True Light Software Repository #2

This repository has been secured against attacks by adding a full system read only access on all users. You can get your basic infiltration tools from here, in case they get misplaced.

We may also have some covert missions for a good hacker on the bulletin board.