EDR) is a security solution that combines real-time monitoring, data collection, and automated response to detect and investigate suspicious activities on endpoints.\"}),/*#__PURE__*/e(\"h2\",{children:\"Key Components of Endpoint Detection and Response\"}),/*#__PURE__*/e(\"p\",{children:\"Endpoint Detection and Response (EDR) solutions are essential for modern cybersecurity, providing continuous monitoring and automated responses to threats. These solutions are designed to detect, investigate, and mitigate suspicious activities on endpoints in real-time.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Real-time Monitoring:\"}),\" Continuous observation of endpoint activities to identify potential threats.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Collection:\"}),\" Gathering logs, processes, and network connections from endpoints.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Automated Response:\"}),\" Predefined rules trigger automatic actions against detected threats.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Analysis Capabilities:\"}),\" Identifying patterns and anomalies in collected data to detect security issues.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Implementing EDR in Your Organization\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing EDR in your organization involves several key steps. First, deploy EDR agents on all endpoints within your network. Next, configure the EDR system to align with your security policies and requirements. Finally, set up real-time monitoring to continuously observe endpoint activities.\"}),/*#__PURE__*/e(\"p\",{children:\"Automated response mechanisms should be implemented to quickly address detected threats. Regularly analyze collected data to identify patterns and potential security incidents. Continuously update and improve the EDR system based on new threats and organizational changes.\"}),/*#__PURE__*/e(\"h2\",{children:\"EDR versus Traditional Antivirus Solutions\"}),/*#__PURE__*/e(\"p\",{children:\"EDR and traditional antivirus solutions serve different purposes in cybersecurity.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Detection Methods:\"}),\" Traditional antivirus relies on signature-based detection, while EDR uses real-time monitoring and data analysis to detect suspicious activities.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Response Capabilities:\"}),\" EDR includes automated response and investigation tools, whereas traditional antivirus typically lacks these advanced response features.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"The Future of Endpoint Security\"}),/*#__PURE__*/e(\"p\",{children:\"The future of endpoint security is evolving rapidly, driven by the increasing complexity of cyber threats and the rise of remote work. Organizations must adopt advanced solutions to stay ahead of potential risks and ensure robust protection for their endpoints.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Advanced Analytics:\"}),\" Leveraging AI and machine learning to detect and respond to threats in real-time.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Integration:\"}),\" Combining EDR with other security platforms for comprehensive protection.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cloud-Based Solutions:\"}),\" Utilizing cloud infrastructure to enhance scalability and reduce latency.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Behavioral Analysis:\"}),\" Monitoring user and entity behavior to identify anomalies and potential threats.\"]})})]})]});export const richText2=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Sanitization is the process of permanently removing or destroying data to prevent unauthorized access, ensuring data privacy and security.\"}),/*#__PURE__*/e(\"h2\",{children:\"Methods of Data Sanitization\"}),/*#__PURE__*/e(\"p\",{children:\"Data sanitization is essential for ensuring that sensitive information is permanently removed or destroyed, preventing unauthorized access. Various methods can be employed to achieve this, each with its own advantages and use cases.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Overwriting:\"}),\" Replacing existing data with meaningless data patterns, often done multiple times.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Degaussing:\"}),\" Using a powerful magnetic field to disrupt the magnetic patterns on media like hard drives and tapes.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Physical Destruction:\"}),\" Completely destroying the storage media through shredding, crushing, or disintegration.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cryptographic Erasure:\"}),\" Encrypting data and then destroying the cryptographic key, making the data unreadable.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Importance of Sanitizing Data\"}),/*#__PURE__*/e(\"p\",{children:\"Sanitizing data is crucial for maintaining data privacy and security. It ensures that sensitive information is permanently removed or destroyed, preventing unauthorized access. This process is essential for protecting Personally Identifiable Information (PII) and maintaining compliance with data protection regulations.\"}),/*#__PURE__*/e(\"p\",{children:\"Failure to sanitize data can lead to severe consequences, including data breaches and misuse of information. Organizations must implement effective data sanitization methods to safeguard their data and avoid legal and financial repercussions. Proper sanitization also helps in maintaining the integrity and confidentiality of data.\"}),/*#__PURE__*/e(\"h2\",{children:\"Sanitization vs. Deletion: Understanding the Difference\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding the difference between sanitization and deletion is crucial for effective data management.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Sanitization:\"}),\" Involves permanently removing or altering data to make it unrecoverable, ensuring data privacy and security.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Deletion:\"}),\" Typically removes a file's entry from the directory, but the data often remains on the disk and can be recovered unless securely deleted.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Best Practices in Data Sanitization\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing best practices in data sanitization is essential for ensuring data privacy and security.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Sanitization:\"}),\" Removing labels and other identifying marks from a system.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Zeroisation:\"}),\" Overwriting data on disk or tape multiple times to render it unreadable.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Masking:\"}),\" Creating fake versions of data that retain structural properties but cannot be reverse-engineered.\"]})})]})]});export const richText3=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"An air gap is a security measure that physically isolates a system from other networks, preventing unauthorized access and enhancing security. It is commonly used in critical environments like military and financial systems.\"}),/*#__PURE__*/e(\"h2\",{children:\"The Importance of Air Gaps in Cybersecurity\"}),/*#__PURE__*/e(\"p\",{children:\"Air gaps play a crucial role in cybersecurity by physically isolating systems to prevent unauthorized access and cyber attacks. This method is particularly effective in protecting critical infrastructure and sensitive data from external threats.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enhanced Security:\"}),\" Prevents unauthorized access and data breaches.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Network Isolation:\"}),\" Protects against network-based attacks by isolating systems.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Controlled Data Flow:\"}),\" Limits interactions, reducing malware risks.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Critical Infrastructure Protection:\"}),\" Safeguards military, government, and industrial systems.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Implementing Air-Gap Security Measures\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing air-gap security measures is essential for protecting critical systems from cyber threats. By physically isolating systems, organizations can significantly reduce the risk of unauthorized access and data breaches. Here are some key steps to implement air-gap security:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"System Isolation:\"}),\" Physically segregate systems to prevent external connections.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Transfer:\"}),\" Use removable media for transferring data to and from isolated systems.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Access Restriction:\"}),\" Limit access to trusted users and apply the principle of least privilege.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Electromagnetic Protection:\"}),\" Prevent electromagnetic leakage with physical barriers like Faraday cages.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Air Gaps vs. Online Security Methods\"}),/*#__PURE__*/e(\"p\",{children:\"Air gaps and online security methods offer distinct approaches to protecting systems and data.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Isolation vs. Connectivity:\"}),\" Air gaps physically isolate systems, ensuring no network connections, while online security methods rely on encryption and access controls to secure connected systems.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Implementation Complexity:\"}),\" Air gaps are challenging to maintain due to physical separation, whereas online security methods are easier to implement but may not provide the same level of isolation.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Advantages and Limitations of Air Gaps\"}),/*#__PURE__*/e(\"p\",{children:\"Air gaps offer significant advantages in cybersecurity by physically isolating systems, thus preventing unauthorized access and cyber attacks. This isolation ensures that malware and ransomware cannot infiltrate the system, providing a robust defense for critical infrastructure and sensitive data. Additionally, air gaps limit access to trusted users, reducing the risk of insider threats and unauthorized data breaches.\"}),/*#__PURE__*/e(\"p\",{children:\"However, air gaps also come with limitations. Maintaining and updating isolated systems can be challenging and costly, often requiring manual intervention. Human error during data transfers between air-gapped and networked systems can introduce vulnerabilities. Furthermore, the operational complexity of managing air-gapped systems can increase the risk of security lapses.\"})]});export const richText4=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"A loopback address (127.0.0.1) is a special IP address used to test network software on the local machine without sending packets over a network. It ensures internal communication.\"}),/*#__PURE__*/e(\"h2\",{children:\"Understanding Loopback Address Functions\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding the functions of a loopback address is crucial for network management and troubleshooting. The loopback address, typically 127.0.0.1 for IPv4 and ::1 for IPv6, allows a device to communicate with itself, facilitating various testing and diagnostic tasks.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Testing:\"}),\" Ensures network applications and services are functioning correctly.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Diagnostics:\"}),\" Verifies the TCP/IP stack is properly installed and operational.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Development:\"}),\" Allows local testing of networked applications without external interference.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Configuration:\"}),\" Used in protocols like OSPF to define stable Router IDs.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Practical Uses of Loopback Addresses\"}),/*#__PURE__*/e(\"p\",{children:\"Loopback addresses are essential for various practical applications in networking. They are primarily used for testing network connectivity, ensuring that the TCP/IP stack is functioning correctly on a local machine. This helps in diagnosing and troubleshooting network issues without involving external networks.\"}),/*#__PURE__*/e(\"p\",{children:\"Additionally, loopback addresses are invaluable for local development and testing. Developers can simulate network communication within a device, allowing for efficient testing of networked applications. They also play a crucial role in router configuration, providing stable IP addresses for defining Router IDs in protocols like OSPF.\"}),/*#__PURE__*/e(\"h2\",{children:\"Comparing Loopback and Physical Addresses\"}),/*#__PURE__*/e(\"p\",{children:\"Comparing loopback and physical addresses reveals distinct differences in their roles and functionalities.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Purpose:\"}),\" Loopback addresses are used for internal testing and diagnostics within a device, while physical addresses (MAC addresses) uniquely identify devices on a network for communication.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Network Interaction:\"}),\" Loopback addresses do not send packets over a network, ensuring internal communication only. In contrast, physical addresses are essential for actual data transmission across network devices.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Securing Network Communications with Loopback\"}),/*#__PURE__*/e(\"p\",{children:\"Securing network communications with loopback addresses is essential for maintaining robust internal security.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Isolation:\"}),\" Keeps testing and diagnostics within the local machine, reducing exposure to external threats.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Control:\"}),\" Ensures that services bound to loop back addresses are only accessible locally, preventing unauthorized remote access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reliability:\"}),\" Provides a stable environment for internal communication, enhancing the security of network operations.\"]})})]})]});export const richText5=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Public key cryptography, or asymmetric cryptography, uses a pair of keys: a public key for encryption and a private key for decryption. This ensures secure communication and authentication.\"}),/*#__PURE__*/e(\"h2\",{children:\"How Public Key Cryptography Works\"}),/*#__PURE__*/e(\"p\",{children:\"Public key cryptography operates on the principle of using two distinct keys: a public key for encryption and a private key for decryption. This method ensures secure communication and authentication over potentially insecure networks.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Public Key:\"}),\" A cryptographic key that can be widely distributed and is used for encryption.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Private Key:\"}),\" A confidential key used for decryption, ensuring only the intended recipient can read the message.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Encryption:\"}),\" The process of converting plaintext into ciphertext to protect data from unauthorized access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Decryption:\"}),\" The process of converting ciphertext back into plaintext, making the data readable again.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Applications of Public Key Cryptography\"}),/*#__PURE__*/e(\"p\",{children:\"Public key cryptography has a wide range of applications, including secure communication and authentication over the Internet. It is integral to protocols like TLS/SSL, which enable HTTPS, ensuring that data transmitted between a web browser and server remains confidential and tamper-proof.\"}),/*#__PURE__*/e(\"p\",{children:\"Another significant application is in digital signatures, which verify the authenticity and integrity of a message or document. Public key cryptography is also used in email security protocols like S/MIME and PGP, ensuring that email communications are both confidential and authentic.\"}),/*#__PURE__*/e(\"h2\",{children:\"Comparing Symmetric and Asymmetric Encryption\"}),/*#__PURE__*/e(\"p\",{children:\"Comparing symmetric and asymmetric encryption reveals key differences in their operation and use cases.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Key Usage:\"}),\" Symmetric encryption uses a single shared key for both encryption and decryption, making it faster but requiring secure key exchange. Asymmetric encryption uses a pair of keys, a public key for encryption and a private key for decryption, enhancing security but at the cost of speed.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Performance:\"}),\" Symmetric encryption is computationally efficient and suitable for large data volumes. In contrast, asymmetric encryption is slower and often used to securely exchange symmetric keys for subsequent data encryption.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Key Advantages of Public Key Cryptography\"}),/*#__PURE__*/e(\"p\",{children:\"Public key cryptography offers several key advantages for secure communication.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Confidentiality:\"}),\" Ensures that only the intended recipient can decrypt the message.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Authentication:\"}),\" Verifies the identity of the sender, preventing impersonation.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Non-repudiation:\"}),\" Guarantees that the sender cannot deny sending the message.\"]})})]})]});export const richText6=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Network Address Translation (NAT) maps private IP addresses to public IP addresses, allowing multiple devices to share a single public IP. It enhances IP conservation and provides basic security.\"}),/*#__PURE__*/e(\"h2\",{children:\"Benefits of Network Address Translation\"}),/*#__PURE__*/e(\"p\",{children:\"Network Address Translation (NAT) offers significant benefits, including enhanced privacy and security. By hiding internal IP addresses from external networks, NAT prevents direct access to internal devices, adding an extra layer of protection. This makes it harder for malicious actors to target specific devices within a network.\"}),/*#__PURE__*/e(\"p\",{children:\"Additionally, NAT helps in conserving public IP addresses by allowing multiple devices to share a single public IP. This efficient use of IP addresses is crucial, especially given the limited availability of IPv4 addresses. NAT also simplifies network management by organizing IP addresses within a local network.\"}),/*#__PURE__*/e(\"h2\",{children:\"Types of NAT Explained\"}),/*#__PURE__*/e(\"p\",{children:\"Network Address Translation (NAT) comes in various forms, each serving different purposes and offering unique benefits. Understanding these types can help in choosing the right NAT for specific network needs.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Static NAT:\"}),\" Maps a single private IP address to a single public IP address.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Dynamic NAT:\"}),\" Uses a pool of public IP addresses, assigning a different one each time.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"PAT (Port Address Translation):\"}),\" Maps multiple private IP addresses to a single public IP address using different ports.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Overlapping NAT:\"}),\" Translates IP addresses that overlap with another network's IP addresses.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Implementing NAT: A Step-by-Step Guide\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing Network Address Translation (NAT) can be straightforward if you follow these essential steps:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Configure Router:\"}),\" Set up your router to handle NAT by accessing its settings and enabling NAT functionality.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Assign IPs:\"}),\" Allocate private IP addresses to devices within your network, ensuring they are within the designated range.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Test Connectivity:\"}),\" Verify that devices can access external networks and that NAT is translating addresses correctly.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"NAT and Security: Enhancing Protection\"}),/*#__PURE__*/e(\"p\",{children:\"Network Address Translation (NAT) plays a crucial role in enhancing network security by masking internal IP addresses and preventing direct access from external networks. This added layer of protection makes it more challenging for malicious actors to target specific devices within a network.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"IP Masking:\"}),\" Hides internal IP addresses from external networks.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Indirect Access:\"}),\" Prevents direct connections to private devices.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Attack Surface Reduction:\"}),\" Minimizes the number of exposed IP addresses.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Basic Security:\"}),\" Acts as a fundamental security measure alongside other tools.\"]})})]})]});export const richText7=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"A port scan is a technique used to identify open ports and services on a network, often to find vulnerabilities that can be exploited.\"}),/*#__PURE__*/e(\"h2\",{children:\"Types of Port Scans\"}),/*#__PURE__*/e(\"p\",{children:\"Port scanning is a crucial technique in cybersecurity, used to identify open ports and services on a network. Different types of port scans serve various purposes, from security assessments to network troubleshooting.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Ping Scan\"}),\": Uses ICMP Echo Requests to identify active devices on a network.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"SYN Scan\"}),\": Sends a SYN flag and waits for a SYN-ACK response without completing the TCP connection.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"XMAS Scan\"}),\": Sends packets with all flags set to gather information about firewall and port states.