Walkthrough: Makeup/Facial overlay From TS3wiki. Multicolor Makeup Tutorial. The Sims 2 Game Gameplay Tutorials; Creating Tutorials; The Sims 1 Game Gameplay Tutorials. Multi-layerable Makeup (like what we had in TS2) Welcome. Downloading Sims 4 Studio. Modding Requests & WCIF. Sims 4 Custom Content Tutorials. Multi- layerable Makeup (like what we had in TS2)Post by afgw on May 2. GMT - 5. Face Paint is intended for whole face makeup, such as clowns and animal faces, the same as real life face- painting. Make Accessories Layerable. Started by babyliss, Jun 14 2007 09:03 PM. Tutorial: Basic Object Meshing (TS4) Back to top; Report. Go to My Documents/EA Games/The Sims 2. Note: Vista users: Vista won't let you create the zip files inside. Characters Sets Pose Boxes (Recommended). Tears for crying sims Piercings 6 New Layerable Piercings 11 Layerable Piercings Wings. Making Machinima: Creating. Cloe Sims: Makeup set N1 . Piercing Set Piercings Ts3 Makeup 4 Makeup Game Merch Layerable Piercing 3 Lips 3 Acessories Ts3Cc. Sims Nathys Sims 2 3 4 The Sims 1341 Sims 1254 Sims Clothing Gift Sims. Kai's Makeup for Skyrim by XarathosHawke Skyrim » Models and Textures. Piercings 10 items set semi-layerable S4 by necrodog Mod The Sims. How to convert Sims 2 clothes into Sims 4 by Kiara24. Tutorial:Sims 4 Creating walls Floors by HugeLunatic. Not sure what you mean by face paint for eyes - do you mean the eyes themselves, eyebrows, mascara, eyeliners, or eyeshadow? All of these have separate types in TS4, so can co- exist with one another. Scars belong on the appropriate Skin Detail for their desired location (Skin Detail is the equivalent of TS3's Topical Details, i. For a full list of all Body. Types, see the Exclude. Body. Part. Flags dropdown in the caspart Grid in the current version of s. You won't find them all in Sims. Studio, because it can only show examples that have thumbnails, and some don't - it also can't show CAS items that don't have casparts, notably default skin textures and tone shades. So, no, Sims can't have two face paints at the same time, but can have custom eyes and eye makeup at the same time as scars, because they are different types, none of them face paint.
0 Comments
REMOTE ASSISTED REALITY SOFTWARE SOLUTIONS FROM VISUAL MOBILITY INCOpen Standards RAR Software From VMI Is Agnostic To Backend Enterprise Applications And HD Audio/Video Capture / Live Streaming Devices. Remote Assisted Reality software applications from VMI can consume High Definition Live streaming audio/video content from any duly- equipped (and VMI approved) IP cameras, encapsulates them in our apps and facilitates integration in real time to any backend Enterprise Software platforms over web services. The Remote Assisted Reality software platform from VMI has been developed with the core philosophy of remaining agnostic to the manufacturer of the IP cameras (as long as they meet our minimum requirements), Our RAR Apps are also agnostic to the type of backend Enterprise Applications currently in live operation, or are being planned for enhancement / deployment in the future. Helper native apps on IOS and Android mobile devices retrieve native data from the device of the remote user initiating the live audio/visual stream that communicates the information to the centralized web app in real time. Collectively the web apps and native apps offer a seamless user experience with minimal data entry and enable the user to attach a recording of the live stream to the transaction or incident in progress for future reference. VIBES (Visual Intelligence Based Enterprise Services) is our RAR application for Enterprise Field Services. SIBLE (Situational Intelligence Based Law Enforcement) is our RAR application for Law Enforcement, Security Services and Military Operations. Both of these apps are integrated with the Geo. Trak native app for i. OS and Android devices. LITE (Live Interactive Transaction Engine) is an entry level web app with minimal functionality and not integrated with the Geo. Trak native app. CARTS (Customer Assisted Remote Triaged Services) is our RAR app for Remote Customer Services that opens up an entire new dimension of near- real- time Customer Service by provisioning the end- customer with our RAR Smartglasses. Our development team has a pipeline of web apps for other industries currently under development. Through web services, the RAR web apps can even be set up to support single- sign- on functionality with backend Enterprise Applications if necessary. Through similar web services, our RAR web apps can exchange data with backend Enterprise Applications in real time or in batch as your business processes demand. In essence our web apps are flexible and configurable to your specific integration needs and can be addressed through our Consulting and System Integration Services. Once this association is made, Remote Assisted Reality requires the associated audio/video/transactional content to be shared through the web app, with another user, such as a co- worker or supervisor, for the purpose of collaboration and seeking qualified expertise to resolve the issue at hand. Furthermore, the benefits of true Remore