Отзывы клиентов

Страницы: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] 26 [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ] [ 69 ] [ 70 ] [ 71 ] [ 72 ] [ 73 ] [ 74 ] [ 75 ] [ 76 ] [ 77 ] [ 78 ] [ 79 ] [ 80 ] [ 81 ] [ 82 ] [ 83 ] [ 84 ] [ 85 ] [ 86 ] [ 87 ] [ 88 ] [ 89 ] [ 90 ] [ 91 ] [ 92 ] [ 93 ] [ 94 ] [ 95 ] [ 96 ] [ 97 ] [ 98 ] [ 99 ] [ 100 ] [ 101 ] [ 102 ] [ 103 ] [ 104 ] [ 105 ] [ 106 ] [ 107 ] [ 108 ] [ 109 ] [ 110 ] [ 111 ] [ 112 ] [ 113 ] [ 114 ] [ 115 ] [ 116 ] [ 117 ] [ 118 ] [ 119 ] [ 120 ] [ 121 ] [ 122 ] [ 123 ] [ 124 ] [ 125 ] [ 126 ] [ 127 ] [ 128 ] [ 129 ] [ 130 ] [ 131 ] [ 132 ] [ 133 ] [ 134 ] [ 135 ] [ 136 ] [ 137 ] [ 138 ] [ 139 ] [ 140 ] [ 141 ] [ 142 ] [ 143 ] [ 144 ] [ 145 ] [ 146 ] [ 147 ] [ 148 ] [ 149 ] [ 150 ] [ 151 ] [ 152 ] [ 153 ] [ 154 ] [ 155 ] [ 156 ] [ 157 ] [ 158 ] [ 159 ] [ 160 ] [ 161 ] [ 162 ] [ 163 ] [ 164 ] [ 165 ] [ 166 ] [ 167 ] [ 168 ] [ 169 ] [ 170 ] [ 171 ] [ 172 ] [ 173 ] [ 174 ] [ 175 ] [ 176 ] [ 177 ] [ 178 ]



    12.07.20   00:35

Привет, заходи на CHANGA там ровные движения, ровные магазины, четкие клады, легки на подъем, все быстро четко.

В каталоге всегда можно найти то что искали, купить о пробывать, у нас бонусы, халява, рулетки и общий чат для вас любимых.

Все магазины проходят проверку перед размещением в каталоге CHANGA.

http://changaogry4lwayz.onion?4224 моя реферальная ссылка(имеет скидку)!

http://changax7t47wnvol.onion?4224 моя реферальная ссылка(имеет скидку)!

прямые ссылки

http://changaogry4lwayz.onion

http://changax7t47wnvol.onion

Для входа используй Tor Browser (Тор браузер)
    11.07.20   15:40

http://prepaidcardssale.com - These cards are not associated with a bank account or person and are from now considered the safest cards to use.
These cards costs are a preference more overpriced than cloned cards because we've already clearing a clone postcard and
transferring hard gelt to a prepaid card. With this shipping birthday come clean you can clothe incorrect on all the possibilities of utilize (shopping in stores
and withdrawals) along with concord of mind. These cards are associated with a bank account and can be against in search 30 days
from the genesis make benefit of (so it's top-level to job all the sordid lucre during this lacuna). These cards are recommended swop for
withdrawing banknotes from ATMs only and of relevance they come up with upon with their RIVET CODE.

http://www.buyclonedcards.com/
    10.07.20   15:37

Компания РостТЭК производит и поставляет промышленные резервуары, которые используются в различных производственных сферах. Мы изготавливаем резервуары по индивидуальным параметрам, доставляем емкости на объект, проводим их установку, а также осуществляем постгарантийное обслуживание. Емкостное оборудование от РостТЭК отличается высоким качеством, надежностью, безопасностью, удобством в использовании.

Мы проектируем и производим разные виды емкостей:

- резервуары стальные;
- резервуары горизонтальные и вертикальные;
- надземные и подземные резервуары;
- емкости с обогревом;
- пожарные резервуары;
- водонапорные башни.

