Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Pro Blog
  • Users
  • Groups
  • Unsolved
  • Solved
Collapse
Secnto AI
  1. Secnto AI
  2. Categories
  3. Virtual University
  4. CS205 - Information Security
  5. CS205 Grand Quiz Solution and Discussion
CS205 - Information Security
Engrnaveed SaeedE
Total Marks 5 Starting Date Thursday, August 01, 2019 Closing Date Friday, August 02, 2019 Status Open Question Title Graded Discussion Board Question Description Scenario: Suppose “WeConnect” is an IT based company which is specialized in providing Voice over IP (VoIP) based services to its clients. Currently “WeConnect” is working on an application that will provide the functionality of “Virtual Labs” to Online Universities situated across the globe. Using this application the teachers could be able to give online lectures with the help of simulations and students could be able to raise text, audio or video based queries. A module of this application requires the usage of CAPTCHA codes that takes less than a minute to process, but the client is insisting to remove this delay for a better user experience. After reading the above given scenario, give your opinion with solid reasons, should the company reduce the CAPTCHA code processing time or completely remove the CAPTCHA code feature from this application? Please read the scenario carefully before writing your comments. A concise, coherent and to the point comment is preferred over lengthy comment having irrelevant details. Your comment must not be more than 4-5 lines. Comments, posted on regular Lessons MDB or sent through email will NOT be considered in any case. Any request about such an acceptance will not be catered. Furthermore, your solution should not be copied from any student or from any other source. Best of Luck!
CS205 - Information Security
CS205 Assignment 1 Solution and Discussion
zareenZ
Topic thumbnail image
CS205 - Information Security
CS205 Grand Quiz Solution and Discussion
zaasmiZ
Please share you Grand Quiz or Download File [center][image: wNTUZAq.png][/center]
CS205 - Information Security
CS205 Assignment 2 Solution and Discussion
zaasmiZ
Re: CS205 Assignment 2 Solution and Discussion Assignment No. 02 Semester: Spring 2020 CS205: Information Security Total Marks: 25 Due Date: 15/06/2020 Instructions: Please read the following instructions carefully before submitting assignment: You need to use MS word document to prepare and submit the assignment on VU-LMS. It should be clear that your assignment will not get any credit if:  The assignment is submitted after due date.  The assignment is not in the required format (doc or docx)  The submitted assignment does not open or file is corrupt.  Assignment is copied (partial or full) from any source (websites, forums, students, etc) Objectives: To enhance the learning capabilities of the students about Vulnerability management and its Tools. Assignment Question No-1: You are required to download the QUALYS and NESSUS trial versions and install these tools on your PC/Laptop. Then read the online guides and watch the related YouTube videos where necessary for instructions on how to use these tools and to familiarize with the menus. Now run the scanner to scan a minimum of: 2 IT assets such as server, workstation, or network device (As per your convenience) 2 web assets such as website or portal Compare and contrast the both (QUALYS and NESSUS) reports and comment how the reports are different. Your answer should be concise and to the point. Note: After scanning the above IT assets take the screenshot of the reports of these scanners (QUALYS and NESSUS) and paste those screenshot in word file then submit that word file as assignment. Best of luck
CS205 - Information Security
CS205 Assignment 1 Solution and Discussion
M
Re: CS205 Assignment 1 Solution and Discussion Assignment No. 01 Semester: Spring 2020 CS205: Information Security Total Marks: 30 Due Date: 29 /05/2020 Instructions: Please read the following instructions carefully before submitting assignment: You need to use MS word document to prepare and submit the assignment on VU-LMS. It should be clear that your assignment will not get any credit if:  The assignment is submitted after due date.  The assignment is not in the required format (doc or docx)  The submitted assignment does not open or file is corrupt.  Assignment is copied (partial or full) from any source (websites, forums, students, etc) Objectives: To enhance the learning capabilities of the students about: • CIA triangle. • OSI security architecture. Assignment Question No-1: In today’s IT world, different stores are running their businesses through Internet which enables their customers to make sales and purchase transactions online 24/7 from anywhere. Time saving is one of the prime benefits of online business/shopping as the customers don’t have to physically visit the business/shopping centers in this regard. In addition, online businesses also provide the facility of online support and tracking of their orders/transactions to their customers. The customers can get their queries clarified and can track their delivery status i.e. when the goods /products are going to be dispatched to them. However, in spite of all the benefits of online business/ shopping, still a large number of people hesitate to make online account on the website of online store to perform online transaction due to fear of losing their personal / account information. To ensure the customer gain, the online businesses must need to apply some OSI preventive security measures/services to tackle with the risk associated with their businesses. In view of above, you are required to carefully analyze each scenario given below and identify the most suitable OSI security service to tackle the risk associated with each scenario: Customer’s personal or order information is considered very important and it should be available only for that specific