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"UDP Scan\"}),\": Sends UDP packets to various ports to determine which ones are open.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Methods for Detecting Port Scans\"}),/*#__PURE__*/e(\"p\",{children:\"Detecting port scans involves several methods to identify and mitigate potential threats. One common approach is using firewalls to block or filter ping scans, which helps in identifying unauthorized access attempts. Another method is monitoring for SYN packets to detect half-open scans, which are often used by attackers to probe for open ports without completing a full connection.\"}),/*#__PURE__*/e(\"p\",{children:\"Additionally, checking for unusual FIN packets can help identify XMAS scans, a stealthy technique used to detect open ports. Regular system checks and employing robust security software are also essential practices to ensure network security and prevent malicious activities.\"}),/*#__PURE__*/e(\"h2\",{children:\"Risks Associated with Port Scanning\"}),/*#__PURE__*/e(\"p\",{children:\"Port scanning, while a valuable tool for network administrators, carries several risks that can compromise network security.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Unauthorized Access\"}),\": Hackers can use port scans to find open ports and exploit vulnerabilities.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Network Vulnerabilities\"}),\": Scans can reveal weak points that cybercriminals may target.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Breaches\"}),\": Exploited vulnerabilities from port scans can lead to significant data breaches.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Steps to Secure Against Port Scans\"}),/*#__PURE__*/e(\"p\",{children:\"Securing against port scans is essential to protect your network from unauthorized access and potential attacks.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Firewalls\"}),\": Implementing firewalls can block or filter suspicious traffic, preventing attackers from gathering information about your network.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Close Unused Ports\"}),\": Ensuring that all unnecessary ports are closed minimizes the attack surface, making it harder for cybercriminals to exploit vulnerabilities.\"]})})]})]});export const richText8=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"An Intrusion Prevention System (IPS) is a network security tool that monitors traffic for malicious activity and takes action to prevent it, such as blocking or disabling connections.\"}),/*#__PURE__*/e(\"h2\",{children:\"How Intrusion Prevention Systems Work\"}),/*#__PURE__*/e(\"p\",{children:\"Intrusion Prevention Systems (IPS) are essential for modern network security, actively monitoring and blocking malicious activities. They work by analyzing network traffic and taking immediate action to mitigate threats.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Detection:\"}),\" Identifies suspicious activities using signature-based, anomaly-based, and policy-based methods.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Prevention:\"}),\" Automatically blocks or disables malicious connections to protect the network.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Efficiency:\"}),\" Reduces the workload on other security devices by filtering out threats early.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Compliance:\"}),\" Helps meet regulatory requirements and provides valuable auditing data.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Types of Intrusion Prevention Systems\"}),/*#__PURE__*/e(\"p\",{children:\"Intrusion Prevention Systems (IPS) come in various types, each tailored to specific security needs. Network Intrusion Prevention Systems (NIPS) monitor and protect entire network traffic at strategic points. Host Intrusion Prevention Systems (HIPS) focus on individual endpoints, acting as a last line of defense.\"}),/*#__PURE__*/e(\"p\",{children:\"Wireless Intrusion Prevention Systems (WIPS) secure Wi-Fi networks by preventing unauthorized access. Network Behavior Analysis (NBA) systems detect unusual traffic patterns, such as DDoS attacks, providing an additional layer of security.\"}),/*#__PURE__*/e(\"h2\",{children:\"Benefits of Using an Intrusion Prevention System\"}),/*#__PURE__*/e(\"p\",{children:\"Using an Intrusion Prevention System (IPS) offers several key benefits:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security:\"}),\" Proactively blocks malicious activities to protect the network.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Efficiency:\"}),\" Reduces the workload on other security devices by filtering threats early.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Compliance:\"}),\" Helps meet regulatory requirements and provides valuable auditing data.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Selecting the Right Intrusion Prevention System\"}),/*#__PURE__*/e(\"p\",{children:\"Selecting the right Intrusion Prevention System (IPS) involves understanding the key differences between various options.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Functionality:\"}),\" Some IPS solutions offer advanced features like automatic threat mitigation, while others focus on detection and alerting, requiring manual intervention.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Integration:\"}),\" Certain IPS systems are designed to seamlessly integrate with existing security frameworks, whereas others may require significant adjustments to your current infrastructure.\"]})})]})]});export const richText9=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"A query string is a part of a URL that contains data to be passed to web applications. It starts with a question mark, (?) followed by key-value pairs separated by ampersands (&).\"}),/*#__PURE__*/e(\"h2\",{children:\"Usage and Importance of Query Strings\"}),/*#__PURE__*/e(\"p\",{children:\"Query strings play a crucial role in web development, enabling the transmission of data through URLs. They are essential for various functionalities, from tracking user behavior to personalizing content.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Tracking:\"}),\" Used to monitor user interactions and gather analytics.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Personalization:\"}),\" Helps customize content based on user preferences.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Session Management:\"}),\" Maintains user sessions by passing session IDs.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"A/B Testing:\"}),\" Facilitates testing different webpage versions for performance.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Crafting Secure and Effective Query Strings\"}),/*#__PURE__*/e(\"p\",{children:\"Crafting secure and effective query strings is essential for maintaining the integrity and security of web applications. By following best practices, developers can mitigate common vulnerabilities and ensure data is transmitted safely.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Sanitization:\"}),\" Remove or neutralize potentially harmful content in query strings.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Validation:\"}),\" Ensure input conforms to expected formats and values.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Encoding:\"}),\" Encode special characters to prevent injection attacks.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Parameterized Queries:\"}),\" Use parameterized queries or prepared statements to handle query strings securely.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Decoding Query Strings: Structure and Syntax\"}),/*#__PURE__*/e(\"p\",{children:\"Query strings are integral to URLs, enabling the transmission of data to web applications. They follow a specific structure: starting with a question mark (?), followed by key-value pairs separated by ampersands (&). Each key is separated from its value by an equals sign (=).\"}),/*#__PURE__*/e(\"p\",{children:\"Proper encoding of special characters in query strings is crucial to ensure data integrity and security. Common uses include passing data, tracking information, and filtering content. However, they can expose sensitive data if not handled correctly, making security measures essential.\"}),/*#__PURE__*/e(\"h2\",{children:\"Best Practices for Query String Management\"}),/*#__PURE__*/e(\"p\",{children:\"Effective query string management is crucial for maintaining web application security and performance.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Sanitization:\"}),\" Remove harmful content to prevent injection attacks.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Encryption:\"}),\" Protect sensitive data from exposure.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Validation:\"}),\" Ensure input meets expected formats and values.\"]})})]})]});export const richText10=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Transmission Control Protocol (TCP) is a set of rules that enables two hosts to establish a connection and exchange data streams. It guarantees data delivery and maintains the order of packets.\"}),/*#__PURE__*/e(\"h2\",{children:\"Fundamentals of TCP Operation\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding the fundamentals of TCP operation is crucial for grasping how data is reliably transmitted over networks. TCP ensures data integrity and proper sequencing, making it a cornerstone of internet communication.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Connection Establishment:\"}),\" Uses a three-way handshake to initiate communication between devices.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Transmission:\"}),\" Ensures data packets are sent and received in the correct order.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Error Detection:\"}),\" Incorporates mechanisms to detect and correct errors during transmission.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Flow Control:\"}),\" Manages the rate of data transmission to prevent network congestion.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"TCP vs. UDP: Understanding the Differences\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding the differences between TCP and UDP is essential for choosing the right protocol for your application.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reliability:\"}),\" TCP ensures reliable data transfer with error checking and acknowledgment, making it suitable for applications where data integrity is crucial. UDP, on the other hand, does not guarantee reliable data transfer, as it lacks error checking and acknowledgment mechanisms.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Speed:\"}),\" TCP is slower due to the overhead involved in establishing a connection and ensuring data integrity. UDP is faster because it has minimal overhead and does not establish a connection or perform error checking.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Key Components of TCP Communications\"}),/*#__PURE__*/e(\"p\",{children:\"TCP communications are fundamental to ensuring reliable data transfer over networks. By understanding its key components, one can appreciate how TCP maintains data integrity and order during transmission.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Three-Way Handshake:\"}),\" Establishes a connection using SYN, SYN-ACK, and ACK packets.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Flow Control:\"}),\" Manages data transmission rate to prevent congestion.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Error Detection:\"}),\" Identifies and corrects errors during data transfer.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Sequencing:\"}),\" Ensures packets are received in the correct order.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"The Role of TCP in Internet Connectivity\"}),/*#__PURE__*/e(\"p\",{children:\"TCP plays a crucial role in internet connectivity by ensuring reliable data transmission between devices. It establishes connections using a three-way handshake, which involves SYN, SYN-ACK, and ACK packets. This process guarantees that both devices are ready to communicate, providing a stable foundation for data exchange.\"}),/*#__PURE__*/e(\"p\",{children:\"Additionally, TCP manages data integrity and order through error-checking mechanisms and flow control. It ensures that data packets are delivered without errors and in the correct sequence, making it indispensable for applications requiring reliable communication.\"})]});export const richText11=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Scavenging is the process of searching through data residue in a system to gain unauthorized access to sensitive information. It often involves sifting through leftover data in memory or storage.\"}),/*#__PURE__*/e(\"h2\",{children:\"The Risks of Data Scavenging\"}),/*#__PURE__*/e(\"p\",{children:\"Data scavenging poses significant risks to both individuals and organizations. By sifting through data residue, attackers can uncover sensitive information, leading to severe consequences.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Unauthorized Access:\"}),\" Gaining entry to confidential data without permission.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Breaches:\"}),\" Exposure of sensitive information to unauthorized parties.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Legal Repercussions:\"}),\" Potential lawsuits and penalties for failing to protect data.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Financial Loss:\"}),\" Costs associated with data recovery, fines, and loss of business.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Strategies to Mitigate Scavenging\"}),/*#__PURE__*/e(\"p\",{children:\"To mitigate scavenging, organizations should implement regular software updates and strong passwords combined with multi-factor authentication. These measures ensure that vulnerabilities are patched and unauthorized access is deterred. Additionally, network segmentation can isolate critical assets, minimizing the risk of data retrieval.\"}),/*#__PURE__*/e(\"p\",{children:\"Effective access control and continuous monitoring are also crucial. These strategies help detect and prevent scavenging attempts by providing timely responses to unauthorized data access. Together, these methods create a robust defense against the risks posed by scavenging.\"}),/*#__PURE__*/e(\"h2\",{children:\"Scavenging vs. Data Mining: Key Differences\"}),/*#__PURE__*/e(\"p\",{children:\"Scavenging and data mining are distinct processes with different objectives and methods.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Purpose:\"}),\" Scavenging aims to gain unauthorized access to sensitive data, while data mining analyzes existing data to extract useful information for business insights.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Method:\"}),\" Scavenging involves searching through data residue, whereas data mining processes large datasets to identify trends and correlations.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Preventative Measures Against Scavenging\"}),/*#__PURE__*/e(\"p\",{children:\"Preventative measures against scavenging are essential to protect sensitive data from unauthorized access.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Regular Updates:\"}),\" Keep software up-to-date to patch vulnerabilities.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Strong Authentication:\"}),\" Use strong passwords and multi-factor authentication.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Network Segmentation:\"}),\" Isolate critical assets to minimize risks.\"]})})]})]});export const richText12=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Whitebox testing involves evaluating a system with full knowledge of its internal workings, including source code and design documents. This method ensures comprehensive security assessments and identifies hidden vulnerabilities.\"}),/*#__PURE__*/e(\"h2\",{children:\"Understanding Whitebox Testing Techniques\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding whitebox testing techniques is crucial for ensuring comprehensive security assessments. This approach allows testers to delve deep into the internal workings of a system, identifying vulnerabilities that might otherwise go unnoticed.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Code Coverage Analysis:\"}),\" Ensuring all code paths are tested.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Control Flow Testing:\"}),\" Examining the order of execution of statements.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Flow Testing:\"}),\" Tracking the flow of data through the code.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Unit Testing:\"}),\" Testing individual components or modules.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Key Advantages of Whitebox Security\"}),/*#__PURE__*/e(\"p\",{children:\"Whitebox security offers several key advantages. It ensures comprehensive test coverage by providing full access to source code and system documentation. This allows for early detection of vulnerabilities, reducing the risk of security breaches. Additionally, it enables detailed analysis of the internal workings of a system, including code, architecture, and data flow.\"}),/*#__PURE__*/e(\"p\",{children:\"Another significant benefit is the efficiency in debugging and troubleshooting, as testers have complete knowledge of the system internals. This approach also helps in improving overall code quality by identifying logical errors and security flaws. Ultimately, whitebox security enhances the security posture of an organization by allowing for thorough and targeted assessments.\"}),/*#__PURE__*/e(\"h2\",{children:\"Contrasting Whitebox and Blackbox Testing\"}),/*#__PURE__*/e(\"p\",{children:\"Contrasting whitebox and blackbox testing reveals distinct approaches to security assessments.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Knowledge:\"}),\" Whitebox testing involves full access to the system's internal workings, including source code and design documents. In contrast, blackbox testing is conducted without any knowledge of the system's internals, focusing solely on input and output.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Focus:\"}),\" Whitebox testing ensures comprehensive code coverage and internal security, while blackbox testing simulates an external attacker's perspective, validating the system's functionality and security from the outside.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Implementing Whitebox Testing in Projects\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing whitebox testing in projects ensures a thorough examination of the system's internal workings, leading to early detection of vulnerabilities and improved code quality. Here are some key steps to effectively integrate whitebox testing into your development process:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Path Checking:\"}),\" Explore various execution paths to ensure all conditional statements are correct and efficient.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Output Validation:\"}),\" Enumerate potential inputs and ensure each produces the expected result.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security Testing:\"}),\" Use static code analysis to identify vulnerabilities and validate secure development practices.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Loop Testing:\"}),\" Test loops to ensure they are correct, efficient, and properly manage variables.\"]})})]})]});export const richText13=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"A Personal Identification Number (PIN) is a numeric passcode used for authenticating users, commonly in financial transactions, ensuring only the authorized individual can access the protected entity.\"}),/*#__PURE__*/e(\"h2\",{children:\"Creating a Secure PIN\"}),/*#__PURE__*/e(\"p\",{children:\"Creating a secure PIN is essential for protecting your financial transactions and personal information. A strong PIN should be difficult to guess and not related to easily accessible personal data. Here are some tips to help you create a secure PIN:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Length:\"}),\" Use a PIN that is at least six digits long.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Randomness:\"}),\" Avoid using easily guessable sequences like \u201C123456\u201D or \u201C000000\u201D.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Personal Info:\"}),\" Do not use personal information such as your birthdate or phone number.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Regular Updates:\"}),\" Change your PIN regularly to enhance security.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"The Role of PIN in Security\"}),/*#__PURE__*/e(\"p\",{children:\"PINs play a crucial role in security by serving as a numeric passcode known only to the individual user, providing a simple yet effective layer of protection. They are commonly used in financial transactions to verify the identity of the cardholder, making it harder for unauthorized users to access accounts.\"}),/*#__PURE__*/e(\"p\",{children:\"Beyond financial transactions, PINs are also utilized in various security contexts, such as home security systems and mobile phones. Their effectiveness largely depends on their complexity and regular updates, which help prevent unauthorized access over time.\"}),/*#__PURE__*/e(\"h2\",{children:\"PIN vs. Password: Understanding the Differences\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding the differences between a PIN and a password is crucial for enhancing security measures.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Complexity:\"}),\" Passwords are generally more complex, incorporating letters, numbers, and special characters, whereas PINs are typically shorter and consist only of numeric digits.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Usage:\"}),\" PINs are often used for quick access in financial transactions and mobile devices, while passwords are employed for securing online accounts and systems requiring higher security.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Essential Practices for PIN Management\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing essential practices for PIN management is crucial for maintaining security and preventing unauthorized access.