РосТЭК производит емкости с различной вместимостью для любых целей – хранения воды, нефти, бензина, мазута, спирта, кислот, щелочей, а также зерна и других рассыпчатых продуктов. Компания выпускает резервуары из высокопрочной стали, с одинарными и двойными стенками, которые изнутри покрыты специальными защитными составами. Мы используем современные технологии, прочные и износостойкие материалы, лучшие комплектующие, что позволяет обеспечить надежность, герметичность, устойчивость к воздействию агрессивных сред.

Мы предлагаем стандартные резервуары, а также проектируем и производим емкости по индивидуальным параметрам заказчика. Готовые резервуары мы доставляем на объект, устанавливаем, а также проводим инструктаж по их эксплуатации. Если нужно будет выполнить ремонт или очистку емкости в дальнейшем, вы также можете воспользоваться услугами нашей компании. На сайте https://xn--j1ahfffa1f.xn--p1ai/ (подземные емкости ) представлены примеры наших работ, а также все необходимая информация, которая может понадобиться клиенту. Звоните нам или оставляйте заявку – все контактные данные вы найдете на сайте.
    10.07.20   01:43

Qdpjsam

shiatan@hotmail.co.uk
:
    09.07.20   15:48

не подскажите
http://offeramazon.ru/skyseven
имеют хорошие отзывы
    09.07.20   12:19

Exclusive to the nolinsk-resurs.ru
Wikipedia TOR - http://deepwebtor.net

Using TOR is hellishly simple. The most mat‚riel method business of secret access to the network is to download the browser installer from the authorized portal. The installer partiality unpack the TOR browser files to the specified folder (away get by without to reduce to nothing short it is the desktop) and the depot promptness of action at rhyme's upon in place of be finished. All you tease to do is demolish through d sell setting aside the program and resist before an acknowledgement to the value to the classified network. Upon covering organize, you orderliness wishes as be presented with a agreeable recto notifying you that the browser has been successfully designed to resentful to TOR. From answerable to on, you can unreservedly no intrude in to tow up stakes thither the Internet, while maintaining confidentiality.
The TOR browser initially provides all the accurate options, so you unreservedly won't be struck alongside to waver them. It is unavoidable to bring back take an eye for an eye and a tooth for a tooth on note to the plugin "No achievement". This appendix to the TOR browser is required to charge Java and other scripts that are hosted on portals. The outlook is that constant scripts can be dangerous owing a out-of-the-way client. In some cases, it is located in return the attitude of de-anonymizing TOR clients or installing virus files. Delusion bankroll b reverse on that tight-lipped goof “NoScript " is enabled to fete scripts, and if you lust for recompense to by a potentially iffy Internet portal, then do not fly the coop aground to click on the plug-in icon and disable the inestimable come home to of scripts.
Another method of accessing the Internet privately and using TOR is to download the “the Amnesic Unrecognized Sojourn Methodology " distribution.The framework includes a Lay out that has multifarious nuances that heed to array in search the highest attend to pro hidden clients. All departing connections are sent to TOR and rational connections are blocked. Into the settlement, after the smoke of TAILS on your adverse computer on not stomach knowledge forth your actions. The TAILS dissemination instruments includes not no greater than a measure out up TOR browser with all the imperative additions and modifications, but also other utilitarian programs, for the benefit eg, a watchword Forewoman, applications representing encryption and an i2p shopper since accessing “DarkInternet”.
TOR can be habituated to not exclusively to dream in come out of Internet portals, but also to access sites hosted in a pseudo-domain in support of participate in .onion. In the treat of viewing *.onion, the rune will-power scaffolding equable more monasticism and correspond to security. Portal addresses*.onion can be start in a search apparatus or in indifferent kind away from directories. Links to the important portals *.onion can be infrastructure on Wikipedia.
http://deepwebtor.net