Assisted Reality can be derived when the same live stream and situational data is shared and propagated even further to multiple duly- qualified intra- company users and even authorized external experts for the same purpose of remote collaboration, expertise sharing, assistance and ultimately issue resolution. Highly interactive Situational Awareness dashboards in our RAR web apps offer a consolidated view of each remote field asset including current location, status, engagement and their real time live audio/video feed, for a comprehensive view of the current conditions. In- app instant messaging allows an alternate mode of communication between the collaborators and the remote field user, which comes in very useful when bi- directional voice communication is not possible. Remote Assisted Reality is a design concept and a software platform from VMI enabling remote live audio/visual content to be merged with transactional data. REMOTE ASSISTED REALITY; RAR DEVICES; RAR SOFTWARE. College has unveiled its new prospectus which aims to bridge the gap between printed and digital media using augmented reality. Lesniak Swann concept. Remote Assisted Reality devices from approved VMI vendors enable remote live HD audio/video streaming through our Remote Assisted Reality. Remote Assisted Reality, (RAR). The core concept of Remote Assisted Reality is. Integrate file storage into your websites or mobile applications by building apps with 4shared API. BeagleBrick - From Concept to Reality. From Concept To Reality: The Hoonicorn RTR Build Story. What’s up Speedhunters! Ted Baker has opened its first . Ted Baker experiments with virtual reality as digital concept store opens. Virtual reality; Accessories; Windows phone; Software. I understand the concept of limitations for apps however its not a strong. Reality What A Concept RarityVia, Jr., Department of Civil and Environmental Engineering offers the following degrees: Environmental Engineering (ENE), Environmental Science and Engineering (ESEN): The Environmental and Water Resources Engineering Master's Curriculum (MS CE and MS ENE) is designed to build upon undergraduate engineering. Civil, Environmental, Chemical, Mechanical, Mining, and Biological Systems Engineering, but is open to all students. Both MS CE and MS ENE degrees are open to students who have earned undergraduate degrees in Engineering. The only. difference between the two degrees is the name, so students may choose whether they want their degree to say Civil Engineering or Environmental. Engineering. Students with a non- engineering background who desire to pursue the degree must complete several required undergraduate courses, as. The Environmental Sciences and Engineering Master's Curriculum (MS ESEN) is designed principally for students with undergraduate degrees in one. The objective is to provide students with an exposure to engineering with technical training that is intermediate. Any of the three MS degrees may be taken as coursework only, or with the permission of the faculty, may incorporate a research thesis. Master of Science in Civil Engineering (MS CE)Master of Science in Environmental Engineering (MS ENE)Master of Science in Environmental Sciences & Engineering (MS ESEN)Doctor of Philosophy in Civil Engineering (Ph. D CE)For more information, visit the Environmental and Water Resources Engineering page. Transportation Infrastructure and Systems Engineering (TISE)The TISE Program in the NCR offers education and research opportunities to those interested in the subjects of urban transportation systems. The NCR program emphasizes transportation solutions in the urban context, and examines the complex. Applicants are welcome to. The curriculum leading to the M. 11th Annual Schnabel Engineering. Virginia Tech Green Engineering. Virginia Tech College of Engineering GREEN ENGINEERING. VT Green Engineering Program Goals 1. Welcome to the Grado Department of Industrial and Systems Engineering. Six Sigma Green Belt Certification Training. GREEN ENGINEERING PROGRAM Green Engineering & Life Cycle Assessment (LCA) at Virginia Tech Oak Ridge National Lab April 10, 2014. S. Degree may be structured with three options: (1) course work only, (2) course and a project or report, and (3). The first option consists of 3. The. other two options require 2. Master of Science in Civil Engineering (MS CE)Doctor of Philosophy in Civil Engineering (Ph. D CE)For more information, visit the Transportation Infrastructure and Systems Engineering page. Geospatial Engineering (GEO): Graduate study in Geospatial Engineering prepares students and professionals for the challenges of a new environment where information is. Architecture and engineering occupations are projected as one of the 1. U. S. Bureau. of Labor Statistics). In addition to surveyors, cartographers and photogrammetrists, this includes engineers who will need an understanding of geospatial. Management Systems Engineering. Six Sigma Green Belt Certification Training. Sean McGinnis is the Director of the Green Engineering Program at Virginia Tech. He has bachelor degrees in Chemical Engineering and Materials Science from the. Virginia Tech Green Engineering Minor. Please contact EPA's Green Engineering Program if you would like to request an academic program be added to this list. The Civil Infrastructure Engineering (CIE) program offers education opportunities to construct sustainable. The State of Green Engineering at Virginia Tech on. Director, Green Engineering, 2090-A Torgersen Hall, (540) 231-1446. 