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Memorization:\"}),\" Ensure your PIN is easy to remember but hard for others to guess.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Confidentiality:\"}),\" Never share your PIN with anyone to keep it secure.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Regular Updates:\"}),\" Change your PIN periodically to enhance security.\"]})})]})]});export const richText14=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"A packet sniffer is a tool that monitors and captures data packets traveling through a network. It is used for network analysis, troubleshooting, and detecting unauthorized activity.\"}),/*#__PURE__*/e(\"h2\",{children:\"How Packet Sniffers Work\"}),/*#__PURE__*/e(\"p\",{children:\"Packet sniffers operate by capturing data packets as they travel through a network. These tools can be used for both legitimate network management and malicious activities. Understanding how packet sniffers work is crucial for both network administrators and security professionals.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Capture:\"}),\" Packet sniffers intercept and log traffic passing over a digital network.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Modes of Operation:\"}),\" They can operate in unfiltered mode, capturing all packets, or filtered mode, capturing only specific packets.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Network Types:\"}),\" They work on both wired and wireless networks, depending on the network's security protocols.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Analysis:\"}),\" Captured data is analyzed to diagnose network issues or detect unauthorized activity.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Legitimate Uses of Packet Sniffers\"}),/*#__PURE__*/e(\"p\",{children:\"Packet sniffers are invaluable tools for network administrators and security professionals. They offer a range of legitimate uses that enhance network performance, security, and compliance.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Network Management:\"}),\" Monitoring and analyzing network traffic to ensure optimal performance.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Troubleshooting:\"}),\" Identifying and diagnosing network issues by capturing data packets.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security Monitoring:\"}),\" Detecting unauthorized access and suspicious activities on the network.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Compliance:\"}),\" Ensuring adherence to security policies and regulatory requirements by logging network activity.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Packet Sniffer vs. Network Analyzer\"}),/*#__PURE__*/e(\"p\",{children:\"Packet sniffers and network analyzers serve different purposes in network management and security.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Functionality:\"}),\" Packet sniffers primarily capture and log network traffic data, while network analyzers offer comprehensive analysis and diagnostics of network performance and security.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Use Cases:\"}),\" Packet sniffers are used for monitoring and troubleshooting, whereas network analyzers are employed for detailed performance analysis, anomaly detection, and network health insights.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Securing Networks from Packet Sniffing\"}),/*#__PURE__*/e(\"p\",{children:\"Securing networks from packet sniffing involves implementing robust encryption techniques and using secure network protocols. Encrypting data with VPNs and HTTPS ensures that intercepted packets are unreadable to unauthorized users. Additionally, setting up firewalls and using antivirus software can help detect and block malicious sniffing activities.\"}),/*#__PURE__*/e(\"p\",{children:\"Regularly updating software and connecting only to trusted Wi-Fi networks are essential preventive measures. Employing intrusion detection and prevention systems further enhances network security by identifying and mitigating sniffing attempts. Adopting these practices significantly reduces the risk of packet sniffing attacks.\"})]});export const richText15=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Public key encryption, also known as asymmetric cryptography, uses a pair of keys: a public key for encryption and a private key for decryption. This ensures secure data exchange.\"}),/*#__PURE__*/e(\"h2\",{children:\"Understanding Public Key Cryptography Mechanics\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding the mechanics of public key cryptography is crucial for grasping how secure communications are established. This cryptographic method uses a pair of keys, ensuring that data encrypted with a public key can only be decrypted by the corresponding private key.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Key Pair:\"}),\" Consists of a public key for encryption and a private key for decryption.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Encryption:\"}),\" Converts plaintext into ciphertext using the public key.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Decryption:\"}),\" Transforms ciphertext back into plaintext using the private key.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Digital Signatures:\"}),\" Verify the authenticity and integrity of a message.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Key Components of Public Key Encryption\"}),/*#__PURE__*/e(\"p\",{children:\"Public key encryption is a cornerstone of modern cybersecurity, enabling secure communication over the internet. It relies on a pair of keys: a public key for encryption and a private key for decryption. This method ensures that sensitive information remains confidential and authentic.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Public Key:\"}),\" Used to encrypt messages and can be shared openly.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Private Key:\"}),\" Kept secret and used to decrypt messages encrypted with the public key.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cryptographic Algorithms:\"}),\" Mathematical formulas that generate key pairs and perform encryption and decryption.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"One-way Functions:\"}),\" Easy to compute in one direction but difficult to reverse, ensuring security.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Comparing Public Key to Symmetric Encryption\"}),/*#__PURE__*/e(\"p\",{children:\"Comparing public key encryption to symmetric encryption reveals key differences in their mechanisms and applications.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Key Management:\"}),\" Public key encryption uses a pair of keys (public and private), making it easier to share the public key openly. Symmetric encryption relies on a single key, which must be securely shared between parties.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Performance:\"}),\" Public key encryption is computationally intensive and slower, suitable for secure key exchanges. Symmetric encryption is faster and more efficient for encrypting large amounts of data.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Implementing Public Key Encryption Safely\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing public key encryption safely involves several critical steps to ensure robust security.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Key Management:\"}),\" Properly generate, distribute, and store keys.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Algorithm Choice:\"}),\" Use strong, well-established cryptographic algorithms.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Regular Rotation:\"}),\" Periodically update keys to mitigate risks.\"]})})]})]});export const richText16=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Unicast is a communication method where data is sent from a single sender to a specific receiver, ensuring efficient and direct data transmission between two devices.\"}),/*#__PURE__*/e(\"h2\",{children:\"Understanding Unicast Traffic Patterns\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding unicast traffic patterns is essential for optimizing network performance and ensuring efficient data delivery. Unicast traffic, characterized by one-to-one communication, plays a crucial role in various applications, from web browsing to video streaming.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Efficiency:\"}),\" Direct data transmission between sender and receiver.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reliability:\"}),\" Ensures data reaches the intended recipient without delay.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Unique Addressing:\"}),\" Each device has a unique IP address for precise communication.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Versatility:\"}),\" Suitable for diverse applications like email, file transfers, and live events.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Unicast vs. Multicast vs. Broadcast: Key Differences\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding the key differences between unicast, multicast, and broadcast is essential for optimizing network performance and security.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Unicast vs. Multicast:\"}),\" Unicast involves one-to-one communication, ensuring data is sent directly to a specific recipient. In contrast, multicast sends data to multiple specified recipients, making it more efficient for group communication.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Multicast vs. Broadcast:\"}),\" While multicast targets a select group of devices, broadcast sends data to all devices within a network, which can lead to higher network traffic and potential congestion.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Advantages of Using Unicast\"}),/*#__PURE__*/e(\"p\",{children:\"Unicast offers several advantages that make it a preferred method for direct communication in network environments.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Efficiency:\"}),\" Direct data transmission to the intended recipient.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reliability:\"}),\" Ensures messages reach the correct device.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security:\"}),\" Reduces the risk of data interception.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Implementing Unicast in Network Systems\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing unicast in network systems involves assigning unique IP addresses to each device, ensuring direct one-to-one communication. This method is efficient for applications like web browsing and email, where data is sent directly from the source to the destination. Using a DHCP server can automate the assignment of unicast IP addresses, simplifying network management.\"}),/*#__PURE__*/e(\"p\",{children:\"However, unicast is vulnerable to security threats such as DoS and DDoS attacks. Mitigating these risks requires measures like IP filtering and rate limiting. Despite these challenges, unicast remains essential for precise and efficient data delivery in modern internet communication.\"})]});export const richText17=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Supply Chain Risk Management involves identifying, analyzing, and mitigating risks within the supply chain to ensure operational integrity and security.\"}),/*#__PURE__*/e(\"h2\",{children:\"Identifying Supply Chain Vulnerabilities\"}),/*#__PURE__*/e(\"p\",{children:\"Identifying supply chain vulnerabilities is crucial for maintaining the integrity and security of operations. By understanding potential weak points, organizations can better prepare and mitigate risks.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Counterfeits:\"}),\" Fake components that compromise product quality and safety.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Tampering:\"}),\" Unauthorized alterations that can introduce security risks.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Poor Manufacturing Practices:\"}),\" Substandard processes that lead to vulnerabilities.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Network Attacks:\"}),\" Cyber assaults targeting interconnected systems.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Implementing Effective Mitigation Strategies\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing effective mitigation strategies is essential for safeguarding supply chains from various risks. By adopting a proactive approach, organizations can significantly reduce vulnerabilities and enhance their overall security posture.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Access Control:\"}),\" Implementing measures to restrict unauthorized access to systems and data.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Continuous Monitoring:\"}),\" Regularly assessing and monitoring systems to detect and respond to threats promptly.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Incident Response:\"}),\" Developing and maintaining a robust plan to manage and mitigate the impact of security breaches.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Vendor Management:\"}),\" Ensuring that all suppliers adhere to stringent security standards and are involved in resilience activities.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Supply Chain Risk vs. Traditional Risk Management\"}),/*#__PURE__*/e(\"p\",{children:\"Supply Chain Risk Management and Traditional Risk Management differ significantly in their scope and focus.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Scope:\"}),\" Traditional Risk Management focuses on protecting an organization's own digital infrastructure, while Supply Chain Risk Management involves identifying and managing risks across the entire supply chain.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Approach:\"}),\" Traditional methods rely heavily on perimeter security, whereas Supply Chain Risk Management requires ongoing monitoring, assessment, and collaboration with third parties and vendors.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"The Future of Supply Chain Risk Management\"}),/*#__PURE__*/e(\"p\",{children:\"The future of supply chain risk management will be shaped by technological advancements and evolving threats. Integrating AI and machine learning can enhance predictive analytics, allowing organizations to anticipate and mitigate risks more effectively. Additionally, continuous monitoring and assessment will become essential to maintain supply chain integrity.\"}),/*#__PURE__*/e(\"p\",{children:\"Organizations must also focus on collaboration and transparency with suppliers to ensure robust cybersecurity practices. Developing comprehensive C-SCRM plans and involving all stakeholders in resilience activities will be crucial for managing both adversarial and non-adversarial threats.\"})]});export const richText18=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"USCG stands for the United States Coast Guard, a branch of the U.S. Armed Forces responsible for maritime safety, security, and environmental stewardship.\"}),/*#__PURE__*/e(\"h2\",{children:\"USCG's Role in Cybersecurity\"}),/*#__PURE__*/e(\"p\",{children:\"The United States Coast Guard (USCG) plays a crucial role in safeguarding the nation's maritime infrastructure from cyber threats. By implementing comprehensive cybersecurity strategies, the USCG ensures the protection of ports, terminals, and other critical maritime assets.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Risk Assessments:\"}),\" Identifying vulnerabilities in maritime systems.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Best Practices:\"}),\" Adopting industry standards for IT security.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Supply Chain Security:\"}),\" Evaluating the cyber practices of suppliers and partners.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Progress Measurement:\"}),\" Conducting drills to identify and address gaps.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"USCG Compared to Other Security Agencies\"}),/*#__PURE__*/e(\"p\",{children:\"The USCG's approach to cybersecurity differs significantly from other security agencies.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Focus:\"}),\" The USCG concentrates on maritime-specific cybersecurity, including facility and vessel security assessments, while other agencies like CISA provide general cybersecurity advisories for all critical infrastructure sectors.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Jurisdiction:\"}),\" The USCG has specific jurisdiction over maritime facilities and vessels, whereas agencies like the FBI focus on cyber crime investigations across all sectors.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Key Operations of the USCG\"}),/*#__PURE__*/e(\"p\",{children:\"The United States Coast Guard (USCG) is integral to maintaining maritime safety, security, and environmental stewardship. Their operations span a wide range of activities, ensuring the protection of critical maritime infrastructure.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Maritime Safety:\"}),\" Ensuring the safe navigation of vessels and the protection of life at sea.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Environmental Protection:\"}),\" Preventing and responding to oil spills and hazardous substance releases.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Law Enforcement:\"}),\" Enforcing maritime laws, including drug interdiction and immigration control.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Search and Rescue:\"}),\" Conducting operations to save lives and assist vessels in distress.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"The Evolution of USCG Cybersecurity Initiatives\"}),/*#__PURE__*/e(\"p\",{children:\"The evolution of USCG cybersecurity initiatives has been marked by significant advancements and strategic collaborations. Initially, the USCG faced challenges in adapting to the rapidly changing cyber threat landscape. Over time, they developed comprehensive frameworks and resources, such as the Maritime Cybersecurity Assessment & Annex Guide, to address these challenges effectively.\"}),/*#__PURE__*/e(\"p\",{children:\"Recent efforts include the release of updated guidance and job aids to enhance cyber resilience. The USCG's collaboration with agencies like CISA and MARAD has been crucial in sharing threat information and best practices, ensuring the protection of critical maritime infrastructure.\"})]});export const richText19=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Full Duplex is a communication mode where data is transmitted in both directions simultaneously. This allows both the sender and receiver to send and receive data at the same time, enhancing efficiency.\"}),/*#__PURE__*/e(\"h2\",{children:\"Understanding Full Duplex Communication\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding full duplex communication is essential for grasping modern data transmission methods. Full duplex allows data to be sent and received simultaneously, enhancing communication efficiency and performance.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Simultaneous Transmission:\"}),\" Data flows in both directions at the same time.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Increased Efficiency:\"}),\" Reduces latency by allowing continuous data exchange.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Better Bandwidth Utilization:\"}),\" Maximizes the use of available bandwidth.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Common Use Cases:\"}),\" Found in Ethernet networks, telecommunication systems, and USB 3.0.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Benefits of Full Duplex Technology\"}),/*#__PURE__*/e(\"p\",{children:\"Full duplex technology offers significant benefits by enabling simultaneous two-way communication, which enhances data transmission efficiency and speed. This capability eliminates network collisions and reduces retransmission overhead, leading to improved overall network performance.\"}),/*#__PURE__*/e(\"p\",{children:\"Additionally, full duplex maximizes bandwidth utilization, making it ideal for modern telecommunication systems and local area networks. By supporting high-speed, reliable data transfer, it is crucial for advanced networking applications and services that demand robust performance.\"}),/*#__PURE__*/e(\"h2\",{children:\"Full Duplex vs. Half Duplex: Contrast and Compare\"}),/*#__PURE__*/e(\"p\",{children:\"Comparing full duplex and half duplex reveals key differences in data transmission capabilities.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Simultaneous vs. Sequential:\"}),\" Full duplex allows data to be sent and received simultaneously, while half duplex only permits one direction at a time.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Efficiency:\"}),\" Full duplex maximizes bandwidth utilization and reduces latency, whereas half duplex is simpler and conserves bandwidth by alternating transmission directions.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Implementing Full Duplex in Networks\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing full duplex in networks can significantly enhance data transmission efficiency and performance. By allowing simultaneous two-way communication, full duplex technology reduces latency and maximizes bandwidth utilization.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Simultaneous Communication:\"}),\" Enables data to be sent and received at the same time.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Reduced Latency:\"}),\" Minimizes delays by allowing continuous data flow.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enhanced Performance:\"}),\" Improves overall network efficiency and speed.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Better Bandwidth Utilization:\"}),\" Maximizes the use of available network resources.\"]})})]})]});export const richText20=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Least Privilege is a security principle that restricts user or application access to the minimum necessary permissions to perform their tasks, reducing potential security risks.