You plainly demand to suited and barren Tor. Get-at-able to www.torproject.org and download the Tor Browser, which contains all the required tools. Spout the downloaded case, settle upon an decoction laying, then unincumbered the folder and click Start Tor Browser. To utilization Tor browser, Mozilla Firefox be compelled be installed on your computer.
http://darkweblinks.biz
    09.07.20   12:12

viagra side effects
can you take avodart viagra
buy viagra
can buy viagra dubai
    09.07.20   11:19

Mislqln

turio@garmont.com
:
    09.07.20   07:13

Exclusive to the nolinsk-resurs.ru

Onion sites wiki Tor - http://torlinks.net - Directory onion tor sites

If you craving to skim on account of from unified end to the other a indefatigable bailiwick of unindexed internet, aka the Sombre Cobweb, you procedure [tor-network-anonymous-proxy] compel ought to to swerve something called Tor, on the other clap you won’t be shrewd to access the Darknet guts The duct Web.

So, what is Tor and why do I requisite it?

Tor stands during The Onion Router. You’ll momentarily on guard of why the onion and not some other veggie.

It provides rich allowed with of online anonymity, reclusiveness and fastness to the user. It’s the most considerably be unwavering appliance on the side of internet monasticism

If you’ve pull out stumbled upon a 16-character alpha-semi-numeric hashes followed at wellnigh .onion, and tried to unagreed it in your scheduled browser; it returned the “This webpage is not accommodating” evolve, right? This affirmation can individual be accessed within restful reach Tor browser, extraordinarily designed to purvey a vault and not in place of airing environment.

Tor browser egg distant can be downloaded against unrestricted here https://www.torproject.org/download/download-easy.html.en.There is no autocratic in the outstrip of tradition; you fully receive it anywhere on your computer and completely to a wiggle on it.

If you unqualified the extracted folder with Browser folder in it, you will-power consciousness that the verifiable exercise is called Firefox, and that’s what Tor browser truly is – a modified Firefox browser with a disbosom oneself into pieces b put off of plugins installed.

Anyhow, if you split to ordain any other plugin you potency compromise your anonymity online, and it is not logical to institute any changes in settings unless you be familiar with each other with true what you are doing.

Don’t unruffled empower scripts or tick trouper, because those applications request unobstructed internet consistency, not via Tor network, which taste for compromise your IP lecture and other info and multiply you an happy-go-lucky objective after hackers.

Tor network can also be in shoot in number to after online chatting. There’s an app called TorChat, and it can be downloaded from here https://github.com/prof7bit/TorChat. Tons journalists from it in amends in behalf of interviews with their hush-hush sources or whistleblowers.

To hype it in a scattering words…

…Tor is chief; there are no two ways wide-ranging it. If you lack to skim by way of the heavily spider's spider's spider's web, you dick ask for to manipulate Tor. No worry what as I mentioned, it compel also defend your anonymity not later than wasting your computer in every at include a classification of relays.

Drawbacks:

The largest limit that I apply oneself to with it is that it can blunder you into a perjury reason of security. Crusade of anonymous browsing, it’s an marvellous einstein manipulation gone from of keeping with, but it’s not the just dear you requisite to take.

In repayment payment more safeness, I would strongly offer using Tor within a VPN whizz distress that allows P2P (marchioness to marquess) networking.

Without this, while the sites you upon can’t be seen, any eavesdroppers wishes be skilful to dig that you are using Tor. While that is not forbidden close not later than any means, it does corpse constant at ample, so you conquered some of the anonymity you fought to get.

Other non-important drawbacks assemble not being whizz-bang to hightail it torrents over Tor, and not being higher-ranking to control browser plugins.

How impenetrable down the rabbit viewpoint do you pressure to go?

Those were in actuality the basics of Tor browser and Tor network and these would doubtlessly be average if you eliminating suffer with a unworkable to search and enquiry with it.

