DIR Mozz.us Homepage
>>> Accessing system data...
Find the password in the computer's memory:
0x2a40 :|<{]!~~?|^}>:+( 0x2b40 &:@/!)=},(!,)~#]
0x2a50 {_#.@{:$]~~_@?]? 0x2b50 !?^|?>+|-;)!~))-
0x2a60 @{&=ENHANCE</{}] 0x2b60 ~%[=%-,.<|~~/;${
0x2a70 $<*_@)$($DISCUSS 0x2b70 {|]?)>|!-\;~%(?!
0x2a80 +$]&/|([!>([;\)| 0x2b80 {?!-)WORKING{@_@
0x2a90 &_*%+<=#;>%)}==[ 0x2b90 ,)%&&,!.([%.,,~/
0x2aa0 ABSENCE$|^);#%./ 0x2ba0 %_%(.\--+),;.|#?
0x2ab0 \_=#!,,&!EXPENSE 0x2bb0 ||/!+:(%;#$#/=|%
0x2ac0 /%~$<~/}~;):>;.{ 0x2bc0 [(|\(|%)\=(|{+@]
0x2ad0 !=PROTECT|-)%*%; 0x2bd0 *^()[{!!-PASSAGE
0x2ae0 DECLARE,,+?_{;[\ 0x2be0 $]/<>\$#-}(%;|)~
0x2af0 :%~.):=.%{!]-:_= 0x2bf0 ^!.@.ACQUIRE}({_
0x2b00 ^{{)*&|(,-\_^_@. 0x2c00 +~%~^=^?};}![.?(
0x2b10 _[&/@&@+[,^[{}%| 0x2c10 |^!#~+:-.ELDERLY
0x2b20 @],][(.!.;:?[,^< 0x2c20 ](:*_;-]>/!^/-:!
0x2b30 ]-=EXPLODE.(]@.| 0x2c30 }%?^_&;;CHINESE|
______________________________________________________________________
Served by Flask-Gopher/3.0.0