Free aptitude solved question,all placement papers for free,gate material,gate books,bank exam material,free ebooks,LATEST HINDI SONGS,final year project,IEEE project,video tutorial,MP3 SONGS DOWNLOAD
DOWNLOAD OPERATING SYSTEM BOOK
DOWNLOAD OS BOOK, DOWNLOAD OS BOOK FOR GATE 2011,DOWNLOAD OS BOOK FOR GATE,DOWNLOAD OS BOOK,DOWNLOAD OS BOOK,DOWNLOAD OS BOOK
GATE 2013 MATHS BOOKS
download gate books for maths,download gate 2013 maths books,download maths book for gate, download gate books for maths,download gate books for maths
How to EXPLORE your GATE 2013 ?
EXPLORE GATE 2013, EXPLORE GATE 2013,EXPLORE GATE 2013,EXPLORE GATE 2013,EXPLORE GATE 2013,EXPLORE GATE 2013,EXPLORE GATE 2013
Gate 2013 exams are nearing and by now you want to accelerate your
gate 2013 preparation. You want to push through the syllabus and get
more out of your study time.
Then here's a simple but effective technique to accelerate the pace of
your learning.
For this to work. You are required to have read the topics at least
once. You need to know what is where and what is what of the gate
syllabus.
The technique is to "take open book test" once you have covered some
topics or part of the syllabus!!
Simple but works everytime.
Gather 4 textbooks or question papers of your chosen subjects and
randomly take a open book test.
Atempt the questions without seeing the book. If stuck, try hard to
remember the answer and if no success then only see the book. Ater
seeing write down the answer without peeping at the answer again!!
Do it enough time and you will see how much you can cover in shot span
of time. Do it with all the topics, do it several times and you will
see how testing yourself, this way, increases your learning capacity.
Why it works I don't know! But it works. I have used this countless
times in my studies in AeSI!
And while selecting questions randomly, don't read the question you
are selecting. Just think of some random numbers and answer questions
against those numbers.
Hope you will at least give this simple exercise a go. Go test for
yourself.
And best of luck !!
Find all posts related to how to prepare for gate by clicking this link
Gate 2013 exams are nearing and by now you want to accelerate your
gate 2013 preparation. You want to push through the syllabus and get
more out of your study time.
Then here's a simple but effective technique to accelerate the pace of
your learning.
For this to work. You are required to have read the topics at least
once. You need to know what is where and what is what of the gate
syllabus.
The technique is to "take open book test" once you have covered some
topics or part of the syllabus!!
Simple but works everytime.
Gather 4 textbooks or question papers of your chosen subjects and
randomly take a open book test.
Atempt the questions without seeing the book. If stuck, try hard to
remember the answer and if no success then only see the book. Ater
seeing write down the answer without peeping at the answer again!!
Do it enough time and you will see how much you can cover in shot span
of time. Do it with all the topics, do it several times and you will
see how testing yourself, this way, increases your learning capacity.
Why it works I don't know! But it works. I have used this countless
times in my studies in AeSI!
And while selecting questions randomly, don't read the question you
are selecting. Just think of some random numbers and answer questions
against those numbers.
Hope you will at least give this simple exercise a go. Go test for
yourself.
And best of luck !!
Find all posts related to how to prepare for gate by clicking this link
Aerospace engineering books FOR GATE 2013
If you are preparing for the GATE 2009 in aerospace then this is the post that you shouldn't miss. Recently someone posted this following list of books for preparation for aerospace in gate 2009!!
"Hi friends,
After searching on a forum I have got a list of books that must be studied for Gate AE. Many thanks to the person who originally posted this topic:
Maths:
Advanced Engineering Mathematics - Grewal
Advanced Engineering Mathematics - Kreizig
Flight Mechanics:
Introduction to flight - Anderson
Aircraft Performance & Design - Anderson
Flight Stability and Automatic Control - Robert C Nelson
Airplane Stability and Control - Pertin and Hage
Aerodynamics,Aeronautics and Flight Mechanics - Barnes.W.Mcormick
Space Mechanics:
Rocket Propulsion and space Dynamics - Cornelisse
Space Mechanics - Nelson, Walter C.; Loft, Ernest E.
