diff --git a/Manuals/Tcpi-ug/Configurations/Ppp/intro.docbook b/Manuals/Tcpi-ug/Configurations/Ppp/intro.docbook
index 0a8fefa..d819593 100644
--- a/Manuals/Tcpi-ug/Configurations/Ppp/intro.docbook
+++ b/Manuals/Tcpi-ug/Configurations/Ppp/intro.docbook
@@ -20,4 +20,178 @@
access to is the telephone lines system.
+
+ This configuration emerged from the need of sharing
+ information with my friends in a country where Internet access
+ is limitted to statal organizations and controlled there with
+ an increasing crazy obsession. However, in this environment,
+ the telephone lines system provides an alternative platform to
+ interchange information in a point-to-point fashion. It can be
+ used to create small social groups and organize ideas safetly
+ (e.g., by using TLS to encrypt connections). To be more
+ specific, the goal would be to provide public access to an
+ Internet Service Provider (ISP) where people can express
+ themselves freely (e.g., through a mailing list with open
+ subscriptions).
+
+
+
+ Even this configuration tries to reduce the lack of
+ communication, there are limitations around it that we cannot
+ take away, yet. The following list shows what these
+ limitations are:
+
+
+
+
+
+ Only one connection (of 15 minutes) is possible at a time.
+
+
+
+
+ More than 3 consecutive connections from the same phone number
+ in a time range of 60 minutes means that that number is
+ attacking the ISP to provoke a Denying of Service
+ (DoS)
attach. In such cases the phone number
+ originating the call will be permantly banished from
+ realizing further calls to the ISP. Fourtunly, such controls
+ can be automated so I hope they achieve an acceptable degree
+ of efficiency.
+
+
+
+
+ The ISP is isolated from Internet, so it is not possible to
+ provide Internet access through the ISP.
+
+
+
+
+ The information generated inside the ISP is jailed to it. This
+ way, it will be available to people registered inside the ISP
+ only (e.g., through the web internface).
+
+
+
+
+ The implementation of services that required persistent
+ connections (e.g., chats) will not
+ be considered as a practical offer. Instead, only
+ asynchronous services (e.g.,
+ e-mail) will be supported. This
+ restriction is required to reduce the connection effective
+ times. For example, consider an environment where you connect
+ the ISP to send/receive e-mails only and then disconnect. In
+ fact, to force this behaivour the ISP will be configured to
+ close connections after 15 minutes passed the connection
+ establishment.
+
+
+
+
+ Your user profile will be removed from ISP when no effective
+ point-to-point connection is established by you in a period of
+ 7 days since the last effective point-to-point connection you
+ established to the ISP. When your user profile is removed, you
+ will need to register yourself again inside the ISP, to access
+ its services.
+
+
+
+
+
+ I'm very sorry about these limitations, but this is the best I
+ can offer with one PC, one modem, and one single telephone
+ line. If you think this configuration can be improved somehow,
+ please send me an e-mail to al@example.com.
+ Notice that, for any mail to reach me, you should be
+ registered inside the ISP first; I don't answer phone calls
+ personally, the phone is very busy answering point-to-point
+ connections ;).
+
+
+
+ In order for you to share information with others, it is
+ required that both you and the person you want to share
+ information with, have an e-mail address registered inside
+ ISP. This registration process is realized through a secured
+ web interface accessable through an encrypted connection as
+ the following url illustrates:
+
+
+
+
+
+
+
+
+
+
+
+ The web interface should permit everyone to update or delete
+ their personal profiles without compromising personal
+ information. Notice that all actions realized through this web
+ interface must be simple enough to be achieved in less than 15
+ minutes (the time the point-to-point connection reamins active
+ from its first establishment on).
+
+
+
+ User information is stored inside an LDAP server. The web
+ application manipulates LDAP records and all related files
+ inside the operating system that make possible a user to
+ establish a poit-to-point connection to the ISP, as well as
+ register, update or delate its profile inside the ISP. Care
+ should be taken to prevent one user to modify/delete profiles
+ from other users. The user's profile administration is
+ individual to each user based on its identity. Notice that,
+ all related subsystems (e.g., Postix, Cyrus-Imapd and
+ Saslauthd) must use the user information from LDAP server.
+ Likewise, the mailbox administration must be automated based
+ on the users in the LDAP server. The web application must be
+ able to be aware of all files related inside the
+ infrastructure in a way that administration tasks can be
+ automated and presented friendly to end users (this will
+ required the web application to run some program that needs
+ root privileges =:-|). The whole proces would be, establish a
+ point-to-point connection to the ISP, register a new user
+ through the web application and start using the e-mail client
+ with your new address. The LDAP server will be available for
+ everyone to consult from their mail clients. Inside the web
+ application, verifications must be included to avoid
+ duplicated values, invalid characters and similar stuff.
+
+
+
+ In case some kind of force intend to confiscate me the
+ computer where the ISP is installed in, I am plaing to encrypt
+ the whole filesystem in a way that it would be very difficult
+ to get any valid data from it. The encryption feature is
+ applied before the operating system starts. In this
+ configuration a password is required to decrypt the operating
+ system filesystem in order to be able of booting up the
+ operating system as expected. If the password is not provided,
+ the only thing you get is a prompt to enter a password :).
+
+
+
+ Another important matter to be aware of is about the ISP's
+ policy. In order to keep freedom, it is required to define
+ the boundaries of that freedom so you can determine and judge
+ it. Absolute freedom (anarchism) will not be permitted (it
+ would end up in total destruction) and communism will be
+ avoided (it would suppress the natural freedom of human
+ beings). So a middle point will be used. For example, if you
+ think you have the freedom to abuse the ISP I provide (e.g.,
+ by spamming it, or by provoking denying of service attaks) you
+ probably have it, but consider that I am free to banish you
+ immediatly for trying to destroy my work. On the other hand,
+ if you show yourself to be an educated person with solid ideas
+ and reasons to share, you'll be totaly welcome to stay. The
+ general idea behind this work is improving Cuban communication
+ to make ourselves better persons, understand our nature and
+ environment either social, economical or polital.
+
+