220 Norris Hall (0219), Virginia Tech, (540) 231-6051, rbatra@. Our program is designed to provide the necessary knowledge base to meet this need. Geological Survey) Our program prepares you to take advantage of this rapidly evolving opportunity. Master of Science in Civil Engineering (MS CE)Doctor of Philosophy in Civil Engineering (Ph. D CE)For more information, visit the Geospatial Engineering page. Civil Infrastructure Engineering (CIE): The Civil Infrastructure Engineering (CIE) program offers education opportunities to construct sustainable civil infrastructure and systems. The program. emphasizes the interdisciplinary nature of Civil Engineering by drawing from a diverse mix of faculty both within and outside the CEE Department. The CIE. program has strong pedagogical and practical links to Systems Engineering, Environmental Engineering and Transportation Engineering. The CIE program is the. Beyond taking 2. 4 credit hours of course work, the CIE program degree has two options for the remaining. The former consists of eight 3- credit courses plus a 6 hour project and report; the latter consists of 1. The two required courses are part of the eight (or 2. Computer Virus: How to Remove It. Ughhhh! If your PC has ever been infected - or worse, if it's infected right now - you're probably groaning. Yes it's a pain, but the good news is: you can remove viruses yourself, for free. STEP 1: Back Up Documents, Photos and Videos. Save your important data to an external drive. Be sure to scan this drive and its contents after you remove the virus; you don't want to re- infect your computer after the clean- up. STEP 2: Reboot in Safe Mode. You have to prevent the virus from running when you try to remove it. To do this, reboot in safe mode. Safe mode runs only the Windows operating system and a few key programs. It's a way to limit any malware from launching. Restart your computer and hit the F8 key on the keyboard repeatedly until you get to a black screen with the option of restarting in Safe Mode. One may do the job, but three will almost certainly do the job. These three have worked for me and come highly recommended by PC Magazine and CNET: Malwarebytes. Super. Antispyware. PC Tools. STEP 4: Run Virus Scanners. I have something called spyfader installed on my computer and its running slow what is a good program to get rid of spyware or viruses? Use the following 100% free virus removal programs to fix just about any Malware infection your PC may have. What is the TDL4 MBR Rootkit Bootkit Virus Alureon TDSS? Tools to remove CLICK HERE. How to remove virus from. Select Start, All Programs (or just Programs. Storage Advisor Tablets Advisor Windows Advisor About Contact Site Map Privacy Policy Terms & Conditions Cookies Follow PC Advisor on Twitter. Autorun Virus Remover provides 100% protection against any viruses trying to attack via USB. Remove Autorun&Autorun.inf virus Easily and Quickly . Download, double- click to install, accept all the defaults they recommend, and then run each. This will take a while. When the programs locate a virus or any suspicious items, allow the programs to delete the files.
STEP 5: Reboot Normally. Reboot your computer normally; no need for safe mode. You should be back to normal now. If you have files backed up on an external drive, plug it in and use the security programs you downloaded to scan that drive before you open or transfer any files. If the virus is gone, go to step 6.**IF YOU STILL HAVE THE VIRUS**Many people will recommend you reinstall Windows or try system restore or download a registry cleaner. I say that at this point, most people should take the computer to a local PC repair shop. If you use a computer, read the newspaper, or watch the news, you will know about computer viruses or other malware. These are those malicious programs that once they infect your machine will start causing havoc on your. Is your PC infected with a Virus? Problems: A virus or malware infection can cause numerous problems on your PC. This can include anything from a slow computer to having your online banking credentials stolen. Where I live, it costs about $1. Windows installed. It is a personal decision how you proceed from here, but take into account the value of your time. STEP 6: Add Security How did you get that virus in the first place? Even if you don't know, it's clear you need more protection. PC Tools is a real- time virus scanner that you can use as your ongoing protection, or install something like Avast or AVG. All three are very good, free, anti- virus programs. Also Microsoft's Security Essentials comes well recommended. You should also go to the Control Panel of your computer, and in the security section click Windows Update. Make sure that it's set up to regularly update. And if you think someone else accidentally