Introduction To Space Dynamics - Thomson, William Tyrrell
Introduction to flight - Anderson
Aerodynamics:
Introduction to flight - Anderson
Fundamentals of Aerodynamics - Anderson
Aerodynamics for Engineering Students - Houghton and Carpenter/Caruthers
Aerodynamics - Clancy
Modern Compressible flow - Anderson
Gas dynamics - Rathakrishnan
Viscous flow - F M white
Structures:
Analysis of Aircraft Structures: An Introduction -Donaldson
Analysis and Design of Flight Vehicle Structures - Bruhn
Aircraft structures for engineering students - T.H.G. Megson
Theory of vibration - Meirovich
Propulsion:
Mechanics and Thermodynamics of Propulsion - Hill and petersen
Gas Turbine Theory - H Cohen,GFC Rogers,HIH Saravanamutto
Gas Turbine Engine Handbook - Meherwan P.Boyce
Elements of Rocket Propulsion - Sutton
For Basic Fundamentals:
Principles of Flight - Mike Burton
From the ground up - Sandy MacDonalds
Flight without Formulae - Kermode
Mechanics of Flight - Kermode
All the Best... "
I agree with all the books and if you see most of the books are ones that you might have read in AeSI syllabus. GATE is all about basics, so keep them strong and do tons and tons of problems!! That's the basic secret of cracking GATE!!
So what do you think? what are the other books that you read?Is the list missing something? Do tell me in comments.
"Hi friends,
After searching on a forum I have got a list of books that must be studied for Gate AE. Many thanks to the person who originally posted this topic:
Maths:
Advanced Engineering Mathematics - Grewal
Advanced Engineering Mathematics - Kreizig
Flight Mechanics:
Introduction to flight - Anderson
Aircraft Performance & Design - Anderson
Flight Stability and Automatic Control - Robert C Nelson
Airplane Stability and Control - Pertin and Hage
Aerodynamics,Aeronautics and Flight Mechanics - Barnes.W.Mcormick
Space Mechanics:
Rocket Propulsion and space Dynamics - Cornelisse
Space Mechanics - Nelson, Walter C.; Loft, Ernest E.
Introduction To Space Dynamics - Thomson, William Tyrrell
Introduction to flight - Anderson
Aerodynamics:
Introduction to flight - Anderson
Fundamentals of Aerodynamics - Anderson
Aerodynamics for Engineering Students - Houghton and Carpenter/Caruthers
Aerodynamics - Clancy
Modern Compressible flow - Anderson
Gas dynamics - Rathakrishnan
Viscous flow - F M white
Structures:
Analysis of Aircraft Structures: An Introduction -Donaldson
Analysis and Design of Flight Vehicle Structures - Bruhn
Aircraft structures for engineering students - T.H.G. Megson
Theory of vibration - Meirovich
Propulsion:
Mechanics and Thermodynamics of Propulsion - Hill and petersen
Gas Turbine Theory - H Cohen,GFC Rogers,HIH Saravanamutto
Gas Turbine Engine Handbook - Meherwan P.Boyce
Elements of Rocket Propulsion - Sutton
For Basic Fundamentals:
Principles of Flight - Mike Burton
From the ground up - Sandy MacDonalds
Flight without Formulae - Kermode
Mechanics of Flight - Kermode
All the Best... "
I agree with all the books and if you see most of the books are ones that you might have read in AeSI syllabus. GATE is all about basics, so keep them strong and do tons and tons of problems!! That's the basic secret of cracking GATE!!
So what do you think? what are the other books that you read?Is the list missing something? Do tell me in comments.
CHANGE TEXT SIZE IN EXPLORER
To alter the Size Of Text displayed in firefox , Just hold ctrl and scroll your mouse wheel !
Scroll UP : To Reduce Text Size
Scroll Down : To Increase Text Size
Scroll UP : To Reduce Text Size
Scroll Down : To Increase Text Size
TIPS TO FIND FORGET PASSWORD OF BIOS
Forgot BIOS Password ?
Do the following :
1. Open the CPU
2. Now, observe the motherboard.
3. You notice a coin like silver Battery(3V).
----------------------------------------- NOTE --------------------------------------------------------
This battery is 24 x 7 power supply for the BIOS, which is used to run the system clock will the main power is off. It also initiates the booting process when power is switched on.
