How to achieve esthetics in compromised sites