diff --git a/src/App.js b/src/App.js
index 4989ff2..6b6dbe3 100644
--- a/src/App.js
+++ b/src/App.js
@@ -14,6 +14,8 @@ import ConfigAutomation from './Pages/Software/Projects/ConfigAutomation';
import KanjiApplication from './Pages/Software/Projects/KanjiApplication';
import SwivForPi from './Pages/Software/Projects/SwivForPi';
import WifiPrototype from './Pages/Software/Projects/WifiPrototype';
+import RaspberryJukebox from './Pages/Software/Projects/RaspberryJukebox';
+import AttachmentModule from './Pages/Software/Projects/AttachmentModule';
import Radio from './Pages/Radio/Radio';
import Components from './Pages/Radio/Components';
@@ -21,7 +23,6 @@ import Balkon from './Pages/Radio/Balkon';
import Linux from './Pages/Linux/Linux';
import Footer from './UI/Footer';
-import RaspberryJukebox from './Pages/Software/Projects/RaspberryJukebox';
@@ -40,6 +41,7 @@ function App() {
Sometimes a project owner wants a feature implemented in their project that the developers somehow are unable to realize. The project was a website containing a form that customers would enter text data on. The project owner asked for a feature which allowed customers to attach files to this form.
+As a "temporary" solution, I suggested creating a stand-alone server that would handle file uploads that would be linked to the ID number of the form. This consisted of 2 servers. One server would be a simple web interface, the other a database server that hosted a simple API.
+Both servers were VMs running RHEL.
+The web server used the Nginx engine and the Django framework. Python handles the HTTP requests with Gunicorn, a WSGI gateway.
+The database server used a MySQL server to host uploaded file data. To expose this data, Flask RESTful was used to serve a simple API.
+This was the first separate project I created for the company, so I set up a GitLab server for version control.
+After a file is uploaded, someone else will want to access it.
+The project owner did not want the users to separately log in to the web server of the attachment module. So a big security issue is that anyone with the link, can access uploaded files. At the time this was agreed to be a temporary solution. The project was deployed in 2017 and in 2021 this project was still running though. After all, the business must go on and if the problem's symptoms seems fixed, why bother with it further...
+Because other users could access other uploaded files using the right link, it was decided that users could only upload and never delete any files.
+A big learning point for me was that not to compromise security, even for projects that are considered temporary. A problem never occurred. This compromise caused silly decisions to not allow users to delete their own files. I will defend my standpoint much more and use this project as an example.
+The actual problem here though, is why the other developers were not able to create a safe file upload feature.
+