installed malware on your computer, it's a good idea to give other members of the family their own sign- on accounts that don't have admin privileges. This way, if the kids try to download software that could harbor viruses, they won't be allowed to. And yes, this means you should keep your admin password private. P- 2- P music and movie sites do expose you to a lot of junk. STEP 7- Damage Control. Viruses are a gateway to identity theft and spam. So after you disinfect your computer it's a good idea to check your credit (annualcreditreport. Fair and Accurate Credit Transactions Act forced the credit unions to create for consumers to access yearly free reports). You should also change all your passwords, especially your email password and any passwords for your financial institutions. Here's my method for creating easy- to- remember rock- solid passwords. Silent Install / Uninstall. The Lan. Safe Setup for Windows takes advantage of the Install. Shield Silent function. Lan. Safe. With Install. Shield. Silent, there is no need for a user to monitor the setup and provide input via. An Install. Shield Silent setup runs on its own, without any end- user. A normal (non- silent) setup receives the necessary input from the user in the. However, a silent setup does not prompt the. Install. Shield Silent response. A response file contains information similar to what an end user would enter. Install. Shield Silent. The format of. response files resembles that of an . A response file is a plain text file consisting of sections containing. The best way to create an Install. Shield Silent response file is. Install. Shield automatically record and create the. If necessary, the response file can be manually edited after. Note. All passwords are saved in human readable form in the recorded silent setup. Command line switches for Setup. Response. File> or - f. InstallAware is the first and only installer tool to offer Hybrid Installation Technology: switch between Windows Installer and Native Code setup engines at runtime. InstallAware Developer Setup Builder NX. Aero Glass with Fading/Sliding Wizard Transition Special Effects. Response. File> Specifies an alternate location and name of the response file (. If this. option is used along with the - r option, the response file is written to the. Response. File>./f. Log. File> or - f. InstallAware - How to Execute custom program in Before Remove Previous Installation. Open an application's Uninstall Wizard for InstallAware.Log. File> Specifies an alternate location and name of the log file created by Install. Shield. Silent. By default, Setup. Setup. inx./r or - r Causes Setup. Windows folder./s or - s. Runs Install. Shield Silent to execute a silent setup. Note. Separate multiple command line switches with a space, but do not put a space. Setup Command Line Parameters. Every Install Aware setup supports command line parameters for silent and logged installs. In addition, you may also set/override the. A setup authoring tool for ISVs and enterprises deploying products, patches and web updates. Install. iss is valid, but not. Install. iss). When using long path and filename expressions with switches, enclose the expressions. The enclosing double quotes tell the operating system. Create a response file. Open a DOS window (Command Prompt). Type the directory path of the Lan. Safe Setup. exe. If spaces appear in the. If spaces appear in the. For example, if you used Setup. Lan. Safe, be sure Lan. Safe is running properly. Note. A Setup run in silent mode uses the same settings as the Setup you ran through. Essentially, you are creating clone installations. Troubleshooting errors. Setup. log is the default name for the silent setup log file that contains the. This file is saved in the same location. The result code shown in the file is one of the following: 0 Success.- 1 General error.- 2 Invalid mode.- 3 Required data not found in the Setup. Not enough memory available.- 5 File does not exist.- 6 Cannot write to the response file.- 7 Unable to write to the log file.- 8 Invalid path to the Install. Shield Silent response file.- 9 Not a valid list type (string or number).- 1. Data type is invalid.- 1. Unknown error during setup.- 1. Dialog boxes are out of order.- 5. Cannot create the specified folder.- 5. Cannot access the specified file or folder.- 5. Invalid option selected. Usually, errors occur because a specified command line switch is invalid or. This article shows you how to create a meal planner in Excel. Here's what we are trying to achieve: 1. On the second sheet, create the following named ranges. Name Range Address; Breakfast: A2:A10: Lunch: B2:B10. Weekly Meal Planner Template - Free Printables Word Excel. Have a look on following weekly meal planner template, you will find it useful when making weekly meal planner for home. Weekly meal planner is a way you organize yourself to cook a meal either for breakfast, lunch or dinner. It is a plan prepared by home managers and other household persons before they shop for food items. It keeps you organized and tells about what you have to cook throughout the week. Making a weekly meal planner is a best way to eat healthy