-----------------------------------------------------------------------------------------------------------
4. Remove the battery from the motherboard.
(It is safe to remove the Battery)
5. Wait 30 seconds and place the battery back on the motherboard.
6. Now, when you start your system you won't be prompted for the BIOS password.
Do the following :
1. Open the CPU
2. Now, observe the motherboard.
3. You notice a coin like silver Battery(3V).
----------------------------------------- NOTE --------------------------------------------------------
This battery is 24 x 7 power supply for the BIOS, which is used to run the system clock will the main power is off. It also initiates the booting process when power is switched on.
-----------------------------------------------------------------------------------------------------------
4. Remove the battery from the motherboard.
(It is safe to remove the Battery)
5. Wait 30 seconds and place the battery back on the motherboard.
6. Now, when you start your system you won't be prompted for the BIOS password.
DELETE ADMINISTRATOR PASSWORD WITHOUT SOFTWARE IN WINDOWS
Boot up with DOS and delete the sam.exe and sam.log files from Windows\system32\config in your hard drive. Now when you boot up in NT the password on your built-in administrator account which will be blank (i.e No password). This solution works only if your hard drive is FAT kind.
Method 2
Step 1. Put your hard disk of your computer in any other pc .Step 2. Boot that computer and use your hard disk as a secondary hard disk (D'nt boot as primary hard disk ).Step 3. Then open that drive in which the victim’s window(or your window) is installed.Step 4. Go to location windows->system32->configStep 5. And delete SAM.exe and SAM.log
Step 6. Now remove hard disk and put in your computer.
Step 7. And boot your computer :-)
Method 2
Step 1. Put your hard disk of your computer in any other pc .Step 2. Boot that computer and use your hard disk as a secondary hard disk (D'nt boot as primary hard disk ).Step 3. Then open that drive in which the victim’s window(or your window) is installed.Step 4. Go to location windows->system32->configStep 5. And delete SAM.exe and SAM.log
Step 6. Now remove hard disk and put in your computer.
Step 7. And boot your computer :-)
INCREASE THE SIZE OF VIRTUAL RAM
Follow the steps given below :-
1) Hold down the 'Windows' Key and Press the 'Pause/Break' button at the top right of your keyboard.
Another way is Right-Clicking 'My Computer' and then Select 'Properties'.
2) Click on the 'Advanced' tab.
3) Under 'Performance', click 'Settings'.
4) Then click the 'Advanced' tab on the button that pops up.
5) Under 'Virtual Memory' at the bottom, click 'Change'.
6) Click the 'Custom Size' button.
7) For the initial size (depending on your HD space), type in anywhere from 1000-1500 (although I use 4000), and for the Maximum size type in anywhere from 2000-2500 (although I use 6000).
8) Click 'Set', and then exit out of all of the windows.
9) Finally, Restart your computer.
10) You now have a faster computer and 1-2GB of Virtual RAM..!
1) Hold down the 'Windows' Key and Press the 'Pause/Break' button at the top right of your keyboard.
Another way is Right-Clicking 'My Computer' and then Select 'Properties'.
2) Click on the 'Advanced' tab.
3) Under 'Performance', click 'Settings'.
4) Then click the 'Advanced' tab on the button that pops up.
5) Under 'Virtual Memory' at the bottom, click 'Change'.
6) Click the 'Custom Size' button.
7) For the initial size (depending on your HD space), type in anywhere from 1000-1500 (although I use 4000), and for the Maximum size type in anywhere from 2000-2500 (although I use 6000).
8) Click 'Set', and then exit out of all of the windows.
9) Finally, Restart your computer.
10) You now have a faster computer and 1-2GB of Virtual RAM..!
IP SPOOFING
The term IP (Internet Protocol) address spoofing refers to the creation of IP packets with a forged (spoofed) source IP address with the purpose of concealing the identity of the sender or impersonating another computing system.
Why it works ?
IP-Spoofing works because trusted services only rely on network address based authentication. Since IP is easily duped, address forgery is not difficult.
The main reason is security weakness in the TCP protocol known as sequence number prediction.
How it works ?
To completely understand how ip spoofing can take place, one must examine the structure of the TCP/IP protocol suite. A basic understanding of these headers and network exchanges is crucial to the process.
Internet Protocol (IP) :
It is a network protocol operating at layer 3 (network) of the OSI model. It is a connectionless model, meaning there is no information regarding transaction state, which is used to route packets on a network. Additionally, there is no method in place to ensure that a packet is properly delivered to the destination.
