How Secure Remote Access Connects Top Talent with Job Opportunities

Posted by Tobias Eichenseer Fri, 28 Aug 2015 08:20:00 GMT

Top Talent Remote Access HOB VPN

Talented job candidates are out there, but unfortunately the perfect candidate for a job in Sydney, Australia, may reside in Lima, Peru, or vice versa. Luckily, with secure remote access solutions, geography is no longer a limitation in connecting top talent from across the globe with work opportunities. Companies with reliable secure remote access solutions not only have a competitive edge in attracting these valuable candidates, but also benefit from the larger candidate pool.

Here are some of the beneficiaries of secure remote access solutions:

New Parents
Bringing a child into the world can be an overwhelming, tumultuous time when new parents may feel torn between their careers and families. Many parents with new children feel pressured to resume work as soon as possible, then quickly regret the precious bonding time they missed with their infant. Secure remote access solutions enable these parents to witness their child’s first steps while also pursing their own passions with a flexible work from home (WFH) career. 

Military Spouses
Military spouses or spouses of those with jobs that require frequent relocation can benefit from secure remote access solutions. In lieu of conducting a time-consuming job-hunt at each new location or transferring branches, this group can find a company with secure remote access solutions that enable working from home so that their career continues to grow regardless of location. Additionally the companies that hire military spouses benefit from the talent and expertise they bring to work, thanks to secure remote access.

Part-time Job Seekers
A freelancer with a fulltime job in one location may want to pursue an opportunity in another location. Secure remote access solutions open up a host of freelancing and part-time opportunities across the globe, connecting us and fostering collaboration and creativity like never before.

Companies
In an increasingly wired and digital world, flexibility is king. Companies unable to offer WFH options fall behind in attracting and maintaining top talent. Having to relocate for a position costs time and money and many talented candidates are leery of leaving family, friends and their communities behind to pursue a career elsewhere. Secure remote access takes physical location out of the equation, giving companies a competitive hiring edge. Once hired, WFH employees tend to be more productive, less absent from work and more cost-effective for employers, who no longer have to purchase expensive laptops, tablets, phones, printers and Internet services. HOB offers an array of secure remote access solutions guaranteed to give your business a competitive edge in the “war for talent” and to maintain valuable employees who can bring their best to the job, even from a distance.

Visit our website to learn more about our comprehensive Remote Access solutions.

 

no comments |

HOB Brings Home Gold, Silver and Bronze!

Posted by Tobias Eichenseer Wed, 19 Aug 2015 15:43:00 GMT

Our customers always knew that our secure remote access solutions were exceptional and now we have additional accolades to prove it. At the 10th annual 2015 IT World Awards, hosted by Network Products Guide, the IT industry’s leading technology research and advisory publication, HOB won three awards for our Remote Desktop Virtual Private Network (HOB RD VPN version 2.1).

Our flagship product, HOB RD VPN (version 2.1), won gold in the “Best Security Software” category, silver in the “Best IT Software” category and bronze in the “Most Innovative IT Software” category.

The awards honor excellence in every facet of the IT industry, people and products included. Nominees went through a rigorous review process conducted by a panel of industry experts before winners were announced.  

Here’s what sets our product apart: HOB RD VPN is not your typical SSL VPN. It’s high-performance, enabling convenient, yet secure remote access to enterprise resources and data, thereby decreasing costs and administration effort while increasing productivity and enhancing IT security. Version 2.1 of HOB RD VPN improves accessibility and auto-synchronization of corporate files across different platforms and devices.

Secure remote access is a top of mind industry issue as ever-connected employees demand flexible work environments. Employers must meet this demand while ensuring that corporate intellectual property is safe. Our solution meets both sides in the middle; equipping mobile workers with the access and resources they demand, while gifting industry leaders with peace of mind, knowing that this information remains secure.

We’re extremely proud and humbled to receive industry recognition alongside some of the brightest and best in the business and see these awards as a milestone in our journey to fuse security and flexibility for all of our customers.

no comments |

HOB Exhibits at HP Discover in Las Vegas. Viva IT Security!

Posted by Tobias Eichenseer Fri, 29 May 2015 13:19:00 GMT

HOB at HP Discover 2015 Las Vegas

Flights booked. Bags packed. Laptops charged. This weekend a hand-picked delegation of HOB employees will travel to Las Vegas in order to exhibit at HP Discover 2015. From June 02 to June 04 visitors have the opportunity to see live demos of our latest software innovations. Our remote access experts will welcome you at booth #2339.

