diff --git a/.gitignore b/.gitignore
new file mode 100644
index 0000000..96e3ed0
--- /dev/null
+++ b/.gitignore
@@ -0,0 +1,38 @@
+# Logs
+logs
+*.log
+npm-debug.log*
+yarn-debug.log*
+yarn-error.log*
+pnpm-debug.log*
+lerna-debug.log*
+
+# See http://help.github.com/ignore-files/ for more about ignoring files.
+
+.env
+.env.local
+
+# Mac OS X
+.DS_Store
+._.*
+._*
+
+# Compiler files
+node_modules/
+*.lock
+*.local
+
+# DB Files
+app/data/*.db
+*.db
+
+# Editor directories and files
+.vscode/*
+!.vscode/extensions.json
+.idea
+.DS_Store
+*.suo
+*.ntvs*
+*.njsproj
+*.sln
+*.sw?
diff --git a/.htaccess b/.htaccess
new file mode 100644
index 0000000..9dc600c
--- /dev/null
+++ b/.htaccess
@@ -0,0 +1,397 @@
+# Security Headers
+
+
+ Header Set Service-Worker-allowed "/"
+ Header set X-XSS-Protection "1; mode=block"
+ Header set Access-Control-Allow-Origin "*"
+ Header always append X-Frame-Options "SAMEORIGIN"
+ Header set X-Content-Type-Options "nosniff"
+ Header add Strict-Transport-Security "max-age=63072000; includeSubDomains; preload"
+ Header add Content-Security-Policy "default-src 'self' data: blob: https://client-8efhwk.dreamhosters.com https://via.placeholder.com https://*.gstatic.com https://*.googleapis.com https://*.google.com; style-src 'self' 'unsafe-inline' https://cdnjs.cloudflare.com https://fonts.googleapis.com https://www.gstatic.com; font-src 'self' data: https://fonts.gstatic.com https://cdnjs.cloudflare.com; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://translate.google.com https://*.googleapis.com;upgrade-insecure-requests;"
+ Header always set Referrer-Policy "strict-origin-when-cross-origin"
+ Header set Connection keep-alive
+ Header always set Permissions-Policy "accelerometer=(),autoplay=(),camera=(),encrypted-media=(),fullscreen=*,geolocation=*,gyroscope=(),interest-cohort=(),magnetometer=(),microphone=(),midi=(),payment=(\"https://*.paypal.com\" \"https://*.stripe.com\"),sync-xhr=*,usb=(),xr-spatial-tracking=()"
+
+
+
+ php_flag session.cookie_httponly on
+
+
+
+ php_flag expose_php off
+
+
+# multiple file types
+
+ Order Allow,Deny
+ Deny from all
+
+
+
+ Require ip 127.0.0.1
+
+
+
+ Require all granted
+
+
+# Enable rewrite engine and route requests to framework
+
+ Options -MultiViews +FollowSymLinks
+
+ # Turn rewriting on
+ RewriteEngine On
+ RewriteBase /
+
+ # Redirect http
+ RewriteCond %{HTTPS} !=on
+ RewriteRule ^(.*)$ https://%{HTTP_HOST}%{REQUEST_URI} [L,R=301,NE]
+
+ # Enable HTTP Authorization Header if use php-cgi
+ # $_SERVER['HTTP_AUTHORIZATION']
+ RewriteCond %{HTTP:Authorization} ^(.*)
+ RewriteRule .* - [e=HTTP_AUTHORIZATION:%1]
+
+ # Redirect requests to index.php
+ RewriteCond %{REQUEST_FILENAME} !-d
+ RewriteCond %{REQUEST_FILENAME} !-f
+ RewriteRule ^(.+)$ index.php [QSA,L]
+
+ # proc/self/environ? no way!
+ RewriteCond %{QUERY_STRING} proc/self/environ [OR]
+
+ # Block out any script trying to set a mosConfig value through the URL
+ RewriteCond %{QUERY_STRING} mosConfig_[a-zA-Z_]{1,21}(=|\%3D) [OR]
+
+ # Block out any script trying to base64_encode crap to send via URL
+ RewriteCond %{QUERY_STRING} base64_encode.*(.*) [OR]
+
+ # Block out any script that includes a
+
+
+
+
+
+
+
+
+
+
+
+