Restricted Access
Unauthorized access is strictly prohibited. All attempts are logged and monitored.
USERNAME
PASSWORD
AUTHENTICATE
ACCESS TERMINAL
RETURN HOME
Initializing security protocols... System ready.