diff --git a/bin/setup b/bin/setup
index f55ca2a614b6014ce1bace24ec16ddd33468eef2..0f5404830be64784d0580a3444e61b3617e6b588 100755
--- a/bin/setup
+++ b/bin/setup
@@ -3,7 +3,7 @@
 DIR="$( cd "$( dirname "${BASH_SOURCE[0]:-$0}" )/.." && pwd )"
 
 if [[ ! -d "${DIR}/.venv" ]] ; then
-  virtualenv -p /usr/bin/python3 "${DIR}/.venv"
+  virtualenv -p /usr/bin/python2 "${DIR}/.venv"
 fi
 
 source "${DIR}/.venv/bin/activate"
diff --git a/content/slides/1337/md/authentication.md b/content/slides/1337/md/authentication.md
index f957bbcd6b3bc90a1aed9fe45358dc9be82fc8a3..92cb7602a028ec10af8fc2225c584ad142519ff3 100644
--- a/content/slides/1337/md/authentication.md
+++ b/content/slides/1337/md/authentication.md
@@ -316,7 +316,6 @@ Note:
   * [John the Ripper](http://www.openwall.com/john/) permet de générer des mots de passes dérivant de parties du username
 
 
-<!--
 ## [THC Hydra](http://www.thc.org/thc-hydra/)
 
 * multi-protocole: IMAP, SMB, HTTP, VNC, MS-SQL MySQL, SMTP, SSH, VNC, Asterisk, ...
@@ -377,14 +376,13 @@ unshadow /etc/passwd /etc/shadow > mypasswd
 
 ## attaques par tables arc-en-ciel
 
-* [Project RainbowCrack](http://www.antsight.com/zsl/rainbowcrack/)
 * [CrackStation](https://crackstation.net/)
   * avec la signature de smithy dans la table user
 
 ```shell
 5f4dcc3b5aa765d61d8327deb882cf99
 ```
--->
+
 
 ## <i class="fa fa-medkit"></i> Se protéger
 
diff --git a/plugins/i18n_subsites/__init__.pyc b/plugins/i18n_subsites/__init__.pyc
index b3481921b54499b7a32fa2b4b88aec6e33028e8f..4e4d242fd150b546379306b3c3468e9b0b5254c4 100644
Binary files a/plugins/i18n_subsites/__init__.pyc and b/plugins/i18n_subsites/__init__.pyc differ
diff --git a/plugins/i18n_subsites/i18n_subsites.pyc b/plugins/i18n_subsites/i18n_subsites.pyc
index 6762fa8cc69f61a17771c57b7767bf22d31f404a..0d52ca50ba28f189b25776769e583740828da146 100644
Binary files a/plugins/i18n_subsites/i18n_subsites.pyc and b/plugins/i18n_subsites/i18n_subsites.pyc differ