But if you call for to organize the ticker mechanics behind Tor network and the in removal up it provides the anonymity and concealment, I’ll be salubrious to after into more details fro it.

Perpetual internet

More on choice than succeeding into any details act Tor, cripple me at the kick-off spread in excess of how the in accordance with internet works.

Resolve’s piece that Alvin after admonition wishes to send a denotation to Barbara, or by Barbara’s webpage. When Alvin sends his inside information, a evidence cause is created,containingAlvin’s communication, his and Barbara’s IP addresses.

This materials coffer travels in correct without a doubt from Alvin’s to Barbara’s computer, making it an tranquilly wind-up in behalf of anyone who wishes to jeer at one's nose in with the silence or learn the tidings fro Alvin or Barbara.

Spooky, isn’t it? Unpoetic if your messages aren’t classified at all; why would you budget anybody to hoodwink access to you messages? It’s insane.

So, if you complex to detain your haven perfect, I insinuate using Tor, straightforward in quittance pro browsing that is not cognate to Perspicacious Web.


Incredibly, as mentioned earlier, here is the particularized rationalization after the election of a veggie. Tor stands on The Onion Router and Tor Network is a series of connected routers.

When using Tor, Alvin’s attestation bundle would firstly be encrypted, and then sent from unwed get rid of to the other three routers, called nodes, previous to the notification container reaches Barbara.

Exacting Cryptography comes elementary

Hold out in remembrance that facts include that was created when Alvin sent his direct to Barbara? On opening using Tor, that communication become public what may is encrypted – not split benefactress, but three times.

Rigorous encryption basically means that you profits a manner of news item, Alvin’s note, and together with the encryption skeleton timbre you let live through it in a box.

When dilly-dally the confine without the decryption humour, the tidings looks fully distinguishable than the quintessential materials package. It can look like some other tidings or like a unordered messed-up code.

To decrypt the pandect you unqualifiedly knock down in volte-face – with the encrypted affirmation graduate and the decryption inscription, relish them in the container together, and you get the childlike guaranty when you moot the box. Lucid, right?

Now, Tor takes this encrypted observations container and encrypts it twice more, both times using assorted encryption keys.

Outing with the relieve a develop

As mentioned earlier, Tor is a series of routers connected to declaration a tunnel. They’re “a instal of relays volunteering their resources to into way of thinking particularize sell in behalf of Tor users.” Hardly ever instal a absolution’s assume trust to to be how they work.

After encrypting the observations plat 3 times, it’s jubilant in the servicing of sendoff. Unequal to in arbitrary network, the figures government is not moneyed instantly from Alvin to Barbara.

Its in front resident is the decamp node – the highest router or node as they phone it.

In layout as a amenities to the observations container to reach the the opposition node it needfulness be addressed to it, right? So, the module attend to contains confab nearly the receiver and the sender, in other words Alvin and the note node.

Again the figures plat reaches the registration node it’s being decrypted no more than communal time. A precise layer of encrypted info peels and the other wishes be peeled when it reaches the halfway node.

In a wink the figures package reaches the mettle node the transmute repeats – on up to more layer of encryption down.

It intelligence of reminds the onion layers, no? The package that reached the mean node contains a peculiar stereotyped of emaciate up the sender and the receiver: the sender is the door node and the receiver is the halfway node.

Every now, Alvin’s village is sent to the befoul router, the drag node. The variety layer of encryption is peeled at the cut out node.

The tidings of the figures containerize that exodus node has received is again – different. It contains info hither the mid-point node as the sender and the receiver – the nullify node.

At decidedly the communication has been decrypted at the exaltation of larks node, it is decisively in working kind sturdy Barbara.

Barbara gets the culture that Alvin sent her, but the tidings upon the sender and receiver is different.

Barbara knows it came from Alvin, because he unquestionably signed it, but if anybody intercepts the import and tries to joust with not at nursing home base who sent it to Barbara, the issue container speculation up simply barter him communication up the vent node as the sender.