If you are interested in highly secure remote access solutions, you should have a closer look at our flagship product HOB RD VPN. It is a comprehensive solution that provides secure remote access to centrally stored business data and applications at any time, from anywhere, and with almost any device. HOB RD VPN supports many different platforms, including Windows, Linux, and MacOS. It requires no client-side installation or administration rights and is multi-tenant capable, making it easy to manage access to data and applications. Users also benefit from the easy and secure single sign-on features.

While you are at our booth, make sure to ask for a demo of our HTML 5 Client (HOBLink Webterm RDP) and our integrated data synchronization tool (HOBLink DASH) that lets you share data across multiple devices without transferring any data to servers outside of your company network.

We’re excited to talk to you about your IT Security needs. See you in Las Vegas. Viva IT Security!

no comments |

Homeward Bound: Why At-Home Work Benefits You and Your Employees

Posted by Tobias Eichenseer Tue, 03 Feb 2015 16:26:00 GMT

Home Office with HOB

The concept of working from home is often associated with a host of negative connotations. Distraction, idleness, avoiding responsibility and therefore decreased productivity are just a few of the preconceived notions often correlated with working within familiar confines. Although working from home means being farther away from a manager and closer to the television and perhaps an attention-seeking dog, recent studies and surveys contradict the impact of these “distractions” and reveal that working from home benefits employees and companies alike in three distinct areas.

Increased Productivity
Ctrip, China’s travel agent giant, monitored the work performance and productivity of two groups of employees—a group working form home and a group of office workers (control)—for nine months. Shift length, computer hardware and software, equipment and work order flow were held constant. The only variance was location. The results of this experiment on work environments showed a 13% increase in remote-worker performance, while the performance of office workers remained stagnant. Home-based employees worked more minutes per shift, taking less breaks and sick days than their office-worker counterparts. The variable group identified a quieter work environment at home as the root of this increased productivity.

Bottom-line benefits: work performance improves due to the ability of each employee to customize their work environments and maximize their comfort levels. Employers see increased work input and therefore product output.

Conservation of Resources
Commutes and office computers are costly, both in terms of energy and hardware. One day of working from home means one less day of idling in traffic, reducing your company’s carbon footprint. Businesses will also benefit from reduced office overhead costs, as employees will use less company resources on the days they work from home.

Bottom-line benefits: Employees will save fuel, companies will see reductions in electricity costs and conservation efforts will be bolstered. For more information, check out our free e-book about Green IT!

Employee Satisfaction

Work often induces stress. According to a 2005 study from Work and Families Institute, 90% of US workers felt that their jobs required them to work hard and that there was not enough time in their day to complete their work tasks. Similarly, nearly 50% of working dads and 25% of working moms claimed that they don’t spend an adequate amount of time with their families, according to a 2013 Pew Report. Working from home eliminates much of the conflict associated with balancing work and personal affairs. Employees feel more connected to household happenings, and therefore less stressed. In the aforementioned Ctrip study, annual staff turnover decreased by 50% among employees working from home due to increased job satisfaction.

Bottom-line benefits: Working from home allows employees to attain a more desirable work/home balance. Companies benefit by experiencing less staff turnover. 

Due to the need for flexibility in modern society, there has been a drastic increase in the amount of employees who opt to work from home. Census data from the USA show that 17% of the US workforce works from home at least once a week. As businesses adjust to this rising trend, they must consider the reliability and security of their remote access solutions. HOB’s remote access solutions are easily tailored to your remote access needs and the first step towards maximizing employee performance and satisfaction.

Here’s more information on home offices, check out our free e-book: Home Offices Made Easy.

no comments |

Helpful Tips to Prevent Cyber Crime

Posted by Tobias Eichenseer Thu, 04 Dec 2014 16:15:00 GMT

Business depends on data and technology, both of which can be abused by cyber criminals. A study conducted by the Center for Strategic and International Studies (CSIS) reported that cybercrime costs the global economy a staggering $445 billion a year. Cybercriminals are gaining momentum by sharing information and launching more sophisticated attacks. Fighting cybercrime requires a holistic approach to safeguarding information.