customer. Customer’s delivery address is stored in the database of an online store for delivery of required items. An employee of this store having legal rights to access this database, unintentionally changes this address information which resultantly can misguide the delivery of products on wrong address. Online shopping website is not accessible due to which its customers are unable to place orders or do any other transaction. Delivery receipt should be received in same form as it is sent to a customer. Online shopping store is going to launch new promotions, but this plan is leaked prior to its launching. While online shopping, customer is transferring online payment via credit card. Both the parties i.e. customer and related bank should be guaranteed for identification of each other. A customer is only allowed to see his/her order status, but not allowed to make any changes in his/her order information after successful submission of order request. A customer performs online order and then later denies for his/her order. How online business will tackle/handle this situation? A customer sends email to an online store to know about his/her order status and the online store replies to the customer with related information of order status. This information should be received as it is sent by online store. Solution: Scenario No OSI security service 1 2 3 4 5 6 7 8 9 Question No-2: Consider an online performance evaluation system of a company where its employees enter the daily status of the tasks assigned to them in online sheets available in the system. The sheets are analyzed by the competent authorities of the company on daily basis to evaluate the performance of the employees. You are required to briefly explain the confidentiality, integrity and availability with the help of example associated with this system. In your point of view which component of C.I.A. Triangle model will get the highest importance and which component will get the least importance according to above mentioned scenario? Solution: Best of luck
CS205 - Information Security
CS205 Assignment 3 Solution and Discussion
A
Assignment No. 03 Semester: Fall 2019 CS205: Information Security Total Marks: 25 Due Date: 22/01/2020 Instructions: Please read the following instructions carefully before submitting assignment: You need to use MS word document to prepare and submit the assignment on VU-LMS. It should be clear that your assignment will not get any credit if:  The assignment is submitted after due date.  The assignment is not in the required format (doc or docx)  The submitted assignment does not open or file is corrupt.  Assignment is copied (partial or full) from any source (websites, forums, students, etc) Objectives: To enhance the learning capabilities of the students about cryptography and crypto algorithms. Assignment Question 1: You are required to encrypt the string “Security Professional” and decrypt the string “MdgfjVhjfbteut” using following tables with “Substitution Cipher Method”. [image: 2jpMsDs.png] Question 2: You are required to encrypt the plain text “ACCOUNTABILITY” using Vigenere Square Cipher method? Suppose that keyword is “SILENT”. Question 3: You are required to encrypt the plain text “wearesecurityprofessionalsinuk” into cipher text using columnar transposition method with a Key: “231645”. Best of luck Any Frnd have CS205 Solved 3rd Assignment. Kindly Share it urgent
CS205 - Information Security
CS205 Assignment 2 Solution and Discussion
zareenZ
Assignment No. 02 Semester: Fall 2019 CS205: Information Security Total Marks: 15 Due Date: 28/11/2019 Instructions: Please read the following instructions carefully before submitting assignment: You need to use MS word document to prepare and submit the assignment on VU-LMS. It should be clear that your assignment will not get any credit if:  The assignment is submitted after due date.  The assignment is not in the required format (doc or docx)  The submitted assignment does not open or file is corrupt.  Assignment is copied (partial or full) from any source (websites, forums, students, etc) Objectives: To enhance the learning capabilities of the students about: Software Attacks Need for Security against attacks Assignment Question No-1: “Friend Circle” is a social media platform yet to be launched. Currently, it is in testing phase in which various security policies in the perspective of an online platform are being tested. Following are the reports / observations of such tests: Report 1: Upon testing the login interface, the security experts found a loophole in the system that an unauthorized person can login to the system by trying different combinations of passwords. Report 2: It is observed that bundle of unnecessary requests possibly generated by some computers or bots can overload the application and resultantly system may crash or fail to perform ordinary functions. After carefully analyzing above mentioned reports, you are required to identify the type of attack associated with each report. Also mention one suitable solution to tackle the identified attack. Question No-2: Carefully study the Topics “threat” and “software attacks” and identify the deliberate software attacks for following situations with proper justification. Suppose a user receives an email containing an image file as the attachment. As the user opens the file, different files on his systems get deleted or modified. A student copied some files from his USB flash drive to a computer in university lab. After doing this, he observed that the number of files on the system got duplicated and overall performance of the system got deteriorated. He faced too much delay in performing tasks by the computer. A user noticed that someone is using his Facebook account after stealing his credentials. After investigation, he observed that it happened after installing a software downloaded from an un-authentic website.
CS205 - Information Security