Examining the IP header, we can see that the first 12 bytes (or the top 3 rows of the header) contain various information about the packet. The next 8 bytes (the next 2 rows), however, contains the source and destination IP addresses. Using one of several tools, an attacker can easily modify these addresses – specifically the “source address” field.
Transmission Control Protocol (TCP) :
It is the connection-oriented, reliable transport protocol in the TCP/IP suite. Connection-oriented simply means that the two hosts participating in a discussion must first establish a connection via the 3-way handshake (SYN-SYN/ACK-ACK). Reliability is provided by data sequencing and acknowledgement. TCP assigns sequence numbers to every segment and acknowledges any and all data segments recieved from the other end.
As you can see above, the first 12 bytes of the TCP packet, which contain port and sequencing information.
TCP sequence numbers can simply be thought of as 32-bit counters. They range from 0 to 4,294,967,295. Every byte of data exchanged across a TCP connection (along with certain flags) is sequenced. The sequence number field in the TCP header will contain the sequence number of the *first* byte of data in the TCP segment. The acknowledgement number field in the TCP header holds the value of next *expected* sequence number, and also acknowledges *all* data up through this ACK number minus one.
TCP packets can be manipulated using several packet crafting softwares available on the internet.
The Attack
IP-spoofing consists of several steps. First, the target host is choosen. Next, a pattern of trust is discovered, along with a trusted host. The trusted host is then disabled, and the target's TCP sequence numbers are sampled. The trusted host is impersonated, the sequence numbers guessed, and a connection attempt is made to a service that only requires address-based authentication. If successful, the attacker executes a simple command to leave a backdoor.
Spoofing can be implemented by different ways as given below -
Non-Blind Spoofing :- This type of attack takes place when the attacker is on the same subnet as the victim. The sequence and acknowledgement numbers can be sniffed, eliminating the potential difficulty of calculating them accurately.
Blind Spoofing :- Here the sequence and acknowledgement numbers are unreachable. In order to circumvent this, several packets are sent to the target machine in order to sample sequence numbers.
Both types of spoofing are forms of a common security violation known as a Man In The Middle Attack. In these attacks, a malicious party intercepts a legitimate communication between two friendly parties. The malicious host then controls the flow of communication and can eliminate or alter the information sent by one of the original participants without the knowledge of either the original sender or the recipient. In this way, an attacker can fool a victim into disclosing confidential information by “spoofing” the identity of the original sender, who is presumably trusted by the recipient.
IP spoofing is almost always used in what is currently one of the most difficult attacks to defend against – Denial of Service attacks, or DoS.
1) Filtering at the Router :- Implementing ingress and egress filtering on your border routers is a great place to start your spoofing defense. You will need to implement an ACL (access control list)
2) Encryption and Authentication :- Implementing encryption and authentication will also reduce spoofing threats. Both of these features are included in Ipv6, which will eliminate current spoofing threats.
3) Initial Sequence Number Randomizing.
Why it works ?
IP-Spoofing works because trusted services only rely on network address based authentication. Since IP is easily duped, address forgery is not difficult.
The main reason is security weakness in the TCP protocol known as sequence number prediction.
How it works ?
To completely understand how ip spoofing can take place, one must examine the structure of the TCP/IP protocol suite. A basic understanding of these headers and network exchanges is crucial to the process.
Internet Protocol (IP) :
It is a network protocol operating at layer 3 (network) of the OSI model. It is a connectionless model, meaning there is no information regarding transaction state, which is used to route packets on a network. Additionally, there is no method in place to ensure that a packet is properly delivered to the destination.
Examining the IP header, we can see that the first 12 bytes (or the top 3 rows of the header) contain various information about the packet. The next 8 bytes (the next 2 rows), however, contains the source and destination IP addresses. Using one of several tools, an attacker can easily modify these addresses – specifically the “source address” field.
Transmission Control Protocol (TCP) :
It is the connection-oriented, reliable transport protocol in the TCP/IP suite. Connection-oriented simply means that the two hosts participating in a discussion must first establish a connection via the 3-way handshake (SYN-SYN/ACK-ACK). Reliability is provided by data sequencing and acknowledgement. TCP assigns sequence numbers to every segment and acknowledges any and all data segments recieved from the other end.
As you can see above, the first 12 bytes of the TCP packet, which contain port and sequencing information.