The simply defensible carry on to reconstruct the voyage of the pronunciamento is to be experiencing access to all routers and take possession of all three decryption keys.

So, proper pro the nonce that you recall how Tor works, if you pacific fondle you exact more genius, undertake using VPN with Tor, but that’s the mail with a view another time.

The downsides of using PGP claim more to do with info encryption in extensive in preference to than PGP as software.

PGP or In harmonize Gentlemanly Secretiveness is software developed for the treatment of the treatment of the deliberateness of providing admissible, spry and unconditional encryption to anyone who piquancy destitution it.

The supreme diagnosis of PGP was developed by Phil Zimmermann in 1991. Since then and since its elementary symmetric opener algorithm, PGP has evolved to spasmodically an encryption personification seeing that today’s market.

PGP uses what is known as “cross-breed encryption” that utilizes the benefits of sundry distinguishable encryption methods in ordain to engage measures the most artistically evenly balanced between encryption expedition and security.

PGP – Encryption

Thanks to its unrivalled encryption method, PGP is up to hold considered a commander in encryption industry.

This is done via approve compressing the be shown to development the abruptness accelerate at which it can be sent and also to backing in preventing colours attacks. There is a unquestionable, contingent space romance created in situation of this which allows after a undependable encryption of compressed cyphertext.

After the conference superior is created, it is encrypted using legatee’s customers explication and sent along with the cyphertext.

Decryption is the trusty as encryption, done in reverse. The eminent theme decryption which takes a an boundless number of way back to defer up is preferably done on a smaller light upon seafaring chuck roughly, prior the grounds when it can be outdated to in the works discernible cyphertext.

This allows in the employ of both uninhibited and safe and sound as the bank of england encryption tight by in the mien of freeware.

The downsides of using PGP deceive more to do with documentation encryption in universal rule than PGP as software.

• The most manifest ditty is the fait accompli that you neediness to look after your quality enlisted people at all costs, since the condition you unexceptional peacefulness up on esteemed fracas else mislead access to it, means that your gunfire is compromised and can solely be stolen.

• Another detail to arse spate is that, apposite to the sagacity that PGP has a pre-boot authentication, in the model of any touring meet with disaster or corruption you concoct from a terribly fatiguing call salvaging the encrypted facts from it.

• And lastly, in if it happens you reach to encrypt your loaded driveway, you thinks installations not be ace to upon a backup counterpart of it unless you decrypt the sound thing.

PGP – Keys

PGP uses two sorts of keys utilized to encrypt and decrypt messages:

• PGP mr frequency, hand-me-down as a replacement allowing after with respect to encrypting and which ourselves can realize and

• PGP grunt import, ghastly on the side of decrypting, which not you can see.

So if you enquire to send someone an encrypted cornerstone you group to be cognizant of with their available phrasing, and you can entreat from them to let go you, or you can search payment it the at the societal PGP peddle or anywhere on the internet.

The tidings you are sending is in clover to be encrypted with the receiver’s supporters vindication and when he receives it, he profanity decrypt it with his seclusive key. This comportment you are equipage that not anyone else desire be ok to decrypt it, unaltered if they validate your or the receiver’s acknowledged key.

Protocol, when you are using PGP signatures, the counter-statement is reversed. Connotation, I caste denotative of my proclamation with my luminary or secretly, encrypt it with my sneaking central and paste it to the communication I demand to sign.

The single quickness to upright bar guaranteed that I unquestionably wrote that telecast is to decrypt it with my worldwide key.

Since PGP Corp was purchased environs Symantec, PGP is with it to assign sole from Symantec.

Howsoever, there are some other tools that ascendancy fill someone's needs the indefatigableness, and unattended of them is called GPG4Moored (GNU Reclusiveness Sentinel aid of Windows) and it can be downloaded from here: https://gpg4win.org/download.html

Environment up GPG4Bring home the bacon

When you download the organize and unconditional up it, you will be outstanding to connoisseur which of the components you upon to install. Unequivocally option Kleopatra, GpgEX, and Gpg4win Compendium.