\"}),/*#__PURE__*/e(\"h2\",{children:\"Implementing Least Privilege Principles\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing Least Privilege Principles is essential for enhancing security and minimizing risks. By ensuring that users and applications have only the permissions they need, organizations can significantly reduce their attack surface and protect sensitive data.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Role-Based Access Control:\"}),\" Assign permissions based on job roles and responsibilities.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Automated Tools:\"}),\" Use automated tools to manage and monitor access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Regular Reviews:\"}),\" Conduct regular reviews of access permissions to ensure they are up-to-date.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Integration with DevOps:\"}),\" Ensure consistent enforcement of least privilege across all IT environments.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Benefits of Applying Least Privilege\"}),/*#__PURE__*/e(\"p\",{children:\"Applying the principle of least privilege offers several key benefits. It minimizes the attack surface by limiting permissions, thereby reducing potential pathways for attackers. This approach also reduces the risk of accidental changes that could compromise system stability or security.\"}),/*#__PURE__*/e(\"p\",{children:\"Additionally, least privilege enhances overall security by limiting the damage that compromised accounts or malicious insiders can inflict. It also improves operational efficiency by streamlining access management and ensuring compliance with various security standards and regulations.\"}),/*#__PURE__*/e(\"h2\",{children:\"Challenges in Enforcing Least Privilege\"}),/*#__PURE__*/e(\"p\",{children:\"Enforcing the principle of least privilege presents several challenges.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Complexity:\"}),\" Managing diverse IT environments and systems.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Resistance:\"}),\" Users accustomed to broader access resist changes.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Consistency:\"}),\" Ensuring uniform enforcement across all applications.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Best Practices for Sustaining Least Privilege\"}),/*#__PURE__*/e(\"p\",{children:\"Sustaining the principle of least privilege over time requires a strategic approach and continuous effort. Organizations must adopt best practices to ensure that access controls remain effective and up-to-date.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Regular Audits:\"}),\" Conduct frequent reviews of user permissions to identify and revoke unnecessary access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Automated Tools:\"}),\" Utilize automated solutions to manage and enforce least privilege consistently.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Role-Based Access:\"}),\" Implement role-based access controls to assign permissions based on job roles.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Continuous Monitoring:\"}),\" Monitor access patterns and adjust permissions as needed to maintain security.\"]})})]})]});export const richText21=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Data leakage is the unauthorized transmission of data from an organization to an external source, often due to internal errors or malicious actions.\"}),/*#__PURE__*/e(\"h2\",{children:\"Common Causes of Data Leakage\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding the common causes of data leakage is crucial for organizations aiming to protect their sensitive information. Data leakage can occur due to various factors, often stemming from both internal and external sources.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Malicious insiders:\"}),\" Employees or partners who intentionally steal and leak data.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Physical exposure:\"}),\" Unattended devices like hard drives or USBs containing sensitive data.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Electronic communication:\"}),\" Exploitation of BYOD policies by hackers to access data.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Accidental leakage:\"}),\" Human errors such as misdirected emails or unpatched software.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Preventive Measures Against Data Leakage\"}),/*#__PURE__*/e(\"p\",{children:\"Preventing data leakage is essential for maintaining the integrity and confidentiality of sensitive information. Organizations can adopt several strategies to mitigate the risk of data leaks, ensuring robust security measures are in place.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Loss Prevention (DLP):\"}),\" Implement procedures and tools to prevent sensitive data from leaving the organization.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Access Control:\"}),\" Restrict data access to only those employees who need it for their job functions.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Encryption:\"}),\" Transform plaintext into ciphertext to protect data from unauthorized access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Employee Training:\"}),\" Educate staff on cybersecurity best practices to act as an additional line of defense.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Detecting and Responding to Data Leakage\"}),/*#__PURE__*/e(\"p\",{children:\"Detecting data leakage involves using tools like Data Loss Prevention (DLP) systems and behavior monitoring to identify unusual activities. Intrusion Detection and Prevention Systems (IDPS) and Security Information and Event Management (SIEM) solutions also play a crucial role in monitoring and analyzing security events.\"}),/*#__PURE__*/e(\"p\",{children:\"Responding to data leakage requires a well-defined incident response plan. This includes safeguarding critical data, stopping endpoint data leaks, and implementing copy protection. Containing ransomware attacks and conducting regular security assessments are also essential steps in mitigating the impact of data leaks.\"}),/*#__PURE__*/e(\"h2\",{children:\"Data Leakage vs. Data Breach: Understanding the Difference\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding the difference between data leakage and data breach is crucial for effective cybersecurity.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Intent:\"}),\" Data leakage often occurs accidentally due to internal errors, while data breaches are typically intentional and malicious attacks by external sources.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Scope:\"}),\" Data leakage usually involves the unintentional exposure of information, whereas data breaches result in unauthorized access and theft of sensitive data.\"]})})]})]});export const richText22=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"A security policy is a set of rules and practices that specify how an organization protects its sensitive and critical resources. It provides a framework for managing cybersecurity risks and ensuring compliance.\"}),/*#__PURE__*/e(\"h2\",{children:\"Developing a Robust Security Policy\"}),/*#__PURE__*/e(\"p\",{children:\"Developing a robust security policy is essential for safeguarding an organization's sensitive information and ensuring compliance with regulatory requirements. A well-crafted policy not only sets clear expectations but also guides technical controls and improves overall efficiency.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Access Control:\"}),\" Mechanisms to ensure that resources are only granted to authorized users.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Authentication:\"}),\" Processes to confirm the correctness of claimed identities.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Authorization:\"}),\" Approval or permission for someone to do something.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Confidentiality:\"}),\" Ensuring that information is disclosed only to authorized individuals.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Key Elements of Effective Security Policies\"}),/*#__PURE__*/e(\"p\",{children:\"Effective security policies are crucial for protecting an organization's sensitive information and ensuring compliance with regulatory requirements. These policies provide a structured approach to managing cybersecurity risks and guiding technical controls.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Confidentiality:\"}),\" Ensuring that information is disclosed only to authorized individuals.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Integrity:\"}),\" Maintaining the accuracy and completeness of information.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Availability:\"}),\" Ensuring that information and resources are accessible when needed.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Non-Repudiation:\"}),\" Guaranteeing that a user cannot deny the authenticity of their actions.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Security Policy vs. Privacy Policy: Understanding the Difference\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding the difference between a security policy and a privacy policy is crucial for organizations.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Focus:\"}),\" A security policy is designed to protect an organization's data and resources from threats, while a privacy policy focuses on how personal data is collected, used, and protected.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Scope:\"}),\" Security policies cover technical and procedural measures to safeguard data integrity and availability, whereas privacy policies address user rights and data handling practices.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"The Purpose and Goals of Security Policies\"}),/*#__PURE__*/e(\"p\",{children:\"Security policies serve as a set of rules and practices that regulate how an organization provides security services to protect its critical resources. They ensure the confidentiality, integrity, and availability of information, safeguarding sensitive data from unauthorized access. These policies also provide guidelines for the secure operation of systems and networks.\"}),/*#__PURE__*/e(\"p\",{children:\"The goals of security policies include mitigating risks, ensuring compliance with legal and regulatory requirements, and aligning cybersecurity efforts with the organization's strategic objectives. They establish a framework for responding to security incidents and promote a culture of cybersecurity awareness within the organization.\"})]});export const richText23=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Passwordless authentication allows users to log in without a password, using methods like biometrics, hardware tokens, or one-time codes. It enhances security and simplifies the user experience.\"}),/*#__PURE__*/e(\"h2\",{children:\"Benefits of Passwordless Authentication\"}),/*#__PURE__*/e(\"p\",{children:\"Passwordless authentication offers significant benefits, including enhanced security and improved user experience. By eliminating passwords, it reduces the risk of phishing attacks and other password-related vulnerabilities. This method also simplifies IT operations, leading to cost savings for organizations.\"}),/*#__PURE__*/e(\"p\",{children:\"Additionally, passwordless authentication can be seamlessly integrated with Single Sign-On (SSO) and Multi-Factor Authentication (MFA) solutions. This integration not only bolsters security but also streamlines the login process, making it more convenient for users to access multiple applications and services.\"}),/*#__PURE__*/e(\"h2\",{children:\"Methods of Passwordless Verification\"}),/*#__PURE__*/e(\"p\",{children:\"Methods of passwordless verification offer diverse ways to enhance security and user experience. These methods leverage unique identifiers and possession factors to authenticate users without traditional passwords.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Biometrics:\"}),\" Uses unique physical traits like fingerprints or facial recognition.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Hardware Tokens:\"}),\" Physical devices that generate one-time codes for authentication.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Proximity Badges:\"}),\" Cards or badges that authenticate users based on their physical proximity to a reader.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Mobile Apps:\"}),\" Applications that provide authentication codes or push notifications to verify identity.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Comparing Passwordless to Traditional Security\"}),/*#__PURE__*/e(\"p\",{children:\"Comparing passwordless authentication to traditional security methods reveals significant differences in both security and user experience.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security:\"}),\" Traditional methods rely on passwords, which are vulnerable to attacks like phishing and brute force. Passwordless methods use biometrics or tokens, reducing these risks.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User Experience:\"}),\" Traditional security requires memorizing multiple passwords, leading to frustration. Passwordless authentication simplifies access, enhancing user satisfaction.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Implementing Passwordless: Key Considerations\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing passwordless authentication requires careful consideration of several key factors.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security:\"}),\" Ensures robust protection by eliminating password vulnerabilities.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"User Experience:\"}),\" Simplifies access, reducing the need for password management.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Integration:\"}),\" Requires compatibility with existing systems and workflows.\"]})})]})]});export const richText24=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"A Company Limited by Guarantee is a type of limited company used primarily by non-profit organizations. It has no shareholders, only members who act as guarantors with limited liability.\"}),/*#__PURE__*/e(\"h2\",{children:\"Establishing a Company Limited by Guarantee\"}),/*#__PURE__*/e(\"p\",{children:\"Establishing a Company Limited by Guarantee involves several key steps and considerations. This type of company is ideal for non-profit organizations, offering limited liability and a clear structure for governance and compliance.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Choosing a Name:\"}),\" Ensure the name aligns with the organization\u2019s purpose and is unique.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Incorporation Requirements:\"}),\" Prepare necessary documents like the memorandum and articles of association, have a registered office address, and appoint at least one director.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Drafting Articles:\"}),\" Outline the rules and regulations governing the organization, including membership, decision-making processes, and asset distribution upon dissolution.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Registration:\"}),\" Register the company with Companies House and ensure compliance with all legal obligations.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Key Advantages and Disadvantages\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding the key advantages and disadvantages of Companies Limited by Guarantee (CLGs) is crucial for organizations considering this structure.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Limited Liability:\"}),\" Members' personal assets are protected, as their liability is limited to a specific amount.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"No Share Capital:\"}),\" CLGs cannot issue shares, which may limit their ability to attract investors.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Comparing Guarantees to Shares\"}),/*#__PURE__*/e(\"p\",{children:\"Comparing guarantees to shares reveals distinct differences in liability and ownership structure.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Liability:\"}),\" Guarantees limit members' liability to a predetermined amount, protecting personal assets. In contrast, shareholders' liability can extend to the value of their shares.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Ownership:\"}),\" Guarantees do not confer ownership, focusing on support and governance. Shares represent ownership stakes, allowing shareholders to profit from the company's success.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Understanding Members' Liabilities\"}),/*#__PURE__*/e(\"p\",{children:\"Members of Companies Limited by Guarantee (CLGs) enjoy limited liability, meaning their financial responsibility is capped at a predetermined amount, often as low as \\xa31. This structure ensures that personal assets are protected, even if the company faces financial difficulties or is wound up.\"}),/*#__PURE__*/e(\"p\",{children:\"Liabilities for members typically arise during the winding-up process of the CLG. Each member is only liable for the amount they have guaranteed, safeguarding their personal finances from the company's debts and obligations.\"})]});export const richText25=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"A trap door in cryptography is an algorithm that is easy to execute in one direction but extremely difficult to reverse without special information. This ensures data security.\"}),/*#__PURE__*/e(\"h2\",{children:\"Understanding Trap Door Functions\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding trap door functions is crucial for grasping modern cryptographic systems. These functions are integral to ensuring data security by making it easy to perform operations in one direction while making it nearly impossible to reverse them without special information.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Definition:\"}),\" An algorithm that is simple to execute in one direction but difficult to reverse.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Applications:\"}),\" Used in encryption algorithms to secure data.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security:\"}),\" Ensures that data remains protected from unauthorized access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Mathematical Basis:\"}),\" Relies on complex mathematical problems that are hard to solve without specific keys.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Identifying Trap Doors in Security\"}),/*#__PURE__*/e(\"p\",{children:\"Identifying trap doors in security systems is crucial for maintaining robust defenses against potential breaches. These hidden vulnerabilities can be exploited if not properly managed, making it essential to understand their characteristics and implications.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Definition:\"}),\" A hidden vulnerability in a system that can be exploited.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Detection:\"}),\" Requires thorough code reviews and security audits.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Prevention:\"}),\" Implementing strong encryption and regular updates.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Impact:\"}),\" Can lead to unauthorized access and data breaches.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Trap Doors vs. Backdoors: Key Distinctions\"}),/*#__PURE__*/e(\"p\",{children:\"Trap doors and backdoors are both security vulnerabilities, but they differ significantly in their nature and usage.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Purpose:\"}),\" Trap doors are designed for legitimate cryptographic functions, making it easy to perform operations in one direction but difficult to reverse without special information. Backdoors, on the other hand, are unauthorized access points inserted into systems to bypass security mechanisms.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Usage:\"}),\" Trap doors are used in encryption algorithms to secure data, while backdoors are often used by attackers or developers to gain unauthorized access to systems or data.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Implementing Secure Trap Doors\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing secure trap doors involves leveraging cryptographic algorithms that are easy to execute in one direction but difficult to reverse without special information. This ensures that data can be encrypted efficiently while making decryption without the proper key extremely challenging. Such asymmetry is fundamental to the security of many cryptographic systems.\"}),/*#__PURE__*/e(\"p\",{children:\"Best practices for implementing secure trap doors include thorough code reviews and regular security audits to identify potential vulnerabilities. Additionally, using strong encryption methods and keeping systems updated can help prevent unauthorized access and data breaches. These measures are crucial for maintaining robust security in any organization.\"})]});export const richText26=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"A fork bomb is a type of denial-of-service attack that exhausts system resources by recursively creating child processes until the system crashes.\"}),/*#__PURE__*/e(\"h2\",{children:\"Understanding Fork Bomb Mechanics\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding the mechanics of a fork bomb is crucial for grasping how this type of denial-of-service attack can cripple a system. A fork bomb works by recursively creating child processes, which eventually exhaust system resources and lead to a crash.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Process Creation:\"}),\" Uses the fork() system call to duplicate processes.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Resource Exhaustion:\"}),\" Consumes all available process slots, leading to system overload.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"System Impact:\"}),\" Causes significant slowdown or complete system crash.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Prevention:\"}),\" Implement process limits using tools like ulimit and cgroups.