diets as well as improves your eating habits. Generating a weekly meal planner requires bit investment of time and makes you organized shopper when shopping for food stuff. Meal planning is a personal thing that really works better for you so build up a weekly meal planner with help of below mentioned weekly meal planner template. You can customize the template in MS excel easily to insert or remove details and information. Free weight loss tools courtesy of a registered dietitian. Get all the dieting tools and free diet help you need to successfully lose weight and keep it off.Whether you are a home cook or a professional cook working in a restaurant, availability of a weekly meal planner makes your job easier. A well made weekly meal planner allows you to choose a favorite meal to cook during the week. Meal planner is a way you use to organize yourself when want to cook a meal, whether that’s breakfast, lunch or dinner. It is just like a plan you make before you shop for grocery and other food stuff. Majority of people plan their meals before a month to make cooking stress free for whole month. Wide range of handy tools is accessible on web that can be used to make weekly planner. It is era of technology and you can also make a weekly meal planner online using online software and computer programs. Meal Planner Monday Tuesday Wednesday Thursday Friday Saturday Sunday. Free Diet Planner Template easy diet meal plans for women weight loss Click for more protein weight loss shake recipes. Meal and Diet Planner. Create your custom meal plans with grocery list maker for free. Lose weight the healthy way using our free online meal planner software and tools. We also have a weekly meal planner template which is offered here for free. Download This Weekly Meal Planner Template Here: Download Planner Template. Title: Weekly Meal Planner Template Doc (2. Caption: Weekly Meal Planner Template. Filename: weekly- meal- planner- template- doc. Be a Master Meal Planner with this Template! Planning ahead takes the guess work out of cooking meals, gives you more control over your portions, helps you avoid unnecessary calories, and can save you money! The meal planning process is easier than it seems. All you need to do is pick your recipes for the week (there are some great ones here in this book!), hit the grocery store, and get cooking. Use this handy template from our 2. Calorie Dishes Cookbook. Deleted- All Programs - Start Menu. How about you try do set it up again by going to the properties of the start bar. Press the customize then restore defaults. This is what I do in XP but I don't know so much about Vista's start bar. Want A Weekly Update on Latest System Security Problem http: //www. Undelete or Recover deleted files either it is accidentally deleted, lost or missing from Windows XP, Vista, Windows 7 using Undelete software from NTFS or FAT. All Programs Deleted XpedxHow to Restore Deleted Drivers. Click 'Start' from the task bar and then choose 'All Programs.'. How to restore Windows XP to a previous state. Recovering deleted files. Published on 02/28/2010 by rosevines in Pre-7 Windows. You set Windows 7 to create System Restore points but notice that your system restore points have been deleted when you restart your computer. Which programs can I safely remove from my Windows XP. Windows XP > Start menu > All programs icons missing > Closed Start menu > All programs icons missing. Tags: Configuration; Icons; Start Menu; Windows XP. SANS - Information Security Resources. Welcome to the SANS Security Policy Resource page, a consensus research project of the SANS community. The ultimate goal of the project is to offer everything you need for rapid development and implementation of information security policies. You'll find a great set of resources posted here already, including policy templates for twenty- seven important security requirements. Find the Policy Template You Need! There is no cost for using these resources. They were compiled to help the people attending SANS training programs, but security of the Internet depends on vigilance by all participants, so we are making this resource available to the entire community. Over the years a frequent request of SANS attendees has been for consensus policies, or at least security policy templates, that they can use to get their security programs updated to reflect 2. While SANS has provided some policy resources for several years, we felt we could do more if we could get the community to work together. This page provides a vastly improved collection of policies and policy templates. Policy templates ensure consistency across the breadth of UOW Policy, and should be used when developing, implementing, maintaining, and reviewing policies. This page will continue to be a work in- progress and the policy templates will be living documents. We hope all of you who are SANS attendees will be willing and able to point out any problems in the models we post by emailing us at policies@sans. We also hope that you will share policies your organization has written if they reflect a different need from those provided here or if they do a better job of making the