Permalink
Cannot retrieve contributors at this time
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
46 lines (42 sloc)
2.31 KB
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <html> | |
| <head> | |
| <meta name="postinfo" content="/scripts/postinfo.asp"> | |
| <title>Home Page</title> | |
| </head> | |
| <body bgcolor="#FFFFFF" background="images/chrom.jpg" text="#000066"> | |
| <h1 align="center">United States Army Aeromedical Center</h1> | |
| <div align="center"><center> | |
| <table border="2" cellpadding="5" width="90%" cellspacing="1"> | |
| <tr> | |
| <td><p align="center"><img src="images/warning.gif" alt="warning.gif (4746 bytes)" WIDTH="158" HEIGHT="100"></td> | |
| </tr> | |
| <tr> | |
| <td><font size="3" color="#000000">This is a DOD computer system. Before processing classified | |
| information, check the security accreditation level of this system. Do not process, | |
| store, or transmit information classified above the accreditation level of this system. | |
| This computer system, including all related equipment, networks and network devices | |
| (includes internet access) are provided only for authorized U.S. government use. DOD | |
| computer systems may be monitored for all lawful purposes, including to ensure that their | |
| use is authorized, for management of the system, to facilitate protection against | |
| unauthorized access, and to verify the security procedures, survivability, and operational | |
| security. Monitoring includes, but is not limited to, active attacks by authorized | |
| DOD entities to test or verify the security of this system. During monitoring, | |
| information may be examined, recorded, copied, and used for authorized purposes. All | |
| information, including personal information, placed on o sent of over this system may be | |
| monitored. Use of this DOD computers system, authorized or unauthorized, constitutes | |
| consent to monitoring. Unauthorized use of this DOD computer system may subject you | |
| to criminal prosecution. Evidence of unauthorized use collected during monitoring | |
| may be used for administrative, criminal, or other adverse action. Use of this | |
| system constitutes consent to monitoring for all lawful purposes.</font></td> | |
| </tr> | |
| <tr> | |
| <td> | |
| <p align="center"><a href="usaamc/intro.htm"><b><i>Continue</i></b></a> | |
| </td> | |
| </tr> | |
| </table> | |
| </center></div> | |
| </body> | |
| </html> | |
| . | |
| Good Day, your warning was interesting and stuff, but I decided to rape this box anyway. When will you learn, nt sucks and linux rocks. hV2k 0WNS J00 |