TCP sequence numbers can simply be thought of as 32-bit counters. They range from 0 to 4,294,967,295. Every byte of data exchanged across a TCP connection (along with certain flags) is sequenced. The sequence number field in the TCP header will contain the sequence number of the *first* byte of data in the TCP segment. The acknowledgement number field in the TCP header holds the value of next *expected* sequence number, and also acknowledges *all* data up through this ACK number minus one.
TCP packets can be manipulated using several packet crafting softwares available on the internet.
The Attack
IP-spoofing consists of several steps. First, the target host is choosen. Next, a pattern of trust is discovered, along with a trusted host. The trusted host is then disabled, and the target's TCP sequence numbers are sampled. The trusted host is impersonated, the sequence numbers guessed, and a connection attempt is made to a service that only requires address-based authentication. If successful, the attacker executes a simple command to leave a backdoor.
Spoofing can be implemented by different ways as given below -
Non-Blind Spoofing :- This type of attack takes place when the attacker is on the same subnet as the victim. The sequence and acknowledgement numbers can be sniffed, eliminating the potential difficulty of calculating them accurately.
Blind Spoofing :- Here the sequence and acknowledgement numbers are unreachable. In order to circumvent this, several packets are sent to the target machine in order to sample sequence numbers.
Both types of spoofing are forms of a common security violation known as a Man In The Middle Attack. In these attacks, a malicious party intercepts a legitimate communication between two friendly parties. The malicious host then controls the flow of communication and can eliminate or alter the information sent by one of the original participants without the knowledge of either the original sender or the recipient. In this way, an attacker can fool a victim into disclosing confidential information by “spoofing” the identity of the original sender, who is presumably trusted by the recipient.
IP spoofing is almost always used in what is currently one of the most difficult attacks to defend against – Denial of Service attacks, or DoS.
CounterMeasures |
2) Encryption and Authentication :- Implementing encryption and authentication will also reduce spoofing threats. Both of these features are included in Ipv6, which will eliminate current spoofing threats.
3) Initial Sequence Number Randomizing.
Free Gprs IN BSNL
U Can Surf For Free Via Gprs On Pc Too
I came to know of using BSNL GPRS for FREE with FULL ACCESS to All Sites.
Here is the way.
1.Create 2 connections with different names like "BSNL PORTAL" and "CELLONE PORTAL" with following settings.
I came to know of using BSNL GPRS for FREE with FULL ACCESS to All Sites.
Here is the way.
1.Create 2 connections with different names like "BSNL PORTAL" and "CELLONE PORTAL" with following settings.
Access Point Name-
"celloneportal"
Proxy Service Address-
"192.168.51.163"
Proxy Port-
"8080"
Security-
"NORMAL"
"celloneportal"
Proxy Service Address-
"192.168.51.163"
Proxy Port-
"8080"
Security-
"NORMAL"
Rest fields to be as it is.
2.now open phone's default inbuilt browser and select any of the two settings created to access the web.you will now access only bsnl's home site.
3.now keep browser working and open another browser for full internet access like opera or netfront.in these browsers use the second setting created. make sure to use second setting this time. connect to open a page. you get an error message like "ACCESS DENIED" but you don't worry.
4.keep both browsers working in background and open connection manager. in connection manager just disconnect the connection that is not working like the second one you used to connect opera or net front.
5.again open opera or netfront from background and this time use the first connection that you are using to connect with default inbuilt browser to connect to internet.
6.sure this time you are connected with full access.
2.now open phone's default inbuilt browser and select any of the two settings created to access the web.you will now access only bsnl's home site.
3.now keep browser working and open another browser for full internet access like opera or netfront.in these browsers use the second setting created. make sure to use second setting this time. connect to open a page. you get an error message like "ACCESS DENIED" but you don't worry.
4.keep both browsers working in background and open connection manager. in connection manager just disconnect the connection that is not working like the second one you used to connect opera or net front.
5.again open opera or netfront from background and this time use the first connection that you are using to connect with default inbuilt browser to connect to internet.
6.sure this time you are connected with full access.