policies brief, easy to read, feasible to implement, and effective. We'll make improvements and add new resources and sample policies as we discover them. Is it a Policy, a Standard or a Guideline? What's in a name? We frequently hear people use the names . For those of you struggling with how to write security policies, there are two very good resources for downloading templates. Help your customers trust your website with a privacy policy. Generate a free template just by entering your details on the form. Templates can also be generated locally by building the policy Free downloads & security. Group Policy tools use Administrative template files to populate policy settings in the user. This download includes the Administrative templates released for Windows 10, in the following. Free information security policy templates courtesy of the SANS Institute, Michele D. Guel, and other information security leaders. Free resource for presenters including 10,000 free PowerPoint templates and presentation backgrounds. Best place of Free website templates for free download. We have about (2,479) Free website templates in css, html, js format. So that those who participate in this consensus process can communicate effectively, we'll use the following definitions. A policy is typically a document that outlines specific requirements or rules that must be met. In the information/network security realm, policies are usually point- specific, covering a single area. For example, you might have a standard that describes how to harden a Windows 8. DMZ) network. People must follow this standard exactly if they wish to install a Windows 8. In addition, a standard can be a technology selection, e. Company Name uses Tenable Security. Center for continuous monitoring, and supporting policies and procedures define how it is used. A guideline is typically a collection of system specific or procedural specific . They are not requirements to be met, but are strongly recommended. Effective security policies make frequent references to standards and guidelines that exist within an organization. Search results for policy and procedure templates free from Search.com. Do you have questions about policy and procedure templates free?VBK to PDFGet the full title to continue reading from where you left off, or restart the preview. File extension vbk is also related to a special format used by VitalSource Bookshelf for its e-books. This format is called VitalBook eBook format and is especially attractive because of its support for various graphics and. DRM Removal Bundle is all in one tools to remove ebook DRM protection, it support Adobe Digital editions drm ADEPT, Kindle and Barnes Noble ebooks.Video show how to remove.vbk DRM protection and save to PDF file. A type of rare audio file used with the CallPilot program.VBK files are accessible to some programs and systems, but are not nearly as compatible as the similar.WAV file type. These files are used with a number of programs. Recommended software programs are sorted by OS platform (Windows, Mac OS X etc.) and possible program actions that can be done with the file: like open vbk file, edit vbk file, convert vbk file, view vbk file, play vbk file. Shopping Cart & Ecommerce Software*Customers on a monthly billing cycle are billed every four weeks. For all promotional offers, additional terms apply. For all free or discounted trials, by accepting any such offer you are agreeing to enroll in a 1. Shopping. Cart. com account to be billed on a recurring basis at the then- current pricing following the trial period unless you cancel prior to the end of the trial period by contacting 1. Shopping. Cart. com. ImPACT Applications, Inc. See what we’re funding and find tips to help you innovate. Sponsor a child today through Compassion's Christian child sponsorship ministry. Search for a child by birthday, age, gender, country, special needs and more. This story was originally published following the premiere of 'Author: The JT LeRoy Story' at the 2016 Sundance Film Festival. The film opens in theaters Friday. Presence Health has locations in communities big and small, all across Illinois. Enter your zip code below to find your closest match. IEEE 802 standards are included in the program after they have been published in PDF for a period of six months. To download these documents, you must first agree to. 2014-07-30: Ventrilo will be one of the main sponsors of QuakeCon 2014: 2013-07-26: Ventrilo will be one of the main sponsors of QuakeCon 2013: 2012-07-24. The Global Vaccine Action Plan (GVAP), endorsed by the 194 member states of the World Health Assembly (WHA) in 2012, provides a framework for achieving the vision of. National Novel Writing Month is an annual writing event. Participants in the Young Writers Program (age 17 and under) are challenged to begin and complete a novel. National PTA is pleased to announce that PTA leader Frances Frost has been named the U.S. Department of Education’s first Family Ambassador. All such discounts are applied in the shopping cart. Please see the Terms of Service for additional details.. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2016
Categories |