Detecting near-by phone numbers [closed] - mobile

Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 5 years ago.
Improve this question
Trying to figure out some sort of method in which it would be possible to detect nearby phone numbers e.g. within a private premises.
My only lead so far is to build a mini mobile base station that would let phones connect to it - even then my theory for this has many holes and blanks.
The above may be completely off or possibly I may be on to something, either way if someone could give me a rough idea of what direction to take it in that would be much appreciated - I do not require any kind of code as I would much rather figure it out myself via a finger pointed in the right direction.
Even if you do not have any solid answers but some tips that could possibly help me piece this together, that'd be great.

This link might be useful. It feature some code and instructions for a personal cell tower.
https://julianoliver.com/output/stealth-cell-tower

After a lot of searching, I came across something called an IMSI-catcher, which is a telephone eavesdropping device used for intercepting mobile phone traffic and tracking location data of mobile phone users. Now, this does not give the MSISDN (the phone number) but does give the unique IMSI number of the user, so maybe that could help.
Ref: https://en.wikipedia.org/wiki/IMSI-catcher
Also, accroding to this article (https://en.wikipedia.org/wiki/Talk%3AIMSI-catcher), it is not possible to get the MSISDN with this method since mobile phones send the IMSI when connecting to towers which internally is converted by the provider to the mobile number (MSISDN).

I looked into the same idea but, at only a theoretical level. I found that whenever someones WiFi is turned on, they will ~constantly broadcast a signal. A signal that contains there MAC address. You can use this to identify who is there. Most people either forget, or are just lazy to turn of there WiFi when they leave home/work, and you can exploit this. So all you have to do is passively listen for these signals. The best thing is that you don't broadcast any signals at all, so they have no idea you know that they are there. More information at: https://www.crc.id.au/tracking-people-via-wifi-even-when-not-connected/.
I hope I could help,
please comment if you have any questions.

Related

What is STRIPS in artificial intelligence? [closed]

Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 6 years ago.
Improve this question
I have a homework in artificial intelligence.
I need to make a robot go from room A to room B and there are obstacles between the rooms.
The professor asked me to use STRIPS (Stanford Research Institute Problem Solver) but I can not understand how STRIPS works.
Can someone give me a good explanation and examples about what is strips and how it work?
Thank you.
[Please note, this is based on what I half-remember from nearly a year ago]
These days, I would expect that when the Prof. says STRIPS, they would be talking about the problem coding 'language', rather than the planner - check for example the Wikipedia page: STRIPS. I would imagine that your Prof. likely has a particular solver (and quite possibly algorithm too) in mind, and is wanting you to encode the domain and specific problem, to run on the solver. Without knowing more details of the assignment, I can't be sure what you need. If you're looking for a planner, as I understand it, Fast Downward is quite popular among researchers currently. The website has some instructions on how to use it, and IIRC it comes with a bunch of domains and problems for those domains. I would thoroughly recommend looking at those, they're pretty much what I learnt with. I also just found this and this.
STRIPS is essentially a way of encoding information about the nature of the problem you want the computer to find a solution to. Typically you encode a domain, which provides information about the problem overall, such as what objects may be involved, what states they can be in, and what actions can be taken. Then, you also encode a particular problem, which (generally) specifies the starting state of the problem, and what the goal state should look like. Both those files are fed into a solver, which takes them and then finds a solution to the problem. Note that this won't always necessarily be an optimal solution - that depends on what algorithm you use, and how you have told the solver what should be optimised (which I think you can generally do in the problem, though I can't remember for sure now).
I suggest you have a look at those links, and see what you can find out. That should hopefully give you a better idea of what gaps you need filled in your knowledge, and then you can narrow in on exact specifics. If this is a taught course assignment, then I would expect that surely the Prof. would have gone over some of this in lectures (do you have lecture slides available?), or at least pointed everyone towards a recommended planner and material to read up on. If you're still struggling, your best bet is to go back and see the Prof. in office hours.

Read network data from Airport Extreme [closed]

Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 4 years ago.
Improve this question
I'm making a network manager program as a small project, and I want it to be able to access data on my Airport Extreme (most importantly, the DHCP client list).
There has to be a way of accessing the client list file from the Airport Extreme, after all, Airport Utility can do it. All I want to do is read the data from the file/list.
If anyone could even point me in the right direction, that would be great. I'm also hoping that I can get this program to run on all *nix machines, not just a mac (so any Airport utility hacks wouldn't really help).
You can do this via SNMP. Get hold of an SNMP browser such as GetIF and browse around the Airport via its address to see exactly what's in there, then use an SNMP library to get hold of the same information yourself in your application.
Network management essentially is SNMP. I'm surprised you hadn't come across it already.
I can't leave a comment so I will leave an answer. I don't have a solid answer but I have a few bread crumbs that might be helpful.
see the comment on page 5 — https://discussions.apple.com/thread/5101886?start=60&tstart=0 by user "_r_s_"
Also
1) Open airport utility
2) Double click your airport device from the window or click the device and then click the edit button.
3) Now go to File>Export Configuration File
4) Open the .baseconfig file in your favorite editor
5) Now go to http://aldentech.wnyric.org/webshare/mkempste/AirPort%20Utility%20copy.app/Contents/Resources/English.lproj/AirPortSettings.strings to help you sort out what all the strings mean.
6) Edit your base config file — Use the site below to find out the strings meaning in the .baseconfig file and edit the file to yield the result you are looking for.
7) Import the file back to your airport device and it should give you the features it is capable of.
I am posting these steps because Apple has removed SNMP for Airport Utility but they appear to be in the XML.
If you are willing please leave a link to your project.

