diff --git a/Shepherd.pdf b/Shepherd.pdf
index 47eff9891532eb6d2468ce0d43524ab14f248472..4033244c9ef33a2566fdc82924bca86634ba8198 100644
Binary files a/Shepherd.pdf and b/Shepherd.pdf differ
diff --git a/Shepherd.tex b/Shepherd.tex
index aed0a72904158ff55f53139df40fe0bef26b3e23..95f9661a5fe41b852bc8218a8018c7eb3f0fa1d0 100644
--- a/Shepherd.tex
+++ b/Shepherd.tex
@@ -294,6 +294,7 @@ them. However, you are free to do the challenges in any order you want.
     \item[Session Management Challenge 3]
     \item[SQL Injection 1]
     \item[SQL Injection 2]
+		    The server first checks if the query contains \emph{one} @ before processing it!
     \item[Insecure Cryptographic Storage Challenge 1]
     \item[Insecure Cryptographic Storage Challenge 2]
         Here, \enquote{2d cipher} refers to the