CS205 Grand Quiz Solution and Discussion

Scheduled Pinned Locked Moved CS205 - Information Security
cs205grand quizsolutiondiscussionspring 2020
29 Posts 1 Posters 15.8k Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • zaasmiZ Offline
    zaasmiZ Offline
    zaasmi
    Cyberian's Gold
    wrote on last edited by
    #7

    IT/ Infosec Teams require information security project report at ________basis.
    Daily
    Weekly
    monthly
    Quarterly

    5fca6575-91de-4f88-a150-e80a9546e3e7-image.png

    Discussion is right way to get Solution of the every assignment, Quiz and GDB.
    We are always here to discuss and Guideline, Please Don't visit Cyberian only for Solution.
    Cyberian Team always happy to facilitate to provide the idea solution. Please don't hesitate to contact us!
    [NOTE: Don't copy or replicating idea solutions.]
    VU Handouts
    Quiz Copy Solution
    Mid and Final Past Papers
    Live Chat

    1 Reply Last reply
    0
    • zaasmiZ Offline
      zaasmiZ Offline
      zaasmi
      Cyberian's Gold
      wrote on last edited by
      #8

      It would be correct to say that the security posture in Pakistan can be improved by____________.
      More awareness and training
      Effective actions taken by regulators, organizations, and building an effective cyber security eco-system
      Regular technical security audits
      Learning from regional countries
      c4d62ef2-cd15-4d8e-9f08-af50f54afb03-image.png

      Discussion is right way to get Solution of the every assignment, Quiz and GDB.
      We are always here to discuss and Guideline, Please Don't visit Cyberian only for Solution.
      Cyberian Team always happy to facilitate to provide the idea solution. Please don't hesitate to contact us!
      [NOTE: Don't copy or replicating idea solutions.]
      VU Handouts
      Quiz Copy Solution
      Mid and Final Past Papers
      Live Chat

      1 Reply Last reply
      0
      • zaasmiZ Offline
        zaasmiZ Offline
        zaasmi
        Cyberian's Gold
        wrote on last edited by
        #9

        Which team tests the patches in test environment in vulnerability management process?
        Risk & compliance team
        Business team
        IT operations team
        Audit team

        65e7c885-97a7-45a0-b446-bc78b737b31a-image.png

        Discussion is right way to get Solution of the every assignment, Quiz and GDB.
        We are always here to discuss and Guideline, Please Don't visit Cyberian only for Solution.
        Cyberian Team always happy to facilitate to provide the idea solution. Please don't hesitate to contact us!
        [NOTE: Don't copy or replicating idea solutions.]
        VU Handouts
        Quiz Copy Solution
        Mid and Final Past Papers
        Live Chat

        1 Reply Last reply
        0
        • zaasmiZ Offline
          zaasmiZ Offline
          zaasmi
          Cyberian's Gold
          wrote on last edited by
          #10

          What should standard secure configuration images represent?
          Default configuration version of OS only.
          Hardened versions of OS only.
          Hardened versions of application installed on system only.
          Hardened versions of underlying OS and application installed on system.