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Symptoms of a Fork Bomb Attack\"}),/*#__PURE__*/e(\"p\",{children:\"Recognizing the symptoms of a fork bomb attack is crucial for timely intervention.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"System Slowdown:\"}),\" Noticeable decrease in system performance.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"High CPU Usage:\"}),\" Excessive CPU consumption due to process replication.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Unresponsive System:\"}),\" Inability to execute new commands or applications.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Preventing and Mitigating Fork Bombs\"}),/*#__PURE__*/e(\"p\",{children:\"Preventing and mitigating fork bombs is essential for maintaining system stability and security. By implementing a few key strategies, organizations can significantly reduce the risk of these attacks.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Process Limits:\"}),\" Use tools like \",/*#__PURE__*/e(\"code\",{children:\"ulimit\"}),\" to cap the number of processes a user can create.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Configuration Files:\"}),\" Set system-wide limits in files, like \",/*#__PURE__*/e(\"code\",{children:\"/etc/security/limits.conf\"}),\" for PAM-enabled systems.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"cgroups:\"}),\" Utilize cgroups on modern Linux systems to manage and limit resource usage.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Monitoring:\"}),\" Continuously monitor system activity to detect and respond to unusual behavior promptly.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Real-World Fork Bomb Incidents\"}),/*#__PURE__*/e(\"p\",{children:\"Real-world fork bomb incidents highlight the devastating impact these attacks can have on system stability and performance. Although specific case studies are scarce, the following points summarize the general consequences and lessons learned from such incidents:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"System Overload:\"}),\" Fork bombs can cause complete system crashes by exhausting all available resources.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Operational Disruption:\"}),\" Organizations may experience significant downtime, affecting productivity and service availability.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Resource Depletion:\"}),\" High CPU and memory usage can lead to unresponsive systems, requiring manual intervention.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Mitigation Importance:\"}),\" Implementing process limits and monitoring tools is crucial to prevent and detect fork bomb attacks.\"]})})]})]});export const richText27=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Digital Rights Management (DRM) is a technology used to control and protect the use of digital content. It ensures that only authorized users can access, copy, or distribute digital media.\"}),/*#__PURE__*/e(\"h2\",{children:\"The Evolution of Digital Rights Management\"}),/*#__PURE__*/e(\"p\",{children:\"Digital Rights Management (DRM) has evolved significantly since its inception. Initially, DRM focused on basic access control technologies to protect digital content. Over time, it has incorporated advanced mechanisms like encryption, watermarks, and metadata to prevent unauthorized access and distribution.\"}),/*#__PURE__*/e(\"p\",{children:\"Today, DRM is integral to various industries, from media and entertainment to healthcare and finance. It not only secures digital assets but also ensures compliance with data protection regulations. As technology advances, DRM continues to adapt, offering more sophisticated and user-friendly solutions.\"}),/*#__PURE__*/e(\"h2\",{children:\"Benefits and Limitations of DRM\"}),/*#__PURE__*/e(\"p\",{children:\"Digital Rights Management (DRM) offers both benefits and limitations in managing digital content.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Benefits:\"}),\" DRM helps protect income by ensuring only paying users can access content. It also secures sensitive files, preventing unauthorized access or reading of confidential information.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Limitations:\"}),\" DRM can restrict legitimate uses of content, such as making backup copies. Additionally, some DRM systems may track user behavior, raising privacy concerns.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"DRM Technologies and Applications\"}),/*#__PURE__*/e(\"p\",{children:\"Digital Rights Management (DRM) technologies are essential for protecting digital content across various industries. They ensure that only authorized users can access, modify, or distribute digital assets, thereby safeguarding intellectual property and sensitive information.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Encryption:\"}),\" Secures content by converting it into unreadable code, accessible only with a decryption key.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Watermarking:\"}),\" Embeds identifiable information into digital media to trace unauthorized distribution.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Access Control:\"}),\" Limits content access to specific users, devices, or locations.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"License Management:\"}),\" Regulates how and when digital content can be used, ensuring compliance with usage terms.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"The Future of Digital Rights Management\"}),/*#__PURE__*/e(\"p\",{children:\"The future of Digital Rights Management (DRM) is poised for significant advancements as technology continues to evolve. Emerging trends indicate a shift towards more sophisticated and user-friendly DRM solutions that address current limitations and enhance security measures.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Blockchain Integration:\"}),\" Utilizing blockchain for transparent and secure content distribution.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"AI and Machine Learning:\"}),\" Implementing AI to detect and prevent unauthorized access in real-time.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Enhanced User Experience:\"}),\" Developing DRM systems that are less intrusive and more intuitive for end-users.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cross-Platform Compatibility:\"}),\" Ensuring DRM solutions work seamlessly across various devices and operating systems.\"]})})]})]});export const richText28=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Address Resolution Protocol (ARP) maps an IP address to a physical machine address (MAC address) within a local network, facilitating proper packet routing.\"}),/*#__PURE__*/e(\"h2\",{children:\"How ARP Works: A Deep Dive\"}),/*#__PURE__*/e(\"p\",{children:\"ARP operates by mapping IP addresses to MAC addresses, ensuring devices on a local network can communicate effectively. This process involves several key steps and components that work together seamlessly.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"ARP Request:\"}),\" A broadcast packet sent to all devices on the network to find the MAC address associated with a specific IP address.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"ARP Reply:\"}),\" The response from the device with the matching IP address, providing its MAC address.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"ARP Cache:\"}),\" A table that stores IP-to-MAC address mappings to speed up future communications.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"ARP Spoofing:\"}),\" A security threat where attackers send fake ARP messages to intercept data intended for another device.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Security Vulnerabilities in ARP\"}),/*#__PURE__*/e(\"p\",{children:\"ARP vulnerabilities, particularly ARP spoofing, pose significant security risks. Attackers can intercept and manipulate data by sending fake ARP messages, leading to man-in-the-middle attacks, denial-of-service attacks, and session hijacking. These attacks can result in unauthorized access to sensitive information.\"}),/*#__PURE__*/e(\"p\",{children:\"Mitigating ARP vulnerabilities involves several strategies. Implementing static ARP entries, using ARP spoofing detection tools, and enabling security features on network devices can help prevent unauthorized changes. Additionally, employing secure communication protocols like HTTPS can reduce the risk of data interception.\"}),/*#__PURE__*/e(\"h2\",{children:\"Mitigating ARP Spoofing Attacks\"}),/*#__PURE__*/e(\"p\",{children:\"Mitigating ARP spoofing attacks is crucial for maintaining network security and integrity. Implementing a combination of proactive measures can significantly reduce the risk of these attacks.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Static ARP Entries:\"}),\" Manually configure ARP entries to prevent unauthorized devices from being added.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Detection Tools:\"}),\" Utilize software to monitor and alert on suspicious ARP activity.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Network Segmentation:\"}),\" Divide the network into smaller segments to limit the impact of an attack.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Encryption:\"}),\" Encrypt data to ensure intercepted information remains unreadable.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"ARP vs. DHCP: Understanding the Differences\"}),/*#__PURE__*/e(\"p\",{children:\"ARP and DHCP serve distinct purposes in network management.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Functionality:\"}),\" ARP maps IP addresses to MAC addresses within a local network, while DHCP dynamically assigns IP addresses to devices, ensuring no conflicts.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Scope:\"}),\" ARP operates at the data link layer to facilitate device communication, whereas DHCP functions at the application layer to manage IP address allocation and network configuration.\"]})})]})]});export const richText29=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Proprietary Information refers to unique company data crucial for competitive advantage, including customer lists, technical data, product costs, and trade secrets. Protecting this information is essential.\"}),/*#__PURE__*/e(\"h2\",{children:\"Protecting Proprietary Information\"}),/*#__PURE__*/e(\"p\",{children:\"Protecting proprietary information is crucial for maintaining a competitive edge and ensuring business continuity. Implementing robust security measures can help safeguard sensitive data from unauthorized access and potential breaches.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Encryption:\"}),\" Transforming data into a secure format to prevent unauthorized access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Access Control:\"}),\" Restricting access to resources to only authorized users.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Confidentiality Agreements:\"}),\" Legal documents ensuring that sensitive information is not disclosed.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Employee Training:\"}),\" Educating staff on the importance of data protection and proper handling of proprietary information.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Identifying Proprietary vs. Public Information\"}),/*#__PURE__*/e(\"p\",{children:\"Identifying proprietary versus public information is essential for maintaining data security and compliance.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Proprietary Information:\"}),\" This includes data unique to a company, such as trade secrets, technical data, and customer lists. It is not publicly available and is crucial for competitive advantage.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Public Information:\"}),\" This is information accessible to the public without restrictions, such as published research, press releases, and regulatory filings. It does not provide a competitive edge.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Key Elements of a Proprietary Information Policy\"}),/*#__PURE__*/e(\"p\",{children:\"Establishing a robust proprietary information policy is essential for safeguarding a company's competitive edge and ensuring compliance with legal standards. A well-defined policy outlines the responsibilities and procedures for handling sensitive information.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Definition:\"}),\" Clearly define what constitutes proprietary information within the organization.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Access Control:\"}),\" Implement strict access controls to ensure only authorized personnel can access sensitive data.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Confidentiality:\"}),\" Mandate confidentiality agreements to protect proprietary information from unauthorized disclosure.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Record Keeping:\"}),\" Maintain detailed records of all proprietary information and any access or changes to it.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Legal Consequences of Breaching Proprietary Information Agreements\"}),/*#__PURE__*/e(\"p\",{children:\"Breaching proprietary information agreements can lead to severe legal consequences. Companies may seek injunctive relief, such as temporary restraining orders, to prevent further unauthorized use or disclosure of sensitive data. Additionally, violators may face financial repercussions, including damages and loss of employment.\"}),/*#__PURE__*/e(\"p\",{children:\"Legal actions can also involve court proceedings where the company seeks to enforce its rights and protect its intellectual property. These measures are crucial for maintaining business integrity and safeguarding competitive advantages.\"})]});export const richText30=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Spillage refers to the unauthorized or accidental disclosure, transfer, or dissemination of sensitive or classified information, often resulting from human error, system vulnerabilities, or cyberattacks.\"}),/*#__PURE__*/e(\"h2\",{children:\"Causes of Data Spillage\"}),/*#__PURE__*/e(\"p\",{children:\"Data spillage can occur due to a variety of factors, often stemming from both human and technological errors. Understanding these causes is crucial for implementing effective prevention strategies.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Human Error:\"}),\" Mistakes such as sending sensitive information to the wrong recipient.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"System Misconfiguration:\"}),\" Incorrect settings that expose data to unauthorized users.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Software Vulnerabilities:\"}),\" Flaws in software that can be exploited by attackers.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Weak Security Controls:\"}),\" Insufficient measures that fail to protect sensitive data.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Prevention Strategies for Spillage\"}),/*#__PURE__*/e(\"p\",{children:\"Preventing data spillage is essential for maintaining the integrity and confidentiality of sensitive information. Implementing effective strategies can significantly reduce the risk of unauthorized disclosures.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Regular Updates:\"}),\" Ensure all systems and software are up-to-date to mitigate vulnerabilities.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Strong Security Measures:\"}),\" Use encryption and intrusion detection systems to protect data.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Risk Assessments:\"}),\" Conduct thorough evaluations to identify and address potential threats.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Employee Training:\"}),\" Educate staff on best practices and the importance of data security.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Handling and Mitigation of Spillage\"}),/*#__PURE__*/e(\"p\",{children:\"Handling spillage involves immediate containment and thorough investigation. Organizations should implement robust incident response plans to detect and address spillage incidents promptly. Employee training on security best practices is crucial to minimize human error and prevent future occurrences.\"}),/*#__PURE__*/e(\"p\",{children:\"Mitigation strategies focus on reducing the impact of spillage. Regular system updates, strong security controls, and encryption technologies are essential. Conducting risk assessments and enhancing security measures post-incident can further safeguard sensitive information.\"}),/*#__PURE__*/e(\"h2\",{children:\"Legal Implications of Data Spillage\"}),/*#__PURE__*/e(\"p\",{children:\"Data spillage can have significant legal implications for organizations.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Legal Consequences:\"}),\" Potential fines and legal actions for non-compliance.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Regulatory Requirements:\"}),\" Necessity to adhere to data protection laws.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Liability Issues:\"}),\" Risk of financial penalties and reputational damage.\"]})})]})]});export const richText31=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"A jump server, also known as a jump host or jump box, is a secure computer that administrators use to access and manage other servers, networks, or untrusted environments.\"}),/*#__PURE__*/e(\"h2\",{children:\"Benefits of Using Jump Servers\"}),/*#__PURE__*/e(\"p\",{children:\"Jump servers offer significant benefits in enhancing security and operational efficiency. By acting as a controlled access point, they reduce the attack surface and centralize authentication, making it easier to manage and monitor administrative access. This setup not only isolates critical systems from potential threats but also ensures that all connections are secure and auditable.\"}),/*#__PURE__*/e(\"p\",{children:\"Additionally, jump servers streamline administrative tasks by providing a single gateway for accessing multiple networks. This centralization simplifies security management and improves productivity for system administrators. The ability to log and audit all activities further aids in compliance and regulatory requirements, making jump servers a valuable asset for any organization.\"}),/*#__PURE__*/e(\"h2\",{children:\"Setting Up a Secure Jump Server\"}),/*#__PURE__*/e(\"p\",{children:\"Setting up a secure jump server is crucial for maintaining robust cybersecurity. Here are some essential steps to ensure your jump server is both effective and secure:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Authentication:\"}),\" Implement strong, multi-factor authentication to verify user identities.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Access Control:\"}),\" Restrict access to authorized personnel only, using role-based permissions.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Monitoring:\"}),\" Continuously monitor and log all activities to create an audit trail for tracking and auditing purposes.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Updates:\"}),\" Regularly update and patch the jump server to protect against vulnerabilities.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Jump Servers vs. Direct Access Methods\"}),/*#__PURE__*/e(\"p\",{children:\"When comparing jump servers to direct access methods, there are notable differences in security and operational efficiency.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security:\"}),\" Jump servers act as a secure gateway, reducing the attack surface and providing audit trails. Direct access methods, however, expose systems to higher risks due to the lack of intermediary security controls.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Operational Efficiency:\"}),\" Jump servers centralize authentication and access control, simplifying management. Direct access methods can be more straightforward but often lack the centralized oversight and logging capabilities of jump servers.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Best Practices for Jump Server Management\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing best practices for jump server management is essential for maintaining robust security and operational efficiency.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Hardening:\"}),\" Minimize vulnerabilities by reducing touchpoints.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Segmentation:\"}),\" Use jump servers to create barriers between networks.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Auditing:\"}),\" Monitor traffic and user activity for real-time surveillance.\"]})})]})]});export const richText32=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Zero Trust Network Access (ZTNA) is an IT security model that ensures secure access based on identity and context, not network location, minimizing the attack surface and enhancing security.\"}),/*#__PURE__*/e(\"h2\",{children:\"Principles Behind Zero Trust Network Access\"}),/*#__PURE__*/e(\"p\",{children:\"Zero Trust Network Access (ZTNA) is built on a set of core principles designed to enhance security by eliminating implicit trust and continuously verifying every access request. These principles ensure that access is granted based on strict identity verification and contextual factors.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Identity Verification:\"}),\" Ensures that every user and device is authenticated before accessing resources.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Least Privilege:\"}),\" Grants users only the access they need to perform their tasks, minimizing exposure.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Continuous Monitoring:\"}),\" Constantly checks and validates user and device activities to detect anomalies.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Microsegmentation:\"}),\" Divides the network into smaller, isolated segments to limit the spread of potential threats.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Implementing Zero Trust: Step by Step\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing Zero Trust requires a methodical approach to ensure robust security and seamless access.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Identity Verification:\"}),\" Traditional VPNs grant network-wide access once authenticated, while ZTNA requires continuous identity verification for each access request, enhancing security.