cost of developing and running a GPS application [closed]

Closed. This question is off-topic. It is not currently accepting answers.
Want to improve this question? Update the question so it's on-topic for Stack Overflow.
Closed 12 years ago.
Improve this question
i am currently undergoing the branding of a place that is in the outskirts of a major city. the situation at hand is that the place is unknown and not easy to get around, so my associates and i have planned to develop a gps application with specifics eg safari lodges, conference venues of this area and make it possible for people to download it onto their smartphones (nokia,iphone and black berry) and be able to navigate their way around.
the issue is how much would it cost to develop such an application and run it?
need an answer ASAP. thanks a mil.
The answer to this question could be 1000$, but it could be 100.000$ as well. There are so many details to a project like this that must be taken into account that it is almost impossible to answer your question more precisely.
To give an example - consider details like (but not only):
who will supply the necessary content
does the content need to be updated on a regular basis -> CMS
should the app navigate the user around in turn-by-turn style or should it be more like an interactive map
These three details alone would make a huge difference. So, the best thing you can do is contact a company or a freelance developer, brief him precisely on the matter and see how much it'll cost you.

Best practices for creating a license for a program? Tie to a hardware or just use a UUID? [closed]

Closed. This question is opinion-based. It is not currently accepting answers.
Want to improve this question? Update the question so it can be answered with facts and citations by editing this post.
Closed 7 years ago.
Improve this question
I'm working with a developer who has placed his faith in a license scheme that makes little sense to me. He wants to tie a desktop application to a hardware component value, one of which is easily changed, the MAC address of the ethernet controller.
Now, I know no one likes licenses, he does want to protect his hard work and I can understand that. What can I tell him to help him out? In the very least I'd like to give him a path other than tying a license to a hardware component.
I am sure this will not convince anyone who doesn't already share my view, but I don't see any value in licensing schemes that are more complicated than a short serial number, perhaps "phoning home" so you can detect if it is being abused and disable it. If the software is moderately popular, it will be cracked, whether you invest $5 or $5 million into the licensing scheme. Put those millions toward building a product that honest people (the majority) are willing to pay for and upgrade. If more protection is needed, hopefully the application can be converted to a web service.
In one of the podcasts, Joel said something like this (I'm paraphrasing):
Just make your licensing scheme hard
enough to crack so that it's a little
easier to pick up the check from
accounting and just order another
license. That keeps those people
honest that are worth thinking about.
The rest of them are not going to give
a penny to you anyway.
Good point, I guess.
If he wants to be sure that only the licensed computer can use the software, a hardware key is one of the only options to be sure that the hardware(computer) is the same as the one the license was purchased for.
It can be easily cracked(so can anything), but it's not so easy to use two computers with the same mac address on the same network segment.
I don't see how a UUID will make a license more secure, or help to accomplish the goal of restricting one license per computer.
With licenses it depends on what the goal of the license is, having a unique license per computer may be a valid decision(although I personally don't like it), but it has to be remembered that licenses will only keep honest people honest in the end, and if someone decides to, they will crack your license scheme.
It all depends on how many users he expects and the price of his application, but in any case a mac address can be easily changed and will certainly only annoy valid users. In my opinion a standard serial will just do fine. If something shows up in P2P networks, just talk to the user to whom you issued the serial and ban it in the next release. To make a long story short, in the eye of a fraudulent user the only difference will be, if he downloads "CoolApp.v1.11.Incl.Keymaker-GroupName" or "CoolApp.v1.11.Incl.Keygen.and.Patch-GroupName".

best way to bounding software licence to a machine/environment? [closed]

Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 7 years ago.
Improve this question
I need to create a software license key, and one of the requirement is to bound the key to a particular server, to avoid image duplication.
1. what is the preferred way to achieve this task (CPU, MAC, other) ?
2. Can it be achieved on virtual machines?
Extra credits for to cross-platform approaches :)
Follow the same approach as the Windows activation does. Collect the information about hardware, convert it into some sort of hash and here is your machine key.
Check here what hardware it watches:
Windows Product Activation
Windows Product Activation (WPA) on Windows XP
Please don't do anything like this: all you are doing is pissing off your legitimate customers. The bad guys will find a way around whatever you do.
The last thing any customer wants is to be up at 4:00am trying to convince a piece of software they paid good money for that, yes, it is still running on the same machine as before only the network card/ disk controller/ motherboard/ etc. has been changed.
The tricky thing is to find a unique key determined by the above, with some reduncancy. I.e. to allow that either CPU(s), MAC or harddisk is replaced, but not all of them. Actually, CPU-ID is less likely to change as MAC and harddisk, so it is more suitable. It can be acchieved on virtual machines, although virtual machines can also clone these IDs. In that case you may want to combine an active license with a single internet based server which validates the activity; this way if VM's are cloned, only one can be active.

Resources