          5572590b-535d-459c-aea3-b895be467dd4-image.png

          Discussion is right way to get Solution of the every assignment, Quiz and GDB.
          We are always here to discuss and Guideline, Please Don't visit Cyberian only for Solution.
          Cyberian Team always happy to facilitate to provide the idea solution. Please don't hesitate to contact us!
          [NOTE: Don't copy or replicating idea solutions.]
          VU Handouts
          Quiz Copy Solution
          Mid and Final Past Papers
          Live Chat

          1 Reply Last reply
          0
          • zaasmiZ Offline
            zaasmiZ Offline
            zaasmi
            Cyberian's Gold
            wrote on last edited by
            #11

            How security of outsourced services can be evaluated?
            Include outsourced scope in internal audit
            Ask for 3rd party security review
            Vulnerability assessment and penetration testing
            Spot security checks

            4eee97c2-d033-4c42-9877-9e5c6aad4b60-image.png

            Discussion is right way to get Solution of the every assignment, Quiz and GDB.
            We are always here to discuss and Guideline, Please Don't visit Cyberian only for Solution.
            Cyberian Team always happy to facilitate to provide the idea solution. Please don't hesitate to contact us!
            [NOTE: Don't copy or replicating idea solutions.]
            VU Handouts
            Quiz Copy Solution
            Mid and Final Past Papers
            Live Chat

            1 Reply Last reply
            0
            • zaasmiZ Offline
              zaasmiZ Offline
              zaasmi
              Cyberian's Gold
              wrote on last edited by
              #12

              Policy & compliance practice of “governance” function of software assurance maturity model is focused on________________.

              On arming personnel involved in software lifecycle with knowledge and resources to design develop and deploy secure software
              Understanding and meeting external legal and regulatory requirements
              On establishing a framework within an organization for a software security assurance program
              On proactively specifying the expected behavior of software with respect to security

              a0a25f34-cdcc-4b12-b30b-0288ffde97fc-image.png

              Discussion is right way to get Solution of the every assignment, Quiz and GDB.
              We are always here to discuss and Guideline, Please Don't visit Cyberian only for Solution.
              Cyberian Team always happy to facilitate to provide the idea solution. Please don't hesitate to contact us!
              [NOTE: Don't copy or replicating idea solutions.]
              VU Handouts
              Quiz Copy Solution
              Mid and Final Past Papers
              Live Chat

              1 Reply Last reply
              0
              • zaasmiZ Offline
                zaasmiZ Offline
                zaasmi
                Cyberian's Gold
                wrote on last edited by
                #13

                Checklist of applicable security controls step includes?
                Make a checklist for progress tracking and share with it teams
                Document controls in sop
                Research for applicable controls
                Both b and C

                3e83c643-ce23-4820-9843-00cbf52a37c3-image.png

                Discussion is right way to get Solution of the every assignment, Quiz and GDB.
                We are always here to discuss and Guideline, Please Don't visit Cyberian only for Solution.
                Cyberian Team always happy to facilitate to provide the idea solution. Please don't hesitate to contact us!
                [NOTE: Don't copy or replicating idea solutions.]
                VU Handouts
                Quiz Copy Solution
                Mid and Final Past Papers
                Live Chat

                1 Reply Last reply
                0
                • zaasmiZ Offline
                  zaasmiZ Offline
                  zaasmi
                  Cyberian's Gold
                  wrote on last edited by zaasmi
                  #14

                  As per carneige mellon university computing consortium commercial software contains?
                  20 to 30 bugs for every 1000 lines of code
                  20 to 30 bugs for every 10,000 lines of code
                  40 to 50 bugs for every 1000 lines of code
                  40 to 50 bugs for every 10,000 lines of code

                  d93859ec-9356-4f4a-b5b4-2b3a5a46150eimage.png

                  Discussion is right way to get Solution of the every assignment, Quiz and GDB.
                  We are always here to discuss and Guideline, Please Don't visit Cyberian only for Solution.
                  Cyberian Team always happy to facilitate to provide the idea solution. Please don't hesitate to contact us!
                  [NOTE: Don't copy or replicating idea solutions.]
                  VU Handouts
                  Quiz Copy Solution
                  Mid and Final Past Papers
                  Live Chat

                  1 Reply Last reply
                  0
                  • zaasmiZ Offline
                    zaasmiZ Offline
                    zaasmi
                    Cyberian's Gold
                    wrote on last edited by
                    #15

                    The 4 layer security transformation model and isms requirements and controls__________________.
                    Are both separate security programs
                    Are both separate security projects
                    May form essential elements of the security program
                    None of the given

                    93c60250-46a0-4249-9220-0fe0744684da-image.png

                    Discussion is right way to get Solution of the every assignment, Quiz and GDB.
                    We are always here to discuss and Guideline, Please Don't visit Cyberian only for Solution.
                    Cyberian Team always happy to facilitate to provide the idea solution. Please don't hesitate to contact us!
                    [NOTE: Don't copy or replicating idea solutions.]
                    VU Handouts
                    Quiz Copy Solution
                    Mid and Final Past Papers
                    Live Chat