To avoid becoming a victim of cybercrime and prevent unauthorized access to your data, here are some steps you can take:

Education
Hackers are not the only ones who can gain power from information – by educating yourself on the existing types of scams and how to prevent  them, you can stay one step ahead of cybercriminals. After all, cyber security begins with personal responsibility.

Automate software updates
Previously, we mentioned the fact that software updates are important as, apart from product enhancements, updates contain bug fixes and solutions to security vulnerabilities. The good news is that many software programs will automatically connect and update to defend against known risks; therefore it is best to configure automatic updates. 

Click with caution
Whether chatting over an instant messenger or checking e-mail, you should be careful not to click on any links in messages from people whom you do not know. The link could download malware onto your computer, or it could revert to a fake website that asks for private information, such as user names and passwords. These data could be used to carry out identity theft or other crimes. The same concept applies even if the message is from someone you do know – you should always be vigilant. Certain types of viruses multiply and spread through e-mail, therefore looking for information that indicates the legitimacy of a message is advisable. Also, exercise caution when downloading any programs.

Shop safely
Apart from practicing safe surfing, you also need to be cautious when shopping online. Before entering your payment information on a site that you have never visited before, do a little investigating to determine if the seller is legitimate. 
When it comes to payment, a credit card - rather than a debit card - should be used. If the site turns out to be fraudulent, your credit card issuer may reimburse you for the charges, but with a debit card, the money is lost.

Use Common sense…
Even though our awareness about cybercrime has increased, mainly due to the ongoing revelations by the ex-National Security Agency contractor Edward Snowden, cybercrime is still on the rise. Cybercrimes trajectory is fuelled by common mistakes such as replying to spam or downloading attachments. Therefore, common sense should be used whenever you are on the Internet. You should never post revealing personal information online, or share sensitive information, such as your social security number and credit card number.

…But be suspicious
Even cyber-savvy people still need to keep a guard up for any new tricks and act proactively to protect their safety. Although protecting oneself does take some effort, there are numerous resources and tools that can help. By adopting best practices and a few precautions, you can keep cybercrime at bay. 

If you are looking for security solutions for your company, you can find valuable information on our website www.hobsoft.com. You will find several software security solutions “Made in Germany” that will help you protect your corporate network and files.

no comments |

Non-technical Security Threats: Social Engineering

Posted by Tobias Eichenseer Thu, 13 Nov 2014 15:44:00 GMT

Consider this common business scenario: a business has invested in network firewalls, modern authentication techniques, latest encryption technology, and other security technologies, but a social engineering attack could bypass all these defenses. A firewall cannot protect against users being tricked into clicking on a malicious link they think came across from an old friend.

What is Social Engineering?
The term “social engineering” refers to the non-technical type of intrusion that mainly relies on human interaction and commonly involves tricking people to break normal security procedures. In simpler words, social engineering can be regarded as a scam or fraud – people are scammed into giving away valuable data, including passwords. 

Examples
Social engineering is normally considered the easiest and most successful type of attack, and can come in several forms.

In the office
Social engineers may easily physically enter the organization’s building without provoking suspicions. A common practice used by social engineers to enter a secured building unnoticed is to hang out in the smoking area and wait to be let in by an unsuspecting employee.

On the phone
One of the most traditional methods is to call a person and ask them questions - a social engineer might pretend to be a trusted authority. Phone-number spoofing is another common practice amongst social engineers – a different number shows up on the target’s caller ID. The criminal could be calling from his/her home, but the number that shows up on the caller ID seems to come from within the company.

Online
Criminals also take advantage of the Internet. When someone types in a URL that is only one letter off, instantly they can end up with unintended consequences. Rather than going to where they intended, unsuspecting users who make typing errors land on a fake site that has one of the following aims: to sell something, to steal something, or push out malware.

Why do People Fall for Social Engineering Tactics?
Social engineering has been proven to be a very successful method for a criminal to “get inside” an organization. Social engineering works because people want to be helpful and/or benefit themselves. By exploiting human psychology, social engineers find innovative ways of gaining access to buildings, systems or data. Successful phishing attacks generally warn that, “Your bank account has been breached! Click here to log in and verify your account.” This ploy takes advantage of human fear of having a compromised bank account. This psychological trick also helps social engineers to succeed with their criminal activities.