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Access Control:\"}),\" VPNs provide broad access, posing security risks, whereas ZTNA offers granular, context-aware access control, limiting exposure to specific resources.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Zero Trust vs. Traditional Security Models\"}),/*#__PURE__*/e(\"p\",{children:\"Zero Trust and traditional security models differ fundamentally in their approach to network security.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Trust Model:\"}),\" Zero Trust assumes no implicit trust, requiring continuous verification for every access request. Traditional security often relies on perimeter defenses, assuming entities inside the network are trusted.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Access Control:\"}),\" Zero Trust enforces strict, context-aware access controls, continuously verifying identity and context. Traditional security typically grants broad access based on network location, with less frequent verification.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"The Advantages of Adopting Zero Trust\"}),/*#__PURE__*/e(\"p\",{children:\"Adopting Zero Trust offers significant advantages, including a reduction in the attack surface by verifying each access request as if it originates from an open network. This approach minimizes the risk of internal threats and lateral movement within the network. Additionally, Zero Trust enhances security for IoT devices and supports secure remote work environments.\"}),/*#__PURE__*/e(\"p\",{children:\"Zero Trust also simplifies management by continuously monitoring and validating user and device identities. It ensures that only authorized users gain access to specific resources, reducing the risk of unauthorized access. Implementing Zero Trust can replace or augment traditional VPNs, providing a more secure and efficient solution for modern organizations.\"})]});export const richText33=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Hypertext Transfer Protocol (HTTP) is a protocol used to transport hypertext documents across the internet. It operates as a request-response protocol in the client-server model.\"}),/*#__PURE__*/e(\"h2\",{children:\"Understanding HTTP and HTTPS Differences\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding the differences between HTTP and HTTPS is crucial for ensuring secure web communication.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security:\"}),\" HTTP is vulnerable to eavesdropping and man-in-the-middle attacks, while HTTPS uses SSL/TLS to encrypt data, ensuring secure communication.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Performance:\"}),\" HTTPS may introduce slight overhead due to encryption but offers better data integrity, user trust, and SEO benefits compared to HTTP.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"The Architecture of HTTP\"}),/*#__PURE__*/e(\"p\",{children:\"The architecture of HTTP is fundamental to how the web operates, enabling the transfer of hypertext documents between clients and servers. This architecture is built on a client-server model, where various components work together to facilitate communication and data exchange.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Client:\"}),\" The entity that initiates requests for resources from the server.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Server:\"}),\" The entity that responds to client requests by providing the requested resources.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Proxy Server:\"}),\" An intermediary that enhances security, administrative control, and caching.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"HTTP Methods:\"}),\" Actions like GET and POST that define the type of request being made.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Security Considerations for HTTP\"}),/*#__PURE__*/e(\"p\",{children:\"Security considerations for HTTP are essential to protect data and ensure safe web communication.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Eavesdropping:\"}),\" HTTP is susceptible to unauthorized interception of data.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Man-in-the-Middle Attacks:\"}),\" Attackers can alter communication between client and server.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Data Integrity:\"}),\" HTTP lacks mechanisms to ensure data has not been tampered with.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Exploring HTTP Methods and Responses\"}),/*#__PURE__*/e(\"p\",{children:\"HTTP methods and responses are fundamental to web communication, defining how requests and responses are structured and processed. Understanding these methods and their corresponding responses is crucial for web development and troubleshooting.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"GET:\"}),\" Requests data from a specified resource.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"POST:\"}),\" Submits data to be processed to a specified resource.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"200 OK:\"}),\" The request was successful, and the server returned the requested resource.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"404 Not Found:\"}),\" The server cannot find the requested resource.\"]})})]})]});export const richText34=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"A public key is a cryptographic key used to encrypt data, ensuring secure communication. It is publicly available and works with a private key, which decrypts the data.\"}),/*#__PURE__*/e(\"h2\",{children:\"Understanding Public Key Cryptography\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding public key cryptography is essential for securing modern digital communications. This method uses a pair of keys: a public key for encryption and a private key for decryption, ensuring that sensitive data remains protected.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Asymmetric Cryptography:\"}),\" Uses two different keys for encryption and decryption.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Public Key Infrastructure (PKI):\"}),\" A framework that manages public keys and digital certificates.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Digital Signatures:\"}),\" Verify the authenticity and integrity of a message or document.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Secure Communications:\"}),\" Enables secure data exchange over the internet.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Generating and Using Public Keys\"}),/*#__PURE__*/e(\"p\",{children:\"Generating and using public keys is a fundamental aspect of securing digital communications. Public keys are created through cryptographic algorithms and are used in various applications to ensure data integrity and confidentiality.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Key Generation:\"}),\" Involves creating a pair of keys, a public key for encryption and a private key for decryption.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Encryption:\"}),\" Data is encrypted using the public key, making it accessible only to those with the corresponding private key.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Digital Signatures:\"}),\" Public keys verify the authenticity of digital signatures created with private keys.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Secure Connections:\"}),\" Used in protocols like SSL/TLS to establish secure connections between servers and clients.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Public vs. Private Keys: Core Differences\"}),/*#__PURE__*/e(\"p\",{children:\"Public and private keys are fundamental to asymmetric cryptography, each serving distinct roles.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Public Key:\"}),\" Public keys are shared openly and used to encrypt data, ensuring that only the corresponding private key can decrypt it.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Private Key:\"}),\" Private keys are kept secret and used to decrypt data encrypted with the public key, as well as to create digital signatures for authentication.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Benefits of Public Key Infrastructure\"}),/*#__PURE__*/e(\"p\",{children:\"Public Key Infrastructure (PKI) offers numerous benefits, including secure and private data exchange over unsecured networks. It provides digital certificates that authenticate individuals or organizations, ensuring data integrity and confidentiality. Additionally, PKI supports directory services for storing and revoking certificates when necessary.\"}),/*#__PURE__*/e(\"p\",{children:\"PKI enhances security through encryption, digital signatures, and non-repudiation, ensuring that messages are authentic and unaltered. It also improves authentication with certificate-based methods, making it a cornerstone of secure internet communications.\"})]});export const richText35=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Critical infrastructure refers to systems and assets, physical or virtual, vital to society. Their incapacity or destruction would severely impact security, economy, public health, or safety.\"}),/*#__PURE__*/e(\"h2\",{children:\"Challenges Facing Critical Infrastructure\"}),/*#__PURE__*/e(\"p\",{children:\"Critical infrastructure faces numerous challenges that threaten its stability and security. These challenges are multifaceted, ranging from technological vulnerabilities to natural disasters, and require comprehensive strategies to mitigate their impact.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cybersecurity:\"}),\" Increasing cyber threats targeting essential systems.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Natural Disasters:\"}),\" Extreme weather events disrupting services.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Interdependencies:\"}),\" Complex connections between sectors, amplifying risks.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Resource Allocation:\"}),\" Limited funding for infrastructure protection.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Protecting Critical Infrastructure: Strategies and Solutions\"}),/*#__PURE__*/e(\"p\",{children:\"Protecting critical infrastructure requires a multifaceted approach that combines technological solutions, policy frameworks, and collaborative efforts. Here are some key strategies and solutions to enhance the security and resilience of these vital systems:\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Access Control:\"}),\" Implementing measures to detect and deny unauthorized access.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Resilience Services:\"}),\" Offering support to enhance infrastructure security and resilience.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Cyber Exercises:\"}),\" Conducting simulations to test and improve response capabilities.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Public-Private Partnerships:\"}),\" Collaborating between government and private sectors for comprehensive protection.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"The Evolution of Critical Infrastructure Security\"}),/*#__PURE__*/e(\"p\",{children:\"Critical infrastructure security has evolved significantly over the years. Initially, the focus was on basic access control mechanisms to prevent unauthorized access. However, as cyber threats became more sophisticated, the need for advanced security protocols and comprehensive strategies emerged.\"}),/*#__PURE__*/e(\"p\",{children:\"Today, the emphasis is on resilience and adaptability. Modern security measures include conducting cyber and physical security exercises to identify vulnerabilities and improve response capabilities. This proactive approach ensures that critical infrastructure can withstand and recover from various threats, including cyberattacks and natural disasters.\"}),/*#__PURE__*/e(\"h2\",{children:\"The Future of Critical Infrastructure Resilience\"}),/*#__PURE__*/e(\"p\",{children:\"The future of critical infrastructure resilience hinges on innovative strategies and collaborative efforts.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Technological Advancements:\"}),\" Leveraging AI and IoT for predictive maintenance.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Public-Private Partnerships:\"}),\" Strengthening collaboration for comprehensive protection.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Resilience Exercises:\"}),\" Conducting simulations to identify and mitigate vulnerabilities.\"]})})]})]});export const richText36=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"A private key is a confidential cryptographic key used in asymmetric cryptography to decrypt data and create digital signatures. It must be kept secret to ensure secure communications.\"}),/*#__PURE__*/e(\"h2\",{children:\"Understanding Private Key Security\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding private key security is crucial for maintaining the integrity and confidentiality of encrypted communications. A private key must be kept secret to prevent unauthorized access and ensure the security of digital signatures and encrypted data.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Confidentiality:\"}),\" The private key must remain secret to protect encrypted data.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Storage:\"}),\" Store private keys securely in software, operating systems, or hardware security modules (HSMs).\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Complexity:\"}),\" Use sufficiently complex and lengthy private keys to prevent brute-force attacks.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Operational Security:\"}),\" Maintain high levels of operational security to safeguard private keys.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Generating and Storing Private Keys\"}),/*#__PURE__*/e(\"p\",{children:\"Generating and storing private keys are fundamental aspects of maintaining secure cryptographic systems. Proper methods and best practices ensure the integrity and confidentiality of sensitive data.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Generation:\"}),\" Use software tools or hardware security modules (HSMs) to generate private keys.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Storage:\"}),\" Store private keys securely in software, operating systems, or HSMs.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Confidentiality:\"}),\" Ensure private keys remain secret to protect encrypted data.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Complexity:\"}),\" Use complex and lengthy private keys to prevent brute-force attacks.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Private Key vs. Public Key: Unraveling Differences\"}),/*#__PURE__*/e(\"p\",{children:\"Private keys and public keys are fundamental components of asymmetric cryptography, each serving distinct roles.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Confidentiality:\"}),\" A private key must be kept secret to decrypt data and create digital signatures, ensuring secure communication.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Public Access:\"}),\" A public key can be widely distributed to encrypt data and verify digital signatures, facilitating secure interactions.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"The Role of Private Keys in Cryptography\"}),/*#__PURE__*/e(\"p\",{children:\"Private keys are essential in asymmetric cryptography, serving as the confidential part of a key pair used for decryption and digital signatures. They must be kept secret to ensure the security of encrypted data and the authenticity of digital communications.\"}),/*#__PURE__*/e(\"p\",{children:\"Proper management of private keys involves secure storage, often in hardware security modules (HSMs), and ensuring their complexity to prevent brute-force attacks. These measures are crucial for maintaining the integrity and confidentiality of cryptographic systems.\"})]});export const richText37=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Basic Authentication is a straightforward method for web-based authentication, sending the username and password with each request, typically encoded in Base64. It is simple but lacks advanced security features.\"}),/*#__PURE__*/e(\"h2\",{children:\"How Basic Authentication Works\"}),/*#__PURE__*/e(\"p\",{children:\"Basic Authentication is a simple method for securing HTTP requests by sending encoded credentials with each request. Despite its simplicity, it has several limitations that make it less secure compared to modern methods.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Encoding:\"}),\" Credentials are encoded in Base64 format.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Transmission:\"}),\" Sent in the HTTP header with each request.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security:\"}),\" Lacks encryption, making it vulnerable to interception.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Use Cases:\"}),\" Suitable for internal networks or quick setups.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Securing Basic Authentication Practices\"}),/*#__PURE__*/e(\"p\",{children:\"Securing Basic Authentication practices is crucial to mitigate the inherent vulnerabilities of this method. While Basic Authentication is simple, it lacks advanced security features, making it essential to implement additional measures to enhance its security.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Use HTTPS:\"}),\" Encrypts the transmitted credentials to prevent interception.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Strong Passwords:\"}),\" Ensures passwords are complex and not easily guessable.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Multi-Factor Authentication:\"}),\" Adds an extra layer of security by requiring more than one form of authentication.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Regular Monitoring:\"}),\" Keeps track of authentication attempts and monitors for suspicious activity.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Basic Authentication vs. Modern Methods\"}),/*#__PURE__*/e(\"p\",{children:\"Basic Authentication is a simple method for securing HTTP requests, but it falls short compared to modern methods.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security:\"}),\" Basic Authentication sends credentials in Base64, which can be easily intercepted, while modern methods like OAuth use tokens and encryption for enhanced security.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Usability:\"}),\" Basic Authentication requires manual credential entry, whereas modern methods often use single sign-on (SSO) and multifactor authentication (MFA) for a smoother user experience.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Understanding Basic Authentication Headers\"}),/*#__PURE__*/i(\"p\",{children:[\"Basic Authentication headers are a fundamental part of HTTP transactions, used to transmit credentials in a straightforward manner. The \",/*#__PURE__*/e(\"code\",{children:\"Authorization\"}),\" header contains the Base64 encoded username and password, formatted as \",/*#__PURE__*/e(\"code\",{children:\"Authorization: Basic <credentials>\"}),\". This method, while simple, lacks encryption, making it vulnerable to interception.\"]}),/*#__PURE__*/i(\"p\",{children:[\"When a server requires authentication, it responds with a \",/*#__PURE__*/e(\"code\",{children:\"WWW-Authenticate\"}),\" header, prompting the client to provide credentials. Despite its simplicity, Basic Authentication is often used in legacy systems and scenarios where ease of implementation is prioritized over security.\"]})]});export const richText38=/*#__PURE__*/i(t.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Border Gateway Protocol (BGP) is an inter-autonomous system routing protocol used to exchange routing information between Internet service providers (ISPs) and ensure efficient data routing across the Internet.\"}),/*#__PURE__*/e(\"h2\",{children:\"Understanding BGP Routing Essentials\"}),/*#__PURE__*/e(\"p\",{children:\"Understanding BGP routing is essential for ensuring efficient and secure data transmission across the Internet. BGP, or Border Gateway Protocol, is the backbone of Internet routing, enabling data to find the best path through a complex web of networks.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Autonomous Systems:\"}),\" Independent networks managed by single organizations, each identified by a unique ASN.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Path Selection:\"}),\" BGP selects the best route based on multiple attributes like hop count, latency, and cost.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Peering Sessions:\"}),\" Mechanism where routers share routing information to optimize data paths.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security Measures:\"}),\" Implementations like RPKI help validate route announcements and prevent hijacking.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"The Role of BGP in Internet Architecture\"}),/*#__PURE__*/e(\"p\",{children:\"BGP plays a pivotal role in Internet architecture by enabling autonomous systems to exchange routing information, ensuring efficient data transmission. It determines the best routes based on factors like path length and network policies, making it essential for global connectivity.\"}),/*#__PURE__*/e(\"p\",{children:\"Moreover, BGP's scalability and security features, such as route reflectors and RPKI, help manage the growing number of network connections and prevent routing hijacks. This ensures that data travels securely and efficiently across the Internet.\"}),/*#__PURE__*/e(\"h2\",{children:\"BGP vs. Other Routing Protocols: Key Differences\"}),/*#__PURE__*/e(\"p\",{children:\"Comparing BGP to other routing protocols reveals key differences in their applications and functionalities.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Scope:\"}),\" BGP is used for inter-domain routing between autonomous systems, while protocols like OSPF and RIP are designed for intra-domain routing within a single autonomous system.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Decision Factors:\"}),\" BGP considers business policies and cost, whereas OSPF and RIP focus on technical metrics like hop count and link state.\"]})})]}),/*#__PURE__*/e(\"h2\",{children:\"Best Practices for Secure BGP Implementation\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing secure BGP practices is crucial for maintaining the integrity and reliability of Internet routing.\"}),/*#__PURE__*/i(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Authentication:\"}),\" Use preconfigured passwords to verify BGP messages.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"RPKI:\"}),\" Implement Resource Public Key Infrastructure to validate route announcements.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/i(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Monitoring:\"}),\" Employ tools to detect and alert on BGP anomalies.\"]})})]})]});\nexport const __FramerMetadata__ = {\"exports\":{\"richText25\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText4\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText32\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText26\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText9\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText11\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText7\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText10\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText33\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText12\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText38\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText31\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText19\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText2\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText30\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText23\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText14\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText8\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText28\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText29\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText24\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText13\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText34\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText17\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText18\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText20\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText16\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText27\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText37\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText5\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText36\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText35\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText6\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText1\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText15\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText3\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText22\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText21\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],