                    1 Reply Last reply
                    0
                    • zaasmiZ Offline
                      zaasmiZ Offline
                      zaasmi
                      Cyberian's Gold
                      wrote on last edited by cyberian
                      #16

                      What do you mean by RTO in a business continuity plan?
                      Minimum frequency of backups
                      Maximum downtime an organization can handle
                      Maximum age of files that an organization must recover from backup storage for normal operations to resume after disaster
                      Both a & b

                      3ebe0ea0-1ddf-45c2-9595-753ea9e81950-image.png
                      [center]images.png[/center]

                      Discussion is right way to get Solution of the every assignment, Quiz and GDB.
                      We are always here to discuss and Guideline, Please Don't visit Cyberian only for Solution.
                      Cyberian Team always happy to facilitate to provide the idea solution. Please don't hesitate to contact us!
                      [NOTE: Don't copy or replicating idea solutions.]
                      VU Handouts
                      Quiz Copy Solution
                      Mid and Final Past Papers
                      Live Chat

                      1 Reply Last reply
                      0
                      • zaasmiZ Offline
                        zaasmiZ Offline
                        zaasmi
                        Cyberian's Gold
                        wrote on last edited by
                        #17

                        Anthem insurance breach 2014 was initiated through?
                        Windows vulnerability
                        Phishing email
                        Man in the middle attack
                        Sql injection attack

                        9a2c81c1-4615-4701-bf3d-3a5e0dd26eda-image.png

                        Discussion is right way to get Solution of the every assignment, Quiz and GDB.
                        We are always here to discuss and Guideline, Please Don't visit Cyberian only for Solution.
                        Cyberian Team always happy to facilitate to provide the idea solution. Please don't hesitate to contact us!
                        [NOTE: Don't copy or replicating idea solutions.]
                        VU Handouts
                        Quiz Copy Solution
                        Mid and Final Past Papers
                        Live Chat

                        1 Reply Last reply
                        0
                        • zaasmiZ Offline
                          zaasmiZ Offline
                          zaasmi
                          Cyberian's Gold
                          wrote on last edited by
                          #18

                          What are the three types of redundant site models in an enterprise network?
                          Hot site, cold site and warm site
                          Primary site, secondary site and DR site
                          Highly available site, fault tolerant site and DR site
                          Both a & b

                          f02eb931-b086-4c36-852d-984bf87495bd-image.png

                          Discussion is right way to get Solution of the every assignment, Quiz and GDB.
                          We are always here to discuss and Guideline, Please Don't visit Cyberian only for Solution.
                          Cyberian Team always happy to facilitate to provide the idea solution. Please don't hesitate to contact us!
                          [NOTE: Don't copy or replicating idea solutions.]
                          VU Handouts
                          Quiz Copy Solution
                          Mid and Final Past Papers
                          Live Chat

                          1 Reply Last reply
                          0
                          • zaasmiZ Offline
                            zaasmiZ Offline
                            zaasmi
                            Cyberian's Gold
                            wrote on last edited by
                            #19

                            Which activity is carried out in security hardening layer?
                            Address security configuration of all it assets
                            Scanning to inspect patching of all it assets
                            Aggregative controls involving people, process, and technology
                            Ensure the proper utilization, ROI and audits of purchased devices

                            3b066eb3-4224-46cf-a1e2-1a10d917b43d-image.png

                            Discussion is right way to get Solution of the every assignment, Quiz and GDB.
                            We are always here to discuss and Guideline, Please Don't visit Cyberian only for Solution.
                            Cyberian Team always happy to facilitate to provide the idea solution. Please don't hesitate to contact us!
                            [NOTE: Don't copy or replicating idea solutions.]
                            VU Handouts
                            Quiz Copy Solution
                            Mid and Final Past Papers
                            Live Chat

                            1 Reply Last reply
                            0
                            • zaasmiZ Offline
                              zaasmiZ Offline
                              zaasmi
                              Cyberian's Gold
                              wrote on last edited by
                              #20

                              In an enterprise which software should be allowed to install and execute?
                              Softwares included in white-list.
                              Any freely available software.
                              Only paid software.
                              Softwares displayed on notice board.