Awareness Training
People are fooled everyday by these fraudsters because they have not been sufficiently informed about social engineers. Keeping a watchful eye for social engineering is also part of personal responsibility to prevent cyber attacks. Since social engineering tricks are constantly evolving, awareness training has to be maintained. For instance, as social networking sites continue to grow in popularity, so do the scams social engineers try to use there, targeting Facebook, Twitter, LinkedIn and other social sites. Links that ask “Have you seen this video of you?” take advantage of both human fear and curiosity, making it impossible to resist unless the user is aware that it is a social engineer looking to trap the user into clicking on a bad link. 

Prevention
From small pieces of information, a social engineer can compile an entire profile of a target. This makes the social engineer well poised for an attack to gain access to a facility or sensitive data. 

Security is all about knowing what risks there are and how to avoid falling victim; not all threats come from the online front or use technical means to exploit network vulnerabilities. The weakest link in security is the human factor. Social engineering should be seen as a very serious risk and preventative measures should be in place. Prevention involves educating people about the worth of information, training them to protect it, and increasing people's awareness of how social engineers function.

no comments |

VPN Functionalities for Remote Access Technology: Fact or Fiction? Part 2

Posted by Tobias Eichenseer Thu, 16 Oct 2014 13:27:00 GMT

In our earlier post on remote access technology, we discussed various aspects of VPN (virtual private network) technology. This article will further examine how VPNs offer staff and business partners a reliable and secure connection to highly-sensitive company resources using unsecure connections, such as the internet.

1. VPNs Play an Important Role in Mobile Workplace Strategy Deployment

Fact.
VPN technology is a vital part of a mobile workplace strategy. VPNs allow an employee to gain access to the corporate network with the same speed and controls as their in-office counterparts. Modern VPNs are so reliable that a growing number of network managers are choosing to deploy VPNs even when the employee is in the office. This strategy is a reasonable approach if employees use their personal mobile devices on the company site. In this case, the access via VPN on site prevents viruses and other malware from compromising the company network, and can also prevent employees from establishing a second Internet connection whilst being connected to the company network (anti-split tunneling). These security measures help overcome the security risks so that employees can benefit from anywhere and anytime access.

2. VPN Connections Fail Frequently and Require Repeat Log-ins

Fiction.
VPNs offer high availability and single sign-on techniques to ensure that users can connect to a multitude of services by only entering their password once. VPNs present in the market resume automatically after a loss of connectivity rapidly and without the need of user intervention. Some VPNs also ease network roaming. For instance, an employee’s authenticated state may be kept during a brief loss of connectivity, or reinstated transparently via single sign-on. Furthermore, today’s solutions ensure that data are not lost in the case of a connection interruption.  


3. Once an Employee has Remote Access, He or She Can Access the Company Resources Forever

Fiction
Network managers can prohibit employees’ access to the company resources once employment is terminated. Modern VPNs facilitate this process by allowing central administration and configuration.
Furthermore, while the employees are working for the company, IT administrators can define roles and rights for each user – this also includes the possibility to completely deny access from an external site under a specific situation, such as in the case that an employee wants to access data from a public Internet café. This ensures that each user can only view and access the data he or she is intended to.

4. VPNs Management Policies are Difficult to Administer

Fiction.
To simplify administration, VPNs can use central policy managers and integrate with enterprise authentication servers and directories. Given the multiple access methods, endpoint security checkers and other policies, it is possible that policies may become cumbersome. It is up to the network administrator to use his or her authority sensibly to achieve the desired security level without rendering the VPN challenging to manage. Today’s VPNs are relatively simple to manage and give network managers various options that ensure that users gain only access to appropriate information.

Remote Access: The Future of the Workforce
Remote access technology has vastly improved since its inception, and organizations are increasingly deploying VPN technology, benefitting from enhanced security features whilst being user-friendly.

If you are looking for a performant and innovative remote access solution, we can recommend you our Remote Access Suite HOB RD VPN. HOB RD VPN is the comprehensive solution for remote access to your central data and applications, at any time and from anywhere, with almost any end device. As a pure software solution, HOB RD VPN is highly scalable and supports many different platforms.

