everyone says do what you did for mission 8 except do it for 9..
well the mission 9 says think about how the input is accepted, where would i go about that?
maybe use 2 arguments? if only i could use whatever command i wanted this would be a lot easier, but then again Sam would be even more terrible of a network security specialist