  "mappings": "oFAAiF,IAAMA,EAAsBC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,kNAAkN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sQAAsQ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,2EAA2E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,mGAAmG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,0GAA0G,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,gGAAgG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mWAAmW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sTAAsT,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mNAAmN,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,mFAAmF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,kFAAkF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,uFAAuF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,kFAAkF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2FAA2F,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,kEAAkE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,wEAAwE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,8EAA8E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeC,EAAuBH,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,wMAAwM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mDAAmD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gRAAgR,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,+EAA+E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,qEAAqE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,uEAAuE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,kFAAkF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0SAA0S,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kRAAkR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oFAAoF,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,oJAAoJ,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,2IAA2I,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uQAAuQ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,oFAAoF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,4EAA4E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,4EAA4E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,mFAAmF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeE,EAAuBJ,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,4IAA4I,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0OAA0O,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,qFAAqF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,wGAAwG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,0FAA0F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,yFAAyF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kUAAkU,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6UAA6U,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yDAAyD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0GAA0G,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,+GAA+G,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,4IAA4I,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uGAAuG,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,6DAA6D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,2EAA2E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,qGAAqG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeG,EAAuBL,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,kOAAkO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uPAAuP,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,kDAAkD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,+DAA+D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,+CAA+C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qCAAqC,CAAC,EAAE,2DAA2D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2RAA2R,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,gEAAgE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,0EAA0E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,4EAA4E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,6EAA6E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gGAAgG,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,0KAA0K,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,4KAA4K,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uaAAua,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wXAAwX,CAAC,CAAC,CAAC,CAAC,EAAeI,EAAuBN,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,sLAAsL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8QAA8Q,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,uEAAuE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,mEAAmE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,gFAAgF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,2DAA2D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2TAA2T,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kVAAkV,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4GAA4G,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,uLAAuL,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,kMAAkM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gHAAgH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,iGAAiG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,yHAAyH,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,0GAA0G,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeK,EAAuBP,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,+LAA+L,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6OAA6O,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,iFAAiF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,qGAAqG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,gGAAgG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,4FAA4F,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qSAAqS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+RAA+R,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yGAAyG,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,8RAA8R,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,yNAAyN,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iFAAiF,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,oEAAoE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,iEAAiE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,8DAA8D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeM,EAAuBR,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,qMAAqM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6UAA6U,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2TAA2T,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kNAAkN,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,kEAAkE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,2EAA2E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iCAAiC,CAAC,EAAE,0FAA0F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,4EAA4E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4GAA4G,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,6FAA6F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,+GAA+G,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,oGAAoG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uSAAuS,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,sDAAsD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,kDAAkD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,gDAAgD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,gEAAgE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeO,EAAuBT,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,wIAAwI,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qBAAqB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2NAA2N,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,oEAAoE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,4FAA4F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,0FAA0F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,wEAAwE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kYAAkY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qRAAqR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8HAA8H,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,8EAA8E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,gEAAgE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,oFAAoF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kHAAkH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,sIAAsI,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,gJAAgJ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeQ,EAAuBV,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,yLAAyL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8NAA8N,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,mGAAmG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,iFAAiF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,iFAAiF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,0EAA0E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2TAA2T,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iPAAiP,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kDAAkD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yEAAyE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,kEAAkE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,6EAA6E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,0EAA0E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iDAAiD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2HAA2H,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,4JAA4J,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeS,EAAuBX,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,qLAAqL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6MAA6M,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,0DAA0D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,qDAAqD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,kDAAkD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,kEAAkE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6OAA6O,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,qEAAqE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,wDAAwD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,0DAA0D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,qFAAqF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8CAA8C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sRAAsR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+RAA+R,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wGAAwG,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,uDAAuD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,wCAAwC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,kDAAkD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeU,EAAwBZ,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,mMAAmM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8NAA8N,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,wEAAwE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,mEAAmE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,4EAA4E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,uEAAuE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sHAAsH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,+QAA+Q,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,oNAAoN,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8MAA8M,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,gEAAgE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,wDAAwD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,uDAAuD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,qDAAqD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sUAAsU,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0QAA0Q,CAAC,CAAC,CAAC,CAAC,EAAeW,EAAwBb,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,qMAAqM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8LAA8L,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,yDAAyD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,6DAA6D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,gEAAgE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,oEAAoE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oVAAoV,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qRAAqR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0FAA0F,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,+JAA+J,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,EAAE,wIAAwI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4GAA4G,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,qDAAqD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,wDAAwD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,6CAA6C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeY,EAAwBd,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,uOAAuO,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yPAAyP,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,sCAAsC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,kDAAkD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,8CAA8C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,4CAA4C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qXAAqX,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4XAA4X,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gGAAgG,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,wPAAwP,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,wNAAwN,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uRAAuR,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,kGAAkG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,2EAA2E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,kGAAkG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,mFAAmF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAea,EAAwBf,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,0MAA0M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2PAA2P,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,EAAE,8CAA8C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,wFAAoE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,0EAA0E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,iDAAiD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uTAAuT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qQAAqQ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iDAAiD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wGAAwG,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,uKAAuK,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,sLAAsL,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6HAA6H,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,oEAAoE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,sDAAsD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,oDAAoD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAec,EAAwBhB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,wLAAwL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4RAA4R,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,4EAA4E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,iHAAiH,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,gGAAgG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,wFAAwF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+LAA+L,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,0EAA0E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,uEAAuE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,0EAA0E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,mGAAmG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oGAAoG,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,4KAA4K,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,yLAAyL,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mWAAmW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0UAA0U,CAAC,CAAC,CAAC,CAAC,EAAee,EAAwBjB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,qLAAqL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iDAAiD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iRAAiR,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,4EAA4E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,2DAA2D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,mEAAmE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,sDAAsD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gSAAgS,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,qDAAqD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,0EAA0E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,uFAAuF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,gFAAgF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8CAA8C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uHAAuH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,+MAA+M,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,4LAA4L,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sGAAsG,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,iDAAiD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,yDAAyD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,8CAA8C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAegB,EAAwBlB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,wKAAwK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8QAA8Q,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,wDAAwD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,6DAA6D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,iEAAiE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,iFAAiF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sDAAsD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2IAA2I,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,2NAA2N,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,8KAA8K,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6BAA6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qHAAqH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,sDAAsD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,6CAA6C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,yCAAyC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0XAA0X,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8RAA8R,CAAC,CAAC,CAAC,CAAC,EAAeiB,EAAwBnB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,0JAA0J,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,8DAA8D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,8DAA8D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,sDAAsD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,mDAAmD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8CAA8C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mPAAmP,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,6EAA6E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,wFAAwF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,mGAAmG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,gHAAgH,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mDAAmD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6GAA6G,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,6MAA6M,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,0LAA0L,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4WAA4W,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mSAAmS,CAAC,CAAC,CAAC,CAAC,EAAekB,EAAwBpB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,4JAA4J,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qRAAqR,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,mDAAmD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,+CAA+C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,4DAA4D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,kDAAkD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0FAA0F,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,iOAAiO,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,iKAAiK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0OAA0O,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