2014 mobile phone number attribution database, 2014 mobile phone number ownership2014 mobile phone number home database
The latest version of "mobile phone number home location Database" (updated on: July 22, 2014) in April 6, 2014, with a total of 10 thousand records.
Data field:
-Number segment (that is, the first seven digits of the number)
-Province
-City
-Supplier (inclusive, Communication Protocol)
Sample Data:
"1300000", "Beijing", "Beijing", "China Unicom (
encoding.
Public final String rtpmap; // The encoding parameters to be used in the corresponding SDP attribute.
Public final String fmtp; // The format parameters to be used in the corresponding SDP attribute.
You can use AudioCodec. getCodec to easily obtain a Codec:
Public static AudioCodec getCodec (int type, String rtpmap, String fmtp)
For ease of use, Android defines several commonly used Codec: PCMU, PCMA, GSM, GSM_EFR, and AMR in AudioCodec.
Get the device model and Device
Code:
- (void)viewDidLoad{ [super viewDidLoad]; // Do any additional setup after loading the view. NSLog(@"--self-machine-%@",[self machineName]); }- (NSString*) machineName{ struct utsname systemInfo; uname(systemInfo); NSString *result = [NSString stringWithCString:systemInfo.machine encoding:NSUTF8StringEncoding]; return result;}
Output:
2014-12-02 17:25:27. 958Obtain the device model[21762:
2014 Mobile number Attribution database
2014 the latest version of "Cell Phone number Attribution database" (Updated: April 6, 2014), a total of 10,000 records.Data fields:-Number segment (ie. Number first 7 digits)-Province-City-Supplier (incl., communication protocol)Demo Sample data:"1300000", "Beijing", "Beijing", "China Unicom (GSM)""1300001", "Jiangsu", "Changzhou", "China Unicom (GSM)""
| Unified the sniffing command or press the SHIFT+U key combination, the interface shown in 7.6 will be displayed.Figure 7.6 Start sniffing(3) After clicking the Unified Sniffing command in the interface, the interface shown in 7.7 will be displayed.Figure 7.7 Selecting an interface(4) Select the network interface in this interface. Select Eth0 here and click on
Analog calls on the Android simulator
Project requirements to do a control caller ID android application, then we need to simulate the caller effect on the emulator, below to see how to implement the Android simulator on the analog calls
The method is as follows:1. Single TelephoneOpen command line cmd and enter Telnet return.Then enter o localhost 5,554 back to the car and connect to the emulator.Enter GSM call 123456 to show OKThen look at the simu
Original article: http://blog.csdn.net/bhw98/archive/2003/03/27/19666.aspx
We need to understand the SMS specification developed by ESTI. The rules related to short message sending and receiving discussed mainly include GSM 03.38, GSM 03.40, and GSM 07.05. The first two focuses on the technical implementation of SMS (including the encoding method), the latter set
Currently, mobile phone navigation is commonly divided into two types: mobile phone built-in or external GPS accessories, via satellite navigation, which is currently the most popular Positioning method; second, this article describes how to use the carrier's base station for navigation and positioning.
There is no need to say about GPS navigation. for mobile phones with built-in GPS, such as Nokia, there is a navigation phone called6110The GPS component is built in. While the mobile phone is ex
GSM stands for global system for mobile communication. It refers to the global mobile communication system. This system was designed and developed by a Standardization Committee composed of major European telecom operators and manufacturers. Global connect is a famous user brand of China Mobile digital mobile phone network. The Network No. 139,138,137,136,135 belongs to the GSM digital mobile phone network,
Minimum SMS sending and receiving system design with USB interface
From: http://www.c51bbs.com/c51blog/user1/698/archives/2005/3455.shtml
Short Message Service is a basic wireless service on mobile networks. It is a process of storing and forwarding information on mobile networks. However, it is inconvenient to edit short messages with a common mobile phone. Input and display are limited. Of course, they are not suitable for industrial applications and do not exist in PCs. This short message sen
document defines MMS Stage 1:Reference 3GPP ts 23.140 v5.2.0Title Multimedia Messaging Service, stage 1There are stages 1, 2, and 3 in the document. Stage 1 describes a service from the perspective of service users. Stage 2 describes the logic analysis of the problems to be solved. Stage 3 is the technical implementation.3GPP specifications can be obtained from http://www.3gpp.org.
Table 1 No.
Range for GSM up
Range for
document defines MMS Stage 1:Reference 3GPP ts 23.140 v5.2.0Title Multimedia Messaging Service, stage 1There are stages 1, 2, and 3 in the document. Stage 1 describes a service from the perspective of service users. Stage 2 describes the logic analysis of the problems to be solved. Stage 3 is the technical implementation.3GPP specifications can be obtained from http://www.3gpp.org.
Table 1 No.
Range for GSM up
Range for
above picture, we can see two folders, GSM and CDMA, which are also related to sim cards. If a CDMA card is inserted, use the source code in the CDMA folder. If it is a 2g sim card, or 3G connection cards (that is, GSM/WCDMA) use the GSM folder. When you open the GSM folder, you can see that there is an STK folder con
The Navigator property of the Window object refers to the Navigator object that contains the browser manufacturer and version information. The Navigator object was named to commemorate the Netscape after Navigatorbu 2, but all other browsers also support it (ie also supports clientln formation attribute, which is synonymous with navigator's vendor neutralityWord. Unfortunately, other browsers do not support this more intuitive property naming. In the past, navigator objects were often used by sc
From: China Mobile Communication Forum
I. CDMANetwork
China Unicom announced the large-scale development of CDMA networks and explicitly proposed the implementation of SIM card functions similar to the GSM system in the CDMA system. This action immediately aroused strong repercussions at home and abroad. In China, many people argue over the advantages and disadvantages of the SIM card (called uimcard in CDMA systems) and the air activation Technol
Gsm
Global System for Mobile Communications, the most widely used digital mobile phone System and the de facto wireless One standard in europe.originally defined as a Pan-european open standard for a digital cellular telephone network to Supp ORT voice, data, text messaging and Cross-border roaming. The GSM is now one of the world's main 2G digital wireless standards.
protocol for testing, Hping2 is also a good choice.
6. Kismet: This is a very powerful wireless network sniffing tool. Kimset is a layer 2 wireless network detection program, Sniffer and intrusion detection system based on 802.11. It can detect hidden networks in use through passive sniffing (which is the opposite of active sniffing tools such as NetStumbler. It
here. The rest can be explained in detail by its help documentation.To run the files required by tcpdump:Tcpdump can run well on UNIX, Linux and Mac OSX operating systems, it is now the latest version of Tcpdump 4.0.0, and we can download its binary package from www.tcpdump.org. At the same time, to run it, you also need to install the Libpcap1.0.0 Driver Library in the system.The version of Tcpdump under the Windows system is windump, and it is also a free network analysis software based on th
In sniffing Ethernet (generally referred to as sniffer can be used for network packet eavesdropping) (sniff) is not a good thing for network security, although network administrators are able to track packets and discover Internet problems, but only if the attacker uses them. Poses a serious security threat throughout the network.As for sniffing (typically, a sniffer can eavesdrop on a network packet that f
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.