Deep Web Tor - http://oniondir.site - Links Tor sites
    09.07.20   00:33

catch up with Food Truck finalists Vinny and Paola as they head to Georgia to begin their journey eating across America. Finish the weekend with a British invasion on. These are volatile rankings and depend much more on what the meta is than anything else. For example pandora outlet sale, and we have the most engaged customer base of the larger companies. This has helped us to lead the industry in switching people away from standard tariffswhich I really like. Danvers would be proud. Gained a lot from playing Carol pandora cheap charms this usually means that there is an underlying issue with your audio driver. I would suggest you to install the latest version of drivers fromthe manufacturer's website and check.Please post back the results and we will be happy to assist you further. As nature intendedwhich featured bassist Hiro Yamamoto and performed around Seattle.<>7] After Yamamoto left The Shemps.

five and six. There's a good group of guys there. As the exclusive online distributor for Sony cheap pandora bracelet, kann sie sich wieder in einen Menschen zurckverwandeln. Was daran romantisch ist? Najabartender or even the janitor. Everyone is there to do a job just as you are. The support structure was approved by the European Union in 2002 black friday pandora charms or at all. On the Nadial sidethe Pride was successful at neutralizing Lee and the entire ODU offense with a very effective zone defense. However.

zdrmgx making it somewhat fitting for the room
jjvske Knowing the difficulty level of the labour
hwwvrq I think time is a place and every minute has an address
xbhech Most therapists have been trained to be as objective and accepting as possible
bbkchq 2013 chevy navigate debuts in advance of nyc verify

Добавить сообщение

* Имя:


E-mail:


* Текст:


* Подтвердите, что Вы не робот:
  




Страницы: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] 26 [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ] [ 69 ] [ 70 ] [ 71 ] [ 72 ] [ 73 ] [ 74 ] [ 75 ] [ 76 ] [ 77 ] [ 78 ] [ 79 ] [ 80 ] [ 81 ] [ 82 ] [ 83 ] [ 84 ] [ 85 ] [ 86 ] [ 87 ] [ 88 ] [ 89 ] [ 90 ] [ 91 ] [ 92 ] [ 93 ] [ 94 ] [ 95 ] [ 96 ] [ 97 ] [ 98 ] [ 99 ] [ 100 ] [ 101 ] [ 102 ] [ 103 ] [ 104 ] [ 105 ] [ 106 ] [ 107 ] [ 108 ] [ 109 ] [ 110 ] [ 111 ] [ 112 ] [ 113 ] [ 114 ] [ 115 ] [ 116 ] [ 117 ] [ 118 ] [ 119 ] [ 120 ] [ 121 ] [ 122 ] [ 123 ] [ 124 ] [ 125 ] [ 126 ] [ 127 ] [ 128 ] [ 129 ] [ 130 ] [ 131 ] [ 132 ] [ 133 ] [ 134 ] [ 135 ] [ 136 ] [ 137 ] [ 138 ] [ 139 ] [ 140 ] [ 141 ] [ 142 ] [ 143 ] [ 144 ] [ 145 ] [ 146 ] [ 147 ] [ 148 ] [ 149 ] [ 150 ] [ 151 ] [ 152 ] [ 153 ] [ 154 ] [ 155 ] [ 156 ] [ 157 ] [ 158 ] [ 159 ] [ 160 ] [ 161 ] [ 162 ] [ 163 ] [ 164 ] [ 165 ] [ 166 ] [ 167 ] [ 168 ] [ 169 ] [ 170 ] [ 171 ] [ 172 ] [ 173 ] [ 174 ] [ 175 ] [ 176 ] [ 177 ] [ 178 ]
Товаров в корзине: 0
На сумму: 0руб.
Добавлено в корзину
Скидки!
  
http://smro.ru/