,6EAA6E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,4EAA4E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,gFAAgF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,sEAAsE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iDAAiD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oYAAoY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6RAA6R,CAAC,CAAC,CAAC,CAAC,EAAemB,EAAwBrB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yNAAyN,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,kDAAkD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,wDAAwD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,4CAA4C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,sEAAsE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+RAA+R,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4RAA4R,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mDAAmD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kGAAkG,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,0HAA0H,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,kKAAkK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0OAA0O,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,yDAAyD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,qDAAqD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,iDAAiD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,oDAAoD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeoB,EAAwBtB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,mLAAmL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wQAAwQ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,8DAA8D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,oDAAoD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,+EAA+E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,+EAA+E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kSAAkS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gSAAgS,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yEAAyE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,gDAAgD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,qDAAqD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,wDAAwD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oNAAoN,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,0FAA0F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,kFAAkF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,iFAAiF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,iFAAiF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeqB,EAAwBvB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,sJAAsJ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oOAAoO,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,+DAA+D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,yEAAyE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,2DAA2D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,iEAAiE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iPAAiP,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,0FAA0F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,oFAAoF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,gFAAgF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,yFAAyF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oUAAoU,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iUAAiU,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4DAA4D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2GAA2G,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,EAAE,0JAA0J,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,4JAA4J,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAesB,EAAwBxB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,qNAAqN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4RAA4R,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,4EAA4E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,8DAA8D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,sDAAsD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,yEAAyE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mQAAmQ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,yEAAyE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,4DAA4D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,sEAAsE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,0EAA0E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kEAAkE,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2GAA2G,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,qLAAqL,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,oLAAoL,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qXAAqX,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iVAAiV,CAAC,CAAC,CAAC,CAAC,EAAeuB,EAAwBzB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,oMAAoM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wTAAwT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yTAAyT,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wNAAwN,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,uEAAuE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,oEAAoE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,yFAAyF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,2FAA2F,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gDAAgD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6IAA6I,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,6KAA6K,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,mKAAmK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iGAAiG,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,qEAAqE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,gEAAgE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,8DAA8D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAewB,EAAwB1B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,4LAA4L,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wOAAwO,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,6EAAwE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,oJAAoJ,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,0JAA0J,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,8FAA8F,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sJAAsJ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,8FAA8F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,gFAAgF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mGAAmG,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,2KAA2K,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,yKAAyK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0SAA0S,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kOAAkO,CAAC,CAAC,CAAC,CAAC,EAAeyB,EAAwB3B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,kLAAkL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wRAAwR,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,oFAAoF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,gDAAgD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,gEAAgE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,wFAAwF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oQAAoQ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,4DAA4D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,sDAAsD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,sDAAsD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,EAAE,qDAAqD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sHAAsH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,gSAAgS,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,yKAAyK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oXAAoX,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sWAAsW,CAAC,CAAC,CAAC,CAAC,EAAe0B,EAAwB5B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,oJAAoJ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8PAA8P,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,sDAAsD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,oEAAoE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,wDAAwD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,gEAAgE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oFAAoF,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,6CAA6C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,wDAAwD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,qDAAqD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0MAA0M,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,mBAAgCA,EAAE,OAAO,CAAC,SAAS,QAAQ,CAAC,EAAE,oDAAoD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,0CAAuDA,EAAE,OAAO,CAAC,SAAS,2BAA2B,CAAC,EAAE,2BAA2B,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,8EAA8E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,2FAA2F,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yQAAyQ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,sFAAsF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,sGAAsG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,6FAA6F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,uGAAuG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe2B,EAAwB7B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,8LAA8L,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sTAAsT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iTAAiT,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mGAAmG,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,qLAAqL,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,+JAA+J,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qRAAqR,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,gGAAgG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,yFAAyF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,kEAAkE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,4FAA4F,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qRAAqR,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,wEAAwE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,0EAA0E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,mFAAmF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,uFAAuF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe4B,EAAwB9B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,8JAA8J,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+MAA+M,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,uHAAuH,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,wFAAwF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,oFAAoF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,0GAA0G,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8TAA8T,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uUAAuU,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iMAAiM,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,mFAAmF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,oEAAoE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,6EAA6E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,qEAAqE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6DAA6D,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,gJAAgJ,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,qLAAqL,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe6B,EAAwB/B,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,gNAAgN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6OAA6O,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,yEAAyE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,4DAA4D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,wEAAwE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,uGAAuG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gDAAgD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8GAA8G,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,4KAA4K,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,iLAAiL,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kDAAkD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sQAAsQ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,mFAAmF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,kGAAkG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,sGAAsG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,4FAA4F,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oEAAoE,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0UAA0U,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8OAA8O,CAAC,CAAC,CAAC,CAAC,EAAe8B,EAAwBhC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,6MAA6M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uMAAuM,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,yEAAyE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,6DAA6D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,wDAAwD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,6DAA6D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oNAAoN,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,8EAA8E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,kEAAkE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,0EAA0E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,uEAAuE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+SAA+S,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qRAAqR,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0EAA0E,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,wDAAwD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,+CAA+C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,uDAAuD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAe+B,EAAwBjC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,6KAA6K,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oYAAoY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kYAAkY,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yKAAyK,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,2EAA2E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,8EAA8E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,2GAA2G,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,iFAAiF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6HAA6H,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,kNAAkN,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,0NAA0N,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iIAAiI,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,oDAAoD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,wDAAwD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,gEAAgE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAegC,EAAwBlC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,gMAAgM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gSAAgS,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,kFAAkF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,sFAAsF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,kFAAkF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,gGAAgG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uGAAuG,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,mKAAmK,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,yJAAyJ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wGAAwG,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,+MAA+M,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,yNAAyN,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kXAAkX,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0WAA0W,CAAC,CAAC,CAAC,CAAC,EAAeiC,EAAwBnC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,oLAAoL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wGAAwG,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,8IAA8I,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,yIAAyI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uRAAuR,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,EAAE,oEAAoE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,EAAE,oFAAoF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,+EAA+E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,wEAAwE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mGAAmG,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,4DAA4D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,+DAA+D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,mEAAmE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sPAAsP,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,MAAM,CAAC,EAAE,2CAA2C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,wDAAwD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,EAAE,8EAA8E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,iDAAiD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAekC,EAAwBpC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,0KAA0K,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+OAA+O,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,yDAAyD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,EAAE,iEAAiE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,kEAAkE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,kDAAkD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0OAA0O,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,kGAAkG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,iHAAiH,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,uFAAuF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,8FAA8F,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kGAAkG,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,2HAA2H,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,mJAAmJ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iWAAiW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mQAAmQ,CAAC,CAAC,CAAC,CAAC,EAAemC,EAAwBrC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,iMAAiM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gQAAgQ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,wDAAwD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,8CAA8C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,yDAAyD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,iDAAiD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8DAA8D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oQAAoQ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,gEAAgE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,sEAAsE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,oEAAoE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,qFAAqF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mDAAmD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4SAA4S,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oWAAoW,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kDAAkD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6GAA6G,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,oDAAoD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,4DAA4D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,mEAAmE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeoC,EAAwBtC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,0LAA0L,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iQAAiQ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,gEAAgE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,mGAAmG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,oFAAoF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,0EAA0E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wMAAwM,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,mFAAmF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,uEAAuE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,+DAA+D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,uEAAuE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oDAAoD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kHAAkH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,kHAAkH,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,0HAA0H,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qQAAqQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4QAA4Q,CAAC,CAAC,CAAC,CAAC,EAAeqC,EAAwBvC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,qNAAqN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8NAA8N,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,4CAA4C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,6CAA6C,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,0DAA0D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,kDAAkD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sQAAsQ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,gEAAgE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,0DAA0D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,qFAAqF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,+EAA+E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oHAAoH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,sKAAsK,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,oLAAoL,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2IAAwJE,EAAE,OAAO,CAAC,SAAS,eAAe,CAAC,EAAE,2EAAwFA,EAAE,OAAO,CAAC,SAAS,oCAAoC,CAAC,EAAE,sFAAsF,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6DAA0EE,EAAE,OAAO,CAAC,SAAS,kBAAkB,CAAC,EAAE,6MAA6M,CAAC,CAAC,CAAC,CAAC,CAAC,EAAesC,EAAwBxC,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,oNAAoN,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8PAA8P,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,yFAAyF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,6FAA6F,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,4EAA4E,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,qFAAqF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4RAA4R,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uPAAuP,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kDAAkD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6GAA6G,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,EAAE,8KAA8K,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,2HAA2H,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8CAA8C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iHAAiH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,sDAAsD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,EAAE,gFAAgF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,qDAAqD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAC32oKuC,EAAqB,CAAC,QAAU,CAAC,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,SAAW,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,mBAAqB,CAAC,KAAO,UAAU,CAAC,CAAC",
  "names": ["richText", "u", "x", "p", "richText1", "richText2", "richText3", "richText4", "richText5", "richText6", "richText7", "richText8", "richText9", "richText10", "richText11", "richText12", "richText13", "richText14", "richText15", "richText16", "richText17", "richText18", "richText19", "richText20", "richText21", "richText22", "richText23", "richText24", "richText25", "richText26", "richText27", "richText28", "richText29", "richText30", "richText31", "richText32", "richText33", "richText34", "richText35", "richText36", "richText37", "richText38", "__FramerMetadata__"]
}