Moreover, we would like to invite you to download our free e-book: Debunking Myths about Remote Access Technology. It contains useful information about the advantages of remote access solutions and showcases how you can benefit from implementing a remote access solution in your company.

no comments |

Private VoIP – Security in Verbal Communication

Posted by Tobias Eichenseer Thu, 24 Jul 2014 10:55:00 GMT

With the recent revelations by the controversial whistleblower Edward Snowden about surveillance on both digital and phone communications, people have started questioning the security level (or lack thereof) of traditional communication channels.

VoIP Recap
Voice over Internet Protocol (VoIP) is an alternative to traditional telephone systems (Public Service Telephone Network systems, PSTN). VoIP converts a voice-signal into data packets (IP) and uses the Internet to transmit these data. In our last blog on Voice over Internet Protocol, we discussed the advantages of VoIP versus PSTN - VoIP offers cost-effectiveness, higher flexibility, more features, an intuitive interface and better security. However, there are several ways to set up a VoIP connection: by means of the freely accessible worldwide web, referred to as the public VoIP network, or via a secured private or internal network.

Public vs. Private VoIP
In terms of telephony, the public networks pose disadvantages and risks, whereas private and secured IP networks offer safe and high quality VoIP communication. Public Internet telephony is subject to significant security risks, including eavesdropping, hacking or the theft and abuse of private data to conduct other crimes, such as identity theft. Companies seeking alternative telephone solutions should not overlook these risks.

Furthermore, the introduction of “free” calling services, such as Skype and Google Hangouts, are also sources of potential problems; these services utilize the Internet and the resultant connection quality is subject to the same problems as any other “public” connection. When using such services, apart from no guarantee of security, one must be aware of the vulnerabilities that are associated with third-party products, such as viruses and other attacks.

When communicating with business contacts or (potential) clients around the world, the highest priorities are optimum bandwidth utilization, high audio quality and security of the communication channel. However, when using the public VoIP network, these are precisely the factors that are put at risk. Data loss or theft can severely damage the corporate image which could result in immediate and long-term loss of clients and revenue. Conversely, when using a VoIP service via a private network, the voice packets remain on the private Internet, and no voice traffic travels over the public Internet. This enables a provider to offer an IP-based voice solution that eliminates all the concerns of quality and reliability.

With traditional VoIP services, hackers with access to packet sniffers and similar tools are able to monitor pertinent call location and transmission details, or eavesdrop on confidential conservations. However, with a VoIP over a private network, voice packets are routed securely over a private and safe network, thus abolishing security threats.

Flexible and Secure Communication: HOB Phone
Many companies have high requirements on both security and the quality of their communications that they cannot use services from a free-provider. To this end, HOB has developed HOB Phone: a purely web-based Voice-over-IP client. HOB Phone allows phone communication from different locations around the world through the Internet over a virtual private network. It enables a secure, encrypted voice communication so that calls cannot be intercepted. The great advantage of the HOB solution is that there is no need for an installation or administration rights on the client side.

Meeting Modern Business Needs
A great benefit of VoIP is that the service can be used to make and receive calls from any location. VoIP renders the management practice of telework (remote working) possible as it provides service and number mobility, which is not possible with traditional phone technology. Using a private VoIP service, a user can use the same number from virtually anywhere, as long as it has proper IP connectivity.

Conclusion
A VoIP connection over private networks provides higher quality and security than those that function strictly over the public Internet. The VoIP client HOB Phone connects over a virtual private network to the enterprise telephone system without intensive software installation.
 


Author: Hazel Farrugia
 

no comments |

5 Reasons Businesses Should Switch to VoIP

Posted by Tobias Eichenseer Tue, 22 Jul 2014 14:17:00 GMT

Businesses strive to reduce operating costs whilst improving their mode of operation. Voice-over Internet Protocol (VoIP) offers a host of significant advantages compared to Public Service Telephone Network systems (PSTN), which is why businesses are implementing convergent speech- and data networks and VoIP systems. When using VoIP, voice traffic travels on the internet or over private data network lines, rather than being channeled across conventional commercial telecommunications lines. The benefits of VoIP include:

1. Cost-effectiveness
Probably the most striking advantage of VoIP is its ability to save on expenses.
For businesses, VoIP decreases the cost for equipment and effort, reducing labor and maintenance costs. The cost of long-distance phone calls can be reduced effectively with VoIP, in contrast to public switched telephone networks, which involve expensive international calls.