LATEST COMMONWEALTH 2010 MEDAL TALLY
Rank | Country | Gold Medal | Silver Medal | Bronze Medal | Total |
1 | Australia | 74 | 55 | 48 | 177 |
2 | India | 38 | 27 | 36 | 101 |
3 | England | 37 | 59 | 46 | 142 |
4 | Canada | 26 | 17 | 32 | 75 |
5 | South Africa | 12 | 11 | 10 | 33 |
6 | Kenya | 12 | 11 | 9 | 32 |
7 | Malaysia | 12 | 10 | 13 | 35 |
8 | Singapore | 11 | 11 | 9 | 31 |
9 | Nigeria | 11 | 10 | 14 | 35 |
10 | Scotland | 9 | 10 | 7 | 26 |
11 | New Zealand | 6 | 22 | 8 | 36 |
12 | Cyprus | 4 | 3 | 5 | 12 |
13 | Northern Ireland | 3 | 3 | 4 | 10 |
14 | Samoa | 3 | 0 | 1 | 4 |
15 | Wales | 2 | 7 | 10 | 19 |
16 | Jamaica | 2 | 4 | 1 | 7 |
17 | Pakistan | 2 | 1 | 2 | 5 |
18 | Uganda | 2 | 0 | 0 | 2 |
19 | Bahamas | 1 | 1 | 3 | 5 |
20 | Sri Lanka | 1 | 1 | 1 | 3 |
21 | Nauru | 1 | 1 | 0 | 2 |
22 | Botswana | 1 | 0 | 3 | 4 |
23= | Cayman Islands | 1 | 0 | 0 | 1 |
23= | Saint Vincent and the Grenadines | 1 | 0 | 0 | 1 |
25 | Trinidad and Tobago | 0 | 4 | 2 | 6 |
26 | Cameroon | 0 | 2 | 4 | 6 |
27 | Ghana | 0 | 1 | 3 | 4 |
28 | Namibia | 0 | 1 | 2 | 3 |
29= | Papua New Guinea | 0 | 1 | 0 | 1 |
29= | Seychelles | 0 | 1 | 0 | 1 |
31= | Isle of Man | 0 | 0 | 2 | 2 |
31= | Mauritius | 0 | 0 | 2 | 2 |
31= | Tonga | 0 | 0 | 2 | 2 |
34= | Bangladesh | 0 | 0 | 1 | 1 |
34= | Guyana | 0 | 0 | 1 | 1 |
34= | Saint Lucia | 0 | 0 | 1 | 1 |
- | Anguilla | 0 | 0 | 0 | 0 |
- | Antigua and Barbuda | 0 | 0 | 0 | 0 |
- | Barbados | 0 | 0 | 0 | 0 |
- | Belize | 0 | 0 | 0 | 0 |
- | Bermuda | 0 | 0 | 0 | 0 |
- | British Virgin Islands | 0 | 0 | 0 | 0 |
- | Brunei | 0 | 0 | 0 | 0 |
- | Cook Islands | 0 | 0 | 0 | 0 |
- | Dominica | 0 | 0 | 0 | 0 |
- | Falkland Islands | 0 | 0 | 0 | 0 |
- | Gambia | 0 | 0 | 0 | 0 |
- | Gibraltar | 0 | 0 | 0 | 0 |
- | Grenada | 0 | 0 | 0 | 0 |
- | Guernsey | 0 | 0 | 0 | 0 |
- | Jersey | 0 | 0 | 0 | 0 |
- | Kiribati | 0 | 0 | 0 | 0 |
- | Lesotho | 0 | 0 | 0 | 0 |
- | Malawi | 0 | 0 | 0 | 0 |
- | Maldives | 0 | 0 | 0 | 0 |
- | Malta | 0 | 0 | 0 | 0 |
- | Montserrat | 0 | 0 | 0 | 0 |
- | Mozambique | 0 | 0 | 0 | 0 |
- | Niue | 0 | 0 | 0 | 0 |
- | Norfolk Island | 0 | 0 | 0 | 0 |
- | Rwanda | 0 | 0 | 0 | 0 |
- | Saint Helena | 0 | 0 | 0 | 0 |
- | Sierra Leone | 0 | 0 | 0 | 0 |
- | Solomon Islands | 0 | 0 | 0 | 0 |
- | Swaziland | 0 | 0 | 0 | 0 |
- | Tanzania | 0 | 0 | 0 | 0 |
- | Turks and Caicos Islands | 0 | 0 | 0 | 0 |
- | Tuvalu | 0 | 0 | 0 | 0 |
- | Vanuatu | 0 | 0 | 0 | 0 |
- | Zambia | 0 | 0 | 0 | 0 |
Total | 272 | 274 | 282 | 828 |
Subscribe to:
Posts (Atom)