diff --git a/README.md b/README.md
index a798df5b0be8a5dee46c66632194fdc278d5a925..aa3cac261cee65e4a24a62cf74f5eeb3f347934a 100644
--- a/README.md
+++ b/README.md
@@ -1,4 +1,5 @@
 Author: Neeserg Parajuli
+
 Student num: 582811
 
 Program:
diff --git a/certcheck b/certcheck
index dd2bd1939093d1b05f2976abee12c7ad1f42f048..fab3db37cc846948f3f61a493a8b35db1d57050e 100755
Binary files a/certcheck and b/certcheck differ
diff --git a/validater.c b/validater.c
index f39c56f44c865dc9b5bcef827ce3c15e38671794..0a2cf346bac986315bc08fa175e6a732496fb118 100644
--- a/validater.c
+++ b/validater.c
@@ -10,21 +10,21 @@ int validate_certificate(char* filename, char* URL){
 //check the if the url is in the SAN list given that its not already the common name
      if (!check_san_valid(cert, URL, in_host))
      {
-        printf("SAN \n");
+        //printf("SAN \n");
         X509_free(cert);
         return 0;
      }
 //check the expiry date
      if (!check_time(cert))
      {
-        printf("time\n");
+        //printf("time\n");
         X509_free(cert);
         return 0;
      }
 //check if the RSA key is 2048 bits
      if (!check_public_key(cert))
      {
-        printf("PKEY\n");
+        //printf("PKEY\n");
         X509_free(cert);
         return 0;
      }
@@ -32,14 +32,14 @@ int validate_certificate(char* filename, char* URL){
 
      if (!check_constraint(cert))
      {
-        printf("CONSTRAINTS\n");
+        //printf("CONSTRAINTS\n");
         X509_free(cert);
         return 0;
      }
 //check if the usage TLS is webserver authentication
      if (!check_ext_key(cert))
      {
-        printf("ext key\n");
+        //printf("ext key\n");
         X509_free(cert);
         return 0;
      }