2. Increase flexibility

VoIP allows for management practices, such as teleworking, which are not possible with traditional phone technology. VoIP provides service and phone mobility, since the VoIP system can be used virtually anywhere, with the same company number, given that a broadband connection is available. This means that the user is not restricted solely to a fixed workplace, but can also work while travelling, for example. Using a headphone/microphone set connected to a computer system, a laptop can also serve to receive important customer phone calls.

3.More features
VoIP provides a number of useful features, which are, in addition to the standard features, associated with a traditional telephone system. Simultaneous communication with more than two persons is possible with VoIP; therefore this allows for online conferences with numerous persons at one go, decreasing travel costs. Other features include hold and unhold calls, support of several accounts, and call transfer ability, all of which are not possible using standard telephone equipment. VoIP feature upgrades normally require only bandwidth and software upgrades.

4. Intuitive Interface
The majority of VoIP systems use a web GUI, such that working with VoIP is rendered as easy as possible.
 
5. Security
Many enterprises are opting for VoIP on their own virtual private networks (VPN), benefitting from better security and quality than those that function solely over the public Internet. SSL VPN products provide security measures that can be used to protect the data traffic from unwanted access by unauthorized persons, both accidental and malicious, for all communications that pass over the Internet.

Making secure calls using HOBPhone
HOB RD VPN offers secure, flexible and comprehensive remote access to centrally stored company data and applications. One of the key functionalities of HOB RD VPN blue edition is HOBPhone. The Java-based SIP client HOBPhone easily connects to the enterprise telephone system without intensive software installation and allows for phoning from different locations worldwide via the Internet – and is completely comfortable and reliable. It is a secure, encrypted voice communication, thus calls are unable to be tapped.

Moreover, several user accounts can be used simultaneously, with a centrally configurable telephone book. The great advantage of the HOB solution: There is no need for an installation or administration rights on the client side. Worldwide connectivity for employees can thus be achieved quickly and easily. HOBPhone supports five accounts, whereby the user can make and receive calls from these five different lines. Voice conferencing with many persons from different accounts is made possible using HOBPhone, and one has the possibility to connect with exchange server for contacts. HOBPhone can be used with a Windows, Mac, or Linux operating system.

Readers, do you think that VoIP is the way to go for establishing secure business calls? Please share your thoughts in the comments below.

no comments |

4 Reasons Your Remote Working Strategy Is Not Secure

Posted by Tobias Eichenseer Tue, 03 Jun 2014 10:28:00 GMT

More and more, “work” is being defined as something people do, rather than the place people go. Today’s organizations are shifting away from the usual nine-to-five workday, and progressing towards the trend of remote working (also called telecommuting). Remote working enables organizations to gain a competitive advantage from higher productivity, better work-life balance and decreased costs.

However, IT teams frequently face several problems related to mobile workplace deployments. The most common pitfalls are:

1. Ignoring Common Threats
Security risks posed by malware have been on the top agenda of many security teams; however, a more frequent threat nowadays is mobile phishing. Phishing occurs when identity thieves collect user information such as name and password, Social Security number, date of birth, ATM PIN or credit card information, for use in committing fraud or other illegalities. Since it is more difficult to identify fake URLs on a mobile device, it is more likely that remote workers will succumb to a phishing scam, than their in-office counterparts.

2. Taking a One-Size Fits All Approach
Managing mobile device security is more limited, and normally exerts a level of inconvenience for users. For instance, mobile virtualization can allow users to work remotely without any data on their devices; however this may be overkill for the employee who simply wants access to corporate email.

3. Failing to Educate Users
As more organizations adopt the mobile workplace strategy, managing the employees who use mobile technology has become more arduous. IT teams should educate employees to participate in keeping corporate data secure.

4. Assuming Users will Follow Security Policies
The organization should draft, write and implement comprehensive and reasonable security policies to efficiently manage and protect information. IT teams should focus on protecting the company's highly-sensitive information assets, rather than the devices used by remote workers themselves. IT teams must also educate users on why it is important for them to follow the policies put in place.

For any business which has implemented a remote workforce strategy, or those wishing to deploy such a strategy, it is important that IT teams overcome these problems in order to protect the company’s resources.

If you would like to learn more about mobile workplaces, and find out which security issues need to be addressed, you can download our free eBook “How VPNs Help Providing Secure Mobile Workplaces”.

no comments |