                              2c3351c1-dd8b-4ab9-af2f-5789b59c35f6-image.png

                              Discussion is right way to get Solution of the every assignment, Quiz and GDB.
                              We are always here to discuss and Guideline, Please Don't visit Cyberian only for Solution.
                              Cyberian Team always happy to facilitate to provide the idea solution. Please don't hesitate to contact us!
                              [NOTE: Don't copy or replicating idea solutions.]
                              VU Handouts
                              Quiz Copy Solution
                              Mid and Final Past Papers
                              Live Chat

                              1 Reply Last reply
                              0
                              • zaasmiZ Offline
                                zaasmiZ Offline
                                zaasmi
                                Cyberian's Gold
                                wrote on last edited by
                                #21

                                A policy is___________________.
                                Mandatory and limited in scope to a department
                                Mandatory and applies to entire organization; signed off by senior management
                                Not mandatory but a guideline only
                                Signed off by information security department

                                92bf93ae-4804-4d54-bb12-859b57ea9f57-image.png

                                Discussion is right way to get Solution of the every assignment, Quiz and GDB.
                                We are always here to discuss and Guideline, Please Don't visit Cyberian only for Solution.
                                Cyberian Team always happy to facilitate to provide the idea solution. Please don't hesitate to contact us!
                                [NOTE: Don't copy or replicating idea solutions.]
                                VU Handouts
                                Quiz Copy Solution
                                Mid and Final Past Papers
                                Live Chat

                                1 Reply Last reply
                                0
                                • zaasmiZ Offline
                                  zaasmiZ Offline
                                  zaasmi
                                  Cyberian's Gold
                                  wrote on last edited by
                                  #22

                                  For effective information security implementation, the security journey should start with___________.
                                  Developing comprehensive policies and procedures
                                  Management commitment
                                  Security hardening and vulnerability management of IT assets
                                  A penetration test

                                  2bc1c8fb-000e-4d7a-b125-583fa923a4f8-image.png

                                  Discussion is right way to get Solution of the every assignment, Quiz and GDB.
                                  We are always here to discuss and Guideline, Please Don't visit Cyberian only for Solution.
                                  Cyberian Team always happy to facilitate to provide the idea solution. Please don't hesitate to contact us!
                                  [NOTE: Don't copy or replicating idea solutions.]
                                  VU Handouts
                                  Quiz Copy Solution
                                  Mid and Final Past Papers
                                  Live Chat

                                  1 Reply Last reply
                                  0

                                  Reply
                                  • Reply as topic
                                  Log in to reply
                                  • Oldest to Newest
                                  • Newest to Oldest
                                  • Most Votes


                                  How to Build a $1,000/Month PAK VS BAN Live Live Cricket Streaming
                                  File Sharing
                                  Earn with File Sharing

                                  0

                                  Online

                                  3.0k

                                  Users

                                  2.8k

                                  Topics

                                  8.2k

                                  Posts
                                  solution
                                  1235
                                  discussion
                                  1195
                                  fall 2019
                                  813
                                  assignment 1
                                  428
                                  assignment 2
                                  294
                                  spring 2020
                                  265
                                  gdb 1
                                  238
                                  assignment 3
                                  79
                                  • PM. IMRAN KHAN
                                    undefined
                                    4
                                    1
                                    4.0k

                                  • Are the vaccines halal or not?
                                    undefined
                                    4
                                    1
                                    3.8k

                                  • All Subjects MidTerm and Final Term Solved Paper Links Attached Please check moaaz past papers
                                    zaasmiZ
                                    zaasmi
                                    3
                                    26
                                    75.1k

                                  • CS614 GDB Solution and Discussion
                                    M
                                    moaaz
                                    3
                                    3
                                    8.1k

                                  • How can I receive Reputation earning from Cyberian? 100% Discount on Fee
                                    Y
                                    ygytyh
                                    3
                                    28
                                    23.9k
                                  | |
                                  Copyright © 2010-26 RUP Technologies LLC. USA | Contributors
                                  • Login

                                  • Don't have an account? Register

                                  • Login or register to search.
                                  • First post
                                    Last post
                                  0
                                  • Categories
                                  • Recent
                                  • Tags
                                  • Popular
                                  • Pro Blog
                                  • Users
                                  • Groups
                                  • Unsolved
                                  • Solved